Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (12)
- Databases and Information Systems (6)
- Medicine and Health Sciences (4)
- Theory and Algorithms (4)
- Numerical Analysis and Scientific Computing (3)
-
- Software Engineering (3)
- Cardiology (2)
- Data Science (2)
- Graphics and Human Computer Interfaces (2)
- Information Security (2)
- Life Sciences (2)
- Medical Specialties (2)
- OS and Networks (2)
- Other Public Health (2)
- Programming Languages and Compilers (2)
- Public Health (2)
- Social and Behavioral Sciences (2)
- Statistics and Probability (2)
- Systems Architecture (2)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Animal Sciences (1)
- Applied Statistics (1)
- Aquaculture and Fisheries (1)
- Biodiversity (1)
- Categorical Data Analysis (1)
- Clinical Trials (1)
- Computational Neuroscience (1)
- Institution
-
- Western Kentucky University (4)
- San Jose State University (3)
- California Polytechnic State University, San Luis Obispo (2)
- Chapman University (2)
- University of Arkansas, Fayetteville (2)
-
- Bard College (1)
- Claremont Colleges (1)
- College of Saint Benedict and Saint John's University (1)
- Grand Valley State University (1)
- Selected Works (1)
- Southern Methodist University (1)
- University of Dayton (1)
- University of Kentucky (1)
- University of Nebraska - Lincoln (1)
- West Virginia University (1)
- Publication Year
- Publication
-
- Master's Projects (3)
- Computer Science Faculty Publications (2)
- Mahurin Honors College Capstone Experience/Thesis Projects (2)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (2)
- All College Thesis Program, 2016-2019 (1)
-
- CMC Senior Theses (1)
- CSE Conference and Workshop Papers (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dr. Huanjing Wang (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Journal of the Arkansas Academy of Science (1)
- Master's Theses (1)
- Masters Theses (1)
- SMU Data Science Review (1)
- STAR Program Research Presentations (1)
- Senior Projects Spring 2020 (1)
- Theses and Dissertations--Computer Science (1)
- Zhongmei Yao (1)
- Publication Type
- File Type
Articles 1 - 23 of 23
Full-Text Articles in Other Computer Sciences
Cardiogpt: An Ecg Interpretation Generation Model, Guohua Fu, Jianwei Zheng, Islam Abudayyeh, Chizobam Ani, Cyril Rakovski, Louis Ehwerhemuepha, Hongxia Lu, Yongjuan Guo, Shenglin Liu, Huimin Chu, Bing Yang
Cardiogpt: An Ecg Interpretation Generation Model, Guohua Fu, Jianwei Zheng, Islam Abudayyeh, Chizobam Ani, Cyril Rakovski, Louis Ehwerhemuepha, Hongxia Lu, Yongjuan Guo, Shenglin Liu, Huimin Chu, Bing Yang
Mathematics, Physics, and Computer Science Faculty Articles and Research
Numerous supervised learning models aimed at classifying 12-lead electrocardiograms into different groups have shown impressive performance by utilizing deep learning algorithms. However, few studies are dedicated to applying the Generative Pre-trained Transformer (GPT) model in interpreting electrocardiogram (ECG) using natural language. Thus, we are pioneering the exploration of this uncharted territory by employing the CardioGPT model to tackle this challenge. We used a dataset of ECGs (standard 10s, 12-channel format) from adult patients, with 60 distinct rhythms or conduction abnormalities annotated by board-certified, actively practicing cardiologists. The ECGs were collected from The First Affiliated Hospital of Ningbo University and Shanghai …
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Masters Theses
In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
SMU Data Science Review
Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model …
Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy
Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy
Graduate Theses, Dissertations, and Problem Reports
Blood glucose monitoring is a key process in the prevention and management of certain chronic diseases, such as diabetes. Currently, glucose monitoring for those interested in their blood glucose levels are confronted with options that are primarily invasive and relatively costly. A growing topic of note is the development of non-invasive monitoring methods for blood glucose. This development holds a significant promise for improvement to the quality of life of a significant portion of the population and is overall met with great enthusiasm from the scientific community as well as commercial interest. This work aims to develop a potential pipeline …
A High-Precision Machine Learning Algorithm To Classify Left And Right Outflow Tract Ventricular Tachycardia, Jianwei Zhang, Guohua Fu, Islam Abudayyeh, Magdi Yacoub, Anthony Chang, William Feaster, Louis Ehwerhemuepha, Hesham El-Askary, Xianfeng Du, Bin He, Mingjun Feng, Yibo Yu, Binhao Wang, Jing Liu, Hai Yao, Hulmin Chu, Cyril Rakovski
A High-Precision Machine Learning Algorithm To Classify Left And Right Outflow Tract Ventricular Tachycardia, Jianwei Zhang, Guohua Fu, Islam Abudayyeh, Magdi Yacoub, Anthony Chang, William Feaster, Louis Ehwerhemuepha, Hesham El-Askary, Xianfeng Du, Bin He, Mingjun Feng, Yibo Yu, Binhao Wang, Jing Liu, Hai Yao, Hulmin Chu, Cyril Rakovski
Mathematics, Physics, and Computer Science Faculty Articles and Research
Introduction: Multiple algorithms based on 12-lead ECG measurements have been proposed to identify the right ventricular outflow tract (RVOT) and left ventricular outflow tract (LVOT) locations from which ventricular tachycardia (VT) and frequent premature ventricular complex (PVC) originate. However, a clinical-grade machine learning algorithm that automatically analyzes characteristics of 12-lead ECGs and predicts RVOT or LVOT origins of VT and PVC is not currently available. The effective ablation sites of RVOT and LVOT, confirmed by a successful ablation procedure, provide evidence to create RVOT and LVOT labels for the machine learning model.
