Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Deep learning

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 391 - 420 of 890

Full-Text Articles in Physical Sciences and Mathematics

A Non-Deterministic Deep Learning Based Surrogate For Ice Sheet Modeling, Hannah Jordan Jan 2022

A Non-Deterministic Deep Learning Based Surrogate For Ice Sheet Modeling, Hannah Jordan

Graduate Student Theses, Dissertations, & Professional Papers

Surrogate modeling is a new and expanding field in the world of deep learning, providing a computationally inexpensive way to approximate results from computationally demanding high-fidelity simulations. Ice sheet modeling is one of these computationally expensive models, the model used in this study currently requires between 10 and 20 minutes to complete one simulation. While this process is adequate for certain applications, the ability to use sampling approaches to perform statistical inference becomes infeasible. This issue can be overcome by using a surrogate model to approximate the ice sheet model, bringing the time to produce output down to a tenth …


Trading Financial Instruments Like A Video Game: Searching For Profit Using Deep Reinforcement Learning., Sebastian Coombs Jan 2022

Trading Financial Instruments Like A Video Game: Searching For Profit Using Deep Reinforcement Learning., Sebastian Coombs

Graduate Student Theses, Dissertations, & Professional Papers

Buying and selling Stocks, Foreign Currencies (FOREX), Commodities, and Cryptocurrencies have been a source of wealth generation, and more often, wealth loss for many brave enough to enter the financial markets. In this paper, the author builds on the work of Williams, J. 2022 and develops an agent-based method to solve this wealth generation problem with the use of neural networks. The author points out some assumptions made by Williams, J. 2022 that were sound in theory, but made the implementation of the algorithm presented in their paper diverge from the theory. The author proposes a fundamentally different algorithmic method, …


A Survey On Deep Learning For Software Engineering, Yanming Yang, Xin Xia, David Lo Jan 2022

A Survey On Deep Learning For Software Engineering, Yanming Yang, Xin Xia, David Lo

Research Collection School Of Computing and Information Systems

In 2006, Geoffrey Hinton proposed the concept of training "Deep Neural Networks (DNNs)" and an improved model training method to break the bottleneck of neural network development. More recently, the introduction of AlphaGo in 2016 demonstrated the powerful learning ability of deep learning and its enormous potential. Deep learning has been increasingly used to develop state-of-the-art software engineering (SE) research tools due to its ability to boost performance for various SE tasks. There are many factors, e.g., deep learning model selection, internal structure differences, and model optimization techniques, that may have an impact on the performance of DNNs applied in …


Theory Entity Extraction For Social And Behavioral Sciences Papers Using Distant Supervision, Xin Wei, Lamia Salsabil, Jian Wu Jan 2022

Theory Entity Extraction For Social And Behavioral Sciences Papers Using Distant Supervision, Xin Wei, Lamia Salsabil, Jian Wu

Computer Science Faculty Publications

Theories and models, which are common in scientific papers in almost all domains, usually provide the foundations of theoretical analysis and experiments. Understanding the use of theories and models can shed light on the credibility and reproducibility of research works. Compared with metadata, such as title, author, keywords, etc., theory extraction in scientific literature is rarely explored, especially for social and behavioral science (SBS) domains. One challenge of applying supervised learning methods is the lack of a large number of labeled samples for training. In this paper, we propose an automated framework based on distant supervision that leverages entity mentions …


Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar Jan 2022

Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar

Turkish Journal of Electrical Engineering and Computer Sciences

Electricity is the most substantial energy form that significantly affects the development of modern life, work efficiency, quality of life, production, and competitiveness of the society in the ever-growing global world. In this respect, forecasting accurate electricity energy consumption (EEC) is fairly essential for any country?s energy consumption planning and management regarding its growth. In this study, four time-series methods; long short-term memory (LSTM) neural network, adaptive neuro-fuzzy inference system (ANFIS) with subtractive clustering (SC), ANFIS with fuzzy cmeans (FCM), and ANFIS with grid partition (GP) were implemented for the short-term one-day ahead EEC prediction. Root mean square error (RMSE), …


