Current Search: Anarchism. (x) » info:fedora/fau:smc (x) » College of Engineering and Computer Science (x) » Pattern recognition systems (x)
View All Items
Pages
- Title
- Event detection in surveillance video.
- Creator
- Castellanos Jimenez, Ricardo Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Digital video is being used widely in a variety of applications such as entertainment, surveillance and security. Large amount of video in surveillance and security requires systems capable to processing video to automatically detect and recognize events to alleviate the load on humans and enable preventive actions when events are detected. The main objective of this work is the analysis of computer vision techniques and algorithms used to perform automatic detection of events in video...
Show moreDigital video is being used widely in a variety of applications such as entertainment, surveillance and security. Large amount of video in surveillance and security requires systems capable to processing video to automatically detect and recognize events to alleviate the load on humans and enable preventive actions when events are detected. The main objective of this work is the analysis of computer vision techniques and algorithms used to perform automatic detection of events in video sequences. This thesis presents a surveillance system based on optical flow and background subtraction concepts to detect events based on a motion analysis, using an event probability zone definition. Advantages, limitations, capabilities and possible solution alternatives are also discussed. The result is a system capable of detecting events of objects moving in opposing direction to a predefined condition or running in the scene, with precision greater than 50% and recall greater than 80%.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1870694
- Subject Headings
- Computer systems, Security measures, Image processing, Digital techniques, Imaging systems, Mathematical models, Pattern recognition systems, Computer vision, Digital video
- Format
- Document (PDF)
- Title
- Application level intrusion detection using a sequence learning algorithm.
- Creator
- Dong, Yuhong., Florida Atlantic University, Hsu, Sam, Rajput, Saeed, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
An un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed...
Show moreAn un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed approach, a hash table is used to store a sparse data matrix in triple data format that is collected from a web transition log instead of an n-by-n dimension matrix. Furthermore, in GSLA, the sequence learning matrix can be dynamically changed according to a different volume of data sets. Therefore, this approach is more efficient, easy to manipulate, and saves memory space. To validate the effectiveness of the algorithm, extensive simulations have been conducted by applying the GSLA algorithm to the homework submission system at our computer science and engineering department. The performance of GSLA is evaluated and compared with traditional Markov Model (MM) and K-means algorithms. Specifically, three major experiments have been done: (1) A small data set is collected as a sample data, and is applied to GSLA, MM, and K-means algorithms to illustrate the operation of the proposed algorithm and demonstrate the detection of abnormal behaviors. (2) The Random Walk-Through sampling method is used to generate a larger sample data set, and the resultant anomaly score is classified into several clusters in order to visualize and demonstrate the normal and abnormal behaviors with K-means and GSLA algorithms. (3) Multiple professors' data sets are collected and used to build the normal profiles, and the ANOVA method is used to test the significant difference among professors' normal profiles. The GSLA algorithm can be made as a module and plugged into the IDS as an anomaly detection system.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12220
- Subject Headings
- Data mining, Parallel processing (Electronic computers), Computer algorithms, Computer security, Pattern recognition systems
- Format
- Document (PDF)
- Title
- A new GMDH type algorithm for the development of neural networks for pattern recognition.
- Creator
- Gilbar, Thomas C., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Researchers from a wide range of fields have discovered the benefits of applying neural networks to pattern recognition problems. Although applications for neural networks have increased, development of tools to design these networks has been slower. There are few comprehensive network development methods. Those that do exist are slow, inefficient, and application specific, require predetermination of the final network structure, and/or result in large, complicated networks. Finding optimal...
Show moreResearchers from a wide range of fields have discovered the benefits of applying neural networks to pattern recognition problems. Although applications for neural networks have increased, development of tools to design these networks has been slower. There are few comprehensive network development methods. Those that do exist are slow, inefficient, and application specific, require predetermination of the final network structure, and/or result in large, complicated networks. Finding optimal neural networks that balance low network complexity with accuracy is a complicated process that traditional network development procedures are incapable of achieving. Although not originally designed for neural networks, the Group Method of Data Handling (GMDH) has characteristics that are ideal for neural network design. GMDH minimizes the number of required neurons by choosing and keeping only the best neurons and filtering out unneeded inputs. In addition, GMDH develops the neurons and organizes the network simultaneously, saving time and processing power. However, some of the qualities of the network must still be predetermined. This dissertation introduces a new algorithm that applies some of the best characteristics of GMDH to neural network design. The new algorithm is faster, more flexible, and more accurate than traditional network development methods. It is also more dynamic than current GMDH based methods, capable of creating a network that is optimal for an application and training data. Additionally, the new algorithm virtually guarantees that the number of neurons progressively decreases in each succeeding layer. To show its flexibility, speed, and ability to design optimal networks, the algorithm was used to successfully design networks for a wide variety of real applications. The networks developed using the new algorithm were compared to other development methods and network architectures. The new algorithm's networks were more accurate and yet less complicated than the other networks. Additionally, the algorithm designs neurons that are flexible enough to meet the needs of the specific applications, yet similar enough to be implemented using a standardized hardware cell. When combined with the simplified network layout that naturally occurs with the algorithm, this results in networks that can be implemented using Field Programmable Gate Array (FPGA) type devices.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/11994
- Subject Headings
- GMDH algorithms, Neural networks (Computer science), Pattern recognition systems
- Format
- Document (PDF)
- Title
- Generating narratives: a pattern language.
- Creator
- Greene, Samuel., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to facilitate the development, discussion, and advancement of the relatively new subfield of Artificial Intelligence focused on generating narrative content, the author has developed a pattern language for generating narratives, along with a new categorization framework for narrative generation systems. An emphasis and focus is placed on generating the Fabula of the story (the ordered sequence of events that make up the plot). Approaches to narrative generation are classified into...
Show moreIn order to facilitate the development, discussion, and advancement of the relatively new subfield of Artificial Intelligence focused on generating narrative content, the author has developed a pattern language for generating narratives, along with a new categorization framework for narrative generation systems. An emphasis and focus is placed on generating the Fabula of the story (the ordered sequence of events that make up the plot). Approaches to narrative generation are classified into one of three categories, and a pattern is presented for each approach. Enhancement patterns that can be used in conjunction with one of the core patterns are also identified. In total, nine patterns are identified - three core narratology patterns, four Fabula patterns, and two extension patterns. These patterns will be very useful to software architects designing a new generation of narrative generation systems.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3355559
- Subject Headings
- Computational intelligence, Pattern recognition systems, Computer vision, Artificial intelligence, Image processing, Digital techiques
- Format
- Document (PDF)
- Title
- 2D/3D face recognition.
- Creator
- Guan, Xin., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation introduces our work on face recognition using a novel approach based on creating 3D face model from 2D face images. Together with the pose angle estimation and illumination compensation, this method can be used successfully to recognize 2D faces with 3D recognition algorithms. The results reported here were obtained partially with our own face image database, which had 2D and 3D face images of 50 subjects, with 9 different pose angles. It is shown that by applying even the...
Show moreThis dissertation introduces our work on face recognition using a novel approach based on creating 3D face model from 2D face images. Together with the pose angle estimation and illumination compensation, this method can be used successfully to recognize 2D faces with 3D recognition algorithms. The results reported here were obtained partially with our own face image database, which had 2D and 3D face images of 50 subjects, with 9 different pose angles. It is shown that by applying even the simple PCA algorithm, this new approach can yield successful recognition rates using 2D probing images and 3D gallery images. The insight gained from the 2D/3D face recognition study was also extended to the case of involving 2D probing and 2D gallery images, which offers a more flexible approach since it is much easier and practical to acquire 2D photos for recognition. To test the effectiveness of the proposed approach, the public AT&T face database, which had 2D only face photos of 40 subjects, with 10 different images each, was utilized in the experimental study. The results from this investigation show that with our approach, the 3D recognition algorithm can be successfully applied to 2D only images. The performance of the proposed approach was further compared with some of the existing face recognition techniques. Studies on imperfect conditions such as domain and pose/illumination variations were also carried out. Additionally, the performance of the algorithms on noisy photos was evaluated. Pros and cons of the proposed face recognition technique along with suggestions for future studies are also given in the dissertation.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342104
- Subject Headings
- Pattern recognition systems, Optical pattern recognition, Biometric identification, Face perception, Artificial intellingence
- Format
- Document (PDF)
- Title
- Intelligent systems using GMDH algorithms.
- Creator
- Gupta, Mukul., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Design of intelligent systems that can learn from the environment and adapt to the change in the environment has been pursued by many researchers in this age of information technology. The Group Method of Data Handling (GMDH) algorithm to be implemented is a multilayered neural network. Neural network consists of neurons which use information acquired in training to deduce relationships in order to predict future responses. Most software tool during the simulation of the neural network based...
Show moreDesign of intelligent systems that can learn from the environment and adapt to the change in the environment has been pursued by many researchers in this age of information technology. The Group Method of Data Handling (GMDH) algorithm to be implemented is a multilayered neural network. Neural network consists of neurons which use information acquired in training to deduce relationships in order to predict future responses. Most software tool during the simulation of the neural network based algorithms in a sequential, single processor machine like Pascal, C or C++ takes several hours or even days. But in this thesis, the GMDH algorithm was modified and implemented into a software tool written in Verilog HDL and tested with specific application (XOR) to make the simulation faster. The purpose of the development of this tool is also to keep it general enough so that it can have a wide range of uses, but robust enough that it can give accurate results for all of those uses. Most of the applications of neural networks are basically software simulations of the algorithms only but in this thesis the hardware design is also developed of the algorithm so that it can be easily implemented on hardware using Field Programmable Gate Array (FPGA) type devices. The design is small enough to require a minimum amount of memory, circuit space, and propagation delay.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2976442
- Subject Headings
- GMDH algorithms, Genetic algorithms, Pattern recognition systems, Expert systems (Computer science), Neural networks (Computer science), Fuzzy logic, Intelligent control systems
- Format
- Document (PDF)
- Title
- Automated biometrics of audio-visual multiple modals.
- Creator
- Huang, Lin, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Biometrics is the science and technology of measuring and analyzing biological data for authentication purposes. Its progress has brought in a large number of civilian and government applications. The candidate modalities used in biometrics include retinas, fingerprints, signatures, audio, faces, etc. There are two types of biometric system: single modal systems and multiple modal systems. Single modal systems perform person recognition based on a single biometric modality and are affected by...
Show moreBiometrics is the science and technology of measuring and analyzing biological data for authentication purposes. Its progress has brought in a large number of civilian and government applications. The candidate modalities used in biometrics include retinas, fingerprints, signatures, audio, faces, etc. There are two types of biometric system: single modal systems and multiple modal systems. Single modal systems perform person recognition based on a single biometric modality and are affected by problems like noisy sensor data, intra-class variations, distinctiveness and non-universality. Applying multiple modal systems that consolidate evidence from multiple biometric modalities can alleviate those problems of single modal ones. Integration of evidence obtained from multiple cues, also known as fusion, is a critical part in multiple modal systems, and it may be consolidated at several levels like feature fusion level, matching score fusion level and decision fusion level. Among biometric modalities, both audio and face modalities are easy to use and generally acceptable by users. Furthermore, the increasing availability and the low cost of audio and visual instruments make it feasible to apply such Audio-Visual (AV) systems for security applications. Therefore, this dissertation proposes an algorithm of face recognition. In addition, it has developed some novel algorithms of fusion in different levels for multiple modal biometrics, which have been tested by a virtual database and proved to be more reliable and robust than systems that rely on a single modality.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927864
- Subject Headings
- Pattern recognition systems, Optical pattern recognition, Biometric identification, Identification, Automation, Automatic speech recognition
- Format
- Document (PDF)
- Title
- A VLSI implementation of a hexagonal topology CCD image sensor.
- Creator
- Madabushi, Vasudhevan., Florida Atlantic University, Shankar, Ravi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we report a VLSI design implementation of an application specific, full-frame architecture CCD image sensor for a handwritten Optical Character Recognition system. The design is targeted to the MOSIS 2mu, 2-poly/ 2-metal n-buried channel CCD/CMOS technology. The front side illuminated CCD image sensor uses a transparent polysilicon gate structure and is comprised of 84 (H) x 100 (V) pixels arranged in a hexagonal lattice structure. The sensor has unit pixel dimensions of 18...
Show moreIn this thesis we report a VLSI design implementation of an application specific, full-frame architecture CCD image sensor for a handwritten Optical Character Recognition system. The design is targeted to the MOSIS 2mu, 2-poly/ 2-metal n-buried channel CCD/CMOS technology. The front side illuminated CCD image sensor uses a transparent polysilicon gate structure and is comprised of 84 (H) x 100 (V) pixels arranged in a hexagonal lattice structure. The sensor has unit pixel dimensions of 18 lambda (H) x 16 lambda (V). A second layer of metal is used for shielding certain areas from incident light, and the effective pixel photosite area is 8 lambda x 8 lambda. The imaging pixels use a 3-phase structure (with an innovative addressing scheme for the hexagonal lattice) for image sensing and horizontal charge shift. Columns of charge are shifted into the vertical 2-phase CCD shift registers, which shift the charge out serially at high speed. The chip has been laid out on the 'tinychip' (2250 mu m x 2220 (mu m) pad frame and fabrication through MOSIS is planned next.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15123
- Subject Headings
- Integrated circuits--Very large scale integration, Optical character recognition devices, Pattern recognition systems, Imaging systems
- Format
- Document (PDF)
- Title
- Proud elastic target discrimination using low-frequency sonar signatures.
- Creator
- Mallen, Brenton., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
This thesis presents a comparative analysis of various low-frequency sonar signature representations and their ability to discriminate between proud targets of varying physical parameters. The signature representations used include: synthetic aperture sonar (SAS) beamformed images, acoustic color plot images, and bispectral images. A relative Mean-Square Error (rMSE) performance metric and an effective Signal-to-Noise Ratio (SNReff) performance metric have been developed and implemented to...
Show moreThis thesis presents a comparative analysis of various low-frequency sonar signature representations and their ability to discriminate between proud targets of varying physical parameters. The signature representations used include: synthetic aperture sonar (SAS) beamformed images, acoustic color plot images, and bispectral images. A relative Mean-Square Error (rMSE) performance metric and an effective Signal-to-Noise Ratio (SNReff) performance metric have been developed and implemented to quantify the target differentiation. The analysis is performed on a subset of the synthetic sonar stave data provided by the Naval Surface Warfare Center - Panama City Division (NSWC-PCD). The subset is limited to aluminum and stainless steel, thin-shell, spherical targets in contact with the seafloor (proud). It is determined that the SAS signature representation provides the best, least ambiguous, target differentiation with a minimum mismatch difference of 14.5802 dB. The acoustic color plot and bispectrum representations resulted in a minimum difference of 9.1139 dB and 1.8829 dB, respectively
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342210
- Subject Headings
- Pattern recognition systems, Frequency response (Dynamics), Signal theory (Telecommunication), Random noise theory
- Format
- Document (PDF)
- Title
- Patterns for secure interactions in social networks in Web 2.0.
- Creator
- Marin, Carolina, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A social network is a structure of individuals and organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use Web 2.0 technology, which is mostly based on a service-oriented architecture. We are studying patterns for social networks in this environment. A pattern is an encapsulated solution to a software problem in a given context, secure threats are possible in this context. We present a...
Show moreA social network is a structure of individuals and organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use Web 2.0 technology, which is mostly based on a service-oriented architecture. We are studying patterns for social networks in this environment. A pattern is an encapsulated solution to a software problem in a given context, secure threats are possible in this context. We present a collection of patterns associated with the most important aspects of social networks, with emphasis on controlling the actions of the users of these networks.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342203
- Subject Headings
- Web 2.0, Computer network architectures, Online social networks, Security measures, Social media, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Signature system for video identification.
- Creator
- Medellin, Sebastian Possos., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Video signature techniques based on tomography images address the problem of video identification. This method relies on temporal segmentation and sampling strategies to build and determine the unique elements that will form the signature. In this thesis an extension for these methods is presented; first a new feature extraction method, derived from the previously proposed sampling pattern, is implemented and tested, resulting in a highly distinctive set of signature elements, second a robust...
Show moreVideo signature techniques based on tomography images address the problem of video identification. This method relies on temporal segmentation and sampling strategies to build and determine the unique elements that will form the signature. In this thesis an extension for these methods is presented; first a new feature extraction method, derived from the previously proposed sampling pattern, is implemented and tested, resulting in a highly distinctive set of signature elements, second a robust temporal video segmentation system is used to replace the original method applied to determine shot changes more accurately. Under a very exhaustive set of tests the system was able to achieve 99.58% of recall, 100% of precision and 99.35% of prediction precision.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2683534
- Subject Headings
- Biometric identification, Image processing, Digital techniques, Pattern recognition systems, Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- An intelligent GMDH forecaster for forecasting certain variables in financial markets.
- Creator
- Mehta, Sandeep., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, application of GMDH Algorithm to real life problems is studied. A particular type of GMDH Algorithm namely TMNN is chosen for this purpose. An effort is made to forecast S&P Index Closing Value with the help of the forecaster. The performance of the TMNN Algorithm is simulated by implementing a tool in C++ for developing forecast models. The validation of this simulation tool is carried out with Sine Wave Values and performance analysis is done in a noisy environment. The...
Show moreIn this thesis, application of GMDH Algorithm to real life problems is studied. A particular type of GMDH Algorithm namely TMNN is chosen for this purpose. An effort is made to forecast S&P Index Closing Value with the help of the forecaster. The performance of the TMNN Algorithm is simulated by implementing a tool in C++ for developing forecast models. The validation of this simulation tool is carried out with Sine Wave Values and performance analysis is done in a noisy environment. The noisy environment tests the TMNN forecaster for its robustness. The primary goal of this research is to develop a simulation software based on TMNN Algorithm for forecasting stock market index values. The main inputs are previous day's closing values and the output is predicted closing index.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12996
- Subject Headings
- GMDH algorithms, Neural networks (Computer science), Time-series analysis, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Design of analog building blocks useful for artificial neural networks.
- Creator
- Renavikar, Ajit Anand., Florida Atlantic University, Shankar, Ravi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Software simulations of a scaleable VLSI implementable architecture and algorithm for character recognition by a research group at Florida Atlantic University (FAU) have shown encouraging results. We address here hardware implementation issues pertinent to the classification phase of character recognition. Using the digit classification techniques developed at FAU as a foundation, we have designed and simulated general purpose building blocks useful for a possible implementation of a Digital ...
Show moreSoftware simulations of a scaleable VLSI implementable architecture and algorithm for character recognition by a research group at Florida Atlantic University (FAU) have shown encouraging results. We address here hardware implementation issues pertinent to the classification phase of character recognition. Using the digit classification techniques developed at FAU as a foundation, we have designed and simulated general purpose building blocks useful for a possible implementation of a Digital & Analog CMOS VLSI chip that is suitable for a variety of artificial neural network (ANN) architectures. HSPICE was used to perform circuit-level simulations of the building blocks. We present here the details of implementation of the recognition chip including the architecture, circuit design and the simulation results.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15328
- Subject Headings
- Neural networks (Computer science), Artificial intelligence, Optical character recognition devices, Pattern recognition systems
- Format
- Document (PDF)
- Title
- A Novel Method for Human Face Enhancement for Video Images.
- Creator
- Salas, Ernesto Anel, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing...
Show moreThe focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing illumination, as opposed to a controlled environment. To be used in face recognition, images extracted from videos need to be normalized, enlarged and preprocessed. There is a multitude of processing algorithms for image enhancement, and each algorithm faces its advantages and disadvantages. This thesis presents a novel method for image enlargement of human faces applied to low quality video recordings. Results and comparison to traditional methods are also presented.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012547
- Subject Headings
- Human face recognition (Computer science), Biometric identification, Image processing--Digital techniques, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Determination of receptive fields in neural networks using Alopex.
- Creator
- Shah, Gaurang G., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex...
Show moreThis research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex algorithm is presented as an iterative and stochastic processing method, which was proposed for optimization of a given cost function over hundreds or thousands of iterations. In this case the receptive fields of the neurons in the output layers are obtained using the Alopex algorithm.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13298
- Subject Headings
- Pattern recognition systems, Neural networks (Computer science), Computer algorithms, Neuroanatomy, Image processing
- Format
- Document (PDF)
- Title
- Exploring the electromagnetics of millimeter-wave through terahertz spectrum: de novo studies vis-à-vis materials science, biomedical applications and wireless communication.
- Creator
- Sharma, Bharti, Neelakanta, Perambur S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The present research is a targeted endeavor to study the underlying characteristics and novel applications of millimeter (mm) wave through terahertz (THz) spectrum of electromagnetic (EM) energy. Focused thereof are the following specific tasks broadly considered pertinent to the said EM spectral range: (i) To elucidate the material characteristics vis-à-vis the interaction with EM energy at the test frequencies; (ii) to identify biomedical applications based on the material characteristics...
Show moreThe present research is a targeted endeavor to study the underlying characteristics and novel applications of millimeter (mm) wave through terahertz (THz) spectrum of electromagnetic (EM) energy. Focused thereof are the following specific tasks broadly considered pertinent to the said EM spectral range: (i) To elucidate the material characteristics vis-à-vis the interaction with EM energy at the test frequencies; (ii) to identify biomedical applications based on the material characteristics studied and applied to biomedia; and (iii) to model the wireless communication channels supporting EM waves at the test frequency bands of interest. Commensurate with the scope as above, the objectives of the research are as follows:
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004330, http://purl.flvc.org/fau/fd/FA00004330
- Subject Headings
- Electromagnetic waves -- Scattering, Pattern recognition systems, Scattering (Physics), Terahertz technology, Wireless communication systems
- Format
- Document (PDF)
- Title
- Financial prediction using time series.
- Creator
- Srinivasan, Arunkumar., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis discusses the implementation of a feed forward NN using time series model to predict the sudden rise or sudden crash of a company's stock prices. The theory behind this prediction system is Pattern recognition. Pattern recognition techniques for time-series prediction are based on structural matching of the current state of the time-series with previously occurring states in historical data for making predictions. This study reports the result of attempts to predict the Motorola...
Show moreThis thesis discusses the implementation of a feed forward NN using time series model to predict the sudden rise or sudden crash of a company's stock prices. The theory behind this prediction system is Pattern recognition. Pattern recognition techniques for time-series prediction are based on structural matching of the current state of the time-series with previously occurring states in historical data for making predictions. This study reports the result of attempts to predict the Motorola stock price index using artificial neural networks (ANN). Daily data from January 1999 to December 2001 were taken from the NYSE. These data are classified based on criteria of an n% fall or rise of price corresponding to the previous day close price. A novel method using Hurst exponent is used in selecting the data set. These data are fed into a Back Propagated Neural Network. The number of hidden layers and number of neurons are systematically selected to implement a better predicting machine. The implemented model is tested using both interpolated and extrapolated data. Fundamental limitations and inherent difficulties when using neural networks for processing of high noise, small sample size signals are also discussed. Results of the prediction are presented and an elaborate discussion is made comparing the results.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13045
- Subject Headings
- Pattern recognition systems, Neural networks (Computer science), Stock exchanges
- Format
- Document (PDF)
- Title
- PRGMDH algorithm for neural network development and its applications.
- Creator
- Tangadpelli, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The existing Group Method of Data Handling (GMDH) algorithm has characteristics that are ideal for neural network design. This thesis introduces a new algorithm that applies some of the best characteristics of GMDH to neural network design and develops a Pruning based Regenerated Network by discarding the neurons in a layer which don't contribute for the creation of neurons in next layer. Unlike other conventional algorithms, which generate a network which is a black box, the new algorithm...
Show moreThe existing Group Method of Data Handling (GMDH) algorithm has characteristics that are ideal for neural network design. This thesis introduces a new algorithm that applies some of the best characteristics of GMDH to neural network design and develops a Pruning based Regenerated Network by discarding the neurons in a layer which don't contribute for the creation of neurons in next layer. Unlike other conventional algorithms, which generate a network which is a black box, the new algorithm provides visualization of the network displaying all the neurons in the network. The algorithm is general enough that it will accept any number of inputs and any sized training set. To show the flexibility of the Pruning based Regenerated Network, this algorithm is used to analyze different combinations of drugs and determine which pathways in these networks interact and determine the combination of drugs that take advantage of these interactions to maximize a desired effect on genes.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13397
- Subject Headings
- Neural networks (Computer science), GMDH algorithms, Pattern recognition systems
- Format
- Document (PDF)
- Title
- A novel NN paradigm for the prediction of hematocrit value during blood transfusion.
- Creator
- Thakkar, Jay., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
During the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data...
Show moreDuring the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data Handling (GMDH) and compared it to other Neural Network algorithms, in particular the Multi Layer Perceptron (MLP). The standard GMDH algorithm captures the fluctuation very well but there is a time lag that produces larger errors when compared to MLP. To address this drawback we modified the GMDH algorithm to reduce the prediction error and produce more accurate results.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3174078
- Subject Headings
- Neural networks (Computer science), Scientific applications, GMDH algorithms, Pattern recognition systems, Genetic algorithms, Fuzzy logic
- Format
- Document (PDF)
- Title
- Model-based classification of speech audio.
- Creator
- Thoman, Chris., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work explores the process of model-based classification of speech audio signals using low-level feature vectors. The process of extracting low-level features from audio signals is described along with a discussion of established techniques for training and testing mixture model-based classifiers and using these models in conjunction with feature selection algorithms to select optimal feature subsets. The results of a number of classification experiments using a publicly available speech...
Show moreThis work explores the process of model-based classification of speech audio signals using low-level feature vectors. The process of extracting low-level features from audio signals is described along with a discussion of established techniques for training and testing mixture model-based classifiers and using these models in conjunction with feature selection algorithms to select optimal feature subsets. The results of a number of classification experiments using a publicly available speech database, the Berlin Database of Emotional Speech, are presented. This includes experiments in optimizing feature extraction parameters and comparing different feature selection results from over 700 candidate feature vectors for the tasks of classifying speaker gender, identity, and emotion. In the experiments, final classification accuracies of 99.5%, 98.0% and 79% were achieved for the gender, identity and emotion tasks respectively.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210518
- Subject Headings
- Signal processing, Digital techniques, Speech processing systems, Sound, Recording and reproducing, Digital techniques, Pattern recognition systems
- Format
- Document (PDF)