Methods: We randomly sampled training, validation, and testing …
An Exploration Of Methods For Classifying Air-Written Letters From The Spanish Alphabet, Manuel Serna-Aguilera
An Exploration Of Methods For Classifying Air-Written Letters From The Spanish Alphabet, Manuel Serna-Aguilera
Computer Science and Computer Engineering Undergraduate Honors Theses
The ability to recognize human activity, especially air-writing, is an interesting challenge as one could identify any letter from many languages. I intend to investigate this problem of air-writing, but with the added twist of including the following letters from the Spanish alphabet: Á, É, Í, Ó, Ú, Ü, and Ñ. With this new alphabet, I set out to see what kinds of classifiers work best and on what kinds of data, since letters can be represented in multiple ways.
My tracking system will consist of a regular camera and a subject who will draw with a brightly colored marker …
A Description Of A Humans Knowledge Using Artificial Intelligence, Dj Price
A Description Of A Humans Knowledge Using Artificial Intelligence, Dj Price
Mahurin Honors College Capstone Experience/Thesis Projects
There currently does not exist a way to easily view the relationships between a collection of written items (e.g. sports articles, diary entries, research papers). In recent years, novel machine learning methods have been developed which are very good at extracting semantic relationships from large numbers of documents. One of them is the (unsupervised) machine learning model Doc2Vec which constructs vectors for documents. The research project detailed in this paper uses this and other already existing algorithms to analyze the relationship between pieces of text. We set forth a broader ambition for this project before discussing the use and need …
An Analysis Of The Success Of Farmers Markets In Kentucky Using Logistic Regression And Support Vector Machines, Jeron Russell
An Analysis Of The Success Of Farmers Markets In Kentucky Using Logistic Regression And Support Vector Machines, Jeron Russell
Mahurin Honors College Capstone Experience/Thesis Projects
The purpose of this research is to look at the relationship that market-specific, economic, and demographic variables have with the success of farmers markets in Kentucky. It additionally seeks to build a tool for predicting farmers market success that could be used by policy makers to aid in decision-making processes concerning farmers markets. Logistic regression and Support Vector Machines (SVMs) are used on data acquired from the Kentucky Department of Agriculture and the American Community Survey in order to analyze the data in a traditional statistical approach as well as a machine learning approach. The results included an SVM model …
A Computational Method For The Image Segmentation Of Pigmented Skin Lesions, Kaila M. Piscitelli
A Computational Method For The Image Segmentation Of Pigmented Skin Lesions, Kaila M. Piscitelli
Senior Projects Spring 2020
Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.
Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur
Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur
Master's Projects
Myocardial Infarction (MI), commonly known as a heart attack, occurs when one of the three major blood vessels carrying blood to the heart get blocked, causing the death of myocardial (heart) cells. If not treated immediately, MI may cause cardiac arrest, which can ultimately cause death. Risk factors for MI include diabetes, family history, unhealthy diet and lifestyle. Medical treatments include various types of drugs and surgeries which can prove very expensive for patients due to high healthcare costs. Therefore, it is imperative that MI is diagnosed at the right time. Electrocardiography (ECG) is commonly used to detect MI. ECG …
Toward On-Demand Profile Hidden Markov Models For Genetic Barcode Identification, Jessica Sheu
Toward On-Demand Profile Hidden Markov Models For Genetic Barcode Identification, Jessica Sheu
Master's Projects
Genetic identification aims to solve the shortcomings of morphological identification. By using the cytochrome c oxidase subunit 1 (COI) gene as the Eukaryotic “barcode,” scientists hope to research species that may be morphologically ambiguous, elusive, or similarly difficult to visually identify. Current COI databases allow users to search only for existing database records. However, as the number of sequenced, potential COI genes increases, COI identification tools should ideally also be informative of novel, previously unreported sequences that may represent new species. If an unknown COI sequence does not represent a reported organism, an ideal identification tool would report taxonomic ranks …
Species Classification Using Dna Barcoding And Profile Hidden Markov Models, Sphoorti Poojary
Species Classification Using Dna Barcoding And Profile Hidden Markov Models, Sphoorti Poojary
Master's Projects
Traditional classification systems for living organisms like the Linnaean taxonomy involved classification based on morphological features of species. This traditional system is being replaced by molecular approaches which involve using gene sequences. The COI gene, also known as the ”DNA barcode” since it is unique in every species, can be used to uniquely identify organisms and thus, classify them. Classifying using gene sequences has many advantages, including correct identification of cryptic species(individuals which appear similar but belong to different species) and species which are extremely small in size. In this project, I worked on classifying COI sequences of unknown species …
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Master's Theses
Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …
The Algorithmic Composition Of Classical Music Through Data Mining, Tom Donald Richmond, Imad Rahal
The Algorithmic Composition Of Classical Music Through Data Mining, Tom Donald Richmond, Imad Rahal
All College Thesis Program, 2016-2019
