Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1261 - 1290 of 1687

Full-Text Articles in Physical Sciences and Mathematics

Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen Oct 2018

Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen

Theses and Dissertations

The ability to accurately characterize the soundscape, or combination of sounds, of diverse geographic areas has many practical implications. Interested parties include the United States military and the National Park Service, but applications also exist in areas such as public health, ecology, community and social justice noise analyses, and real estate. I use an ensemble of machine learning models to predict ambient sound levels throughout the contiguous United States. Our data set consists of 607 training sites, where various acoustic metrics, such as overall daytime L50 levels and one-third octave frequency band levels, have been obtained. I have data for …


Machine Learning For Ecosystem Services, Simon Willcock, Javier Martínez-López, Danny A.P. Hooftman, Kenneth J. Bagstad, Stefano Balbi, Alessia Marzo, Carlo Prato, Saverio Sciandrello, Giovanni Signorello Oct 2018

Machine Learning For Ecosystem Services, Simon Willcock, Javier Martínez-López, Danny A.P. Hooftman, Kenneth J. Bagstad, Stefano Balbi, Alessia Marzo, Carlo Prato, Saverio Sciandrello, Giovanni Signorello

Rubenstein School of Environment and Natural Resources Faculty Publications

Recent developments in machine learning have expanded data-driven modelling (DDM) capabilities, allowing artificial intelligence to infer the behaviour of a system by computing and exploiting correlations between observed variables within it. Machine learning algorithms may enable the use of increasingly available ‘big data’ and assist applying ecosystem service models across scales, analysing and predicting the flows of these services to disaggregated beneficiaries. We use the Weka and ARIES software to produce two examples of DDM: firewood use in South Africa and biodiversity value in Sicily, respectively. Our South African example demonstrates that DDM (64–91% accuracy) can identify the areas where …


Using Chronicling America’S Images To Explore Digitized Historic Newspapers & Imagine Alternative Futures, Elizabeth Lorang, Leen-Kiat Soh Sep 2018

Using Chronicling America’S Images To Explore Digitized Historic Newspapers & Imagine Alternative Futures, Elizabeth Lorang, Leen-Kiat Soh

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

This presentation situates the work of the Aida team broadly as well as hinges this work on some very specific challenges for digital libraries. In doing so demonstrate the many types of questions and domains to be explored in digitized newspapers.


Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen Sep 2018

Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen

Journal of Undergraduate Research

Kelp forests provide food and shelter for many organisms, and they are an important part of coastal ecosystems throughout the world. Along the Pacific coast of the United States, kelp forests are made up of two species of kelp: bull kelp (Nereocystis Leutkana) and giant kelp (Macrocystis Pyrifera). While similar, these two species are physiologically and structurally different.


Toward Audio Beehive Monitoring: Deep Learning Vs. Standard Machine Learning In Classifying Beehive Audio Samples, Vladmir Kulyukin, Sarbajit Mukherjee, Prakhar Amlathe Sep 2018

Toward Audio Beehive Monitoring: Deep Learning Vs. Standard Machine Learning In Classifying Beehive Audio Samples, Vladmir Kulyukin, Sarbajit Mukherjee, Prakhar Amlathe

Computer Science Faculty and Staff Publications

Electronic beehive monitoring extracts critical information on colony behavior and phenology without invasive beehive inspections and transportation costs. As an integral component of electronic beehive monitoring, audio beehive monitoring has the potential to automate the identification of various stressors for honeybee colonies from beehive audio samples. In this investigation, we designed several convolutional neural networks and compared their performance with four standard machine learning methods (logistic regression, k-nearest neighbors, support vector machines, and random forests) in classifying audio samples from microphones deployed above landing pads of Langstroth beehives. On a dataset of 10,260 audio samples where the training and testing …


Predicting National Basketball Association Success: A Machine Learning Approach, Adarsh Kannan, Brian Kolovich, Brandon Lawrence, Sohail Rafiqi Aug 2018

Predicting National Basketball Association Success: A Machine Learning Approach, Adarsh Kannan, Brian Kolovich, Brandon Lawrence, Sohail Rafiqi

SMU Data Science Review

In this paper, we present a machine learning based approach to projecting the success of National Basketball Association (NBA) draft prospects. With the proliferation of data, analytics have increasingly be- come a critical component in the assessment of professional and collegiate basketball players. We leverage player biometric data, college statistics, draft selection order, and positional breakdown as modelling features in our prediction algorithms. We found that a player's draft pick and their college statistics are the best predictors of their longevity in the National Basketball Association.


