(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–10 of 10 results for author: Ingram, J

.
  1. arXiv:2408.14348  [pdf, other

    cs.CV

    Deep learning-based ecological analysis of camera trap images is impacted by training data quality and size

    Authors: Omiros Pantazis, Peggy Bevan, Holly Pringle, Guilherme Braga Ferreira, Daniel J. Ingram, Emily Madsen, Liam Thomas, Dol Raj Thanet, Thakur Silwal, Santosh Rayamajhi, Gabriel Brostow, Oisin Mac Aodha, Kate E. Jones

    Abstract: Large wildlife image collections from camera traps are crucial for biodiversity monitoring, offering insights into species richness, occupancy, and activity patterns. However, manual processing of these data is time-consuming, hindering analytical processes. To address this, deep neural networks have been widely adopted to automate image analysis. Despite their growing use, the impact of model tra… ▽ More

    Submitted 26 August, 2024; originally announced August 2024.

  2. arXiv:2405.09681  [pdf

    physics.chem-ph

    Inactive Overhang in Silicon Anodes

    Authors: Aidin I. OBrien, Stephen E. Trask, Devashish Salpekar, Seoung-Bum Son, Alison R. Dunlop, Gabriel M. Veith, Wenquan Lu, Brian J. Ingram, Daniel P. Abraham, Andrew N. Jansen, Marco-Tulio F. Rodrigues

    Abstract: Li-ion batteries contain excess anode area to improve manufacturability and prevent Li plating. These overhang areas in graphite electrodes are active but experience decreased Li+ flux during cycling. Over time, the overhang and the anode portions directly opposite to the cathode can exchange Li+, driven by differences in local electrical potential across the electrode, which artificially inflates… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  3. Coronal Heating as Determined by the Solar Flare Frequency Distribution Obtained by Aggregating Case Studies

    Authors: James Paul Mason, Alexandra Werth, Colin G. West, Allison A. Youngblood, Donald L. Woodraska, Courtney Peck, Kevin Lacjak, Florian G. Frick, Moutamen Gabir, Reema A. Alsinan, Thomas Jacobsen, Mohammad Alrubaie, Kayla M. Chizmar, Benjamin P. Lau, Lizbeth Montoya Dominguez, David Price, Dylan R. Butler, Connor J. Biron, Nikita Feoktistov, Kai Dewey, N. E. Loomis, Michal Bodzianowski, Connor Kuybus, Henry Dietrick, Aubrey M. Wolfe , et al. (977 additional authors not shown)

    Abstract: Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms th… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 1,002 authors, 14 pages, 4 figures, 3 tables, published by The Astrophysical Journal on 2023-05-09, volume 948, page 71

  4. Trajectory Planning with Deep Reinforcement Learning in High-Level Action Spaces

    Authors: Kyle R. Williams, Rachel Schlossman, Daniel Whitten, Joe Ingram, Srideep Musuvathy, Anirudh Patel, James Pagan, Kyle A. Williams, Sam Green, Anirban Mazumdar, Julie Parish

    Abstract: This paper presents a technique for trajectory planning based on continuously parameterized high-level actions (motion primitives) of variable duration. This technique leverages deep reinforcement learning (Deep RL) to formulate a policy which is suitable for real-time implementation. There is no separation of motion primitive generation and trajectory planning: each individual short-horizon motio… ▽ More

    Submitted 12 August, 2022; v1 submitted 30 September, 2021; originally announced October 2021.

    Journal ref: IEEE Transactions on Aerospace and Electronic Systems, 59 (2023) 2513-2529

  5. arXiv:2005.09787  [pdf, other

    cs.LG stat.ML

    Self-Updating Models with Error Remediation

    Authors: Justin E. Doak, Michael R. Smith, Joey B. Ingram

    Abstract: Many environments currently employ machine learning models for data processing and analytics that were built using a limited number of training data points. Once deployed, the models are exposed to significant amounts of previously-unseen data, not all of which is representative of the original, limited training data. However, updating these deployed models can be difficult due to logistical, band… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 17 pages, 13 figures, published in the proceedings of the Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II conference in the SPIE Defense + Commercial Sensing, 2020 symposium

    Report number: SAND No: SAND2020-5113 C ACM Class: I.2.6

    Journal ref: Proc. SPIE 11413, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II, 114131W (18 May 2020)

  6. arXiv:2005.01800  [pdf, other

    cs.CR cs.LG stat.ML

    Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

    Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer

    Abstract: Despite the potential of Machine learning (ML) to learn the behavior of malware, detect novel malware samples, and significantly improve information security (InfoSec) we see few, if any, high-impact ML techniques in deployed systems, notwithstanding multiple reported successes in open literature. We hypothesize that the failure of ML in making high-impacts in InfoSec are rooted in a disconnect be… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 2 Figures, 6 tables

  7. arXiv:1712.07671  [pdf, other

    cs.CR

    Tracking Cyber Adversaries with Adaptive Indicators of Compromise

    Authors: Justin E. Doak, Joe B. Ingram, Sam A. Mulder, John H. Naegle, Jonathan A. Cox, James B. Aimone, Kevin R. Dixon, Conrad D. James, David R. Follett

    Abstract: A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary's new TTPs, the adversary w… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

    Comments: This was presented at the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

    Report number: SAND2017-12402 C

    Journal ref: This will be in the proceedings of the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

  8. arXiv:1711.03947  [pdf, other

    cs.CR stat.ML

    Dynamic Analysis of Executables to Detect and Characterize Malware

    Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James

    Abstract: It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating attempts at obfuscation as the behavior is monitored rather than the bytes of an executable. We examine several machine learning techniques for de… ▽ More

    Submitted 28 September, 2018; v1 submitted 10 November, 2017; originally announced November 2017.

    Comments: 9 pages, 6 Tables, 4 Figures

    Report number: SAND2018-11011 C

  9. Probability Models for Degree Distributions of Protein Interaction Networks

    Authors: Michael P. H. Stumpf, Piers J. Ingram

    Abstract: The degree distribution of many biological and technological networks has been described as a power-law distribution. While the degree distribution does not capture all aspects of a network, it has often been suggested that its functional form contains important clues as to underlying evolutionary processes that have shaped the network. Generally, the functional form for the degree distribution… ▽ More

    Submitted 3 July, 2005; originally announced July 2005.

    Journal ref: Europhys.Lett., 71 (1), pp. 152-158 (2005)

  10. arXiv:q-bio/0506013  [pdf, ps, other

    q-bio.MN q-bio.OT

    Statistical model selection methods applied to biological networks

    Authors: M. P. H. Stumpf, P. J. Ingram, I. Nouvel, C. Wiuf

    Abstract: Many biological networks have been labelled scale-free as their degree distribution can be approximately described by a powerlaw distribution. While the degree distribution does not summarize all aspects of a network it has often been suggested that its functional form contains important clues as to underlying evolutionary processes that have shaped the network. Generally determining the appropr… ▽ More

    Submitted 10 June, 2005; originally announced June 2005.

    Comments: Transactions in Computational Systems Biology (in press)