Multi-User Eye-Tracking, Bhanuka Mahanama Jan 2022

Multi-User Eye-Tracking, Bhanuka Mahanama

Computer Science Faculty Publications

The human gaze characteristics provide informative cues on human behavior during various activities. Using traditional eye trackers, assessing gaze characteristics in the wild requires a dedicated device per participant and therefore is not feasible for large-scale experiments. In this study, we propose a commodity hardware-based multi-user eye-tracking system. We leverage the recent advancements in Deep Neural Networks and large-scale datasets for implementing our system. Our preliminary studies provide promising results for multi-user eye-tracking on commodity hardware, providing a cost-effective solution for large-scale studies.


Visual Descriptor Extraction From Patent Figure Captions: A Case Study Of Data Efficiency Between Bilstm And Transformer, Xin Wei, Jian Wu, Kehinde Ajayi, Diane Oyen Jan 2022

Visual Descriptor Extraction From Patent Figure Captions: A Case Study Of Data Efficiency Between Bilstm And Transformer, Xin Wei, Jian Wu, Kehinde Ajayi, Diane Oyen

Computer Science Faculty Publications

Technical drawings used for illustrating designs are ubiquitous in patent documents, especially design patents. Different from natural images, these drawings are usually made using black strokes with little color information, making it challenging for models trained on natural images to recognize objects. To facilitate indexing and searching, we propose an effective and efficient visual descriptor model that extracts object names and aspects from patent captions to annotate benchmark patent figure datasets. We compared two state-of-the-art named entity recognition (NER) models and found that with a limited number of annotated samples, the BiLSTM-CRF model outperforms the Transformer model by a significant …


Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna Jan 2022

Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

At present, intelligent computing applications are widely used in different domains, including retail stores. The analysis of customer behaviour has become crucial for the benefit of both customers and retailers. In this regard, the concept of remote gaze estimation using deep learning has shown promising results in analyzing customer behaviour in retail due to its scalability, robustness, low cost, and uninterrupted nature. This study presents a three-stage, three-attention-based deep convolutional neural network for remote gaze estimation in retail using image data. In the first stage, we design a mechanism to estimate the 3D gaze of the subject using image data …


Deep Learning Augmentation For Medical Image Analysis, Fouzia Altaf Jan 2022

Deep Learning Augmentation For Medical Image Analysis, Fouzia Altaf

Theses: Doctorates and Masters

Deep learning is at the center of the current rise of computer aided diagnosis in medical imaging. This technology has the ability to mimic extremely complex mathematical functions for predictive tasks. These functions are encoded as computational models that are learned directly from data. Deep learning models are known to achieve human-level accuracy for predictive tasks. However, such a performance requires that the model is trained on a huge amount of training data. For computer aided diagnosis tasks, the relevant training data needs to be carefully annotated by medical experts. This process is laborious and expensive, which generally results in …


Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal Jan 2022

Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal

Engineering Technology Faculty Publications

6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous cars, and many more. Those algorithms have also been used in communication technologies to improve the system performance in terms of frequency spectrum usage, latency, and security. With the rapid developments of ML techniques, especially deep learning (DL), it is critical to consider the security concern when applying the algorithms. While ML algorithms offer significant advantages for 6G networks, security concerns on artificial …


Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu Jan 2022

Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu

Engineering Technology Faculty Publications

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …


Deeply Learning Deep Inelastic Scattering Kinematics, Markus Diefenthaler, Abdullah Farhat, Andrii Verbytskyi, Yuesheng Xu Jan 2022

Deeply Learning Deep Inelastic Scattering Kinematics, Markus Diefenthaler, Abdullah Farhat, Andrii Verbytskyi, Yuesheng Xu