Using Advanced Post-Processing Methods With The Hrrr-Tle To Improve The Prediction Of Cold Season Precipitation Type, Timothy Thielke Aug 2018

Using Advanced Post-Processing Methods With The Hrrr-Tle To Improve The Prediction Of Cold Season Precipitation Type, Timothy Thielke

Theses and Dissertations

In this study we explore advanced statistical methods with the operational High-Resolution Rapid Refresh Model (HRRR) Time-Lagged Ensemble (TLE) to improve the prediction of cold season precipitation type. TLEs are a computationally efficient method to provide a slightly improved probabilistic forecast as the differences between model runs are an approximation of initial condition uncertainty. We apply evolutionary programming, weight-decay bias correction, and Bayesian Model Combination with fifteen HRRR forecast variables that potentially relate to precipitation type for station locations in the contiguous United States that are along and to the east of 100 W longitude to obtain probabilistic precipitation type …


Man, Machine, Scientific Models And Creation Science, Steven M. Gollmer Jul 2018

Man, Machine, Scientific Models And Creation Science, Steven M. Gollmer

Proceedings of the International Conference on Creationism

Historically, physics was the most quantitative of the sciences. Geologists and biologists built their models based on observation, categorization and generalization. This distinction between qualitative and quantitative sciences prompted the quote attributed to Ernest Rutherford that “All science is either physics or stamp collecting.” In the intervening 80 years all sciences have exploded in the use of quantitative measures to find patterns and trends in data. A review of a half-century of creationist literature shows that this transition has not been lost to the creationist community.

As this trend continues to accelerate, two areas of caution need to be taken …


Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi Jul 2018

Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi

SMU Data Science Review

In this paper, we present a tool that provides trading recommendations for cryptocurrency using a stochastic gradient boost classifier trained from a model labeled by technical indicators. The cryptocurrency market is volatile due to its infancy and limited size making it difficult for investors to know when to enter, exit, or stay in the market. Therefore, a tool is needed to provide investment recommendations for investors. We developed such a tool to support one cryptocurrency, Bitcoin, based on its historical price and volume data to recommend a trading decision for today or past days. This tool is 95.50% accurate with …


The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan Jul 2018

The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan

University Honors Theses

This extended literature review investigates how the architecture and features of the Facebook Newsfeed algorithm, EdgeRank, can inhibit and facilitate the expression of political opinions. This paper will investigate how Elisabeth Noelle-Neumann's theory on public opinion, Spiral of Silence, can be used to assess the Facebook news feed as a political opinion source that actively shapes users' perceptions of minority and majority opinion climates. The feedback loops created by the algorithm's criteria influences users' decisions to self-censor or express their political opinions with interpersonal connections and unfamiliar connections on the site.


Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue Ou, Huiguang Liang, Hwee Xian Tan Jul 2018

Identifying Elderlies At Risk Of Becoming More Depressed With Internet-Of-Things, Jiajue Ou, Huiguang Liang, Hwee Xian Tan

Research Collection School Of Computing and Information Systems

Depression in the elderly is common and dangerous. Current methods to monitor elderly depression, however, are costly, time-consuming and inefficient. In this paper, we present a novel depression-monitoring system that infers an elderly’s changes in depression level based on his/her activity patterns, extracted from wireless sensor data. To do so, we build predictive models to learn the relationship between depression level changes and behaviors using historical data. We also deploy the system for a group of elderly, in their homes, and run the experiments for more than one year. Our experimental study gives encouraging results, suggesting that our IoT system …


Non-Destructive Evaluation For Composite Material, Desalegn Temesgen Delelegn Jul 2018

Non-Destructive Evaluation For Composite Material, Desalegn Temesgen Delelegn

Electrical & Computer Engineering Theses & Dissertations

The Nondestructive Evaluation Sciences Branch (NESB) at the National Aeronautics and Space Administration (NASA) Langley Research Center (LaRC) has conducted impact damage experiments over the past few years with the goal of understanding structural defects in composite materials. The Data Science Team within the NASA LaRC Office of the Chief Information Officer (OCIO) has been working with the Non-Destructive Evaluation (NDE) subject matter experts (SMEs), Dr. Cheryl Rose, from the Structural Mechanics & Concepts Branch and Dr. William Winfree, from the Research Directorate, to develop computer vision solutions using digital image processing and machine learning techniques that can help identify …


