Search
Skip to Search Results- 2Abdi Oskouie, Mina
- 2Chowdhury, Md Solimul
- 2Chubak, Pirooz
- 2Rabbany khorasgani, Reihaneh
- 2Sacharuk, Edward, 1948-
- 2Sharifi, AmirAli
- 68Machine Learning
- 63Reinforcement Learning
- 41Artificial Intelligence
- 36Machine learning
- 21Natural Language Processing
- 20Image processing. Digital techniques.
-
Fall 2015
Brammadesam Manavalan, Yathirajan
Displaying believable emotional reactions in virtual characters is required in applications ranging from virtual-reality trainers to video games. Manual scripting is the most frequently used method and enables an arbitrarily high fidelity of the emotions displayed. However, scripting is labor...
-
Fall 2009
In this thesis we consider the task of catching a moving target with multiple pursuers, also known as the “Pursuit Game”, in which coordination among the pursuers is critical. Our testbed is inspired by the pursuit problem in video games, which require fast planning to guarantee fluid frame...
-
Using Functional or Structural Magnetic Resonance Images and Personal Characteristic Data to Diagnose ADHD and Autism
DownloadFall 2014
A clinical tool that can diagnose psychiatric illness using functional or structural magnetic resonance (MR) brain images would greatly assist physicians. Here, we propose a learning algorithm that uses the histogram of oriented gradients (HOG) features of MR brain images, as well as personal...
-
Advantage of Integration in Big Data: Feature Generation in Multi-Relational Databases for Imbalanced Learning
DownloadFall 2016
Most data mining and machine learning techniques rely on a single flat table and assume balanced training data. However, most real-world applications comprise databases having multiple tables and imbalanced data. It becomes further complicated in the realm of Big Data where related information is...
-
Fall 2018
Domain-specific knowledge plays a significant role in the success of many Monte Carlo Tree Search (MCTS) programs. The details of how knowledge affects MCTS are still not well understood. In this thesis, we focus on identifying the effects of different types of knowledge on the behaviour of the...
-
Fall 2014
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing k queries instead of one (our "k-query" scheme) protects the privacy of the user's location of interest, but facilitates the adversary...