Mathematics & Statistics Faculty Publications

We study the use of deep learning techniques to reconstruct the kinematics of the neutral current deep inelastic scattering (DIS) process in electron–proton collisions. In particular, we use simulated data from the ZEUS experiment at the HERA accelerator facility, and train deep neural networks to reconstruct the kinematic variables Q2 and x. Our approach is based on the information used in the classical construction methods, the measurements of the scattered lepton, and the hadronic final state in the detector, but is enhanced through correlations and patterns revealed with the simulated data sets. We show that, with the appropriate selection …


A Channel State Information Based Virtual Mac Spoofing Detector, Peng Jiang, Hongyi Wu, Chunsheng Xin Jan 2022

A Channel State Information Based Virtual Mac Spoofing Detector, Peng Jiang, Hongyi Wu, Chunsheng Xin

Electrical & Computer Engineering Faculty Publications

Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years. Due to limited authentication mechanisms, MAC spoofing attack, also known as the identity attack, threatens wireless systems. In this paper, we study a new type of MAC spoofing attack, the virtual MAC spoofing attack, in a tight environment with strong spatial similarities, which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services. We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure. …


Qu-Brats: Miccai Brats 2020 Challenge On Quantifying Uncertainty In Brain Tumor Segmentation - Analysis Of Ranking Scores And Benchmarking Results, Raghav Mehta, Angelos Filos, Ujjwal Baid, Chiharu Sako, Richard Mckinley, Michael Rebsamen, Katrin Dätwyler, Raphael Meier, Piotr Radojewski, Gowtham Krishnan Murugesan, Sahil Nalawade, Chandan Ganesh, Ben Wagner, Fang F. Yu, Baowei Fei, Ananth J. Madhuranthakam, Joseph A. Maldjian, Laura Daza, Catalina Gómez, Pablo Arbeláez, Chengliang Dai, Shuo Wang, Hadrien Reynaud, Yuan-Han Mo, Elsa Angelini, Yike Guo, Wenjia Bai, Subhashis Banerjee, Lin-Min Pei, Murat Ak, Sarahi Rosas-González, Ilyess Zemmoura, Clovis Tauber, Minh H. Vu, Tufve Nyholm, Tommy Löfstedt, Laura Mora Ballestar, Veronica Vilaplana, Hugh Mchugh, Gonzalo Maso Talou, Alan Wang, Jay Patel, Ken Chang, Katharina Hoebel, Mishka Gidwani, Nishanth Arun, Sharut Gupta, Mehak Aggarwal, Praveer Singh, Elizabeth R. Gerstner, Jayashree Kalpathy-Cramer, Nicholas Boutry, Alexis Huard, Lasitha Vidyaratne, Md. Monibor Rahman, Khan M. Iftekharuddin, Joseph Chazalon, Elodie Puybareau, Guillaume Tochon, Jun Ma, Mariano Cabezas, Xavier Llado, Arnau Oliver, Liliana Valencia, Sergi Valverde, Mehdi Amian, Mohammadreza Soltaninejad, Andriy Myronenko, Ali Hatamizadeh, Xue Feng, Quan Dou, Nicholas Tustison, Craig Meyer, Nisarg A. Shah, Sanjay Talbar, Marc-André Weber, Abhishek Mahajan, Andras Jakab, Roland Wiest, Hassan M. Fathallah-Shaykh, Arash Nazeri, Mikhail Milchenko1, Daniel Marcus, Aikaterini Kotrotsou, Rivka Colen, John Freymann, Justin Kirby, Christos Davatzikos, Bjoern Menze, Spyridon Bakas, Yarin Gal, Tal Arbel Jan 2022

Qu-Brats: Miccai Brats 2020 Challenge On Quantifying Uncertainty In Brain Tumor Segmentation - Analysis Of Ranking Scores And Benchmarking Results, Raghav Mehta, Angelos Filos, Ujjwal Baid, Chiharu Sako, Richard Mckinley, Michael Rebsamen, Katrin Dätwyler, Raphael Meier, Piotr Radojewski, Gowtham Krishnan Murugesan, Sahil Nalawade, Chandan Ganesh, Ben Wagner, Fang F. Yu, Baowei Fei, Ananth J. Madhuranthakam, Joseph A. Maldjian, Laura Daza, Catalina Gómez, Pablo Arbeláez, Chengliang Dai, Shuo Wang, Hadrien Reynaud, Yuan-Han Mo, Elsa Angelini, Yike Guo, Wenjia Bai, Subhashis Banerjee, Lin-Min Pei, Murat Ak, Sarahi Rosas-González, Ilyess Zemmoura, Clovis Tauber, Minh H. Vu, Tufve Nyholm, Tommy Löfstedt, Laura Mora Ballestar, Veronica Vilaplana, Hugh Mchugh, Gonzalo Maso Talou, Alan Wang, Jay Patel, Ken Chang, Katharina Hoebel, Mishka Gidwani, Nishanth Arun, Sharut Gupta, Mehak Aggarwal, Praveer Singh, Elizabeth R. Gerstner, Jayashree Kalpathy-Cramer, Nicholas Boutry, Alexis Huard, Lasitha Vidyaratne, Md. Monibor Rahman, Khan M. Iftekharuddin, Joseph Chazalon, Elodie Puybareau, Guillaume Tochon, Jun Ma, Mariano Cabezas, Xavier Llado, Arnau Oliver, Liliana Valencia, Sergi Valverde, Mehdi Amian, Mohammadreza Soltaninejad, Andriy Myronenko, Ali Hatamizadeh, Xue Feng, Quan Dou, Nicholas Tustison, Craig Meyer, Nisarg A. Shah, Sanjay Talbar, Marc-André Weber, Abhishek Mahajan, Andras Jakab, Roland Wiest, Hassan M. Fathallah-Shaykh, Arash Nazeri, Mikhail Milchenko1, Daniel Marcus, Aikaterini Kotrotsou, Rivka Colen, John Freymann, Justin Kirby, Christos Davatzikos, Bjoern Menze, Spyridon Bakas, Yarin Gal, Tal Arbel

Electrical & Computer Engineering Faculty Publications

Deep learning (DL) models have provided the state-of-the-art performance in a wide variety of medical imaging benchmarking challenges, including the Brain Tumor Segmentation (BraTS) challenges. However, the task of focal pathology multi-compartment segmentation (e.g., tumor and lesion sub-regions) is particularly challenging, and potential errors hinder the translation of DL models into clinical workflows. Quantifying the reliability of DL model predictions in the form of uncertainties, could enable clinical review of the most uncertain regions, thereby building trust and paving the way towards clinical translation. Recently, a number of uncertainty estimation methods have been introduced for DL medical image segmentation tasks. …


Arithfusion: An Arithmetic Deep Model For Temporal Remote Sensing Image Fusion, Md Reshad Ul Hoque, Jian Wu, Chiman Kwan, Krzysztof Koperski, Jiang Li Jan 2022

Arithfusion: An Arithmetic Deep Model For Temporal Remote Sensing Image Fusion, Md Reshad Ul Hoque, Jian Wu, Chiman Kwan, Krzysztof Koperski, Jiang Li

Electrical & Computer Engineering Faculty Publications

Different satellite images may consist of variable numbers of channels which have different resolutions, and each satellite has a unique revisit period. For example, the Landsat-8 satellite images have 30 m resolution in their multispectral channels, the Sentinel-2 satellite images have 10 m resolution in the pan-sharp channel, and the National Agriculture Imagery Program (NAIP) aerial images have 1 m resolution. In this study, we propose a simple yet effective arithmetic deep model for multimodal temporal remote sensing image fusion. The proposed model takes both low- and high-resolution remote sensing images at t1 together with low-resolution images at a …


Automatic And Fast Classification Of Barley Grains From Images: A Deep Learning Approach, Syed Afaq Ali Shah, Hao Luo, Putu Dita Pickupana, Alexander Ekeze, Ferdous Sohel, Hamid Laga, Chengdao Li, Blakely Paynter, Penghao Wang Jan 2022

