Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (34)
- Engineering (13)
- Computer Engineering (12)
- Artificial Intelligence and Robotics (10)
- Electrical and Computer Engineering (9)
-
- Data Science (8)
- Statistics and Probability (7)
- Applied Statistics (3)
- Mathematics (3)
- Physics (3)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (2)
- Applied Mathematics (2)
- Arts and Humanities (2)
- Environmental Sciences (2)
- Information Security (2)
- Medicine and Health Sciences (2)
- Multivariate Analysis (2)
- Other Statistics and Probability (2)
- Software Engineering (2)
- Statistical Models (2)
- Analysis (1)
- Analytical Chemistry (1)
- Art and Design (1)
- Astrophysics and Astronomy (1)
- Bioinformatics (1)
- Biomedical Informatics (1)
- Business (1)
- Categorical Data Analysis (1)
- Chemistry (1)
- Institution
-
- TÜBİTAK (8)
- Old Dominion University (3)
- University of Nebraska - Lincoln (3)
- Utah State University (3)
- Michigan Technological University (2)
-
- Universitas Negeri Yogyakarta (2)
- University of Texas at El Paso (2)
- Wright State University (2)
- Association of Arab Universities (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Dartmouth College (1)
- Embry-Riddle Aeronautical University (1)
- Grand Valley State University (1)
- Louisiana State University (1)
- Minnesota State University, Mankato (1)
- Missouri State University (1)
- San Jose State University (1)
- Seattle Pacific University (1)
- Singapore Management University (1)
- Southern Methodist University (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of South Carolina (1)
- University of Texas at Arlington (1)
- University of Texas at Tyler (1)
- University of Windsor (1)
- Wilfrid Laurier University (1)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (8)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (2)
- Browse all Theses and Dissertations (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Elinvo (Electronics, Informatics, and Vocational Education) (2)
-
- All Graduate Theses and Dissertations, Fall 2023 to Present (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- All Works (1)
- Applied Mathematics & Information Sciences (1)
- Beyond: Undergraduate Research Journal (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Senior Theses (1)
- Computer Science and Engineering Theses (1)
- Department of Statistics: Faculty Publications (1)
- Departmental Technical Reports (CS) (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electronic Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Honors Projects (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- LSU Doctoral Dissertations (1)
- MSU Graduate Theses (1)
- Master's Projects (1)
- Masters Theses (1)
- Michigan Tech Publications (1)
- Open Access Theses & Dissertations (1)
- Research Collection School Of Computing and Information Systems (1)
- Publication Type
Articles 31 - 48 of 48
Full-Text Articles in Physical Sciences and Mathematics
Analyzing Relationships With Machine Learning, Oscar Ko
Analyzing Relationships With Machine Learning, Oscar Ko
Dissertations, Theses, and Capstone Projects
Procedurally, this project aims to take a dataset, analyze it, and offer insights to the audience in an easy-to-digest format. Conceptually, this project will seek to explore questions like: “Do couples that meet through online dating or dating apps have higher or lower quality relationships?”, “Can any features in this dataset help predict how a subject would rate their relationship quality?”, and “What other insights can I derive from using machine learning for exploratory analysis?” The intended audience for this project is anyone interested in romantic relationships or machine learning.
The dataset is from a Stanford University survey, “How Couples …
Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni
Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni
Computer Science Faculty Publications and Presentations
Phishing is one of the significant threats in cyber security. Phishing is a form of social engineering that uses e-mails with malicious websites to solicitate personal information. Phishing e-mails are growing in alarming number. In this paper we propose a novel machine learning approach to classify phishing websites using Convolution Neural Networks (CNNs) that use URL based features. CNNs consist of a stack of convolution, pooling layers, and a fully connected layer. CNNs accept images as input and perform feature extraction and classification. Many CNN models are available today. To avoid vanishing gradient problem, recent CNNs use entropy loss function …
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Electrical and Computer Engineering Faculty Publications
The use of network connected devices has grown exponentially in recent years revolutionizing our daily lives. However, it has also attracted the attention of cybercriminals making the attacks targeted towards these devices increase not only in numbers but also in sophistication. To detect such attacks, a Network Intrusion Detection System (NIDS) has become a vital component in network applications. However, network devices produce large scale high-dimensional data which makes it difficult to accurately detect various known and unknown attacks. Moreover, the complex nature of network data makes the feature selection process of a NIDS a challenging task. In this study, …
Multi-Domain Adaptation For Image Classification, Depth Estimation, And Semantic Segmentation, Yu Zhang
Multi-Domain Adaptation For Image Classification, Depth Estimation, And Semantic Segmentation, Yu Zhang
Theses and Dissertations--Computer Science
The appearance of scenes may change for many reasons, including the viewpoint, the time of day, the weather, and the seasons. Traditionally, deep neural networks are trained and evaluated using images from the same scene and domain to avoid the domain gap. Recent advances in domain adaptation have led to a new type of method that bridges such domain gaps and learns from multiple domains.
This dissertation proposes methods for multi-domain adaptation for various computer vision tasks, including image classification, depth estimation, and semantic segmentation. The first work focuses on semi-supervised domain adaptation. I address this semi-supervised setting and propose …
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
All Works
Facial expression is a type of communication and is useful in many areas of computer vision, including intelligent visual surveillance, human-robot interaction and human behavior analysis. A deep learning approach is presented to classify happy, sad, angry, fearful, contemptuous, surprised and disgusted expressions. Accurate detection and classification of human facial expression is a critical task in image processing due to the inconsistencies amid the complexity, including change in illumination, occlusion, noise and the over-fitting problem. A stacked sparse auto-encoder for facial expression recognition (SSAE-FER) is used for unsupervised pre-training and supervised fine-tuning. SSAE-FER automatically extracts features from input images, and …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
All Graduate Theses, Dissertations, and Other Capstone Projects
With the surge in information management technology reliance and the looming presence of cyber threats, user authentication has become paramount in computer security. Traditional static or one-time authentication has its limitations, prompting the emergence of continuous authentication as a frontline approach for enhanced security. Continuous authentication taps into behavior-based metrics for ongoing user identity validation, predominantly utilizing machine learning techniques to continually model user behaviors. This study elucidates the potential of mouse movement dynamics as a key metric for continuous authentication. By examining mouse movement patterns across two contrasting gaming scenarios - the high-intensity "Team Fortress" and the low-intensity strategic …
An Explainable Deep Learning Prediction Model For Severity Of Alzheimer's Disease From Brain Images, Godwin O. Ekuma
An Explainable Deep Learning Prediction Model For Severity Of Alzheimer's Disease From Brain Images, Godwin O. Ekuma
MSU Graduate Theses
Deep Convolutional Neural Networks (CNNs) have become the go-to method for medical imaging classification on various imaging modalities for binary and multiclass problems. Deep CNNs extract spatial features from image data hierarchically, with deeper layers learning more relevant features for the classification application. The effectiveness of deep learning models are hampered by limited data sets, skewed class distributions, and the undesirable "black box" of neural networks, which decreases their understandability and usability in precision medicine applications. This thesis addresses the challenge of building an explainable deep learning model for a clinical application: predicting the severity of Alzheimer's disease (AD). AD …
Online Sexual Predator Detection, Muhammad Khalid
Online Sexual Predator Detection, Muhammad Khalid
Electronic Theses and Dissertations
Online sexual abuse is a concerning yet severely overlooked vice of modern society. With more children being on the Internet and with the ever-increasing advent of web-applications such as online chatrooms and multiplayer games, preying on vulnerable users has become more accessible for predators. In recent years, there has been work on detecting online sexual predators using Machine Learning and deep learning techniques. Such work has trained on severely imbalanced datasets, and imbalance is handled via manual trimming of over-represented labels. In this work, we propose an approach that first tackles the problem of imbalance and then improves the effectiveness …
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Browse all Theses and Dissertations
The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Browse all Theses and Dissertations
Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …
Prediction Of Sumoylation Sites In Proteins From Language Model Representations, Evgenii Sidorov
Prediction Of Sumoylation Sites In Proteins From Language Model Representations, Evgenii Sidorov
Dissertations, Master's Theses and Master's Reports
Sumoylation is an essential post-translational modification intimately involved in a diverse range of eukaryotic cellular mechanisms and plays a significant role in DNA repair. Some researchers hypothesize that a high level of SUMOylation events in cancer cells improves cells' chances for survival under stress conditions by regulating tumor-related proteins.
