Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (28)
- Computer Engineering (23)
- Computer Sciences (19)
- Electrical and Computer Engineering (15)
- Chemical Engineering (13)
-
- Biomedical Engineering and Bioengineering (8)
- Materials Science and Engineering (8)
- Chemistry (7)
- Civil and Environmental Engineering (7)
- Medicine and Health Sciences (6)
- Electrical and Electronics (5)
- Life Sciences (5)
- Artificial Intelligence and Robotics (4)
- Civil Engineering (4)
- Industrial Engineering (4)
- Mechanical Engineering (4)
- Operations Research, Systems Engineering and Industrial Engineering (4)
- Polymer Science (4)
- Engineering Science and Materials (3)
- Neuroscience and Neurobiology (3)
- Polymer Chemistry (3)
- Polymer and Organic Materials (3)
- Aerospace Engineering (2)
- Bioimaging and Biomedical Optics (2)
- Environmental Engineering (2)
- Medical Sciences (2)
- Nanoscience and Nanotechnology (2)
- Neurosciences (2)
- Pharmacy and Pharmaceutical Sciences (2)
- Institution
- Keyword
-
- Machine Learning (6)
- Optimization (4)
- Internet of things (3)
- Logistic regression (3)
- Accuracy (2)
-
- CNN (2)
- Classification (2)
- Deep learning (2)
- Electrodes (2)
- Heat transfer (2)
- Machine learning (2)
- Membrane filtration (2)
- Modelling (2)
- Multiple Linear Regression (2)
- Polymer brush (2)
- Sentiment analysis (2)
- Software testing (2)
- Spiking neural network (2)
- Support Vector Machine (2)
- Transient analysis (2)
- Twitter (2)
- Water treatment (2)
- 911 (1)
- ARIMA (1)
- Active transportation (1)
- Adversarial learning (1)
- Agent-based modeling (1)
- Algal harvesting (1)
- Alzheimer's Disease (1)
- Amorphous solid dispersion (1)
- Publication Type
Articles 61 - 71 of 71
Full-Text Articles in Engineering
An Evaluation Of The Information Security Awareness Of University Students, Alan Pike
An Evaluation Of The Information Security Awareness Of University Students, Alan Pike
Dissertations
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensitive data records were compromised online. The average cost of a data breach in 2018 was reported to be in the region of US$3.62 million. These figures alone highlight the need for computer users to have a high level of information security awareness (ISA). This research was conducted to establish the ISA of students in a university. There were three aspects to this piece of research. The first was to review and analyse the security habits of students in terms of their own personal …
Noise Reduction In Eeg Signals Using Convolutional Autoencoding Techniques, Conor Hanrahan
Noise Reduction In Eeg Signals Using Convolutional Autoencoding Techniques, Conor Hanrahan
Dissertations
The presence of noise in electroencephalography (EEG) signals can significantly reduce the accuracy of the analysis of the signal. This study assesses to what extent stacked autoencoders designed using one-dimensional convolutional neural network layers can reduce noise in EEG signals. The EEG signals, obtained from 81 people, were processed by a two-layer one-dimensional convolutional autoencoder (CAE), whom performed 3 independent button pressing tasks. The signal-to-noise ratios (SNRs) of the signals before and after processing were calculated and the distributions of the SNRs were compared. The performance of the model was compared to noise reduction performance of Principal Component Analysis, with …
Predicting Violent Crime Reports From Geospatial And Temporal Attributes Of Us 911 Emergency Call Data, Vincent Corcoran
Predicting Violent Crime Reports From Geospatial And Temporal Attributes Of Us 911 Emergency Call Data, Vincent Corcoran
Dissertations
The aim of this study is to create a model to predict which 911 calls will result in crime reports of a violent nature. Such a prediction model could be used by the police to prioritise calls which are most likely to lead to violent crime reports. The model will use geospatial and temporal attributes of the call to predict whether a crime report will be generated. To create this model, a dataset of characteristics relating to the neighbourhood where the 911 call originated will be created and combined with characteristics related to the time of the 911 call. Geospatial …
Enhancing Partially Labelled Data: Self Learning And Word Vectors In Natural Language Processing, Eamon Mcentee
Enhancing Partially Labelled Data: Self Learning And Word Vectors In Natural Language Processing, Eamon Mcentee
Dissertations
There has been an explosion in unstructured text data in recent years with services like Twitter, Facebook and WhatsApp helping drive this growth. Many of these companies are facing pressure to monitor the content on their platforms and as such Natural Language Processing (NLP) techniques are more important than ever. There are many applications of NLP ranging from spam filtering, sentiment analysis of social media, automatic text summarisation and document classification.
Detection Of Offensive Youtube Comments, A Performance Comparison Of Deep Learning Approaches, Priyam Bansal
Detection Of Offensive Youtube Comments, A Performance Comparison Of Deep Learning Approaches, Priyam Bansal
Dissertations
Social media data is open, free and available in massive quantities. However, there is a significant limitation in making sense of this data because of its high volume, variety, uncertain veracity, velocity, value and variability. This work provides a comprehensive framework of text processing and analysis performed on YouTube comments having offensive and non-offensive contents.
YouTube is a platform where every age group of people logs in and finds the type of content that most appeals to them. Apart from this, a massive increase in the use of offensive language has been apparent. As there are massive volume of new …
Performance Comparison Of Hybrid Cnn-Svm And Cnn-Xgboost Models In Concrete Crack Detection, Sahana Thiyagarajan
Performance Comparison Of Hybrid Cnn-Svm And Cnn-Xgboost Models In Concrete Crack Detection, Sahana Thiyagarajan
Dissertations
Detection of cracks mainly has been a sort of essential step in visual inspection involved in construction engineering as it is the commonly used building material and cracks in them is an early sign of de-basement. It is hard to find cracks by a visual check for the massive structures. So, the development of crack detecting systems generally has been a critical issue. The utilization of contextual image processing in crack detection is constrained, as image data usually taken under real-world situations vary widely and also includes the complex modelling of cracks and the extraction of handcrafted features. Therefore the …
An Automated Negotiation System For Ecommerce Store Owners To Enable Flexible Product Pricing, Jake O'Halloran
An Automated Negotiation System For Ecommerce Store Owners To Enable Flexible Product Pricing, Jake O'Halloran
Dissertations
If a store owner wishes to sell a product online, they traditionally have two options for deciding on a price. They can sell the product at a fixesd price like the products sold on sites like Amazon, or they can put the product in an auction and let demand from customers drive the final sales price like the products sold on sites like eBay. Both options have their pros and cons. An alternative option for deciding on a final sales price for the product is to enable negotiation on the product. With this, there is a dynamic nature to the …
Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur
Analyzing Twitter Feeds To Facilitate Crises Informatics And Disaster Response During Mass Emergencies, Arshdeep Kaur
Dissertations
It is a common practice these days for general public to use various micro-blogging platforms, predominantly Twitter, to share ideas, opinions and information about things and life. Twitter is also being increasingly used as a popular source of information sharing during natural disasters and mass emergencies to update and communicate the extent of the geographic phenomena, report the affected population and casualties, request or provide volunteering services and to share the status of disaster recovery process initiated by humanitarian-aid and disaster-management organizations. Recent research in this area has affirmed the potential use of such social media data for various disaster …
Augmenting American Fuzzy Lop To Increase The Speed Of Bug Detection, Raviraj Mahajan
Augmenting American Fuzzy Lop To Increase The Speed Of Bug Detection, Raviraj Mahajan
Dissertations
Whitebox fuzz testing is a vital part of the software testing process in the software development life cycle (SDLC). It is used for bug detection and security vulnerability checking as well. But current tools lack the ability to detect all the bugs and cover the entire code under test in a reasonable time. This study will explore some of the various whitebox fuzzing techniques and tools (AFL, SAGE, Driller, etc.) currently in use followed by a discussion of their strategies and the challenges facing them. One of the most popular state-of-the-art fuzzers, American Fuzzy Lop (AFL) will be discussed in …
An Evaluation Of Learning Employing Natural Language Processing And Cognitive Load Assessment, Mrunal Tipari
An Evaluation Of Learning Employing Natural Language Processing And Cognitive Load Assessment, Mrunal Tipari
Dissertations
One of the key goals of Pedagogy is to assess learning. Various paradigms exist and one of this is Cognitivism. It essentially sees a human learner as an information processor and the mind as a black box with limited capacity that should be understood and studied. With respect to this, an approach is to employ the construct of cognitive load to assess a learner's experience and in turn design instructions better aligned to the human mind. However, cognitive load assessment is not an easy activity, especially in a traditional classroom setting. This research proposes a novel method for evaluating learning …
Is There A Correlation Between Wikidata Revisions And Trending Hashtags On Twitter?, Paula Dooley [Thesis]
Is There A Correlation Between Wikidata Revisions And Trending Hashtags On Twitter?, Paula Dooley [Thesis]
Dissertations
Twitter is a microblogging application used by its members to interact and stay socially connected by sharing instant messages called tweets that are up to 280 characters long. Within these tweets, users can add hashtags to relate the message to a topic that is shared among users. Wikidata is a central knowledge base of information relying on its members and machines bots to keeping its content up to date. The data is stored in a highly structured format with the added SPARQL protocol and RDF Query Language (SPARQL) endpoint to allow users to query its knowledge base.