Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Wright State University (1749)
- University of Nebraska - Lincoln (1087)
- University of Texas at El Paso (833)
-
- Washington University in St. Louis (717)
- Technological University Dublin (650)
- Brigham Young University (642)
- Selected Works (590)
- California Polytechnic State University, San Luis Obispo (587)
- Embry-Riddle Aeronautical University (515)
- Singapore Management University (482)
- Universitas Indonesia (433)
- Old Dominion University (389)
- Marquette University (386)
- Air Force Institute of Technology (356)
- Santa Clara University (302)
- University of South Carolina (274)
- SelectedWorks (272)
- University of Central Florida (244)
- Portland State University (242)
- California State University, San Bernardino (236)
- Purdue University (212)
- Western University (191)
- Nova Southeastern University (170)
- New Jersey Institute of Technology (166)
- University of Arkansas, Fayetteville (163)
- University of Massachusetts Amherst (163)
- University of Nevada, Las Vegas (162)
- University of South Florida (156)
- Keyword
-
- Machine learning (335)
- Computer Science (312)
- Department of Computer Science and Engineering (255)
- Engineering (240)
- Deep learning (237)
-
- Simulation (229)
- Robotics (202)
- Machine Learning (188)
- Security (173)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (154)
- Classification (146)
- Computer Science and Engineering (121)
- Artificial intelligence (120)
- Deep Learning (119)
- Cybersecurity (108)
- Genetic algorithm (107)
- Internet (105)
- Computer vision (100)
- Computer Engineering (97)
- Computer science (94)
- Data mining (94)
- Privacy (92)
- Particle swarm optimization (87)
- Clustering (85)
- Cloud computing (84)
- Applied sciences (82)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (760)
- All Computer Science and Engineering Research (683)
-
- International Congress on Environmental Modelling and Software (630)
- Theses and Dissertations (536)
- Department of Electrical and Computer Engineering: Faculty Publications (483)
- Research Collection School Of Computing and Information Systems (450)
- Makara Journal of Technology (431)
- Electrical and Computer Engineering Faculty Research and Publications (366)
- Electronic Theses and Dissertations (347)
- Faculty Publications (314)
- Dissertations (308)
- Journal of Digital Forensics, Security and Law (299)
- Browse all Theses and Dissertations (278)
- Computer Engineering (267)
- Masters Theses (206)
- Computer Science and Engineering Senior Theses (201)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (190)
- Doctoral Dissertations (183)
- Master's Theses (176)
- Electrical and Computer Engineering Faculty Publications (171)
- Conference papers (163)
- BITs and PCs Newsletter (157)
- College of Engineering and Computing Course Catalogs (152)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (149)
- USF Tampa Graduate Theses and Dissertations (133)
- Publications (130)
- Articles (128)
Articles 1 - 30 of 23213
Full-Text Articles in Engineering
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt
GSTC Academic Symposium - In conjunction with the GSTC Global Conference Sweden April 23, 2024
Planning for sustainable mobility and destination development in rural areas is increasingly important when tourism grows in numbers. A key to address the challenge of transformation and adaptation of local communities to mitigate adverse effects in seasonal peak hours like traffic congestion, power failure, waste management and sewage flooding, is to properly estimate the number of visitors to a destination.
The problem of estimating tourism numbers is a known challenge since, for example, guest nights statistics are in-complete and non-commercial lodging (sharing solutions) are increasing. Recently, the promising utilization of mobile phone data has emerged as a means to estimate …
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Research Week
No abstract provided.
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Research Week
The surge in lunar missions intensifies concerns about congestion and communication reliability. This study proposes a secure cislunar architecture for real-time, cross-mission information exchange. We focus on cryptographic protocols and network design for a native IPv6 cislunar transit system.
Through a review of internet and space communication advancements, we emphasize the need for a secure network, exemplified by LunaNet. A robust data transit system with encryption is crucial for a common communication infrastructure. Traditional protocols face latency challenges. We advocate for user-friendly encryption methods to address confidentiality within the CIA Triad. Integrity is maintained through cryptographic message authentication codes. Availability …
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Campus Research Day
This paper is a proposed solution to the problem of memory safety using machine learning. Memory overload and corruption cause undesirable behaviors in a system that are addressed by memory safety implementations. This project uses machine learning models to classify different states of system memory from a dataset collected from a Raspberry Pi System. These models can then be used to classify real run time memory data and increase memory safety overall in a system.
