Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (1490)
- Singapore Management University (435)
- TÜBİTAK (230)
- City University of New York (CUNY) (96)
- Old Dominion University (82)
-
- Walden University (81)
- Technological University Dublin (76)
- University of Texas at El Paso (71)
- University for Business and Technology in Kosovo (67)
- San Jose State University (62)
- Chulalongkorn University (54)
- Air Force Institute of Technology (49)
- University of Central Florida (48)
- Zayed University (47)
- University of Texas Rio Grande Valley (42)
- University of South Florida (41)
- Kennesaw State University (40)
- Manipal Academy of Higher Education (40)
- University of Nebraska - Lincoln (40)
- Western University (36)
- Dartmouth College (34)
- Missouri University of Science and Technology (33)
- Portland State University (32)
- Edith Cowan University (31)
- Nova Southeastern University (28)
- Utah State University (28)
- Boise State University (27)
- Chapman University (25)
- University of Massachusetts Amherst (25)
- Karbala International Journal of Modern Science (24)
- Keyword
-
- Machine learning (184)
- Deep learning (98)
- Simulation (85)
- Machine Learning (73)
- Cybersecurity (68)
-
- Artificial intelligence (63)
- Computer Science (60)
- Cloud computing (37)
- Security (35)
- Deep Learning (34)
- Neural networks (31)
- Computer science (30)
- Optimization (30)
- Genetic algorithm (29)
- Classification (28)
- Blockchain (27)
- Feature extraction (25)
- Natural language processing (25)
- Neural network (25)
- Visualization (25)
- Computer vision (24)
- Convolutional neural networks (23)
- IoT (23)
- Social media (23)
- Virtual reality (23)
- Artificial Intelligence (22)
- COVID-19 (22)
- Particle swarm optimization (22)
- Privacy (22)
- Modeling (21)
- Publication
-
- Journal of System Simulation (1490)
- Research Collection School Of Computing and Information Systems (410)
- Turkish Journal of Electrical Engineering and Computer Sciences (230)
- Theses and Dissertations (167)
- Walden Dissertations and Doctoral Studies (81)
-
- Open Educational Resources (70)
- Departmental Technical Reports (CS) (57)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (54)
- Computer Science Faculty Publications and Presentations (53)
- All Works (47)
- Doctoral Dissertations (47)
- Dissertations (46)
- Master's Projects (45)
- USF Tampa Graduate Theses and Dissertations (41)
- Manipal Institute of Technology, Manipal Theses and Dissertations (40)
- Electronic Theses and Dissertations, 2020- (39)
- Articles (38)
- Computer Science Faculty Publications (37)
- Electronic Thesis and Dissertation Repository (32)
- CCE Theses and Dissertations (27)
- Research outputs 2014 to 2021 (26)
- Karbala International Journal of Modern Science (24)
- Conference papers (23)
- School of Professional Studies (22)
- Dartmouth College Undergraduate Theses (19)
- Electronic Theses and Dissertations (19)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (18)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (18)
- Faculty Publications (17)
- Master's Theses (17)
- Publication Type
Articles 1 - 30 of 4401
Full-Text Articles in Physical Sciences and Mathematics
Inexact Tensor Methods And Their Application To Stochastic Convex Optimization, Artem Agafonov, Dmitry Kamzolov, Pavel Dvurechensky, Alexander Gasnikov, Martin Takac
Inexact Tensor Methods And Their Application To Stochastic Convex Optimization, Artem Agafonov, Dmitry Kamzolov, Pavel Dvurechensky, Alexander Gasnikov, Martin Takac
Machine Learning Faculty Publications
We propose general non-accelerated and accelerated tensor methods under inexact information on the derivatives of the objective, analyze their convergence rate. Further, we provide conditions for the inexactness in each derivative that is sufficient for each algorithm to achieve a desired accuracy. As a corollary, we propose stochastic tensor methods for convex optimization and obtain sufficient mini-batch sizes for each derivative. © 2020, CC BY.
Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong
Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong
Dissertations
A parallel decentralized binary decision fusion architecture employs a bank of local detectors (LDs) that access a commonly-observed phenomenon. The system makes a binary decision about the phenomenon, accepting one of two hypotheses (H0 (“absent”) or H1 (“present”)). The k 1 LD uses a local decision rule to compress its local observations yk into a binary local decision uk; uk = 0 if the k 1 LD accepts H0 and uk = 1 if it accepts H1. The k 1 LD sends its decision uk over a noiseless dedicated channel to a Data Fusion Center (DFC). The DFC combines the …
Drone-Assisted Emergency Communications, Di Wu
Drone-Assisted Emergency Communications, Di Wu
Dissertations
Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …
A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek
A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek
Dissertations
The introduction of deep learning and big data analytics may significantly elevate the performance of traffic speed prediction. Work zones become one of the most critical factors causing congestion impact, which reduces the mobility as well as traffic safety. A comprehensive literature review on existing work zone delay prediction models (i.e., parametric, simulation and non-parametric models) is conducted in this research. The research shows the limitations of each model. Moreover, most previous modeling approaches did not consider user delay for connected freeways when predicting traffic speed under work zone conditions. This research proposes Deep Artificial Neural Network (Deep ANN) and …
Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu
Dissertations
The combination of online shopping and social media allow people with similar shopping interests and experiences to share, comment, and discuss about shopping from anywhere and at any time, which also leads to the emergence of online shopping communities. Today, more people turn to online platforms to share their opinions about products, solicit various opinions from their friends, family members, and other customers, and have fun through interactions with others with similar interests. This dissertation explores how collaborative online shopping presents itself as a context and platform for users' interpersonal interactions and social relationship formation through a series of studies. …
Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao
Dissertations
Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Dissertations
Internet traffic classification or packet classification is the act of classifying packets using the extracted statistical data from the transmitted packets on a computer network. Internet traffic classification is an essential tool for Internet service providers to manage network traffic, provide users with the intended quality of service (QoS), and perform surveillance. QoS measures prioritize a network's traffic type over other traffic based on preset criteria; for instance, it gives higher priority or bandwidth to video traffic over website browsing traffic. Internet packet classification methods are also used for automated intrusion detection. They analyze incoming traffic patterns and identify malicious …
Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu
Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu
Dissertations
Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …
Accelerating Transitive Closure Of Large-Scale Sparse Graphs, Sanyamee Milindkumar Patel
Accelerating Transitive Closure Of Large-Scale Sparse Graphs, Sanyamee Milindkumar Patel
Theses
Finding the transitive closure of a graph is a fundamental graph problem where another graph is obtained in which an edge exists between two nodes if and only if there is a path in our graph from one node to the other. The reachability matrix of a graph is its transitive closure. This thesis describes a novel approach that uses anti-sections to obtain the transitive closure of a graph. It also examines its advantages when implemented in parallel on a CPU using the Hornet graph data structure.
Graph representations of real-world systems are typically sparse in nature due to lesser …
Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil
Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil
Elinvo (Electronics, Informatics, and Vocational Education)
Pengembangan sistem informasi pemasaran produk pertanian (SIPTANI) dibutuhkan untuk membantu para petani dalam memasarkan produk-produk pertanian khususnya di era pandemic Covid-19. Penelitian ini merupakan penelitian pengembangan sistem dengan model pengembangan prototype dengan studi kelayakan menggunakan standar ISO 9126. Data penelitian diperoleh dari hasil observasi dan pengisian kuesioner oleh responden. Hasil pengujian aplikasi diperoleh dengan menganalisis aspek-aspek pada functional suitability, usability, compatibility, dan portability. Pada aspek functional suitability berada pada kategori layak diterima. Pada aspek usability, kategori sangat setuju memiliki dengan persentase 90%, sehingga aplikasi dinyatakan layak dan ditanggapi baik oleh pengguna. Pada aspek compatibility, sistem pemasaran pertanian ini dapat …
Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari
Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari
Elinvo (Electronics, Informatics, and Vocational Education)
Abstract-Supplier selection is one of the important things in purchasing activities for companies. Supplier selection is a multi-criteria problem which includes quantitative and qualitative factors. One method that can be used for supplier selection is the AHP (Analytical Hierarchy Process) method. The problems that will be discussed in this study are: (1) how is the order of priority criteria and sub-criteria in the selection of suppliers at PT Garuda Hidrotive International? (2) which supplier / supplier should PT Garuda Hidrotive International choose based on the AHP method? The sampling technique uses judgment sampling because the AHP method requires dependence on …
Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah
Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah
Elinvo (Electronics, Informatics, and Vocational Education)
Bipartite graph merupakan satu bentuk graph yang dapat digunakan dalam membentuk sebuah strukur data yang saling berelasi namun memiliki karakteristik dengan dua jenis node yang berbeda seperti data hubungan keluarga atau data pohon keluarga. Dalam menyimpan struktur data bipartite graph ke sebuah database dapat digunakan graph database dengan konsep dimana node saling saling terhubung dengan node lainnya. Bipartite graph yang dikombinasikan dengan graph database menghasilkan solusi yang tepat dalam menyimpan data berelasi dengan dua jenis node yang berbeda. Namun dalam solusi tersebut menimbulkan permasalahan baru mengenai pencarian atau penelusuran (traversal) terhadap data yang terdapat dalam struktur data tersebut. Tujuan dari …
Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti
Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti
Elinvo (Electronics, Informatics, and Vocational Education)
Pengelolaan data secara konvensional, baik manual pada buku maupun penggunaan aplikasi pengolah data (kata atau angka) dinilai masih memiliki keterbatasan terutama dalam hal keterjangkauan akses dan pengelolaan. Sistem informasi inventori mampu menyajikan pengelolaan data berupa informasi-informasi yang dibutuhkan untuk produktivitas tempat usaha sesuai karakteristik pengguna informasi pada tempat usaha tersebut. Lebih lanjut untuk proses transmisi data yang lebih baik, diperlukan optimalisasi media penyimpanan melalui teknik kompresi data tertentu. Salah satu algoritma kompresi data teks yang memiliki keunggulan pada optimalisasi ukuran hasil kompresi adalah Goldbach Codes. Artikel ini mendeskripsikan pengembangan sistem pengelolaan inventori dengan kemampuan dapat menyimpan maupun mengubah data stok …
Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir
Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir
Elinvo (Electronics, Informatics, and Vocational Education)
Layanan sistem informasi akademik untuk orang tua (SIORTU) telah banyak diterapkan di kampus-kampus, salah satunya adalah Universitas Islam Indonesia (UII). Nama resmi SIORTU UII yaitu UNISYS untuk orang tua. Belum banyak orang tua atau wali mahasiswa yang menggunakan SIORTU. Tercatat hanya 7.361 akun SIORTU yang aktif pada rentang April 2018 s.d Maret 2019. Jumlah tersebut hanya 36.68% dari jumlah akun yang disediakan untuk orang tua mahasiswa angkatan 2015-2018 yaitu 20.068 akun. Penelitian ini merupakan pengembangan penelitian yang telah dilakukan sebelumnya. Penelitian ini merupakan penelitian kuantitatif. Data yang dianalisis diperoleh dari data penelitian yang dikembangkan. Tujuan penelitian ini adalah mengetahui pengaruh …
Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri
Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri
BAU Journal - Science and Technology
the increasing demand for cloud computing services has led to the adoption of large-scale cloud data centers (DCs) to meet the user’s requirements. Efficiency and managing of such DCs have become a challenging problem. Consequently, energy-efficient solutions to optimize the whole DC energy consumption, optimize the application’s performance and reduce the cloud provider operational cost are crucial and needed. This paper addressed the problem of Virtual Machines (VMs) placement of multi-tier applications to maximize the compute resources utilization, minimize energy consumption, and reduce network traffic inside modern large-scale cloud DCs. The VM placement problem with communication dependencies among the VMs …
Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland
Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland
Systems Science Faculty Publications and Presentations
Reconstructability analysis, a methodology based on information theory and graph theory, was used to perform a sensitivity analysis of an agent-based model. The NetLogo BehaviorSpace tool was employed to do a full 2k factorial parameter sweep on Uri Wilensky’s Wealth Distribution NetLogo model, to which a Gini-coefficient convergence condition was added. The analysis identified the most influential predictors (parameters and their interactions) of the Gini coefficient wealth inequality outcome. Implications of this type of analysis for building and testing agent-based simulation models are discussed.
Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott
Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott
LSU Doctoral Dissertations
Modern human-machine systems such as microservices rely upon agile engineering practices which require changes to be tested and released more frequently than classically engineered systems. A critical step in the testing of such systems is the generation of realistic workloads or load testing. Generated workload emulates the expected behaviors of users and machines within a system under test in order to find potentially unknown failure states. Typical testing tools rely on static testing artifacts to generate realistic workload conditions. Such artifacts can be cumbersome and costly to maintain; however, even model-based alternatives can prevent adaptation to changes in a system …
Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho
Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho
Master's Projects
Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …
A Neat Approach To Malware Classification, Jason Do
A Neat Approach To Malware Classification, Jason Do
Master's Projects
Current malware detection software often relies on machine learning, which is seen as an improvement over signature-based techniques. Problems with a machine learning based approach can arise when malware writers modify their code with the intent to evade detection. This leads to a cat and mouse situation where new models must constantly be trained to detect new malware variants. In this research, we experiment with genetic algorithms as a means of evolving machine learning models to detect malware. Genetic algorithms, which simulate natural selection, provide a way for models to adapt to continuous changes in a malware families, and thereby …
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu
Physics & Astronomy Faculty Research
We present PyXtal_FF—a package based on Python programming language—for developing machine learning potentials (MLPs). The aim of PyXtal_FF is to promote the application of atomistic simulations through providing several choices of atom-centered descriptors and machine learning regressions in one platform. Based on the given choice of descriptors (including the atom-centered symmetry functions, embedded atom density, SO4 bispectrum, and smooth SO3 power spectrum), PyXtal_FF can train MLPs with either generalized linear regression or neural network models, by simultaneously minimizing the errors of energy/forces/stress tensors in comparison with the data from ab-initio simulations. The trained MLP model from PyXtal_FF is interfaced with …
Signature Identification And Verification Systems: A Comparative Study On The Online And Offline Techniques, Nehal Hamdy Al-Banhawy, Heba Mohsen, Neveen I. Ghali Prof.
Signature Identification And Verification Systems: A Comparative Study On The Online And Offline Techniques, Nehal Hamdy Al-Banhawy, Heba Mohsen, Neveen I. Ghali Prof.
Future Computing and Informatics Journal
Handwritten signature identification and verification has become an active area of research in recent years. Handwritten signature identification systems are used for identifying the user among all users enrolled in the system while handwritten signature verification systems are used for authenticating a user by comparing a specific signature with his signature that is stored in the system. This paper presents a review for commonly used methods for preprocessing, feature extraction and classification techniques in signature identification and verification systems, in addition to a comparison between the systems implemented in the literature for identification techniques and verification techniques in online and …
Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko
Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko
Journal of Sustainable Mining
The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Articles
It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …
Multi-Agent Deep Reinforcement Learning For Walkers, Inhee Park
Multi-Agent Deep Reinforcement Learning For Walkers, Inhee Park
Master's Projects
This project was motivated by seeking an AI method towards Artificial General Intelligence (AGI), that is, more similar to learning behavior of human-beings. As of today, Deep Reinforcement Learning (DRL) is the most closer to the AGI compared to other machine learning methods. To better understand the DRL, we compares and contrasts to other related methods: Deep Learning, Dynamic Programming and Game Theory.
We apply one of state-of-art DRL algorithms, called Proximal Policy Op- timization (PPO) to the robot walkers locomotion, as a simple yet challenging environment, inherently continuous and high-dimensional state/action space.