Baseline Assisted Classification Of Heart Rate Variability, Elham Harirpoush Jun 2018

Baseline Assisted Classification Of Heart Rate Variability, Elham Harirpoush

Electronic Thesis and Dissertation Repository

Recently, among various analysis methods of physiological signals, automatic analysis of Electrocardiogram (ECG) signals, especially heart rate variability (HRV) has received significant attention in the field of machine learning. Heart rate variability is an important indicator of health prediction and it is applicable to various fields of scientific research. Heart rate variability is based on measuring the differences in time between consecutive heartbeats (also known as RR interval), and the most common measuring techniques are divided into the time domain and frequency domain. In this research study, a classifier based on analysis of HRV signal is developed to classify different …


Evaluating Beach Water Quality And Dengue Fever Risk Factors By Satellite Remote Sensing And Artificial Neural Networks, Abdiel Elias Laureano-Rosario Jun 2018

Evaluating Beach Water Quality And Dengue Fever Risk Factors By Satellite Remote Sensing And Artificial Neural Networks, Abdiel Elias Laureano-Rosario

USF Tampa Graduate Theses and Dissertations

Climatic variations, together with large-scale environmental forces and human development affect the quality of coastal recreational waters, creating potential risks to human health. These environmental forces, including increased temperature and precipitation, often promote specific vector-borne diseases in the Caribbean and Gulf of Mexico. Human activities affect water quality through discharges from urban areas, including nutrient and other pollutants derived from wastewater systems. Both water quality of recreational beaches and vector-borne diseases can be better managed by understanding their relationship with local environmental forces.

I evaluated how changes in vector-borne diseases and poor recreational water quality were related to specific environmental …


An Exploration Of Linear Classifiers For Unsupervised Spiking Neural Networks With Event-Driven Data, Wesley Chavez Jun 2018

An Exploration Of Linear Classifiers For Unsupervised Spiking Neural Networks With Event-Driven Data, Wesley Chavez

Dissertations and Theses

Object recognition in video has seen giant strides in accuracy improvements in the last few years, a testament to the computational capacity of deep convolutional neural networks. However, this computational capacity of software-based neural networks coincides with high power consumption compared to that of some spiking neural networks (SNNs), up to 300,000 times more energy per synaptic event in IBM's TrueNorth chip, for example. SNNs are also well-suited to exploit the precise timing of event-driven image sensors, which transmit asynchronous "events" only when the luminance of a pixel changes above or below a threshold value. The combination of event-based imagers …


Bounding Box Improvement With Reinforcement Learning, Andrew Lewis Cleland Jun 2018

Bounding Box Improvement With Reinforcement Learning, Andrew Lewis Cleland

Dissertations and Theses

In this thesis, I explore a reinforcement learning technique for improving bounding box localizations of objects in images. The model takes as input a bounding box already known to overlap an object and aims to improve the fit of the box through a series of transformations that shift the location of the box by translation, or change its size or aspect ratio. Over the course of these actions, the model adapts to new information extracted from the image. This active localization approach contrasts with existing bounding-box regression methods, which extract information from the image only once. I implement, train, and …


Cox Processes For Counting By Detection, Purnima Rajan, Yongming Ma, Bruno Jedynak Jun 2018

Cox Processes For Counting By Detection, Purnima Rajan, Yongming Ma, Bruno Jedynak

Portland Institute for Computational Science Publications

In this work, doubly stochastic Poisson (Cox) processes and convolutional neural net (CNN) classifiers are used to estimate the number of instances of an object in an image. Poisson processes are well suited to model events that occur randomly in space, such as the location of objects in an image or the enumeration of objects in a scene. The proposed algorithm selects a subset of bounding boxes in the image domain, then queries them for the presence of the object of interest by running a pre-trained CNN classifier. The resulting observations are then aggregated, and a posterior distribution over the …


Gaussian Processes With Context-Supported Priors For Active Object Localization, Bruno Jedynak Jun 2018

Gaussian Processes With Context-Supported Priors For Active Object Localization, Bruno Jedynak

Portland Institute for Computational Science Publications

We devise an algorithm using a Bayesian optimization framework in conjunction with contextual visual data for the efficient localization of objects in still images. Recent research has demonstrated substantial progress in object localization and related tasks for computer vision. However, many current state-of-the-art object localization procedures still suffer from inaccuracy and inefficiency, in addition to failing to provide a principled and interpretable system amenable to high-level vision tasks. We address these issues with the current research.

