Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Graph-Based Latent Embedding, Annotation And Representation Learning In Neural Networks For Semi-Supervised And Unsupervised Settings, Ismail Ozsel Kilinc
Graph-Based Latent Embedding, Annotation And Representation Learning In Neural Networks For Semi-Supervised And Unsupervised Settings, Ismail Ozsel Kilinc
USF Tampa Graduate Theses and Dissertations
Machine learning has been immensely successful in supervised learning with outstanding examples in major industrial applications such as voice and image recognition. Following these developments, the most recent research has now begun to focus primarily on algorithms which can exploit very large sets of unlabeled examples to reduce the amount of manually labeled data required for existing models to perform well. In this dissertation, we propose graph-based latent embedding/annotation/representation learning techniques in neural networks tailored for semi-supervised and unsupervised learning problems. Specifically, we propose a novel regularization technique called Graph-based Activity Regularization (GAR) and a novel output layer modification called …
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
USF Tampa Graduate Theses and Dissertations
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy
resources and also restricted by the ad-hoc network operational
environment. They pose unique challenges, due to limited power
supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …