Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (13)
- Artificial Intelligence and Robotics (6)
- Engineering (3)
- Life Sciences (2)
- Numerical Analysis and Scientific Computing (2)
-
- Physics (2)
- Agriculture (1)
- Air and Space Law (1)
- Algebra (1)
- American Politics (1)
- Arts and Humanities (1)
- Biomedical Engineering and Bioengineering (1)
- Biostatistics (1)
- Chemistry (1)
- Collection Development and Management (1)
- Computer Engineering (1)
- Computer Law (1)
- Condensed Matter Physics (1)
- Data Science (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Diseases (1)
- Elementary Particles and Fields and String Theory (1)
- Graphics and Human Computer Interfaces (1)
- History (1)
- Human Rights Law (1)
- Information Literacy (1)
- International Law (1)
- International Relations (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
Automated Delineation Of Visual Area Boundaries And Eccentricities By A Cnn Using Functional, Anatomical, And Diffusion-Weighted Mri Data, Noah C. Benson, Bogeng Song, Toshikazu Miyata, Hiromasa Takemura, Jonathan Winawer
Automated Delineation Of Visual Area Boundaries And Eccentricities By A Cnn Using Functional, Anatomical, And Diffusion-Weighted Mri Data, Noah C. Benson, Bogeng Song, Toshikazu Miyata, Hiromasa Takemura, Jonathan Winawer
MODVIS Workshop
Delineating visual field maps and iso-eccentricities from fMRI data is an important but time-consuming task for many neuroimaging studies on the human visual cortex because the traditional methods of doing so using retinotopic mapping experiments require substantial expertise as well as scanner, computer, and human time. Automated methods based on gray-matter anatomy or a combination of anatomy and functional mapping can reduce these requirements but are less accurate than experts. Convolutional Neural Networks (CNNs) are powerful tools for automated medical image segmentation. We hypothesize that CNNs can define visual area boundaries with high accuracy. We trained U-Net CNNs with ResNet18 …
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.
In this work, we present the first empirical investigation of PTM reuse. …
Comparison Of Machine Learning Models: Gesture Recognition Using A Multimodal Wrist Orthosis For Tetraplegics, Charlie Martin
Comparison Of Machine Learning Models: Gesture Recognition Using A Multimodal Wrist Orthosis For Tetraplegics, Charlie Martin
The Journal of Purdue Undergraduate Research
Many tetraplegics must wear wrist braces to support paralyzed wrists and hands. However, current wrist orthoses have limited functionality to assist a person’s ability to perform typical activities of daily living other than a small pocket to hold utensils. To enhance the functionality of wrist orthoses, gesture recognition technology can be applied to control mechatronic tools attached to a novel fabricated wrist brace. Gesture recognition is a growing technology for providing touchless human-computer interaction that can be particularly useful for tetraplegics with limited upper-extremity mobility. In this study, three gesture recognition models were compared—two dynamic time-warping models and a hidden …
Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..
Applying Machine Learning To Computational Chemistry: Can We Predict Molecular Properties Faster Without Compromising Accuracy?, Hanjing Xu, Pradeep Gurunathan, Lyudmila Slipchenko
Applying Machine Learning To Computational Chemistry: Can We Predict Molecular Properties Faster Without Compromising Accuracy?, Hanjing Xu, Pradeep Gurunathan, Lyudmila Slipchenko
The Summer Undergraduate Research Fellowship (SURF) Symposium
Non-covalent interactions are crucial in analyzing protein folding and structure, function of DNA and RNA, structures of molecular crystals and aggregates, and many other processes in the fields of biology and chemistry. However, it is time and resource consuming to calculate such interactions using quantum-mechanical formulations. Our group has proposed previously that the effective fragment potential (EFP) method could serve as an efficient alternative to solve this problem. However, one of the computational bottlenecks of the EFP method is obtaining parameters for each molecule/fragment in the system, before the actual EFP simulations can be carried out. Here we present a …
Machine Learning In Xenon1t Analysis, Dillon A. Davis, Rafael F. Lang, Darryl P. Masson
Machine Learning In Xenon1t Analysis, Dillon A. Davis, Rafael F. Lang, Darryl P. Masson
The Summer Undergraduate Research Fellowship (SURF) Symposium
In process of analyzing large amounts of quantitative data, it can be quite time consuming and challenging to uncover populations of interest contained amongst the background data. Therefore, the ability to partially automate the process while gaining additional insight into the interdependencies of key parameters via machine learning seems quite appealing. As of now, the primary means of reviewing the data is by manually plotting data in different parameter spaces to recognize key features, which is slow and error prone. In this experiment, many well-known machine learning algorithms were applied to a dataset to attempt to semi-automatically identify known populations, …
Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin
Predicting Locations Of Pollution Sources Using Convolutional Neural Networks, Yiheng Chi, Nickolas D. Winovich, Guang Lin
The Summer Undergraduate Research Fellowship (SURF) Symposium
Pollution is a severe problem today, and the main challenge in water and air pollution controls and eliminations is detecting and locating pollution sources. This research project aims to predict the locations of pollution sources given diffusion information of pollution in the form of array or image data. These predictions are done using machine learning. The relations between time, location, and pollution concentration are first formulated as pollution diffusion equations, which are partial differential equations (PDEs), and then deep convolutional neural networks are built and trained to solve these PDEs. The convolutional neural networks consist of convolutional layers, reLU layers …
