Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1332)
- Artificial Intelligence and Robotics (517)
- Engineering (357)
- Computer Engineering (169)
- Data Science (148)
-
- Social and Behavioral Sciences (143)
- Electrical and Computer Engineering (139)
- Statistics and Probability (129)
- Medicine and Health Sciences (117)
- Life Sciences (102)
- Databases and Information Systems (101)
- Earth Sciences (79)
- Theory and Algorithms (74)
- Mathematics (72)
- Physics (71)
- Environmental Sciences (69)
- Information Security (69)
- Numerical Analysis and Scientific Computing (69)
- Software Engineering (68)
- Other Computer Sciences (64)
- Business (58)
- Applied Mathematics (51)
- Arts and Humanities (45)
- Education (40)
- Medical Specialties (36)
- Chemistry (34)
- Applied Statistics (32)
- Operations Research, Systems Engineering and Industrial Engineering (32)
- Oceanography and Atmospheric Sciences and Meteorology (30)
- Institution
-
- Old Dominion University (116)
- Singapore Management University (105)
- Brigham Young University (74)
- Air Force Institute of Technology (66)
- TÜBİTAK (61)
-
- Zayed University (48)
- University of Texas at Arlington (44)
- New Jersey Institute of Technology (42)
- Technological University Dublin (40)
- Portland State University (38)
- University of Nebraska - Lincoln (38)
- Edith Cowan University (30)
- Western University (30)
- Chapman University (27)
- San Jose State University (26)
- City University of New York (CUNY) (25)
- University of Kentucky (25)
- University of South Florida (24)
- Boise State University (21)
- Utah State University (21)
- Louisiana State University (19)
- University of Texas Rio Grande Valley (19)
- University at Albany, State University of New York (18)
- University of Louisville (18)
- Wright State University (18)
- Southern Methodist University (17)
- University of Nevada, Las Vegas (17)
- University of Tennessee, Knoxville (17)
- California Polytechnic State University, San Luis Obispo (16)
- Dartmouth College (16)
- Publication Year
- Publication
-
- Theses and Dissertations (152)
- Research Collection School Of Computing and Information Systems (86)
- Electronic Theses and Dissertations (65)
- Turkish Journal of Electrical Engineering and Computer Sciences (60)
- Dissertations (51)
-
- All Works (48)
- Faculty Publications (40)
- Computer Science and Engineering Dissertations (24)
- Electrical & Computer Engineering Faculty Publications (24)
- Electronic Thesis and Dissertation Repository (23)
- Dissertations and Theses (22)
- Master's Projects (21)
- Conference papers (20)
- Doctoral Dissertations (20)
- Computer Science Faculty Publications (19)
- Computer Science and Engineering Theses (19)
- Legacy Theses & Dissertations (2009 - 2024) (18)
- Articles (17)
- USF Tampa Graduate Theses and Dissertations (17)
- Master's Theses (16)
- Browse all Theses and Dissertations (15)
- Research outputs 2022 to 2026 (15)
- SMU Data Science Review (15)
- Boise State University Theses and Dissertations (14)
- Dissertations, Theses, and Capstone Projects (13)
- LSU Doctoral Dissertations (13)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (13)
- CCE Theses and Dissertations (12)
- Honors Theses (12)
- Journal of System Simulation (12)
- Publication Type
Articles 961 - 990 of 1689
Full-Text Articles in Physical Sciences and Mathematics
Does Applying Deep Learning In Financial Sentiment Analysis Lead To Better Classification Performance?, Tao Wang, Changhe Yuan, Cuiyuan Wang
Does Applying Deep Learning In Financial Sentiment Analysis Lead To Better Classification Performance?, Tao Wang, Changhe Yuan, Cuiyuan Wang
Publications and Research
Using a unique data set from Seeking Alpha, we compare the deep learning approach with traditional machine learning approaches in classifying financial text. We apply the long short-term memory (LSTM) as the deep learning method and Naive Bayes, SVM, Logistic Regression, XGBoost as the traditional machine learning approaches. The results suggest that the LSTM model outperforms the conventional machine learning methods on all metrics. Based on the tSNE graph, the success of the LSTM model is partially explained as the high-accuracy LSTM model distinguishes between positive and negative important sentiment words while those words are chosen based on SHAP values …
Applications Of Machine Learning To Threat Intelligence, Intrusion Detection And Malware, Charity Barker
Applications Of Machine Learning To Threat Intelligence, Intrusion Detection And Malware, Charity Barker
Senior Honors Theses
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection. Threat intelligence, especially attack attribution, can benefit from the use of ML classification. False positives from rule-based intrusion detection systems can be reduced with the use of ML models. Malware analysis and classification can be made easier by developing ML frameworks to distill similarities between the malicious programs. Adversarial machine learning will also be discussed, because while ML can be used to solve problems or …
Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin
Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin
Civil & Environmental Engineering Theses & Dissertations
Classification of vehicles into distinct groups is critical for many applications, including freight and commodity flow modeling, pavement management and design, tolling, air quality monitoring, and intelligent transportation systems. The Federal Highway Administration (FHWA) developed a standardized 13-category vehicle classification ruleset, which meets the needs of many traffic data user applications. However, some applications need high-resolution data for modeling and analysis. For example, the type of commodity being carried must be known in the freight modeling framework. Unfortunately, this information is not available at the state or metropolitan level, or it is expensive to obtain from current resources.
