Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Machine Learning Modeling Of Polymer Coating Formulations: Benchmark Of Feature Representation Schemes, Nelson I. Evbarunegbe Nov 2023

Machine Learning Modeling Of Polymer Coating Formulations: Benchmark Of Feature Representation Schemes, Nelson I. Evbarunegbe

Masters Theses

Polymer coatings offer a wide range of benefits across various industries, playing a crucial role in product protection and extension of shelf life. However, formulating them can be a non-trivial task given the multitude of variables and factors involved in the production process, rendering it a complex, high-dimensional problem. To tackle this problem, machine learning (ML) has emerged as a promising tool, showing considerable potential in enhancing various polymer and chemistry-based applications, particularly those dealing with high dimensional complexities.

Our research aims to develop a physics-guided ML approach to facilitate the formulations of polymer coatings. As the first step, this …


Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez Aug 2023

Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez

Masters Theses

In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …


Interstice, Shravan Rao Jun 2023

Interstice, Shravan Rao

Masters Theses

When I was about three years old, I distinctly remember being too small to see what was on top of the table. A couple of years later, when I could see those objects, I thought the world around me had grown smaller. In a way, it did, as I experienced, lived, captured, remembered, and shared the space repeatedly. This sense of the world shrinking was exaggerated during the Covid-19 pandemic, allowing new behaviours and modes of interaction to emerge. Continually shaping our modern lives, virtual technologies redefine how we access and share information and stories or even explore new places. …


Detecting Ai Generated Text Using Neural Networks, Jesus Guerrero May 2023

Detecting Ai Generated Text Using Neural Networks, Jesus Guerrero

Masters Theses

For humans, distinguishing machine generated text from human written text is men- tally taxing and slow. NLP models have been created to do this more effectively and faster. But, what if some adversarial changes have been added to the machine generated text? This thesis discusses this issue and text detectors in general.

The primary goal of this thesis is to describe the current state of text detectors in research and to discuss a key adversarial issue in modern NLP transformers. To describe the current state of text detectors a Systematic Literature Review was done on 50 relevant papers to machine-centric …


Interactive Data Analysis Of Multi-Run Performance Data, Vanessa Lama May 2023

Interactive Data Analysis Of Multi-Run Performance Data, Vanessa Lama

Masters Theses

Multi-dimensional performance data analysis presents challenges for programmers, and users. Developers have to choose library and compiler options for each platform, analyze raw performance data, and keep up with new technologies. Users run codes on different platforms, validate results with collaborators, and analyze performance data as applications scale up. Site operators use multiple profiling tools to optimize performance, requiring the analysis of multiple sources and data types. There is currently no comprehensive tool to support the structured analysis of unstructured data, when holistic performance data analysis can offer actionable insights and improve performance. In this work, we present thicket, a …


A Machine Learning Approach For Predicting Clinical Trial Patient Enrollment In Drug Development Portfolio Demand Planning, Ahmed Shoieb May 2023

A Machine Learning Approach For Predicting Clinical Trial Patient Enrollment In Drug Development Portfolio Demand Planning, Ahmed Shoieb

Masters Theses

One of the biggest challenges the clinical research industry currently faces is the accurate forecasting of patient enrollment (namely if and when a clinical trial will achieve full enrollment), as the stochastic behavior of enrollment can significantly contribute to delays in the development of new drugs, increases in duration and costs of clinical trials, and the over- or under- estimation of clinical supply. This study proposes a Machine Learning model using a Fully Convolutional Network (FCN) that is trained on a dataset of 100,000 patient enrollment data points including patient age, patient gender, patient disease, investigational product, study phase, blinded …


Survey Of Input Modalities In The Western World, John Ezat Sadik May 2023

Survey Of Input Modalities In The Western World, John Ezat Sadik

Masters Theses

Having your account compromised can lead to serious complications in your life. One
way accounts become compromised is through the security risks associated with weak
passwords and reused passwords [22,23]. In this thesis, we seek to understand how
entering passwords on non-PC devices contributes to the problems of weak and reused
passwords. To do so, we conducted a survey that was distributed to people in the
the Western World. In our survey results, we found that users commented about
how the current password model was not created with a variety of device types in
mind, which created frustrations and complexity …


Computer Vision In Adverse Conditions: Small Objects, Low-Resoltuion Images, And Edge Deployment, Raja Sunkara Jan 2023

Computer Vision In Adverse Conditions: Small Objects, Low-Resoltuion Images, And Edge Deployment, Raja Sunkara

Masters Theses

"Computer vision based on deep learning is an essential field that plays a significant role in object detection, image classification, semantic segmentation, instance segmentation, and other applications. However, these models face significant challenges in adverse conditions, such as small objects, low-resolution images, and edge deployment. These challenges limit the accuracy and efficiency of computer vision algorithms, making it difficult to obtain reliable results.

The primary objective of this thesis is to assess the performance of deep learning- based computer vision models in challenging conditions and provide viable solutions to overcome the obstacles. The study will specifically address three key challenges, …


Dynamic Discounted Satisficing Based Driver Decision Prediction In Sequential Taxi Requests, Sree Pooja Akula Jan 2023

Dynamic Discounted Satisficing Based Driver Decision Prediction In Sequential Taxi Requests, Sree Pooja Akula

Masters Theses

"Ridesharing platforms rely on connecting available taxi drivers to potential passengers to maximize their revenue. However, predicting the stopping decision made by every driver, i.e., the final task performed during a given day, is crucial to achieving this goal. Unfortunately, little research has been done on predicting drivers’ stopping decisions, especially when they deviate from expected utility maximization behavior. This research proposes a Dynamic Discounted Satisficing (DDS) heuristic to model and learn the task at which human agents will stop working for that day, assuming that the human agents are taking sequential decisions based on their preference order. We apply …


Mat: Genetic Algorithms Based Multi-Objective Adversarial Attack On Multi-Task Deep Neural Networks, Nikola Andric Jan 2023

Mat: Genetic Algorithms Based Multi-Objective Adversarial Attack On Multi-Task Deep Neural Networks, Nikola Andric

Masters Theses

"Vulnerability to adversarial attacks is a recognized deficiency of not only deep neural networks (DNNs) but also multi-task deep neural networks (MT-DNNs) that attracted much attention in the past few years. To the best of our knowledge, all multi-task deep neural network adversarial attacks currently present in the literature are non-targeted attacks that use gradient descent to optimize a single loss function generated by aggregating all loss functions into one. On the contrary, targeted attacks are sometimes preferred since they give more control over the attack. Hence, this paper proposes a novel targeted multi-objective adversarial ATtack (MAT) based on genetic …