Advisync: A Dynamic Academic Course Scheduler, Spencer M. Anderson, Wilson Escobar, Devin Scott Sandlin, Nathan Patrick Doyle
Advisync: A Dynamic Academic Course Scheduler, Spencer M. Anderson, Wilson Escobar, Devin Scott Sandlin, Nathan Patrick Doyle
ATU Research Symposium
Academic advising at universities can be a tedious and disorganized process for both students and advisors. Each advisor may have several dozen advisees to manage each semester, and each individual student has unique sets of classes they need to take to graduate. This might lead to scheduling errors. These errors can put the student behind in their degree, thus extending the time it takes for them to graduate past financial aid periods and delay their entry into the workforce. To address this issue, we create AdviSync. It is a tool for both students and advisors that aims to provide a …
Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson
Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson
ATU Research Symposium
During a wildfire, it is of the utmost importance to be updated about all information of the wildfire. Wind speed, wind direction and dry grass often works as fuel for the fire allowing it to spread in multiple directions. These different factors are often issues for any firefighting organization that is trying to help fight the fire. An uncontrolled wildfire is often a threat to wildlife, property, and worse, human and animal lives. In our paper, we propose an artificial intelligence (AI) powered fire tracking and prediction application utilizing Unmanned Aerial Vehicles (UAV) to inform fire fighters regarding the probability …
Pipe Conveyor System For Cylindrical Steel Pipe, Josiah Paynter, Hannah Harris, Sam Bowden, Nicolas Fuentes
Pipe Conveyor System For Cylindrical Steel Pipe, Josiah Paynter, Hannah Harris, Sam Bowden, Nicolas Fuentes
Scholar Week 2016 - present
The Peddinghaus Pipe Conveyor Senior Engineering Design Team was given the task of equipping an existing conveyor system with the ability to convey cylindrical steel pipe down the system while keeping the pipe in line with the datum and passline planes and restricting axial rotation. A metal prototype was constructed out of 0.25” mild steel that can store safely underneath the existing conveyor when not in use and extend when needed to constrain the pipes. Three pneumatic cylinders to actuate the main arm of the prototype were equipped with a polyurethane-coated roller to hold the pipe against both the conveyor …
League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman
League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman
ATU Research Symposium
The field of sports video analysis using deep learning is rapidly advancing. Proper classification and analysis of sports videos are essential to manage the growing sports media content. It offers numerous benefits for the media, advertising, analytics, and education sectors. Soccer, also known as football, worldwide, is among the most popular sports. This research study used a deep learning-based approach for soccer action detection. Deep learning has become a popular machine learning technique, especially for image and video classification. We have used the SoccerAct dataset, which consists of ten soccer actions like corner, foul, freekick, goal kick, long pass, on …
Analyzing The Impact Of Socioeconomic Factors On Cancer Clinical Trials Accessibility In The U.S. Using Machine Learning, Krysta L. Ray, Hiromi Honda
Analyzing The Impact Of Socioeconomic Factors On Cancer Clinical Trials Accessibility In The U.S. Using Machine Learning, Krysta L. Ray, Hiromi Honda
ATU Research Symposium
While cancer impacts all segments of the United States population, specific groups experience a disproportionate burden of the disease due to social, environmental, and economic disadvantages. This research examines the correlation between socioeconomic factors and the accessibility of cancer clinical trials across U.S. counties, employing a comprehensive dataset, County-Level Socioeconomic and Cancer Clinical Trial Data from Noah Ripper, and advanced machine-learning techniques. Our findings, derived from regression analysis and machine learning models like gradient boosting, highlight significant disparities in trial availability linked to socioeconomic indicators, including poverty rates, population estimates, median income, incidence rates, and mortality rates. Many regression models …
Enhancing Disease Detection In South Asian Freshwater Fish Aquaculture Through Convolutional Neural Networks, Hayin Tamut, Musfikur Rahaman, Dr. Robin Ghosh
Enhancing Disease Detection In South Asian Freshwater Fish Aquaculture Through Convolutional Neural Networks, Hayin Tamut, Musfikur Rahaman, Dr. Robin Ghosh
ATU Research Symposium
Aquaculture expansion necessitates innovative disease detection methods for sustainable production. This study investigates the efficacy of Convolutional Neural Networks (CNNs) in classifying diseases affecting South Asian freshwater fish species. The dataset comprises 1747 images representing 7 class, healthy specimens and various diseases: bacterial, fungal, parasitic, and viral. The CNN architecture includes convolutional layers for feature extraction, max-pooling layers for down sampling, dense layers for classification, and dropout layers for regularization. Training employs categorical cross-entropy loss and the Adam optimizer over 30 epochs, monitoring both training and validation performance. Results indicate promising accuracy levels, with the model achieving 92.14% and test …
Enhancing Cyber Resilience: Development, Challenges, And Strategic Insights In Cyber Security Report Websites Using Artificial Inteligence, Pooja Sharma
Harrisburg University Dissertations and Theses
In an era marked by relentless cyber threats, the imperative of robust cyber security measures cannot be overstated. This thesis embarks on an in-depth exploration of the historical trajectory and contemporary relevance of penetration testing methodologies, elucidating their evolution from nascent origins to indispensable tools in the cyber security arsenal. Moreover, it undertakes the ambitious task of conceptualizing and implementing a cyber security report website, meticulously designed to fortify cyber resilience in the face of ever-evolving threats in the digital realm.
