Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Engineering

Stacked Convolutional Recurrent Auto-Encoder For Noise Reduction In Eeg, Eoghan Keegan Sep 2020

Stacked Convolutional Recurrent Auto-Encoder For Noise Reduction In Eeg, Eoghan Keegan

Dissertations

Electroencephalogram (EEG) can be used to record electrical potentials in the brain by attaching electrodes to the scalp. However, these low amplitude recordings are susceptible to noise which originates from several sources including ocular, pulse and muscle artefacts. Their presence has a severe impact on analysis and diagnoses of brain abnormalities. This research assessed the effectiveness of a stacked convolutional-recurrent auto-encoder (CR-AE) for noise reduction of EEG signal. Performance was evaluated using the signal-to-noise ratio (SNR) and peak signal-to-noise ratio (PSNR) in comparison to principal component analysis (PCA), independent component analysis (ICA) and a simple auto-encoder (AE). The Harrell-Davis quantile …


Discover Influential Mental Workload Attributes Impacting Learners Performance In Third-Level Education, Amisha Mehta Sep 2020

Discover Influential Mental Workload Attributes Impacting Learners Performance In Third-Level Education, Amisha Mehta

Dissertations

Human Mental Workload is an intervening variable and a fundamental concept in the discipline of Ergonomics. It is deduced from variations in performance. High or low mental workload leads to hampering of performance. Mental workload in an educational setting has been extensively researched. It is applied in instructional design but it is obscure as to which factors are majorly driving mental workload in learners. This dissertation investigates the importance of the features used in the the NASA-Task Load Index mental workload assessment instrument and their impact on the performance of learners as assessed by multiple-choice tests conducted in classrooms of …


The Entanglement Of Influential Technology Channels In Practice And Design, Ciarán O'Leary Sep 2020

The Entanglement Of Influential Technology Channels In Practice And Design, Ciarán O'Leary

Doctoral

Design for academic practice is an important phenomenon in Higher Education. This is the practice through which informal, non-professional designers operating in a variety of roles in academic institutions carry out the design of systems, resources, activities and processes that are intended to enhance academic practice. Despite its importance, the area has not received sufficient attention in studies of academic practice, quality enhancement and digital transformation. This thesis argues that the absence of insight into how designers for academic practice engage with digital technology in their design practice contributes to the mismatch between the ambitions for digital transformation in higher …


Detection Of Software Vulnerability Communication In Expert Social Media Channels: A Data-Driven Approach, Andrei Lima Queiroz Sep 2020

Detection Of Software Vulnerability Communication In Expert Social Media Channels: A Data-Driven Approach, Andrei Lima Queiroz

Doctoral

Conceptually, a vulnerability is: "A flaw or weakness in a system’s design, implementation,or operation and management that could be exploited to violate the system’s security policy".Some of these flaws can go undetected and exploited for long periods of time after soft-ware release. Although some software providers are making efforts to avoid this situ-ation, inevitability, users are still exposed to vulnerabilities that allow criminal hackersto take advantage. These vulnerabilities are constantly discussed in specialised forumson social media. Therefore, from a cyber security standpoint, the information found inthese places can be used for countermeasures actions against malicious exploitation ofsoftware. However, manual inspection …


Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz Jun 2020

Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz

Conference papers

Abstract—In this paper, we are investigating the presence of concept drift in machine learning models for detection of hacker communications posted in social media and hacker forums. The supervised models in this experiment are analysed in terms of performance over time by different sources of data (Surface web and Deep web). Additionally, to simulate real-world situations, these models are evaluated using time-stamped messages from our datasets, posted over time on social media platforms. We have found that models applied to hacker forums (deep web) presents an accuracy deterioration in less than a 1-year period, whereas models applied to Twitter (surface …


Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez Jun 2020

Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez

Conference papers

Accurate traffic classification is fundamentally important for various network activities such as fine-grained network management and resource utilisation. Port-based approaches, deep packet inspection and machine learning are widely used techniques to classify and analyze network traffic flows. However, over the past several years, the growth of Internet traffic has been explosive due to the greatly increased number of Internet users. Therefore, both port-based and deep packet inspection approaches have become inefficient due to the exponential growth of the Internet applications that incurs high computational cost. The emerging paradigm of software-defined networking has reshaped the network architecture by detaching the control …


A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin Jun 2020

A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin

Conference papers

Failure incidents result in temporarily preventing the network from delivering services properly. Such a deterioration in services called service unavailability. The traditional fault management techniques, i.e. protection and restoration, are inevitably concerned with service unavailability due to the convergence time that is required to achieve the recovery when a failure occurs. However, with the global view feature of software-defined networking a failure prediction is becoming attainable, which in turn reduces the service interruptions that originated by failures. In this paper, we propose a proactive restoration technique that reconfigure the vulnerable routes which are likely to be affected if the …


Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz May 2020

Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz

Articles

There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in the harshest of environments. Software-Defined Networking (SDN) is gaining traction as a promising approach for designing network architectures which are robust and flexible. One reason for this is that separating the data plane from the control plane, increases the controller’s ability to configure the network rapidly. When network failure events occur, the network manager may trade-off the optimality of the …


Investigation Of The Effects Of A Situated Learning Digital Game On Mathematics Education At The Primary School Level, Mariana Rocha May 2020

Investigation Of The Effects Of A Situated Learning Digital Game On Mathematics Education At The Primary School Level, Mariana Rocha

Doctoral

Previous research suggests games can improve learning outcomesand students’ motivation. However, there still exists insufficient clarity on the design principles and pedagogical approach that should underpinmathematics educational games. This thesis is aimed at evaluating the effects of an educationalgame on the learningperformance and levels of anxiety promoted by mathematics activities of primary school students. The game was designed based on theprinciples of situated learning, following acombination of an in-depth literature review, a collection of teachers’ perceptions about educational games, and features ofclassroom games. Empirical evaluation of the game was performed through a 5-weeks experiment carried out in three Irish schools, …


A Hybrid Agent-Based And Equation Based Epidemiological Model For The Spread Of Infectious Diseases, Elizabeth Hunter Feb 2020

A Hybrid Agent-Based And Equation Based Epidemiological Model For The Spread Of Infectious Diseases, Elizabeth Hunter

Doctoral

Infectious disease models are essential in understanding how an outbreak might occur and how best to mitigate an outbreak. One of the most important factors in modelling a disease is choosing an appropriate model and determining the assump tions needed to create the model. The main research questions this thesis addresses are how do we create a model for the spread of infectious diseases that captures heterogeneous agents without using an inordinate amount of computing power and how can we use that model to plan for future infectious disease outbreaks. We start our work by analysing and comparing equation based …


Developing An Inclusive K-12 Outreach Model, Karen Nolan, Roisin Faherty, Keith Quille, Brett A. Becker, Susan Bergin Jan 2020

Developing An Inclusive K-12 Outreach Model, Karen Nolan, Roisin Faherty, Keith Quille, Brett A. Becker, Susan Bergin

Conference Papers

This paper outlines the longitudinal development of a K-12 outreachmodel, to promote Computer Science in Ireland. Over a three-yearperiod, it has been piloted to just under 9700 K-12 students fromalmost every county in Ireland. The model consists of a two-hourcamp that introduces students to a range of Computer Sciencetopics: addressing computing perceptions, introduction to codingand exploration of computational thinking. The model incorporateson-site school delivery and is available at no cost to any interestedschool across Ireland. The pilot study so far collected over 3400surveys (pre- and post-outreach delivery).Schools from all over Ireland self-selected to participate, includ-ing male only, female only and …


Named Entity Recognition In Spanish Biomedical Literature: Short Review And Bert Model, Liliya Akhtyamova Jan 2020

Named Entity Recognition In Spanish Biomedical Literature: Short Review And Bert Model, Liliya Akhtyamova

Conference Papers

Named Entity Recognition (NER) is the rst step for knowledge acquisition when we deal with an unknown corpus of texts. Having received these entities, we have an opportunity to form parameters space and to solve problems of text mining as concept normalization, speech recognition, etc. The recent advances in NER are related to the technology of word embeddings, which transforms text to the form being effective for Deep Learning. In the paper, we show how NER detects pharmacological substances, compounds, and proteins in the dataset obtained from the Spanish Clinical Case Corpus (SPACCC). To achieve this goal, we use contextualized …


Lm-Based Word Embeddings Improve Biomedical Named Entity Recognition: A Detailed Analysis, Liliya Akhtyamova, John Cardiff Jan 2020

Lm-Based Word Embeddings Improve Biomedical Named Entity Recognition: A Detailed Analysis, Liliya Akhtyamova, John Cardiff

Conference Papers

Recent studies have shown that contextualized word embeddings outperform other types of embeddings on a variety of tasks. However, there is little research done to evaluate their effectiveness in the biomedical domain under multi-task settings. We derive the contextualized word embeddings from the Flair framework and apply them to the task of biomedical NER on 5 benchmark datasets, yielding major improvements over the baseline and achieving competitive results over the current best systems. We analyze the sources of these improvements, reporting model performances over different combinations of word embeddings, and fine-tuning and casing modes.


Investigating The Predictability Of A Chaotic Time-Series Data Using Reservoir Computing, Deep-Learning And Machine- Learning On The Short-, Medium- And Long-Term Pricing Of Bitcoin And Ethereum., Molly Kenny Jan 2020

Investigating The Predictability Of A Chaotic Time-Series Data Using Reservoir Computing, Deep-Learning And Machine- Learning On The Short-, Medium- And Long-Term Pricing Of Bitcoin And Ethereum., Molly Kenny

Dissertations

This study will investigate the predictability of a Chaotic time-series data using Reservoir computing (Echo State Network), Deep-Learning(LSTM) and Machine- Learning(Linear, Bayesian, ElasticNetCV , Random Forest, XGBoost Regression and a machine learning Neural Network) on the short (1-day out prediction), medium (5-day out prediction) and long-term (30-day out prediction) pricing of Bitcoin and Ethereum Using a range of machine learning tools, to perform feature selection by permutation importance to select technical indicators on the individual cryptocurrencies, to ensure the datasets are the best for predictions per cryptocurrency while reducing noise within the models. The predictability of these two chaotic time-series …


Finetuning Pre-Trained Language Models For Sentiment Classification Of Covid19 Tweets, Arjun Dussa Jan 2020

Finetuning Pre-Trained Language Models For Sentiment Classification Of Covid19 Tweets, Arjun Dussa

Dissertations

It is a common practice in today’s world for the public to use different micro-blogging and social networking platforms, predominantly Twitter, to share opinions, ideas, news, and information about many things in life. Twitter is also becoming a popular channel for information sharing during pandemic outbreaks and disaster events. The world has been suffering from economic crises ever since COVID-19 cases started to increase rapidly since January 2020. The virus has killed more than 800 thousand people ever since the discovery as per the statistics from Worldometer [1] which is the authorized tracking website. So many researchers around the globe …


Image Instance Segmentation: Using The Cirsy System To Identify Small Objects In Low Resolution Images, Orghomisan William Omatsone Jan 2020

Image Instance Segmentation: Using The Cirsy System To Identify Small Objects In Low Resolution Images, Orghomisan William Omatsone

Dissertations

The CIRSY system (or Chick Instance Recognition System) is am image processing system developed as part of this research to detect images of chicks in highly-populated images that uses the leading algorithm in instance segmentation tasks, called the Mask R-CNN. It extends on the Faster R-CNN framework used in object detection tasks, and this extension adds a branch to predict the mask of an object along with the bounding box prediction. Mask R-CNN has proven to be effective ininstance segmentation and object de-tection tasks after outperforming all existing models on evaluation of the Microsoft Common Objects in Context (MS COCO) …


Brain Disease Detection From Eegs: Comparing Spiking And Recurrent Neural Networks For Non-Stationary Time Series Classification, Hristo Stoev Jan 2020

Brain Disease Detection From Eegs: Comparing Spiking And Recurrent Neural Networks For Non-Stationary Time Series Classification, Hristo Stoev

Dissertations

Modeling non-stationary time series data is a difficult problem area in AI, due to the fact that the statistical properties of the data change as the time series progresses. This complicates the classification of non-stationary time series, which is a method used in the detection of brain diseases from EEGs. Various techniques have been developed in the field of deep learning for tackling this problem, with recurrent neural networks (RNN) approaches utilising Long short-term memory (LSTM) architectures achieving a high degree of success. This study implements a new, spiking neural network-based approach to time series classification for the purpose of …


Bimodal Emotion Classification Using Deep Learning, Ashutosh Kumar Singh Jan 2020

Bimodal Emotion Classification Using Deep Learning, Ashutosh Kumar Singh

Dissertations

Multimodal Emotion Recognition is an emerging associative field in the area of Human Computer Interaction and Sentiment Analysis. It extracts information from each modality to predict the emotions accurately. In this research, Bimodal Emotion Recognition framework is developed with the decision-level fusion of Audio and Video modality using RAVDES dataset. Designing such frameworks are computationally expensive and require more time to train the network. Thus, a relatively small dataset has been used for the scope of this research. The conducted research is inspired by the use of neural networks for emotion classification from multimodal data. The developed framework further confirmed …


Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany Jan 2020

Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany

Conference papers

Abstract. The Named Entity Recognition (NER) task has attracted significant attention in Natural Language Processing (NLP) as it can enhance the performance of many NLP applications. In this paper, we compare English NER with Arabic NER in an experimental way to investigate the impact of using different classifiers and sets of features including language-independent and language-specific features. We explore the features and classifiers on five different datasets. We compare deep neural network architectures for NER with more traditional machine learning approaches to NER. We discover that most of the techniques and features used for English NER perform well on Arabic …


Active Learning For Auditory Hierarchy, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan Jan 2020

Active Learning For Auditory Hierarchy, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan

Conference papers

Much audio content today is rendered as a static stereo mix: fundamentally a fixed single entity. Object-based audio envisages the delivery of sound content using a collection of individual sound ‘objects’ controlled by accompanying metadata. This offers potential for audio to be delivered in a dynamic manner providing enhanced audio for consumers. One example of such treatment is the concept of applying varying levels of data compression to sound objects thereby reducing the volume of data to be transmitted in limited bandwidth situations. This application motivates the ability to accurately classify objects in terms of their ‘hierarchy’. That is, whether …


Applications Of Artificial Intelligence To Cryptography, Jonathan Blackledge, Napo Mosola Jan 2020

Applications Of Artificial Intelligence To Cryptography, Jonathan Blackledge, Napo Mosola

Articles

This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI). It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) to analyze and encrypt data. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning using Deep ANNs. In this context, the paper considers: (i) the implementation of EC and ANNs for generating unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of finite binary strings for applications in Cryptanalysis. The aim of the paper is to provide an overview on …


Brexit Election: Forecasting A Conservative Party Victory Through The Pound Using Arima And Facebook's Prophet, James Usher, Pierpaolo Dondio Jan 2020

Brexit Election: Forecasting A Conservative Party Victory Through The Pound Using Arima And Facebook's Prophet, James Usher, Pierpaolo Dondio

Conference papers

On the 30th October, 2019, the markets watched as British Prime Minister, Boris Johnson, took a massive political gamble to call a general election to break the Withdrawal Agreement stalemate in the House of Commons to “Get BREXIT Done”. The pound had been politically sensitive owing to BREXIT uncertainty. With the polls indicating a Conservative win on 4thDecember, 2019, the margin of victory could be observed through increases in the pound. The outcome of a Conservative party victory would benefit the pound by removing the current market turbulence. We look to provide a short-term forecast of the pound. Our approach …


Android Compcache Based On Graphics Processing Unit, Muder Almi'ani, Abdu Razaque, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh Jan 2020

Android Compcache Based On Graphics Processing Unit, Muder Almi'ani, Abdu Razaque, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh

Conference papers

Android systems have been successfully developed to meet the demands of users. The following four methods are used in Android systems for memory management: backing swap, CompCache, traditional Linux swap, and low memory killer. These memory management methods are fully functioning.
However, Android phones cannot swap memory into solid-state drives, thus slowing the processor and reducing storage lifetime. In addition, the compression and decompression processes consume additional energy and latency. Therefore, the CompCache requires an extension. An extended Android CompCache using a graphics processing unit to compress and decompress memory pages on demand and reduce the latency is introduced in …


Synthetic Data Generation Using Wasserstein Conditional Gans With Gradient Penalty (Wcgans-Gp), Manhar Singh Walia Jan 2020

Synthetic Data Generation Using Wasserstein Conditional Gans With Gradient Penalty (Wcgans-Gp), Manhar Singh Walia

Dissertations

With data protection requirements becoming stricter, the data privacy has become increasingly important and more crucial than ever. This has led to restrictions on the availability and dissemination of real-world datasets. Synthetic data offers a viable solution to overcome barriers of data access and sharing. Existing data generation methods require a great deal of user-defined rules, manual interactions and domainspecific knowledge. Moreover, they are not able to balance the trade-off between datausability and privacy. Deep learning based methods like GANs have seen remarkable success in synthesizing images by automatically learning the complicated distributions and patterns of real data. But they …


A Discrimination Aware Model To Predict Childhood Literacy Levels, Kate Byrne Jan 2020

A Discrimination Aware Model To Predict Childhood Literacy Levels, Kate Byrne

Dissertations

It is illegal in Ireland to discriminate in the provision of education on the basis of multiple characteristics including gender, race and religion. While the increased use of machine learning models can open multiple avenues to identify early intervention strategies in education, caution must be exercised to ensure that any intervention does not discriminate with respect to a protected class. Poor literacy in childhood can have long term effects as the child ages, including on employment and mental health outcomes. Early intervention is key in mitigating this. In this dissertation, a model was created that predicted the outcome of a …


Adapting Microservices In The Cloud With Faas, Mateusz Pietraszewski Jan 2020

Adapting Microservices In The Cloud With Faas, Mateusz Pietraszewski

Dissertations

This project involves benchmarking, microservices and Function-as-a-service (FaaS) across the dimensions of performance and cost. In order to do a comparison this paper proposes a benchmark framework.


Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin Jan 2020

Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin

Conference papers

A crucial requirement for the network service provider is to satisfy the Service Level Agreements (SLA) that it has made with its customers. Coexisting network tenants may have agreed different SLAs, and thus, the service provider must be able to provide QoS differentiation in order to meet his contractual commitments. Current one-size-fits-all routing models are not appropriate for all network tenants if their individual SLA requirements are to be efficiently met. We propose a SDN-based multi-cost routing approach which allocates network resources based on a portfolio of tenant SLA, which achieves the goal of accommodating multiple tenants, given their SLAs. …


An Evaluation Of Text Representation Techniques For Fake News Detection Using: Tf-Idf, Word Embeddings, Sentence Embeddings With Linear Support Vector Machine., Sangita Sriram Jan 2020

An Evaluation Of Text Representation Techniques For Fake News Detection Using: Tf-Idf, Word Embeddings, Sentence Embeddings With Linear Support Vector Machine., Sangita Sriram

Dissertations

In a world where anybody can share their views, opinions and make it sound like these are facts about the current situation of the world, Fake News poses a huge threat especially to the reputation of people with high stature and to organizations. In the political world, this could lead to opposition parties making use of this opportunity to gain popularity in their elections. In the medical world, a fake scandalous message about a medicine giving side effects, hospital treatment gone wrong or even a false message against a practicing doctor could become a big menace to everyone involved in …


Drug Reviews: Cross-Condition And Cross-Source Analysis By Review Quantification Using Regional Cnn-Lstm Models, Ajith Mathew Thoomkuzhy Jan 2020

Drug Reviews: Cross-Condition And Cross-Source Analysis By Review Quantification Using Regional Cnn-Lstm Models, Ajith Mathew Thoomkuzhy

Dissertations

Pharmaceutical drugs are usually rated by customers or patients (i.e. in a scale from 1 to 10). Often, they also give reviews or comments on the drug and its side effects. It is desirable to quantify the reviews to help analyze drug favorability in the market, in the absence of ratings. Since these reviews are in the form of text, we should use lexical methods for the analysis. The intent of this study was two-fold: First, to understand how better the efficiency will be if CNN-LSTM models are used to predict ratings or sentiment from reviews. These models are known …


Classification Of Animal Sound Using Convolutional Neural Network, Neha Singh Jan 2020

Classification Of Animal Sound Using Convolutional Neural Network, Neha Singh

Dissertations

Recently, labeling of acoustic events has emerged as an active topic covering a wide range of applications. High-level semantic inference can be conducted based on main audioeffects to facilitate various content-based applications for analysis, efficient recovery and content management. This paper proposes a flexible Convolutional neural network-based framework for animal audio classification. The work takes inspiration from various deep neural network developed for multimedia classification recently. The model is driven by the ideology of identifying the animal sound in the audio file by forcing the network to pay attention to core audio effect present in the audio to generate Mel-spectrogram. …