Classifying Pattern Formation In Materials Via Machine Learning, Lukasz Burzawa, Shuo Liu, Erica W. Carlson
Classifying Pattern Formation In Materials Via Machine Learning, Lukasz Burzawa, Shuo Liu, Erica W. Carlson
The Summer Undergraduate Research Fellowship (SURF) Symposium
Scanning probe experiments such as scanning tunneling microscopy (STM) and atomic force microscopy (AFM) on strongly correlated materials often reveal complex pattern formation that occurs on multiple length scales. We have shown in two disparate correlated materials that the pattern formation is driven by proximity to a disorder-driven critical point. We developed new analysis concepts and techniques that relate the observed pattern formation to critical exponents by analyzing the geometry and statistics of clusters observed in these experiments and converting that information into critical exponents. Machine learning algorithms can be helpful correlating data from scanning probe experiments to theoretical models …
A Study Of Security Issues Of Mobile Apps In The Android Platform Using Machine Learning Approaches, Lei Cen
A Study Of Security Issues Of Mobile Apps In The Android Platform Using Machine Learning Approaches, Lei Cen
Open Access Dissertations
Mobile app poses both traditional and new potential threats to system security and user privacy. There are malicious apps that may do harm to the system, and there are mis-behaviors of apps, which are reasonable and legal when not abused, yet may lead to real threats otherwise. Moreover, due to the nature of mobile apps, a running app in mobile devices may be only part of the software, and the server side behavior is usually not covered by analysis. Therefore, direct analysis on the app itself may be incomplete and additional sources of information are needed. In this dissertation, we …
Data Driven Low-Bandwidth Intelligent Control Of A Jet Engine Combustor, Nathan L. Toner
Data Driven Low-Bandwidth Intelligent Control Of A Jet Engine Combustor, Nathan L. Toner
Open Access Dissertations
This thesis introduces a low-bandwidth control architecture for navigating the input space of an un-modeled combustor system between desired operating conditions while avoiding regions of instability and blow-out. An experimental procedure is discussed for identifying regions of instability and gathering sufficient data to build a data-driven model of the system's operating modes. Regions of instability and blow-out are identified experimentally and a data-driven operating point classifier is designed. This classifier acts as a map of the operating space of the combustor, indicating regions in which the flame is in a "good" or "bad" operating mode. A data-driven predictor is also …
Learning From Data: Plant Breeding Applications Of Machine Learning, Alencar Xavier
Learning From Data: Plant Breeding Applications Of Machine Learning, Alencar Xavier
Open Access Dissertations
Increasingly, new sources of data are being incorporated into plant breeding pipelines. Enormous amounts of data from field phenomics and genotyping technologies places data mining and analysis into a completely different level that is challenging from practical and theoretical standpoints. Intelligent decision-making relies on our capability of extracting from data useful information that may help us to achieve our goals more efficiently. Many plant breeders, agronomists and geneticists perform analyses without knowing relevant underlying assumptions, strengths or pitfalls of the employed methods. The study endeavors to assess statistical learning properties and plant breeding applications of supervised and unsupervised machine learning …
Bridging Statistical Learning And Formal Reasoning For Cyber Attack Detection, Kexin Pei
Bridging Statistical Learning And Formal Reasoning For Cyber Attack Detection, Kexin Pei
Open Access Theses
Current cyber-infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of benign programs. Current attack detection approaches based on statistical learning methods may generate misleading decision boundaries when processing noisy data with such a mixture of benign and malicious behaviors. On the other hand, attack detection based on formal program analysis may lack completeness or adaptivity when modeling attack behaviors. In light of these limitations, we have developed LEAPS, an attack detection system based on supervised statistical learning to classify benign and malicious system events. Furthermore, we leverage control flow graphs inferred from the system event …
Moving Object Detection For Interception By A Humanoid Robot, Saltanat B. Tazhibayeva
Moving Object Detection For Interception By A Humanoid Robot, Saltanat B. Tazhibayeva
Open Access Theses
Interception of a moving object with an autonomous robot is an important problem in robotics. It has various application areas, such as in an industrial setting where products on a conveyor would be picked up by a robotic arm, in the military to halt intruders, in robotic soccer (where the robots try to get to the moving ball and try to block an opponent's attempt to pass the ball), and in other challenging situations. Interception, in and of itself, is a complex task that demands a system with target recognition capability, proper navigation and actuation toward the moving target. There …
Enabling Richer Insight Into Runtime Executions Of Systems, Karthik Swaminathan Nagaraj
Enabling Richer Insight Into Runtime Executions Of Systems, Karthik Swaminathan Nagaraj
Open Access Dissertations
Systems software of very large scales are being heavily used today in various important scenarios such as online retail, banking, content services, web search and social networks. As the scale of functionality and complexity grows in these software, managing the implementations becomes a considerable challenge for developers, designers and maintainers. Software needs to be constantly monitored and tuned for optimal efficiency and user satisfaction. With large scale, these systems incorporate significant degrees of asynchrony, parallelism and distributed executions, reducing the manageability of software including performance management. Adding to the complexity, developers are under pressure between developing new functionality for customers …