Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy Jan 2022

Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy

Graduate Theses, Dissertations, and Problem Reports

Blood glucose monitoring is a key process in the prevention and management of certain chronic diseases, such as diabetes. Currently, glucose monitoring for those interested in their blood glucose levels are confronted with options that are primarily invasive and relatively costly. A growing topic of note is the development of non-invasive monitoring methods for blood glucose. This development holds a significant promise for improvement to the quality of life of a significant portion of the population and is overall met with great enthusiasm from the scientific community as well as commercial interest. This work aims to develop a potential pipeline …


Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray Jan 2022

Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray

Graduate Theses, Dissertations, and Problem Reports

Deep learning models with convolutional neural networks are being used to solve some of the most difficult problems in computing today. Complicating factors to the use and development of deep learning models include lack of availability of large volumes of data, lack of problem specific samples, and the lack variations in the specific samples available. The costs to collect this data and to compute the models for the task of detection remains a inhibitory condition for all but the most well funded organizations. This thesis seeks to approach deep learning from a cost reduction and hybrid perspective — incorporating techniques …


Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean Jan 2022

Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean

Graduate Theses, Dissertations, and Problem Reports

Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …


An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei Jan 2022

An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei

Graduate Theses, Dissertations, and Problem Reports

Deep learning has witnessed astonishing advancement in the last decade and revolutionized many fields ranging from computer vision to natural language processing. A prominent field of research that enabled such achievements is adversarial learning, investigating the behavior and functionality of a learning model in presence of an adversary. Adversarial learning consists of two major trends. The first trend analyzes the susceptibility of machine learning models to manipulation in the decision-making process and aims to improve the robustness to such manipulations. The second trend exploits adversarial games between components of the model to enhance the learning process. This dissertation aims to …


Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler Jan 2022

Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler

Graduate Theses, Dissertations, and Problem Reports

This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …


A Domain Adaptation Approach For Segmenting Cell Instances In Microscopy Data, Matthew R. Keaton Jan 2022

A Domain Adaptation Approach For Segmenting Cell Instances In Microscopy Data, Matthew R. Keaton

Graduate Theses, Dissertations, and Problem Reports

Automated cellular instance segmentation is a process that has been utilized for accelerating biological research since before the deep learning era, and recent advancements have produced higher quality results with less effort from the biologist. Most current endeavors focus on completely cutting the researcher out of the picture by generating highly generalized models. However, these models invariably fail when faced with novel data and effectively opt to miss out on the full capabilities of deep learning in pursuit of this goal. In our work, we demonstrate how, with even a minimal amount of annotated data, dominant approaches in this space …


Learning Representations For Human Identification, Sinan Sabri Jan 2022

Learning Representations For Human Identification, Sinan Sabri

Graduate Theses, Dissertations, and Problem Reports

Long-duration visual tracking of people requires the ability to link track snippets (a.k.a. tracklets) based on the identity of people. In lack of the availability of motion priors or hard biometrics (e.g., face, fingerprint, or iris), the common practice is to leverage soft biometrics for matching tracklets corresponding to the same person in different sightings. A common choice is to use the whole-body visual appearance of the person, as determined by the clothing, which is assumed to not change during tracking. The problem is challenging because distinct images of the same person may look very different, since no restrictions are …


Application Of Artificial Intelligence For Co2 Storage In Saline Aquifer (Smart Proxy For Snap-Shot In Time), Marwan Mohammed Alnuaimi Jan 2022

Application Of Artificial Intelligence For Co2 Storage In Saline Aquifer (Smart Proxy For Snap-Shot In Time), Marwan Mohammed Alnuaimi

Graduate Theses, Dissertations, and Problem Reports

In recent years, artificial intelligence (AI) and machine learning (ML) technology have grown in popularity. Smart Proxy Models (SPM) are AI/ML based data-driven models which have proven to be quite crucial in petroleum engineering domain with abundant data, or operations in which large surface/ subsurface volume of data is generated. Climate change mitigation is one application of such technology to simulate and monitor CO2 injection into underground formations.

The goal of the SPM developed in this study is to replicate the results (in terms of pressure and saturation outputs) of the numerical reservoir simulation model (CMG) for CO2 injection into …


Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire Jan 2022

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire

Graduate Theses, Dissertations, and Problem Reports

Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …