Recent Submissions

  • Open Set Text Classification Using Neural Networks 

    Contributor:Venkataram, Vinodini Molukuvan;
    Date Submitted:2018-12
    In a closed set environment, classifiers are trained on examples from a number of known classesandtestedwithunseenexamplesbelongingtothesamesetofknownclasses. However, in most real-world scenarios, a trained classifier is ...
  • Neural Networks For Automatic Polyphonic Piano Music Transcription 

    Contributor:Ender, Johnathon Michael;
    Date Submitted:2018-12
    Automatic Music Transcription is the process of producing an accurate musical representation from a polyphonic audio signal and continues to challenge state-of-the-art techniques. To produce reliable transcriptions, human ...
  • HIDDEN VARIABLE RESULTANT APPROACH FOR CLASSICAL COMPUTER VISION PROBLEMS 

    Contributor:Nonell Pare, Jordi;
    Date Submitted:2018-12
    Many problems in computer vision may be formulated as minimal problems; problems that require a minimal number of inputs and solving them equals to solve a system of non-linear polynomial equations with a finite number ...
  • Openset Approach To Object Detection, An 

    Contributor:Dhamija, Akshay Raj;
    Date Submitted:2018-12
    Object detection has been a popular area of research in computer vision, where during the recent years deep learning based approaches have taken over the traditional approaches based on hand engineered features like HOG ...
  • Learning Based Visual Engagement and Self-Efficacy 

    Contributor:Dhamija, Svati;
    Date Submitted:2018-12
    With the advancements in the fields of Affective computing, Computer vision and Human-computer interaction, along with the exponential development of intelligent machines, the study of human mind and behavior is emerging ...
  • Towards Robust Deep Neural Networks 

    Contributor:Rozsa, Andras;
    Date Submitted:2018-12
    One of the greatest technological advancements of the 21st century has been the rise of machine learning. This thriving field of research already has a great impact on our lives and, considering research topics and the ...
  • TOWARDS IMPROVING VIRTUAL MACHINE SECURITY IN THE CLOUD 

    Contributor:Aloysius Navamani, Beaulah;
    Date Submitted:2018-12
    Cloud computing is very appealing for its convenient central management, the elasticity of resource provisioning and its economic benefits. Undoubtedly, the non-transparent nature of the Cloud infrastructure introduces ...
  • Towards Literary Genre Identification: Applied Neural Networks for Large Text Classification 

    Contributor:Worsham, Joseph Michael;
    Date Submitted:2018-12
    Recent advances in Natural Language Processing are finding ways to place an emphasis on the hierarchical nature of text instead of representing language as a flat sequence or unordered collection of words or letters. A ...
  • CHAINLETS: A NEW DESCRIPTOR FOR DETECTION AND RECOGNITION 

    Contributor:Ahmad, Adil;
    Date Submitted:2018-12
    Detecting and recognizing objects in images is one of the most challenging tasks in computer vision, as it seeks to detect subtle objects while ignoring massive numbers of negatives. While deep networks have led to ...
  • Realtime Physically Plausible Global Illumination Using Scalable Spherical Harmonics Hierarchies 

    Contributor:Metzgar, Jonathan Brian;
    Date Submitted:2018-05
    Global illumination that is based on physically based reflectance models using unbiased statistical path tracing methods remains the best way to simulate a realistic image, but only a few types of simple scenes can be ...
  • Authentication of legitimate users of smartphones based on app usage sequences 

    Contributor:Piferrer Torres, Enric;
    Date Submitted:2018-05
    Nowadays, it is hard to understand society without smartphones. People may own one or even more of these devices and use them regularly. Consequently, such a trend brings up many security issues, initial authentication ...
  • Machine Learning Model for Elite Athletes, A 

    Contributor:Hmosze, Maadh;
    Date Submitted:2018-05
    Abstract In this research we have used different machine learning algorithms to predict the performance of the elite athletes riding bicycles. The study of measuring the performance of the athletes is based on different ...
  • Towards Automating Big Texts Security Classification 

    Contributor:Alzhrani, Khudran Maeed;
    Date Submitted:2018-05
    The U.S Government has been the target of cyber-attacks from all over the world. Former President Obama accused the Russian government of leaking emails to WikiLeaks and declared that the U.S. might be forced to respond. ...
  • CAPITALIZING ON THE SECURITY POTENTIAL OF SOFTWARE DEFINED NETWORKING BY PROVIDING A NETWORK CONFIDENCE ASSESSMENT 

    Contributor:Alcorn, Joshua Andrew;
    Date Submitted:2018-05
    The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in ...
  • Hybrid Cloud Federated Identity Architecture Supporting Mission Critical First Responders 

    Contributor:Garcia, Randall E.;
    Date Submitted:2018-05
    Disaster response operations continue to suffer from poor information sharing across the responding organizations. This recurring trend results in degraded operations and potential loss of life and property. Emerging ...
  • SECURE, FAST, AND EFFICIENT HANDOFF PROTOCOLS FOR WIRELESS MESH NETWORKS 

    Contributor:Alamri, Naif;
    Date Submitted:2018-05
    In 2011, the IEEE 802.11s for wireless mesh networks (WMN) was introduced to provide the specifications and necessary changes to the MAC layer protocols which extend the network capabilities in establishing multi-hop and ...
  • EVALUATING SHORT-WAVE INFRARED IMAGES ON A CONVOLUTIONAL NEURAL NETWORK 

    Contributor:Bihn, Michael Joseph;
    Date Submitted:2017-12
    Machine learning algorithms, both neural networks and non neural networks, have been tested against RGB facial images for years. Their success is dependent on clearly distinguishable cropped faces. Poor lighting and distance ...
  • Enhancing the Bootstrapping Network in Cloud-based Onion Routing (COR) 

    Contributor:Snider, Kevin;
    Date Submitted:2017-12
    The maintenance of privacy and anonymity on the Internet has become a large concern for many users worldwide. The online service known as Tor (The Onion Router) is one of the most popular tools available to users seeking ...
  • Travel Plan Generator 

    Contributor:Shao, Likun;
    Date Submitted:2017-12
    Travelers usually have their customized travel plans before starting their trips. A good travel plan can make them convenient to arrange their trips and make trips well organized. In order to customize personal travel ...
  • FULLY HOMOMORPHIC ENCRYPTION OVER EXTERIOR PRODUCT SPACES 

    Contributor:Honorio Araujo da Silva, David William;
    Date Submitted:2017-12
    In this work I propose a new symmetric fully homomorphic encryption powered by Exterior Algebra and Product Spaces, more specifically by Geometric Algebra as a mathematical language for creating cryptographic solutions, ...

View more