• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 570
  • 336
  • 39
  • 21
  • 15
  • 12
  • 11
  • 9
  • 8
  • 8
  • 8
  • 4
  • 4
  • 3
  • 3
  • Tagged with
  • 1192
  • 1192
  • 1192
  • 572
  • 556
  • 423
  • 157
  • 134
  • 129
  • 128
  • 120
  • 110
  • 94
  • 93
  • 92
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

MODELING THE CORTICAL VISUAL PATHWAYS USING ARTIFICIAL NEURAL NETWORKS

Zhixian Han (11726573) 03 December 2021 (has links)
Although in conventional models of visual information processing, object identity and spatial information are processed separately and independently in ventral and dorsal cortical visual pathways respectively, some recent studies have shown that information about both object’s identity (of shape) and space are present in both visual pathways. However, it is still unclear whether the presence of identity and spatial information in both pathways have functional roles or not. In a recent study (Han & Sereno, in press), we have tried to answer this question through computational modeling. Our simulation results suggested that two separate cortical visual pathways for identity and space (1) actively retain information about both identity and space; (2) retain information about identity and space differently; (3) that this differently retained information about identity and space in the two pathways may be necessary to accurately and optimally recognize and localize objects. However, in these simulations, there was only one object in each image. In reality, there may be more than one object in an image. In this master’s thesis, I have tried to run visual recognition simulations with two objects in each image. My two object simulations suggest that (1) the two separate cortical visual pathways for identity and space (orientation) still retain information about both identity and space (orientation) when there are two objects in each image; (2) the retained information about identity and space (orientation) in the two pathways may be necessary to accurately and optimally recognize objects’ identity and orientation. These results agree with our one object simulation results.
322

Liver Cancer Risk Quantification through an Artificial Neural Network based on Personal Health Data

Unknown Date (has links)
Liver cancer is the sixth most common type of cancer worldwide and is the third leading cause of cancer related mortality. Several types of cancer can form in the liver. Hepatocellular carcinoma (HCC) makes up 75%-85% of all primary liver cancers and it is a malignant disease with limited therapeutic options due to its aggressive progression. While the exact cause of liver cancer may not be known, habits/lifestyle may increase the risk of developing the disease. Several risk prediction models for HCC are available for individuals with hepatitis B and C virus infections who are at high risk but not for general population. To address this challenge, an artificial neural network (ANN) was developed, trained, and tested using the health data to predict liver cancer risk. Our results indicate that our ANN can be used to predict liver cancer risk with changes with lifestyle and may provide a novel approach to identify patients at higher risk and can be bene ted from early diagnosis. / Includes bibliography. / Thesis (PMS)--Florida Atlantic University, 2021. / FAU Electronic Theses and Dissertations Collection
323

Návrh generativní kompetitivní neuronové sítě pro generování umělých EKG záznamů / Generative Adversial Network for Artificial ECG Generation

Šagát, Martin January 2020 (has links)
The work deals with the generation of ECG signals using generative adversarial networks (GAN). It examines in detail the basics of artificial neural networks and the principles of their operation. It theoretically describes the use and operation and the most common types of failures of generative adversarial networks. In this work, a general procedure of signal preprocessing suitable for GAN training was derived, which was used to compile a database. In this work, a total of 3 different GAN models were designed and implemented. The results of the models were visually displayed and analyzed in detail. Finally, the work comments on the achieved results and suggests further research direction of methods dealing with the generation of ECG signals.
324

Klasifikace spánkových fázi za použití polysomnografických dat / Classification of sleep phases using polysomnographic data

Králík, Martin January 2015 (has links)
Aim of this thesis is the classification of polysomnographic data. The first part of the thesis is a review of mentioned topic and also the statistical analysis of classification features calculated from real EEG, EOG and EMG for evaluating of the features suitability for sleep stages scoring. The second part is focused on the automatic classification of the data using artificial neural networks. All the results are presented and discussed.
325

Využití prostředků umělé inteligence na kapitálových trzích / The Use of Means of Artificial Intelligence for the Decision Making Support on Stock Market

Hamerník, Michal January 2011 (has links)
This diploma thesis focuses on the problem and subsequent application of selected methods of artificial intelligence used on stock markets – especially the use of a artificial neural networks to forecast the values and determination of the trend of investment instruments. Solutions are created by using Matlab development environment and subsequently evaluated.
326

Využití prostředků umělé inteligence pro podporu na kapitálových trzích / The Use of Means of Artificial Intelligence for the Decision Making Support on Stock Market

Bačík, Matej January 2012 (has links)
A main subject of the presented master thesis is trading and investing in capital, commodities and foreign exchange markets over the world with support of technical analysis constructed by artificial intelligence. The thesis also produces step-by-step guide to stock and futures trading, building a successful trading system and gaining profits from invested capital.
327

Využití umělé inteligence na finančních trzích / The Use of Artificial Intelligence on Finacial Market

Hasoň, Michal January 2013 (has links)
This diploma thesis is focused on artificial intelligence and its application in financial markets. For the prediction values and trends of selected exchange rates are used artificial neural networks. Artificial neural network is created in Matlab. This solution is subsequently evaluated.
328

Využití umělé inteligence na finančních trzích / The Use of Artificial Intelligence on Finacial Market

Surynek, Jiří January 2013 (has links)
This thesis focuses on the problem and application of artificial intelligence on the financial market. Especially, the use of artificial neural networks to forecast values and determine the trend of the selected investment instrument. Solution is created in the development environment Matlab.
329

Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation

Zhang, Yueqian 17 January 2020 (has links)
Mobile Crowdsensing (MCS) has emerged as a ubiquitous solution for data collection from embedded sensors of the smart devices to improve the sensing capacity and reduce the sensing costs in large regions. Due to the ubiquitous nature of MCS, smart devices require cyber protection against adversaries that are becoming smarter with the objective of clogging the resources and spreading misinformation in such a non-dedicated sensing environment. In an MCS setting, one of the various adversary types has the primary goal of keeping participant devices occupied by submitting fake/illegitimate sensing tasks so as to clog the participant resources such as the battery, sensing, storage, and computing. With this in mind, this thesis proposes a systematical study of fake task injection in MCS, including modeling, detection, and mitigation of such resource clogging attacks. We introduce modeling of fake task attacks in MCS intending to clog the server and drain battery energy from mobile devices. We creatively grant mobility to the tasks for more extensive coverage of potential participants and propose two take movement patterns, namely Zone-free Movement (ZFM) model and Zone-limited Movement (ZLM) model. Based on the attack model and task movement patterns, we design task features and create structured simulation settings that can be modified to adapt different research scenarios and research purposes. Since the development of a secure sensing campaign highly depends on the existence of a realistic adversarial model. With this in mind, we apply the self-organizing feature map (SOFM) to maximize the number of impacted participants and recruits according to the user movement pattern of these cities. Our simulation results verify the magnified effect of SOFM-based fake task injection comparing with randomly selected attack regions in terms of more affected recruits and participants, and increased energy consumption in the recruited devices due to the illegitimate task submission. For the sake of a secure MCS platform, we introduce Machine Learning (ML) methods into the MCS server to detect and eliminate the fake tasks, making sure the tasks arrived at the user side are legitimate tasks. In our work, two machine learning algorithms, Random Forest and Gradient Boosting are adopted to train the system to predict the legitimacy of a task, and Gradient Boosting is proven to be a more promising algorithm. We have validated the feasibility of ML in differentiating the legitimacy of tasks in terms of precision, recall, and F1 score. By comparing the energy-consuming, effected recruits, and impacted candidates with and without ML, we convince the efficiency of applying ML to mitigate the effect of fake task injection.
330

Explainable Neural Networks based Anomaly Detection for Cyber-Physical Systems

Amarasinghe, Kasun 01 January 2019 (has links)
Cyber-Physical Systems (CPSs) are the core of modern critical infrastructure (e.g. power-grids) and securing them is of paramount importance. Anomaly detection in data is crucial for CPS security. While Artificial Neural Networks (ANNs) are strong candidates for the task, they are seldom deployed in safety-critical domains due to the perception that ANNs are black-boxes. Therefore, to leverage ANNs in CPSs, cracking open the black box through explanation is essential. The main objective of this dissertation is developing explainable ANN-based Anomaly Detection Systems for Cyber-Physical Systems (CP-ADS). The main objective was broken down into three sub-objectives: 1) Identifying key-requirements that an explainable CP-ADS should satisfy, 2) Developing supervised ANN-based explainable CP-ADSs, 3) Developing unsupervised ANN-based explainable CP-ADSs. In achieving those objectives, this dissertation provides the following contributions: 1) a set of key-requirements that an explainable CP-ADS should satisfy, 2) a methodology for deriving summaries of the knowledge of a trained supervised CP-ADS, 3) a methodology for validating derived summaries, 4) an unsupervised neural network methodology for learning cyber-physical (CP) behavior, 5) a methodology for visually and linguistically explaining the learned CP behavior. All the methods were implemented on real-world and benchmark datasets. The set of key-requirements presented in the first contribution was used to evaluate the performance of the presented methods. The successes and limitations of the presented methods were identified. Furthermore, steps that can be taken to overcome the limitations were proposed. Therefore, this dissertation takes several necessary steps toward developing explainable ANN-based CP-ADS and serves as a framework that can be expanded to develop trustworthy ANN-based CP-ADSs.

Page generated in 0.07 seconds