Nevertheless, using …
High Performance And Machine Learning Algorithms For Brain Fmri Data, Taban Eslami
High Performance And Machine Learning Algorithms For Brain Fmri Data, Taban Eslami
Dissertations
Brain disorders are very difficult to diagnose for reasons such as overlapping nature of symptoms, individual differences in brain structure, lack of medical tests and unknown causes of some disorders. The current psychiatric diagnostic process is based on behavioral observation and may be prone to misdiagnosis.
Noninvasive brain imaging technologies such as Magnetic Resonance Imaging (MRI) and functional Magnetic Resonance Imaging (fMRI) make the process of understanding the structure and function of the brain easier. Quantitative analysis of brain imaging data using machine learning and data mining techniques can be advantageous not only to increase the accuracy of brain disorder …
Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel
Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel
Theses and Dissertations
Event-based cameras are a novel type of visual sensor that operate under a unique paradigm, providing asynchronous data on the log-level changes in light intensity for individual pixels. This hardware-level approach to change detection allows these cameras to achieve ultra-wide dynamic range and high temporal resolution. Furthermore, the advent of convolutional neural networks (CNNs) has led to state-of-the-art navigation solutions that now rival or even surpass human engineered algorithms. The advantages offered by event cameras and CNNs make them excellent tools for visual odometry (VO). This document presents the implementation of a CNN trained to detect and describe features within …
Retiming Smoke Simulation Using Machine Learning, Samuel Charles Gérard Giraud Carrier
Retiming Smoke Simulation Using Machine Learning, Samuel Charles Gérard Giraud Carrier
Theses and Dissertations
Art-directability is a crucial aspect of creating aesthetically pleasing visual effects that help tell stories. A particularly common method of art direction is the retiming of a simulation. Unfortunately, the means of retiming an existing simulation sequence which preserves the desired shapes is an ill-defined problem. Naively interpolating values between frames leads to visual artifacts such as choppy frames or jittering intensities. Due to the difficulty in formulating a proper interpolation method we elect to use a machine learning approach to approximate this function. Our model is based on the ODE-net structure and reproduces a set of desired time samples …
Treatment Effects Of Modafinil For Cocaine Use Disorders: A Retrospective Analysis Of Aggregated Clinical Trial Data From Three Cocaine Treatment Studies, Daniel Ruskin
Honors Scholar Theses
Approximately 913,000 individuals in the United States meet the diagnostic criteria for cocaine use disorder (CUD). The widespread usage of cocaine, along with the negative cardiac and neurological effects associated with the drug, has made cocaine one of the top three drugs associated with overdose deaths in the United States. This epidemic has brought cocaine dependency into the public spotlight and has prompted extensive research into treatment strategies. However, at the time of writing, no drugs have been approved by the United States Food and Drug Administration (FDA) for use in treating CUD. The purpose of this study is to …
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas
Faculty Publications, Computer Science
In the graph classification problem, given is a family of graphs and a group of different categories, and we aim to classify all the graphs (of the family) into the given categories. Earlier approaches, such as graph kernels and graph embedding techniques have focused on extracting certain features by processing the entire graph. However, real world graphs are complex and noisy and these traditional approaches are computationally intensive. With the introduction of the deep learning framework, there have been numerous attempts to create more efficient classification approaches. We modify a kernel graph convolutional neural network approach, that extracts subgraphs (patches) …
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Computer Science ETDs
Widespread Chinese social media applications such as Sina Weibo (Chinese Twitter), the most popular social network in China, are widely known for monitoring and deleting posts to conform to Chinese government requirements. Censorship of Chinese social media is a complex process that involves many factors. There are multiple stakeholders and many different interests: economic, political, legal, personal, etc., which means that there is not a single strategy dictated by a single government authority. Moreover, sometimes Chinese social media do not follow the directives of government, out of concern that they are more strictly censoring than their competitors.