Automatic And Fast Classification Of Barley Grains From Images: A Deep Learning Approach, Syed Afaq Ali Shah, Hao Luo, Putu Dita Pickupana, Alexander Ekeze, Ferdous Sohel, Hamid Laga, Chengdao Li, Blakely Paynter, Penghao Wang

Research outputs 2022 to 2026

Australia has a reputation for producing a reliable supply of high-quality barley in a contaminant-free climate. As a result, Australian barley is highly sought after by malting, brewing, distilling, and feed industries worldwide. Barley is traded as a variety-specific commodity on the international market for food, brewing and distilling end-use, as the intrinsic quality of the variety determines its market value. Manual identification of barley varieties by the naked eye is challenging and time-consuming for all stakeholders, including growers, grain handlers and traders. Current industrial methods for identifying barley varieties include molecular protein weights or DNA based technology, which are …


Developing A Robust Defensive System Against First Order Adversarial Attacks Using Siamese Neural Network Methods, Ahamd Khalil Jan 2022

Developing A Robust Defensive System Against First Order Adversarial Attacks Using Siamese Neural Network Methods, Ahamd Khalil

Electronic Theses and Dissertations

Both Convolutional neural networks (CNN) and Deep neural networks (DNN)have recently demonstrated state-of-the-art performance in various real-world ap- plications. However, in recent research the Deep neural networks are shown to be sensitive to adversarial attacks .[32]. Furthermore, it was evidenced that inputs that are almost invariant to the human eye from natural data can be classified incorrectly by deep neural networks. [32]. Although adversarial training improves the model’s robustness significantly, it eventually devolves into a whack-a-mole game in which defenders and attackers try to outdo each other. Because of recent advancements in computer applications, the security aspects of machine learning …


Private And Federated Deep Learning: System, Theory, And Applications For Social Good, Han Hu Dec 2021

Private And Federated Deep Learning: System, Theory, And Applications For Social Good, Han Hu

Dissertations

During the past decade, drug abuse continues to accelerate towards becoming the most severe public health problem in the United States. The ability to detect drug­abuse risk behavior at a population scale, such as among the population of Twitter users, can help to monitor the trend of drug­abuse incidents. However, traditional methods do not effectively detect drug­abuse risk behavior in tweets, mainly due to the sparsity of such tweets and the noisy nature of tweets. In the first part of this dissertation work, the task of classifying tweets as containing drug­abuse risk behavior or not, is studied. Millions of public …


Machine Learning And Computer Vision In Solar Physics, Haodi Jiang Dec 2021

Machine Learning And Computer Vision In Solar Physics, Haodi Jiang

Dissertations

In the recent decades, the difficult task of understanding and predicting violent solar eruptions and their terrestrial impacts has become a strategic national priority, as it affects the life of human beings, including communication, transportation, the power grid, national defense, space travel, and more. This dissertation explores new machine learning and computer vision techniques to tackle this difficult task. Specifically, the dissertation addresses four interrelated problems in solar physics: magnetic flux tracking, fibril tracing, Stokes inversion and vector magnetogram generation.

First, the dissertation presents a new deep learning method, named SolarUnet, to identify and track solar magnetic flux elements in …


A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman Dec 2021

A Novel Arabic Corpus For Text Classification Using Deep Learning And Word Embedding, Roua A. Abou Khachfeh, Islam El Kabani, Ziad Osman

BAU Journal - Science and Technology

Over the last years, Natural Language Processing (NLP) for Arabic language has obtained increasing importance due to the massive textual information available online in an unstructured text format, and its capability in facilitating and making information retrieval easier. One of the widely used NLP task is “Text Classification”. Its goal is to employ machine learning technics to automatically classify the text documents into one or more predefined categories. An important step in machine learning is to find suitable and large data for training and testing an algorithm. Moreover, Deep Learning (DL), the trending machine learning research, requires a lot of …


