Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Towards Automated Domain-Oriented Lexicon Construction And Dimension Reduction For Arabic Sentiment Analysis, Hasan A. Alshahrani Dec 2018

Towards Automated Domain-Oriented Lexicon Construction And Dimension Reduction For Arabic Sentiment Analysis, Hasan A. Alshahrani

Dissertations

Sentiment analysis is a type of text mining that uses Natural Language Processing (NLP) tools to identify and label opinionated text. There are two main approaches of sentiment analysis: lexicon-based, and statistical approach. In our research, we use the lexicon-based approach because the lexicon contains sentiment words and phrases which are the main linguistic units to express sentiments. More specifically, we work with domain-oriented lexicons as they are more efficient than general ones because the polarity is heavily driven by domains.

Arabic language has a degree of uniqueness that makes it hard to be processed with the available cross-language tools ...


Efficacy Of Deep Learning In Support Of Smart Services, Basheer Mohammed Basheer Qolomany Dec 2018

Efficacy Of Deep Learning In Support Of Smart Services, Basheer Mohammed Basheer Qolomany

Dissertations

The massive amount of streaming data generated and captured by smart service appliances, sensors and devices needs to be analyzed by algorithms, transformed into information, and minted to extract knowledge to facilitate timely actions and better decision making. This can lead to new products and services that can dramatically transform our lives. Machine learning and data analytics will undoubtedly play a critical role in enabling the delivery of smart services. Within the machine-learning domain, Deep Learning (DL) is emerging as a superior new approach that is much more effective than any rule or formula used by traditional machine learning. Furthermore ...


Exploring The Impact Of Pretrained Bidirectional Language Models On Protein Secondary Structure Prediction, Dillon G. Daudert Dec 2018

Exploring The Impact Of Pretrained Bidirectional Language Models On Protein Secondary Structure Prediction, Dillon G. Daudert

Master's Theses

Protein secondary structure prediction (PSSP) involves determining the local conformations of the peptide backbone in a folded protein, and is often the first step in resolving a protein's global folded structure. Accurate structure prediction has important implications for understanding protein function and de novo protein design, with progress in recent years being driven by the application of deep learning methods such as convolutional and recurrent neural networks. Language models pretrained on large text corpora have been shown to learn useful representations for feature extraction and transfer learning across problem domains in natural language processing, most notably in instances where ...


Lee Honors College Mobile Application, James Ward Apr 2018

Lee Honors College Mobile Application, James Ward

Honors Theses

In the spring of 2018 three Computer Science students Benjamin Campbell, James Ward, and Peter Shutt created a mobile application. This app was developed over the span of two semesters for their senior design project; a capstone to their degrees.

Their client, The Lee Honors College at Western Michigan University --referred to as LHC and WMU respectively hereafter-- has a plethora of academic and social information, and a large demand for access to it. This information includes building hours, contact information, health resources, a LHC specific course catalog, social media posts, event descriptions, and much more. The volume of information ...


Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih Apr 2018

Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih

Dissertations

Sharing healthcare information—including electronic health/medical records (EHRs/EMRs)—among healthcare information systems is necessary for improving the quality of healthcare. However, facilitating data exchange increases privacy threats—due to easier copying and dissemination of healthcare information.

We propose a solution that provides privacy protection for patients’ EHRs/EMRs disseminated among different authorized healthcare information systems. Our solution builds upon the existing construct named an Active Data Bundle (ADB). In the proposed solution, ADBs keep EHRs/EMRs as sensitive data; include metadata describing sensitive data and prescribing their use; and encompass a policy enforcement engine (called a virtual machine ...


A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh Apr 2018

A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh

Dissertations

Despite availability of several proteins search engines, due to the increasing amounts of MS/MS data and database sizes, more efficient data analysis and reduction methods are important. Improving accuracy and performance of protein identification is a main goal in the community of proteomic research. In this research, a holistic solution for improvement in search performance is developed.

Most current search engines apply the SEQUEST style of searching protein databases to define MS/MS spectra. SEQUEST involves three main phases: (i) Indexing the protein databases, (ii) Matching and Ranking the MS/MS spectra and (iii) Filtering the matches and reporting ...


Support Assurance-Based Software Development For Mission Critical Domains Using The Model Driven Architecture, Chung-Ling Lin Apr 2018

Support Assurance-Based Software Development For Mission Critical Domains Using The Model Driven Architecture, Chung-Ling Lin

Dissertations

In the past decades, software development for mission critical applications has drawn great attention not only in various mission critical communities but also software engineering communities. One of the important reasons is that the failure of these systems can lead to some serious consequences such as huge financial loss and even loss of life. Therefore, software certification has become an important activity for mission critical applications in that software assurance for such a system should be certified. With the increasing complexity of a software system in mission critical sectors, certifiers have found hard time to understand how a software system ...


A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri Apr 2018

A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri

Master's Theses

Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it ...