Our method encompasses an active search procedure that uses contextual data to generate initial bounding-box proposals for a target object. We train a convolutional …


2018 Ieee Signal Processing Cup: Forensic Camera Model Identification Challenge, Michael Geiger Jun 2018

2018 Ieee Signal Processing Cup: Forensic Camera Model Identification Challenge, Michael Geiger

Honors Theses

The goal of this Senior Capstone Project was to lead Union College’s first ever Signal Processing Cup Team to compete in IEEE’s 2018 Signal Processing Cup Competition. This year’s competition was a forensic camera model identification challenge and was divided into two separate stages of competition: Open Competition and Final Competition. Participation in the Open Competition was open to any teams of undergraduate students, but the Final Competition was only open to the three finalists from Open Competition and is scheduled to be held at ICASSP 2018 in Calgary, Alberta, Canada. Teams that make it to the Final Competition will …


Advanced Malware Detection For Android Platform, Ke Xu Jun 2018

Advanced Malware Detection For Android Platform, Ke Xu

Dissertations and Theses Collection (Open Access)

In the first quarter of 2018, 75.66% of smartphones sales were devices running An- droid. Due to its popularity, cyber-criminals have increasingly targeted this ecosys- tem. Malware running on Android severely violates end users security and privacy, allowing many attacks such as defeating two factor authentication of mobile bank- ing applications, capturing real-time voice calls and leaking sensitive information. In this dissertation, I describe the pieces of work that I have done to effectively de- tect malware on Android platform, i.e., ICC-based malware detection system (IC- CDetector), multi-layer malware detection system (DeepRefiner), and self-evolving and scalable malware detection system (DroidEvolver) …


Exact Recovery Of Prototypical Atoms Through Dictionary Initialization, Greg Zanotti, Enrico Au-Yeung May 2018

Exact Recovery Of Prototypical Atoms Through Dictionary Initialization, Greg Zanotti, Enrico Au-Yeung

DePaul Discoveries

In dictionary learning, a matrix comprised of signals Y is factorized into the product of two matrices: a matrix of prototypical "atoms" D, and a sparse matrix containing coefficients for atoms in D, called X. Dictionary learning finds applications in signal processing, image recognition, and a number of other fields. Many algorithms for solving the dictionary learning problem follow the alternating minimization paradigm; that is, by alternating solving for D and X. In 2014, Agarwal et al. proposed a dictionary initialization procedure that is used before this alternating minimization process. We show that there is a …


Narrowing The Scope Of Failure Prediction Using Targeted Fault Load Injection, Paul L. Jordan, Gilbert L. Peterson, Alan C. Lin, Michael J. Mendenhall, Andrew J. Sellers May 2018

Narrowing The Scope Of Failure Prediction Using Targeted Fault Load Injection, Paul L. Jordan, Gilbert L. Peterson, Alan C. Lin, Michael J. Mendenhall, Andrew J. Sellers

Faculty Publications

As society becomes more dependent upon computer systems to perform increasingly critical tasks, ensuring that those systems do not fail becomes increasingly important. Many organizations depend heavily on desktop computers for day-to-day operations. Unfortunately, the software that runs on these computers is written by humans and, as such, is still subject to human error and consequent failure. A natural solution is to use statistical machine learning to predict failure. However, since failure is still a relatively rare event, obtaining labelled training data to train these models is not a trivial task. This work presents new simulated fault-inducing loads that extend …


Machine Learning Applications In Graduation Prediction At The University Of Nevada, Las Vegas, Elliott Collin Ploutz May 2018

Machine Learning Applications In Graduation Prediction At The University Of Nevada, Las Vegas, Elliott Collin Ploutz

UNLV Theses, Dissertations, Professional Papers, and Capstones

Graduation rates of four-year institutions are an increasingly important metric to incoming students and for ranking universities. To increase completion rates, universities must analyze available student data to understand trends and factors leading to graduation. Using predictive modeling, incoming students can be assessed as to their likelihood of completing a degree. If students are predicted to be most likely to drop out, interventions can be enacted to increase retention and completion rates.

At the University of Nevada, Las Vegas (UNLV), four-year graduation rates are 15% and six-year graduation rates are 39%. To improve these rates, we have gathered seven years …


Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo May 2018

Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo

Master of Science in Computer Science Theses

Malware classification is a critical part in the cybersecurity.