Explaining Deep Learning Models For Tabular Data Using Layer-Wise Relevance Propagation, Ihsan Ullah, Andre Rios, Vaibhov Gala, Susan Mckeever Dec 2021

Explaining Deep Learning Models For Tabular Data Using Layer-Wise Relevance Propagation, Ihsan Ullah, Andre Rios, Vaibhov Gala, Susan Mckeever

Articles

Trust and credibility in machine learning models are bolstered by the ability of a model to explain its decisions. While explainability of deep learning models is a well-known challenge, a further challenge is clarity of the explanation itself for relevant stakeholders of the model. Layer-wise Relevance Propagation (LRP), an established explainability technique developed for deep models in computer vision, provides intuitive human-readable heat maps of input images. We present the novel application of LRP with tabular datasets containing mixed data (categorical and numerical) using a deep neural network (1D-CNN), for Credit Card Fraud detection and Telecom Customer Churn prediction use …


Deep Parameter Selection For Classic Computer Vision Applications, Michael Whitney Dec 2021

Deep Parameter Selection For Classic Computer Vision Applications, Michael Whitney

Theses and Dissertations

A trend in computer vision today is to retire older, so-called "classic'' methods in favor of ones based on deep neural networks. This has led to tremendous improvements in many areas, but for some problems deep neural solutions may not yet exist or be of practical application. For this and other reasons, classic methods are still widely used in a variety of applications. This paper explores the possibility of using deep neural networks to improve these older methods instead of replace them. In particular, it addresses the issue of parameter selection in these algorithms by using a neural network to …


Aspect-Based Sentiment Analysis Of Movie Reviews, Samuel Onalaja, Eric Romero, Bosang Yun Dec 2021

Aspect-Based Sentiment Analysis Of Movie Reviews, Samuel Onalaja, Eric Romero, Bosang Yun

SMU Data Science Review

This study investigates a comparison of classification models used to determine aspect based separated text sentiment and predict binary sentiments of movie reviews with genre and aspect specific driving factors. To gain a broader classification analysis, five machine and deep learning algorithms were compared: Logistic Regression (LR), Naive Bayes (NB), Support Vector Machine (SVM), and Recurrent Neural Network Long-Short-Term Memory (RNN LSTM). The various movie aspects that are utilized to separate the sentences are determined through aggregating aspect words from lexicon-base, supervised and unsupervised learning. The driving factors are randomly assigned to various movie aspects and their impact tied to …


Pokégan: P2p (Pet To Pokémon) Stylizer, Michael B. Hedge, Morgan Nelson, Thomas Pengilly, Michael Weatherford Dec 2021

Pokégan: P2p (Pet To Pokémon) Stylizer, Michael B. Hedge, Morgan Nelson, Thomas Pengilly, Michael Weatherford

SMU Data Science Review

This paper covers the development, testing, and implementation of an automatic framework for converting common images of pets into a Pokémon cartoon with the style of a Pokémon trading card. The technique will first implement object detection for common animals to facilitate image segmentation and apply the appropriate style transfer model to ensure the most aesthetic stylization. It explores various methods to address artifacts in the results of common neural style transfer techniques using Generative Adversarial Networks (GANs). This research sets up a framework to create an app that converts user-submitted pet pictures to Pokémon styled images using the most …


Uncertainty-Aware Deep Learning For Prediction Of Remaining Useful Life Of Mechanical Systems, Samuel J. Cornelius Dec 2021

Uncertainty-Aware Deep Learning For Prediction Of Remaining Useful Life Of Mechanical Systems, Samuel J. Cornelius

Theses and Dissertations

Remaining useful life (RUL) prediction is a problem that researchers in the prognostics and health management (PHM) community have been studying for decades. Both physics-based and data-driven methods have been investigated, and in recent years, deep learning has gained significant attention. When sufficiently large and diverse datasets are available, deep neural networks can achieve state-of-the-art performance in RUL prediction for a variety of systems. However, for end users to trust the results of these models, especially as they are integrated into safety-critical systems, RUL prediction uncertainty must be captured. This work explores an approach for estimating both epistemic and heteroscedastic …