This study belongs to a booming field of harnessing computational power to the domain of life. Prediction of protein structure, its molecular function, and the design of new drugs are just a few examples of the applications within this exciting area of research. By leveraging computational power, researchers can analyze vast …
Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu
Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu
Turkish Journal of Electrical Engineering and Computer Sciences
This study performed a deep learning-based classification of chaotic systems over their phase portraits. To the best of the authors' knowledge, such classification studies over phase portraits have not been conducted in the literature. To that end, a dataset consisting of the phase portraits of the most known two chaotic systems, namely Lorenz and Chen, is generated for different values of the parameters, initial conditions, step size, and time length. Then, a classification with high accuracy is carried out employing transfer learning methods. The transfer learning methods used in the study are SqueezeNet, VGG-19, AlexNet, ResNet50, ResNet101, DenseNet201, ShuffleNet, and …
Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu
Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu
Turkish Journal of Electrical Engineering and Computer Sciences
The most common type of pancreatic cancer is pancreatic ductal adenocarcinoma (PDAC), which accounts for the vast majority of pancreatic cancers. The five-year survival rate for PDAC due to late diagnosis is 9%. Early diagnosed PDAC patients survive longer than patients diagnosed at a more advanced stage. Biomarkers can play an essential role in the early detection of PDAC to assist the health professional. Machine learning and deep learning methods are used with biomarkers obtained in recent studies for diagnostic purposes. In order to increase the survival rates of PDAC patients, early diagnosis of the disease with a noninvasive test …
A Machine Learning Approach To Classify Open Water And Ice Cover On Slave River Delta, Ida Moalemi
A Machine Learning Approach To Classify Open Water And Ice Cover On Slave River Delta, Ida Moalemi
Theses and Dissertations (Comprehensive)
Seasonal temperature trend and ice phenology in Great Slave lake (GSL), are strongly influenced by warmer inflow from Slave river. The Slave river flows to GSL through Slave river delta (SRD), bringing a rise in temperature that triggers the ice break-up process of the lake. Slave river discharge is subject to multiple stressors including climate warming and upstream water activities, which in turn, directly affects the GSL break-up process. Consequently, monitoring the break-up process at SRD, where the river connects to the lake, serves as an indicator to better understand the cascading effects on GSL ice break-up. This research aims …
Classification Of Darknet Traffic By Application Type, Shruti Sharma
Classification Of Darknet Traffic By Application Type, Shruti Sharma
Master's Projects
The darknet is frequently exploited for illegal purposes and activities, which makes darknet traffic detection an important security topic. Previous research has focused on various classification techniques for darknet traffic using machine learning and deep learning. We extend previous work by considering the effectiveness of a wide range of machine learning and deep learning technique for the classification of darknet traffic by application type. We consider the CICDarknet2020 dataset, which has been used in many previous studies, thus enabling a direct comparison of our results to previous work. We find that XGBoost performs the best among the classifiers that we …
Prediction Of Rapid Early Progression And Survival Risk With Pre-Radiation Mri In Who Grade 4 Glioma Patients, Walia Farzana, Mustafa M. Basree, Norou Diawara, Zeina Shboul, Sagel Dubey, Marie M. Lockheart, Mohamed Hamza, Joshua D. Palmer, Khan Iftekharuddin
Prediction Of Rapid Early Progression And Survival Risk With Pre-Radiation Mri In Who Grade 4 Glioma Patients, Walia Farzana, Mustafa M. Basree, Norou Diawara, Zeina Shboul, Sagel Dubey, Marie M. Lockheart, Mohamed Hamza, Joshua D. Palmer, Khan Iftekharuddin
Electrical & Computer Engineering Faculty Publications
Rapid early progression (REP) has been defined as increased nodular enhancement at the border of the resection cavity, the appearance of new lesions outside the resection cavity, or increased enhancement of the residual disease after surgery and before radiation. Patients with REP have worse survival compared to patients without REP (non-REP). Therefore, a reliable method for differentiating REP from non-REP is hypothesized to assist in personlized treatment planning. A potential approach is to use the radiomics and fractal texture features extracted from brain tumors to characterize morphological and physiological properties. We propose a random sampling-based ensemble classification model. The proposed …
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Electrical & Computer Engineering Faculty Publications
This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …