Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Deep Learning (2)
- Face Recognition (2)
- Machine learning (2)
- Adversarial Defense (1)
- Adversarial Example (1)
-
- Adversarial Learning (1)
- Artificial Intelligence (1)
- Biometrics (1)
- CNN (1)
- CO2 sequestration (1)
- Cell microscopy (1)
- Classification (1)
- Community detections (1)
- Contrastive loss (1)
- Cyberterrorism (1)
- Dark Web (1)
- Data Augmentation (1)
- Data-Driven (1)
- Detection (1)
- Diabetes (1)
- Domain adaptation (1)
- Effort Prediction (1)
- Few-shot learning (1)
- Generative Adversarial Networks (1)
- Glucose (1)
- Human Identification (1)
- Information Bottleneck (1)
- Instance segmentation (1)
- Internet (1)
- Issue Tracking System (1)
Articles 1 - 9 of 9
Full-Text Articles in Physical Sciences and Mathematics
Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy
Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy
Graduate Theses, Dissertations, and Problem Reports
Blood glucose monitoring is a key process in the prevention and management of certain chronic diseases, such as diabetes. Currently, glucose monitoring for those interested in their blood glucose levels are confronted with options that are primarily invasive and relatively costly. A growing topic of note is the development of non-invasive monitoring methods for blood glucose. This development holds a significant promise for improvement to the quality of life of a significant portion of the population and is overall met with great enthusiasm from the scientific community as well as commercial interest. This work aims to develop a potential pipeline …
Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray
Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray
Graduate Theses, Dissertations, and Problem Reports
Deep learning models with convolutional neural networks are being used to solve some of the most difficult problems in computing today. Complicating factors to the use and development of deep learning models include lack of availability of large volumes of data, lack of problem specific samples, and the lack variations in the specific samples available. The costs to collect this data and to compute the models for the task of detection remains a inhibitory condition for all but the most well funded organizations. This thesis seeks to approach deep learning from a cost reduction and hybrid perspective — incorporating techniques …
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Graduate Theses, Dissertations, and Problem Reports
Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
Graduate Theses, Dissertations, and Problem Reports
Deep learning has witnessed astonishing advancement in the last decade and revolutionized many fields ranging from computer vision to natural language processing. A prominent field of research that enabled such achievements is adversarial learning, investigating the behavior and functionality of a learning model in presence of an adversary. Adversarial learning consists of two major trends. The first trend analyzes the susceptibility of machine learning models to manipulation in the decision-making process and aims to improve the robustness to such manipulations. The second trend exploits adversarial games between components of the model to enhance the learning process. This dissertation aims to …
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Graduate Theses, Dissertations, and Problem Reports
This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …
A Domain Adaptation Approach For Segmenting Cell Instances In Microscopy Data, Matthew R. Keaton
A Domain Adaptation Approach For Segmenting Cell Instances In Microscopy Data, Matthew R. Keaton
Graduate Theses, Dissertations, and Problem Reports
Automated cellular instance segmentation is a process that has been utilized for accelerating biological research since before the deep learning era, and recent advancements have produced higher quality results with less effort from the biologist. Most current endeavors focus on completely cutting the researcher out of the picture by generating highly generalized models. However, these models invariably fail when faced with novel data and effectively opt to miss out on the full capabilities of deep learning in pursuit of this goal. In our work, we demonstrate how, with even a minimal amount of annotated data, dominant approaches in this space …
Learning Representations For Human Identification, Sinan Sabri
Learning Representations For Human Identification, Sinan Sabri
Graduate Theses, Dissertations, and Problem Reports
Long-duration visual tracking of people requires the ability to link track snippets (a.k.a. tracklets) based on the identity of people. In lack of the availability of motion priors or hard biometrics (e.g., face, fingerprint, or iris), the common practice is to leverage soft biometrics for matching tracklets corresponding to the same person in different sightings. A common choice is to use the whole-body visual appearance of the person, as determined by the clothing, which is assumed to not change during tracking. The problem is challenging because distinct images of the same person may look very different, since no restrictions are …
Application Of Artificial Intelligence For Co2 Storage In Saline Aquifer (Smart Proxy For Snap-Shot In Time), Marwan Mohammed Alnuaimi
Application Of Artificial Intelligence For Co2 Storage In Saline Aquifer (Smart Proxy For Snap-Shot In Time), Marwan Mohammed Alnuaimi
Graduate Theses, Dissertations, and Problem Reports
In recent years, artificial intelligence (AI) and machine learning (ML) technology have grown in popularity. Smart Proxy Models (SPM) are AI/ML based data-driven models which have proven to be quite crucial in petroleum engineering domain with abundant data, or operations in which large surface/ subsurface volume of data is generated. Climate change mitigation is one application of such technology to simulate and monitor CO2 injection into underground formations.
The goal of the SPM developed in this study is to replicate the results (in terms of pressure and saturation outputs) of the numerical reservoir simulation model (CMG) for CO2 injection into …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …