Searched for: subject%3A%22A%252A%255C%252Balgorithm%22
(1 - 8 of 8)
document
Baez Lozada, Luis Carlos (author)
This research evaluates the applicability of Multivariate Imputation by Chained Equations (MICE) for estimating missing well-log data across different sedimentary basis. Utilizing various machine learning techniques including XGBoost (XGB), Random Forest (RF), K-Nearest Neighbors (KNR), and Bayesian Ridge (BR), the performance of MICE was tested...
master thesis 2023
document
Pandey, Pankaj (author), Rodriguez-Larios, Julio (author), Miyapuram, Krishna Prasad (author), Lomas, J.D. (author)
Electroencephalography (EEG) enables online monitoring brain activity, which can be used for neurofeedback. One of the growing applications of EEG neurofeedback is to facilitate meditation practice. Specifically, EEG neurofeedback can be used to alert participants whenever they get distracted during meditation practice based on changes in their...
conference paper 2023
document
Reed, Emily A. (author), Ramos, Guilherme (author), Bogdan, Paul (author), Gonçalves Melo Pequito, S.D. (author)
Finding strongly connected components (SCCs) and the diameter of a directed network play a key role in a variety of machine learning and control theory problems. In this article, we provide for the first time a scalable distributed solution for these two problems by leveraging dynamical consensus-like protocols to find the SCCs. The proposed...
journal article 2023
document
Zou, L. (author), Zhan, Xiu xiu (author), Sun, Jie (author), Hanjalic, A. (author), Wang, H. (author)
Temporal networks refer to networks like physical contact networks whose topology changes over time. Predicting future temporal network is crucial e.g., to forecast the epidemics. Existing prediction methods are either relatively accurate but black-box, or white-box but less accurate. The lack of interpretable and accurate prediction methods...
journal article 2022
document
Batina, Lejla (author), Bhasin, Shivam (author), Jap, Dirmanto (author), Picek, S. (author)
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physical side-channel attack aiming at reverse engineering neural networks implemented on an edge device. The attack does not need access to training data and allows for neural network recovery by feeding known random inputs. We successfully reverse...
journal article 2022
document
Wahlstrom, Johan (author), Kok, M. (author)
The last years have seen a growing body of literature on data-driven pedestrian inertial navigation. However, despite this, it is still unclear how to efficiently combine classical models and other a priori information with existing machine learning frameworks. In this paper, we first categorize existing approaches to data-driven pedestrian...
journal article 2022
document
Ayala-Romero, Jose A. (author), Garcia-Saavedra, Andres (author), Costa-Perez, Xavier (author), Iosifidis, G. (author)
Radio Access Network Virtualization (vRAN) will spearhead the quest towards supple radio stacks that adapt to heterogeneous infrastructure: from energy-constrained platforms deploying cells-on-wheels (e.g., drones) or battery-powered cells to green edge clouds. We demonstrate a novel machine learning approach to solve resource orchestration...
conference paper 2021
document
Al-Younis, Wardeh (author), Nevarez, Christina (author), Voelz, David (author), Sandoval, Steven (author), Basu, S. (author)
This work details the analysis of time-lapse images with a point-tracking image processing approach along with the use of an extensive numerical weather model to investigate image displacement due to refraction. The model is applied to create refractive profile estimates along the optical path for the days of interest. Ray trace analysis...
conference paper 2019
Searched for: subject%3A%22A%252A%255C%252Balgorithm%22
(1 - 8 of 8)