One crucial question …
Using Logical Specifications For Multi-Objective Reinforcement Learning, Kolby Nottingham
Using Logical Specifications For Multi-Objective Reinforcement Learning, Kolby Nottingham
Undergraduate Honors Theses
In the multi-objective reinforcement learning (MORL) paradigm, the relative importance of environment objectives is often unknown prior to training, so agents must learn to specialize their behavior to optimize different combinations of environment objectives that are specified post-training. These are typically linear combinations, so the agent is effectively parameterized by a weight vector that describes how to balance competing environment objectives. However, we show that behaviors can be successfully specified and learned by much more expressive non-linear logical specifications. We test our agent in several environments with various objectives and show that it can generalize to many never-before-seen specifications.
Machine Learning For Effective Parkinson's Disease Diagnosis, Brennon Brimhall
Machine Learning For Effective Parkinson's Disease Diagnosis, Brennon Brimhall
Undergraduate Honors Theses
Parkinson’s Disease is a degenerative neurological condition that affects approximately 10 million people globally. Because there is currently no cure, there is a strong motivation for research into improved and automated diagnostic procedures. Using Random Forests, a computer can effectively learn to diagnose Parkinson’s disease in a patient with high accuracy (94%), precision (95%), and recall (91%) across the data of over 2800 patients. Using similar techniques, I further determine that the most predictive medical tests relate to tremors observed in patients.
Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin
Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin
Theses and Dissertations
Machine Learning (ML) is rapidly becoming integrated in critical aspects of cybersecurity today, particularly in the area of network intrusion/anomaly detection. However, ML techniques require large volumes of data to be effective. The available data is a critical aspect of the ML process for training, classification, and testing purposes. One solution to the problem is to generate synthetic data that is realistic. With the application of ML to this area, one promising application is the use of ML to perform the data generation. With the ability to generate synthetic data comes the need to evaluate the “realness” of the generated …
Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé
Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé
Theses and Dissertations
A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …
Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher
Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher
Theses and Dissertations
Decisions made during the high-stress and fast-paced operations of the military are extremely prone to cognitive biases. A commonly known cognitive bias is a confirmation bias, or the inappropriate bolstering of an unknown hypothesis. One such critical military operation that can fall prey to a confirmation bias is a visual search. During a visual search, a military operator must perform a visual scan of an environment for a specific target. However, the visual search process can fall prey to the same confirmation bias which can cause inefficient searches. This study elicits inefficient visual search patterns and applies various mitigation techniques …
Characterizing Regime-Based Flow Uncertainty, John L. Fioretti
Characterizing Regime-Based Flow Uncertainty, John L. Fioretti
Theses and Dissertations
The goal of this work is to develop a regime-based quantification of horizontal wind field uncertainty utilizing a global ensemble numerical weather prediction model. In this case, the Global Ensemble Forecast System Reforecast (GEFSR) data is utilized. The machine learning algorithm that is employed is the mini-batch K-means clustering algorithm. 850 hPa Horizontal flow fields are clustered and the forecast uncertainty in these flow fields is calculated for different forecast times for regions across the globe. This provides end-users quantified flow-based forecast uncertainty.
A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum
A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum
Theses and Dissertations
A machine learning approach is taken to characterizing a group of synthetic uranium bearing particles. SEM images of these lab-created particles were converted into a binary representation that captured morphological features in accordance with a guide established by Los Alamos National Laboratory. Each particle in the dataset contains an association with chemical creation conditions: processing method, precipitation temperature and pH, calcination temperature are most closely tied to particle morphology. Additionally, trained classifiers are able to relate final products between particles, implying that morphological features are shared between particles with similar composition.