Traditional methodologies for the malware classification

typically use static analysis and dynamic analysis to identify malware.

In this paper, a malware classification methodology based

on its binary image and extracting local binary pattern (LBP)

features are proposed. First, malware images are reorganized into

3 by 3 grids which is mainly used to extract LBP feature. Second,

the LBP is implemented on the malware images to extract features

in that it is useful in pattern or texture classification. Finally,

Tensorflow, a library for machine learning, is applied to classify

malware images with …


A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein May 2018

A Multiple Classifier System For Predicting Best-Selling Amazon Products, Michael Kranzlein

Master of Science in Computer Science Theses

In this work, I examine a dataset of Amazon product metadata and propose a heterogeneous multiple classifier system for the task of identifying best-selling products in multiple categories. This system of classifiers consumes the product description and the featured product image as input and feeds them through binary classifiers of the following types: Convolutional Neural Network, Na¨ıve Bayes, Random Forest, Ridge Regression, and Support Vector Machine. While each individual model is largely successful in identifying best-selling products from non best-selling products and from worst-selling products, the multiple classifier system is shown to be stronger than any individual model in the …


Ai-Human Collaboration Via Eeg, Adam Noack May 2018

Ai-Human Collaboration Via Eeg, Adam Noack

All College Thesis Program, 2016-2019

As AI becomes ever more competent and integrated into our lives, the issue of AI-human goal misalignment looms larger. This is partially because there is often a rift between what humans explicitly command and what they actually mean. Most contemporary AI systems cannot bridge this gap. In this study we attempted to reconcile the goals of human and machine by using EEG signals from a human to help a simulated agent complete a task.


Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher May 2018

Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher

Conference papers

Activity discovery is a challenging machine learning problem where we seek to uncover new or altered behavioural patterns in sensor data. In this paper we motivate and introduce a novel approach to evaluating activity discovery systems. Pre-annotated ground truths, often used to evaluate the performance of such systems on existing datasets, may exist at different levels of abstraction to the output of the output produced by the system. We propose a method for detecting and dealing with this situation, allowing for useful ground truth comparisons. This work has applications for activity discovery, and also for related fields. For example, it …


Deep Learning For Recognition Of Objects, Activities, Faces, And Spatio-Temporal Patterns, Amir Ghaderi May 2018

Deep Learning For Recognition Of Objects, Activities, Faces, And Spatio-Temporal Patterns, Amir Ghaderi

Computer Science and Engineering Dissertations

A popular method in machine learning is Convolutional Neural Network (CNN). CNN had was of high interest to the research community in the 1990s, but after that its popularity receded compared to the Support Vector Machine Support Vector Machine (SVM)[1]. One of the reasons was the relatively lower computational demands of SVM. Training CNNs requires significantly more computational power, time, and data than training SVM. One of the important issues in showing the power of the CNN is the availability of the huge amount of data and introducing big datasets. With increased availability of powerful GPU processing, using several improvements …


Learning From Mutants: Using Code Mutation To Learn And Monitor Invariants Of A Cyber-Physical System, Yuqi Chen, Christopher M. Poskitt, Jun Sun May 2018

Learning From Mutants: Using Code Mutation To Learn And Monitor Invariants Of A Cyber-Physical System, Yuqi Chen, Christopher M. Poskitt, Jun Sun

Research Collection School Of Computing and Information Systems

Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however, is extremely difficult. In this paper, we propose a novel approach for constructing models of CPS automatically, by applying supervised machine learning to data traces obtained after systematically seeding their software components with faults ("mutants"). We demonstrate the …


Face Detection And Recognition Using Moving Window Accumulator With Various Deep Learning Architecture, Anil Kumar Nayak May 2018

Face Detection And Recognition Using Moving Window Accumulator With Various Deep Learning Architecture, Anil Kumar Nayak

Computer Science and Engineering Theses

Recent advancement in the field of Computer Vision and Deep Learning is making object detection and recognition easier. Hence, growing research activities in the field of deep learning are enabling researchers to find new ideas in the area of face detection and recognition. Implementation of such systems has a number of challenges when it comes to the current approaches. In this paper, we have presented a system of Face Detection and Recognition with newly designed deep learning classification models like CNN, Inception and various state of art models like SVM and we also compared the result with FaceNet. Multiple approaches …