Eating Detection With A Head-Mounted Video Camera, Shengjie Bi, David Kotz Dec 2021

Eating Detection With A Head-Mounted Video Camera, Shengjie Bi, David Kotz

Computer Science Technical Reports

In this paper, we present a computer-vision based approach to detect eating. Specifically, our goal is to develop a wearable system that is effective and robust enough to automatically detect when people eat, and for how long. We collected video from a cap-mounted camera on 10 participants for about 55 hours in free-living conditions. We evaluated performance of eating detection with four different Convolutional Neural Network (CNN) models. The best model achieved accuracy 90.9% and F1 score 78.7% for eating detection with a 1-minute resolution. We also discuss the resources needed to deploy a 3D CNN model in wearable or …


The Detection Of Sexual Harassment And Chat Predators Using Artificial Neural Network, Noor Amer Hamzah, Ban N. Dhannoon Dec 2021

The Detection Of Sexual Harassment And Chat Predators Using Artificial Neural Network, Noor Amer Hamzah, Ban N. Dhannoon

Karbala International Journal of Modern Science

The vast increase in using social media sites like Twitter and Facebook led to frequent sexual_harassment on the Internet, which is considered a major societal problem. This paper aims to detect sexual_harassment and cyber_predators in early phase. We used deeplearning like Bidirectionally-long-short-term memory. Word representations are carefully reviewed in text specific to mapping to real number vectors. The chat sexual predators Detection_approach with the proposed_model. The best results obtained by the performance measured with F0.5-score were the result is_0.927 with proposed_models. The accuracy measured is_97.27% in the proposed_model. The comments sexual_harassment Detection_approach the result is_0.925 F0.5-score, and accuracy measured is_99.12%.


Pranayama Breathing Detection With Deep Learning, Bikash Shrestha Dec 2021

Pranayama Breathing Detection With Deep Learning, Bikash Shrestha

Theses

Yoga, a complementary health approach, according to a 2017 National Health Interview Survey by the Center for Disease Control and Prevention (CDC), is a choice of around 14.3% adults in the US. Kapalbhati pranayama, a yoga practice of alternating fast exhales and longer passive inhales, is understood to improve our health. Incorrect and irregular practices, however, can cause injuries and adverse effects. To avoid these undesired effects, it is essential to maintain a pace fit for the practitioner. In the absence of any tools to observe a pace of practice, this work develops a deep learning method that listens to …


Auto-Curation Of Large Evolving Image Datasets, Sara Mousavicheshmehkaboodi Dec 2021

Auto-Curation Of Large Evolving Image Datasets, Sara Mousavicheshmehkaboodi

Doctoral Dissertations

Large image collections are becoming common in many fields and offer tantalizing opportunities to transform how research, work, and education are conducted if the information and associated insights could be extracted from them. However, major obstacles to this vision exist. First, image datasets with associated metadata contain errors and need to be cleaned and organized to be easily explored and utilized. Second, such collections typically lack the necessary context or may have missing attributes that need to be recovered. Third, such datasets are domain-specific and require human expert involvement to make the right interpretation of the image content. Fourth, the …


Models Versus Datasets: Reducing Bias Through Building A Comprehensive Ids Benchmark, Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai A. Tawalbeh Dec 2021

Models Versus Datasets: Reducing Bias Through Building A Comprehensive Ids Benchmark, Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai A. Tawalbeh

Computer Science Faculty Publications

Today, deep learning approaches are widely used to build Intrusion Detection Systems for securing IoT environments. However, the models’ hidden and complex nature raises various concerns, such as trusting the model output and understanding why the model made certain decisions. Researchers generally publish their proposed model’s settings and performance results based on a specific dataset and a classification model but do not report the proposed model’s output and findings. Similarly, many researchers suggest an IDS solution by focusing only on a single benchmark dataset and classifier. Such solutions are prone to generating inaccurate and biased results. This paper overcomes these …