The end goal of this project is …
End-To-End Learning Utilizing Temporal Information For Vision- Based Autonomous Driving, Dapeng Guo
End-To-End Learning Utilizing Temporal Information For Vision- Based Autonomous Driving, Dapeng Guo
Master's Projects
End-to-End learning models trained with conditional imitation learning (CIL) have demonstrated their capabilities in driving autonomously in dynamic environments. The performance of such models however is limited as most of them fail to utilize the temporal information, which resides in a sequence of observations. In this work, we explore the use of temporal information with a recurrent network to improve driving performance. We propose a model that combines a pre-trained, deeper convolutional neural network to better capture image features with a long short-term memory network to better explore temporal information. Experimental results indicate that the proposed model achieves performance gain …
Lidar Object Detection Utilizing Existing Cnns For Smart Cities, Vinay Ponnaganti
Lidar Object Detection Utilizing Existing Cnns For Smart Cities, Vinay Ponnaganti
Master's Projects
As governments and private companies alike race to achieve the vision of a smart city — where artificial intelligence (AI) technology is used to enable self-driving cars, cashier-less shopping experiences and connected home devices from thermostats to robot vacuum cleaners — advancements are being made in both software and hardware to enable increasingly real-time, accurate inference at the edge. One hardware solution adopted for this purpose is the LiDAR sensor, which utilizes infrared lasers to accurately detect and map its surroundings in 3D. On the software side, developers have turned to artificial neural networks to make predictions and recommendations with …
Detecting Deepfakes With Deep Learning, Eric C. Tjon
Detecting Deepfakes With Deep Learning, Eric C. Tjon
Master's Projects
Advances in generative models and manipulation techniques have given rise to digitally altered videos known as deepfakes. These videos are difficult to identify for both humans and machines. Typical detection methods exploit various imperfections in deepfake videos, such as inconsistent posing and visual artifacts. In this paper, we propose a pipeline with two distinct pathways for examining individual frames and video clips. The image pathway contains a novel architecture called Eff-YNet capable of both segmenting and detecting frames from deepfake videos. It consists of a U-Net with a classification branch and an EfficientNet B4 encoder. The video pathway implements a …
Image Spam Classification With Deep Neural Networks, Ajay Pal Singh, Katerina Potika
Image Spam Classification With Deep Neural Networks, Ajay Pal Singh, Katerina Potika
Faculty Publications, Computer Science
Image classification is a fundamental problem of computer vision and pattern recognition. We focus on images that contain spam. Spam is unwanted bulk content, and image spam is unwanted content embedded inside the images. Image spam potentially creates a threat to the credibility of any email-based communication system. While a lot of machine learning techniques are successful in detecting textual based spam, this is not the case for image spams, which can easily evade these textual-spam detection systems. In our work, we explore and evaluate four deep learning techniques that detect image spams. First, we train deep neural networks using …
Findfur: A Tool For Predicting Furin Cleavage Sites Of Viral Envelope Substrates, Christine Gu
Findfur: A Tool For Predicting Furin Cleavage Sites Of Viral Envelope Substrates, Christine Gu
Master's Projects
Most biologically active proteins of eukaryotic cells are initially synthesized in the secretory pathway as inactive precursors and require proteolytic processing to become functionally active. This process is performed by a specialized family of endogenous enzymes known as proproteases convertases (PCs). Within this family of proteases, the most notorious and well-research is furin. Found ubiquitously throughout the human body, typical furin substrates are cleaved at sites composed of paired basic amino acids, specifically at the consensus sequence, R-X-[K/R]-R↓. Furin is often exploited by many pathogens, such as enveloped viruses, for proteolytic processing and maturation of their proteins. Glycoproteins of enveloped …
Malware Classification With Gaussian Mixture Model-Hidden Markov Models, Jing Zhao
Malware Classification With Gaussian Mixture Model-Hidden Markov Models, Jing Zhao
Master's Projects
Discrete hidden Markov models (HMM) are often applied to the malware detection and classification problems. However, the continuous analog of discrete HMMs, that is, Gaussian mixture model-HMMs (GMM-HMM), are rarely considered in the field of cybersecurity. In this study, we apply GMM-HMMs to the malware classification problem and we compare our results to those obtained using discrete HMMs. As features, we consider opcode sequences and entropy-based sequences. For our opcode features, GMM-HMMs produce results that are comparable to those obtained using discrete HMMs, whereas for our entropy-based features, GMM-HMMs generally improve on the classification results that we can attain with …