The research journey commences with an insightful examination of the historical antecedents of penetration testing, tracing its genesis in …
The Role Of Attention Mechanisms In Enhancing Transparency And Interpretability Of Neural Network Models In Explainable Ai, Bhargav Kotipalli
The Role Of Attention Mechanisms In Enhancing Transparency And Interpretability Of Neural Network Models In Explainable Ai, Bhargav Kotipalli
Harrisburg University Dissertations and Theses
In the rapidly evolving field of artificial intelligence (AI), deep learning models' interpretability
and reliability are severely hindered by their complexity and opacity. Enhancing the
transparency and interpretability of AI systems for humans is the primary objective of the
emerging field of explainable AI (XAI). The attention mechanisms at the heart of XAI's work
are based on human cognitive processes. Neural networks can now dynamically focus on
relevant parts of the input data thanks to these mechanisms, which enhances interpretability
and performance. This report covers in-depth talks of attention mechanisms in neural networks
within XAI, as well as an analysis …
Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani
Decoding The Future: Integration Of Artificial Intelligence In Web Development, Dhiraj Choithramani
Harrisburg University Dissertations and Theses
The thesis explores AI's profound impact on web development, particularly in front-end and back-end processes. AI revolutionizes UI prototyping by automating design creation, enhancing both efficiency and aesthetics. It also aids in code review, content generation, and process flow experimentation, streamlining development workflows. Through AI-driven tools like GitHub's Copilot and Wix ADI, developers benefit from coding assistance and innovative design capabilities. Despite some challenges, AI's evolving role promises to reshape web development, offering unprecedented efficiency and user-centric solutions.
Enhancing Mobile App User Experience: A Deep Learning Approach For System Design And Optimization, Deepesh Haryani
Enhancing Mobile App User Experience: A Deep Learning Approach For System Design And Optimization, Deepesh Haryani
Harrisburg University Dissertations and Theses
This paper presents a comprehensive framework for enhancing user experience in mobile applications through the integration of deep learning systems. The proposed system design encompasses various components, including data collection and preprocessing, model development and training, integration with mobile applications, dataset management service, model training service, model serving, hyperparameter optimization, metadata and artifact store, and workflow orchestration. Each component is meticulously designed with a focus on scalability, efficiency, isolation, and critical analysis. Innovative design principles are employed to ensure seamless integration, usability, and automation. Additionally, the paper discusses distributed training service design, advanced optimization techniques, and decision criteria for hyperparameter …
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Cybersecurity Undergraduate Research Showcase
This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Human-Machine Communication
As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
Journal of Engineering Research
In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.
This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe
Journal of Engineering Research
The proliferation of fake news has become a complex and challenge problem in recent year, and presenting various unsolved issues within the research domain. Among these challenges, a critical concern is the development of effective models capable of accurately distinguish between fake and real news. While numerous techniques have been proposed for fake news detection, achieving optimal accuracy remains elusive. This paper introduces a novel fake news detection approach employing a two-layered weighted voting classifier. In contrast to conventional methods that assign equal weights to all classifiers, our proposed approach utilizes a selective weighting approach to solve the current issue. …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Masters Theses
Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.
Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Research Symposium
Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.
Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …