Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Academic -- UNF -- Computing; ACO; MRI; Birchell; Heart; Image Processing; Computational Intelligence; Ant; Trapping Ant algorithm (1)
- Academic -- UNF -- Computing; MACHINE LEARNING; VISUALIZING; LEXICOGRAPHIC PREFERENCE TREES; DATA MINING; CLASSIFICATION; PREFERENCE LEARNING; Lexicographic preference trees -- Visualization; Preference visualization -- Web-based systems; Preference learning -- Genetic algorithms; Dynamic programming algorithms -- Design – Testing; Novel algorithms -- Design – Testing (1)
- Academic -- UNF -- Computing; Security; Mobile devices; energy aware (1)
- Academic -- UNF -- Computing; code clone; clone detection; topic modeling; machine learning; software refactoring; software engineering; Latent Dirichlet Allocation -- Testing; Topic models -- Testing; Generative statistical models -- Testing; Code clone detection -- Statistical models; Code clone detection -- Software; CloneTM -- Testing (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa
On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa
UNF Graduate Theses and Dissertations
Preferences are very important in research fields such as decision making, recommendersystemsandmarketing. The focus of this thesis is on preferences over combinatorial domains, which are domains of objects configured with categorical attributes. For example, the domain of cars includes car objects that are constructed withvaluesforattributes, such as ‘make’, ‘year’, ‘model’, ‘color’, ‘body type’ and ‘transmission’.Different values can instantiate an attribute. For instance, values for attribute ‘make’canbeHonda, Toyota, Tesla or BMW, and attribute ‘transmission’ can haveautomaticormanual. To this end,thisthesis studiesproblemsonpreference visualization and learning for lexicographic preference trees, graphical preference models that often are compact over complex domains of objects built of …
A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan
A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan
UNF Graduate Theses and Dissertations
In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based …
Trapping Aco Applied To Mri Of The Heart, Shannon Lloyd Birchell
Trapping Aco Applied To Mri Of The Heart, Shannon Lloyd Birchell
UNF Graduate Theses and Dissertations
The research presented here supports the ongoing need for automatic heart volume calculation through the identification of the left and right ventricles in MRI images. The need for automated heart volume calculation stems from the amount of time it takes to manually processes MRI images and required esoteric skill set. There are several methods for region detection such as Deep Neural Networks, Support Vector Machines and Ant Colony Optimization. In this research Ant Colony Optimization (ACO) will be the method of choice due to its efficiency and flexibility. There are many types of ACO algorithms using a variety of heuristics …
Modeling Context-Adaptive Energy-Aware Security In Mobile Devices, Preeti Singh
Modeling Context-Adaptive Energy-Aware Security In Mobile Devices, Preeti Singh
UNF Graduate Theses and Dissertations
As increasing functionality in mobile devices leads to rapid battery drain, energy management has gained increasing importance. However, differences in user’s usage contexts and patterns can be leveraged for saving energy. On the other hand, the increasing sensitivity of users’ data, coupled with the need to ensure security in an energy-aware manner, demands careful analyses of trade-offs between energy and security. The research described in this thesis addresses this challenge by 1)modeling the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec); 2) proving that the decision version of this problem is NP-Complete, via a reduction from a …