Recent Submissions

  • Open Set Text Classification Using Neural Networks 

    Contributor:Venkataram, Vinodini Molukuvan;
    Date Submitted:2018-12
    In a closed set environment, classifiers are trained on examples from a number of known classesandtestedwithunseenexamplesbelongingtothesamesetofknownclasses. However, in most real-world scenarios, a trained classifier is ...
  • Neural Networks For Automatic Polyphonic Piano Music Transcription 

    Contributor:Ender, Johnathon Michael;
    Date Submitted:2018-12
    Automatic Music Transcription is the process of producing an accurate musical representation from a polyphonic audio signal and continues to challenge state-of-the-art techniques. To produce reliable transcriptions, human ...
  • HIDDEN VARIABLE RESULTANT APPROACH FOR CLASSICAL COMPUTER VISION PROBLEMS 

    Contributor:Nonell Pare, Jordi;
    Date Submitted:2018-12
    Many problems in computer vision may be formulated as minimal problems; problems that require a minimal number of inputs and solving them equals to solve a system of non-linear polynomial equations with a finite number ...
  • Openset Approach To Object Detection, An 

    Contributor:Dhamija, Akshay Raj;
    Date Submitted:2018-12
    Object detection has been a popular area of research in computer vision, where during the recent years deep learning based approaches have taken over the traditional approaches based on hand engineered features like HOG ...
  • Towards Literary Genre Identification: Applied Neural Networks for Large Text Classification 

    Contributor:Worsham, Joseph Michael;
    Date Submitted:2018-12
    Recent advances in Natural Language Processing are finding ways to place an emphasis on the hierarchical nature of text instead of representing language as a flat sequence or unordered collection of words or letters. A ...
  • Authentication of legitimate users of smartphones based on app usage sequences 

    Contributor:Piferrer Torres, Enric;
    Date Submitted:2018-05
    Nowadays, it is hard to understand society without smartphones. People may own one or even more of these devices and use them regularly. Consequently, such a trend brings up many security issues, initial authentication ...
  • Machine Learning Model for Elite Athletes, A 

    Contributor:Hmosze, Maadh;
    Date Submitted:2018-05
    Abstract In this research we have used different machine learning algorithms to predict the performance of the elite athletes riding bicycles. The study of measuring the performance of the athletes is based on different ...
  • CAPITALIZING ON THE SECURITY POTENTIAL OF SOFTWARE DEFINED NETWORKING BY PROVIDING A NETWORK CONFIDENCE ASSESSMENT 

    Contributor:Alcorn, Joshua Andrew;
    Date Submitted:2018-05
    The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in ...
  • EVALUATING SHORT-WAVE INFRARED IMAGES ON A CONVOLUTIONAL NEURAL NETWORK 

    Contributor:Bihn, Michael Joseph;
    Date Submitted:2017-12
    Machine learning algorithms, both neural networks and non neural networks, have been tested against RGB facial images for years. Their success is dependent on clearly distinguishable cropped faces. Poor lighting and distance ...
  • Enhancing the Bootstrapping Network in Cloud-based Onion Routing (COR) 

    Contributor:Snider, Kevin;
    Date Submitted:2017-12
    The maintenance of privacy and anonymity on the Internet has become a large concern for many users worldwide. The online service known as Tor (The Onion Router) is one of the most popular tools available to users seeking ...
  • Travel Plan Generator 

    Contributor:Shao, Likun;
    Date Submitted:2017-12
    Travelers usually have their customized travel plans before starting their trips. A good travel plan can make them convenient to arrange their trips and make trips well organized. In order to customize personal travel ...
  • FULLY HOMOMORPHIC ENCRYPTION OVER EXTERIOR PRODUCT SPACES 

    Contributor:Honorio Araujo da Silva, David William;
    Date Submitted:2017-12
    In this work I propose a new symmetric fully homomorphic encryption powered by Exterior Algebra and Product Spaces, more specifically by Geometric Algebra as a mathematical language for creating cryptographic solutions, ...
  • Autoregressive Density Estimation in Latent Spaces 

    Contributor:Olmo Hernández, Alberto;
    Date Submitted:2017-12
    We propose an extension of recent autoregressive density estimation approaches such as PixelCNN and WaveNet that models the density of a latent variable space rather than the output space. In other words, we propose a ...
  • NEURAL NETWORKS FOR HUMAN CELL DETECTION AND COUNTING 

    Contributor:Valdivieso Tamayo, Natalia;
    Date Submitted:2017-12
    In this work, we present a method to count and detect the position of breast cancer cells and bone marrow human cells using a Convolutional Neural Network (CNN). We compare our F1-results against state-of-the-art results ...
  • Improving Techniques for SQL Injection Defenses 

    Contributor:Kilaru, Divya;
    Date Submitted:2017-12
    In this thesis, we investigate how SQL injection attacks occur and how to patch a web app with the SQL injection vulnerability. Various SQL injection tools are evaluated for their functionalities and capabilities. A python ...
  • Dual Marching Squares: Implementation and Analysis Using VTK 

    Contributor:Garg, Manu;
    Date Submitted:2017-12
    ABSTRACT In the past few decades’ volume rendering is perhaps one of the most visited research topics in the field of scientific visualization. Since volume datasets are large and require considerable computing power to ...
  • Cloud based Web Resilience using Node.js 

    Contributor:Gunnam, Pragati;
    Date Submitted:2017-08
    Web services are used almost everyday and for everything. Combining these with cloud based services would allow the web applications to become more available for the users. Delivering such cloud based web applications to ...
  • Optimizing Pedestrian Flow In Airports 

    Contributor:Jordan, Gabriel;
    Date Submitted:2017-05
    Denver International Airport has expressed interest in discovering innovative techniques to optimize pedestrian flow in its massive airport which contains upwards of 53 million passengers each year that travel through the ...
  • Deep Learning For Brain Tumor Segmentation 

    Contributor:Moreno Lopez, Marc;
    Date Submitted:2017-05
    In this work, we present a novel method to segment brain tumors using deep learning. An accurate brain tumor segmentation is key for a patient to get the right treatment and for the doctor who must perform surgery. Due to ...
  • Network Certification Description Language, The 

    Contributor:Hanson, Cody Lawrence;
    Date Submitted:2017-05
    Modern IP networks are complex entities that require constant maintenance and care. Similarly, constructing a new network comes with a high amount of upfront cost, planning, and risk. Unlike the disciplines of software ...

View more