The desire to teach a computer how to algorithmically compose music has been a topic in the world of computer science since the 1950’s, with roots of computer-less algorithmic composition dating back to Mozart himself. One limitation of algorithmically composing music has been the difficulty of eliminating the human intervention required to achieve a musically homogeneous composition. We attempt to remedy this issue by teaching a computer how the rules of composition differ between the six distinct eras of classical music by having it examine a dataset of musical scores, rather than explicitly telling the computer the formal rules of …
Deep Learning-Based Framework For Autism Functional Mri Image Classification, Xin Yang, Saman Sarraf, Ning Zhang
Deep Learning-Based Framework For Autism Functional Mri Image Classification, Xin Yang, Saman Sarraf, Ning Zhang
Journal of the Arkansas Academy of Science
The purpose of this paper is to introduce deep learning-based framework LeNet-5 architecture and implement the experiments for functional MRI image classification of Autism spectrum disorder. We implement our experiments under the NVIDIA deep learning GPU Training Systems (DIGITS). By using the Convolutional Neural Network (CNN) LeNet-5 architecture, we successfully classified functional MRI image of Autism spectrum disorder from normal controls. The results show that we obtained satisfactory results for both sensitivity and specificity.
An Introduction To The Theory And Applications Of Bayesian Networks, Anant Jaitha
An Introduction To The Theory And Applications Of Bayesian Networks, Anant Jaitha
CMC Senior Theses
Bayesian networks are a means to study data. A Bayesian network gives structure to data by creating a graphical system to model the data. It then develops probability distributions over these variables. It explores variables in the problem space and examines the probability distributions related to those variables. It conducts statistical inference over those probability distributions to draw meaning from them. They are good means to explore a large set of data efficiently to make inferences. There are a number of real world applications that already exist and are being actively researched. This paper discusses the theory and applications of …
Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline
Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline
STAR Program Research Presentations
The Monterey Bay Aquarium Research Institute routinely deploys remotely operated underwater vehicles equipped with high definition cameras for use in scientific studies. Utilizing a video collection of over 22,000 hours and the Video Annotation and Reference System, we have set out to automate the detection and classification of deep-sea animals. This paper serves to explore the pitfalls of automation and suggest possible solutions to automated detection in diverse ecosystems with varying field conditions. Detection was tested using a saliency-based neuromorphic selective attention algorithm. The animals that were not detected were then used to tune saliency parameters. Once objects are detected, …
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Zhongmei Yao
Clustering is well-suited for Web mining by automatically organizing Web pages into categories, each of which contains Web pages having similar contents. However, one problem in clustering is the lack of general methods to automatically determine the number of categories or clusters. For the Web domain in particular, currently there is no such method suitable for Web page clustering. In an attempt to address this problem, we discover a constant factor that characterizes the Web domain, based on which we propose a new method for automatically determining the number of clusters in Web page data sets. We discover that the …
Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa
Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa
Theses and Dissertations--Computer Science
Data are valuable assets to any organizations or individuals. Data are sources of useful information which is a big part of decision making. All sectors have potential to benefit from having information. Commerce, health, and research are some of the fields that have benefited from data. On the other hand, the availability of the data makes it easy for anyone to exploit the data, which in many cases are private confidential data. It is necessary to preserve the confidentiality of the data. We study two categories of privacy: Data Value Hiding and Data Pattern Hiding. Privacy is a huge concern …
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
Dr. Huanjing Wang
Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
Computer Science Faculty Publications
Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …
Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet
Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet
CSE Conference and Workshop Papers
Data classification is usually based on measurements recorded at the same time. This paper considers temporal data classification where the input is a temporal database that describes measurements over a period of time in history while the predicted class is expected to occur in the future. We describe a new temporal classification method that improves the accuracy of standard classification methods. The benefits of the method are tested on weather forecasting using the meteorological database from the Texas Commission on Environmental Quality.
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Computer Science Faculty Publications
Clustering is well-suited for Web mining by automatically organizing Web pages into categories, each of which contains Web pages having similar contents. However, one problem in clustering is the lack of general methods to automatically determine the number of categories or clusters. For the Web domain in particular, currently there is no such method suitable for Web page clustering. In an attempt to address this problem, we discover a constant factor that characterizes the Web domain, based on which we propose a new method for automatically determining the number of clusters in Web page data sets. We discover that the …