Artificial Intelligence: A New Paradigm In Obstetrics And Gynecology Research And Clinical Practice, Pulwasha Iftikhar, Marcela V. Kuijpers, Azadeh Khayyat, Aqsa Iftikhar, Maribel Degouvia De Sa
Artificial Intelligence: A New Paradigm In Obstetrics And Gynecology Research And Clinical Practice, Pulwasha Iftikhar, Marcela V. Kuijpers, Azadeh Khayyat, Aqsa Iftikhar, Maribel Degouvia De Sa
Publications and Research
Artificial intelligence (AI) is growing exponentially in various fields, including medicine. This paper reviews the pertinent aspects of AI in obstetrics and gynecology (OB/GYN) and how these can be applied to improve patient outcomes and reduce the healthcare costs and workload for clinicians.
Herein, we will address current AI uses in OB/GYN, and the use of AI as a tool to interpret fetal heart rate (FHR) and cardiotocography (CTG) to aid in the detection of preterm labor, pregnancy complications, and review discrepancies in its interpretation between clinicians to reduce maternal and infant morbidity and mortality. AI systems can be used …
Dictionary Learning For Image Reconstruction Via Numerical Non-Convex Optimization Methods, Lewis M. Hicks
Dictionary Learning For Image Reconstruction Via Numerical Non-Convex Optimization Methods, Lewis M. Hicks
University Honors Theses
This thesis explores image dictionary learning via non-convex (difference of convex, DC) programming and its applications to image reconstruction. First, the image reconstruction problem is detailed and solutions are presented. Each such solution requires an image dictionary to be specified directly or to be learned via non-convex programming. The solutions explored are the DCA (DC algorithm) and the boosted DCA. These various forms of dictionary learning are then compared on the basis of both image reconstruction accuracy and number of iterations required to converge.
Machine Learning Predicts Reach-Scale Channel Types From Coarse-Scale Geospatial Data In A Large River Basin, Hervé Guillon, Colin F. Byrne, Belize A. Lane, Samuel Sandoval Solis, Gregory B. Pasternack
Machine Learning Predicts Reach-Scale Channel Types From Coarse-Scale Geospatial Data In A Large River Basin, Hervé Guillon, Colin F. Byrne, Belize A. Lane, Samuel Sandoval Solis, Gregory B. Pasternack
Publications
Hydrologic and geomorphic classifications have gained traction in response to the increasing need for basin-wide water resources management. Regardless of the selected classification scheme, an open scientific challenge is how to extend information from limited field sites to classify tens of thousands to millions of channel reaches across a basin. To address this spatial scaling challenge, this study leverages machine learning to predict reach-scale geomorphic channel types using publicly available geospatial data. A bottom-up machine learning approach selects the most accurate and stable model among∼20,000 combinations of 287 coarse geospatial predictors, preprocessing methods, and algorithms in a three-tiered framework to …
Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple
Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple
Faculty Publications
Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by enabling reliable authentication of communication devices at the “serial number” level. Facilitating the reliable authentication of communication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured data. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has shown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of “winner take all” classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are computed between exemplars and PVs, and …
Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li
Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li
Journal of System Simulation
Abstract: Monocular camera mark-less pose estimation system suffers low accuracy, robustness and efficiency due to variety of action, self-occlusion of human body. A method of feature exaction from point clouds was proposed, in which a single-to-multiple (S2M) feature regressor and a joint position regressor were designed to quickly and accurately predict the 3D positions of body joints from a single depth image without any temporal information. Experiment result shows that the estimation accuracy is superior to that of state-of-the-arts and multi-camera based methods.
Critical Temperature Prediction Of Superconductors Based On Atomic Vectors And Deep Learning, Shaobo Li, Yabo Dan, Xiang Li, Tiantian Hu, Rongzhi Dong, Zhuo Cao, Jianjun Hu
Critical Temperature Prediction Of Superconductors Based On Atomic Vectors And Deep Learning, Shaobo Li, Yabo Dan, Xiang Li, Tiantian Hu, Rongzhi Dong, Zhuo Cao, Jianjun Hu
Faculty Publications
In this paper, a hybrid neural network (HNN) that combines a convolutional neural network (CNN) and long short-term memory neural network (LSTM) is proposed to extract the high-level characteristics of materials for critical temperature (Tc) prediction of superconductors. Firstly, by obtaining 73,452 inorganic compounds from the Materials Project (MP) database and building an atomic environment matrix, we obtained a vector representation (atomic vector) of 87 atoms by singular value decomposition (SVD) of the atomic environment matrix. Then, the obtained atom vector was used to implement the coded representation of the superconductors in the order of the atoms in the chemical …
Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen
Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen
Research Collection School Of Computing and Information Systems
Code search methods, especially those that allow programmers to raise queries in a natural language, plays an important role in software development. It helps to improve programmers' productivity by returning sample code snippets from the Internet and/or source-code repositories for their natural-language queries. Meanwhile, there are many code search methods in the literature that support natural-language queries. Difficulties exist in recognizing the strengths and weaknesses of each method and choosing the right one for different usage scenarios, because (1) the implementations of those methods and the datasets for evaluating them are usually not publicly available, and (2) some methods leverage …
Developing And Improving Risk Models Using Machine-Learning Based Algorithms, Yan Wang, Sherry Ni
Developing And Improving Risk Models Using Machine-Learning Based Algorithms, Yan Wang, Sherry Ni
Published and Grey Literature from PhD Candidates
The objective of this study is to develop a good risk model for classifying business delinquency by simultaneously exploring several machine learning-based methods including regularization, hyperparameter optimization, and model ensembling algorithms. The rationale under the analyses is firstly to obtain good base binary classifiers (include Logistic Regression (LR), K-Nearest Neighbors (KNN ), Decision Tree (DT), and Artificial Neural Networks (ANN )) via regularization and appropriate settings of hyper-parameters. Then two model ensembling algorithms including bagging and boosting are performed on the good base classifiers for further model improvement. The models are evaluated using accuracy, Area Under the Receiver Operating Characteristic …
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan
Information Science Faculty Publications
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …
Final Presentation To The Library Of Congress On Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack
Final Presentation To The Library Of Congress On Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
This presentation to Library of Congress staff, delivered onsite on January 10, 2020, presents a tour through the demonstration project pursued by the Aida digital libraries research team with the Library of Congress in 2019-2020. In addition to providing an overview and analysis of the specific machine learning projects scoped and explored, this presentation includes a number of high-level take-aways and recommendations designed to influence and inform the Library of Congress's machine learning efforts going forward.
Digital Libraries, Intelligent Data Analytics, And Augmented Description: A Demonstration Project, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack
Digital Libraries, Intelligent Data Analytics, And Augmented Description: A Demonstration Project, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack
UNL Libraries: Faculty Publications
From July 16-to November 8, 2019, the Aida digital libraries research team at the University of Nebraska-Lincoln collaborated with the Library of Congress on “Digital Libraries, Intelligent Data Analytics, and Augmented Description: A Demonstration Project.“ This demonstration project sought to (1) develop and investigate the viability and feasibility of textual and image-based data analytics approaches to support and facilitate discovery; (2) understand technical tools and requirements for the Library of Congress to improve access and discovery of its digital collections; and (3) enable the Library of Congress to plan for future possibilities. In pursuit of these goals, we focused our …
Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang
Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang
Research Collection School Of Computing and Information Systems
The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing of …
Gradient Boosting For Survival Analysis With Applications In Oncology, Nam Phuong Nguyen
Gradient Boosting For Survival Analysis With Applications In Oncology, Nam Phuong Nguyen
USF Tampa Graduate Theses and Dissertations
Cancer is one of the most deadly diseases that the world has been fighting against over decades. An enormous number of research has been conducted, via a wide scale of approaches, raging from genetic analysis to mathematical modeling. Survival analysis is a well-performed methodology frequently used to estimate the survival probability of a patient. Although there has been a large number of methods for survival analysis, efficient exploration of a high-dimensional feature space has been challenging due to its computational cost and complexity. This thesis adapts the component-wise gradient boosting algorithms for cancer survival analysis, and also proposes a new …
Multi-Class Twitter Data Categorization And Geocoding With A Novel Computing Framework, Sakib Mahmud Khan, Mashrur Chowdhury, Linh B. Ngo, Amy Apon
Multi-Class Twitter Data Categorization And Geocoding With A Novel Computing Framework, Sakib Mahmud Khan, Mashrur Chowdhury, Linh B. Ngo, Amy Apon
Computer Science Faculty Publications
This study details the progress in transportation data analysis with a novel computing framework in keeping with the continuous evolution of the computing technology. The computing framework combines the Labeled Latent Dirichlet Allocation (L-LDA)-incorporated Support Vector Machine (SVM) classifier with the supporting computing strategy on publicly available Twitter data in determining transportation-related events to provide reliable information to travelers. The analytical approach includes analyzing tweets using text classification and geocoding locations based on string similarity. A case study conducted for the New York City and its surrounding areas demonstrates the feasibility of the analytical approach. Approximately 700,010 tweets are analyzed …