Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Computer Engineering

Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek Dec 2019

Pixel-Level Deep Multi-Dimensional Embeddings For Homogeneous Multiple Object Tracking, Mateusz Mittek

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The goal of Multiple Object Tracking (MOT) is to locate multiple objects and keep track of their individual identities and trajectories given a sequence of (video) frames. A popular approach to MOT is tracking by detection consisting of two processing components: detection (identification of objects of interest in individual frames) and data association (connecting data from multiple frames). This work addresses the detection component by introducing a method based on semantic instance segmentation, i.e., assigning labels to all visible pixels such that they are unique among different instances. Modern tracking methods often built around Convolutional Neural Networks (CNNs) and additional, …


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu Aug 2019

Analyzing Evolution Of Rare Events Through Social Media Data, Xiaoyu Lu

Dissertations

Recently, some researchers have attempted to find a relationship between the evolution of rare events and temporal-spatial patterns of social media activities. Their studies verify that the relationship exists in both time and spatial domains. However, few of those studies can accurately deduce a time point when social media activities are most highly affected by a rare event because producing an accurate temporal pattern of social media during the evolution of a rare event is very difficult. This work expands the current studies along three directions. Firstly, we focus on the intensity of information volume and propose an innovative clustering …


A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney Jun 2019

A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney

FIU Electronic Theses and Dissertations

Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott Jun 2019

Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott

Computer Science and Software Engineering

Solar energy causes a strain on the electrical grid because of the uncontrollable nature of the factors that affect power generation. Utilities are often required to balance solar generation facilities to meet consumer demand, which often includes the costly process of activating/deactivating a fossil fuel facility. Therefore, there is considerable interest in increasing the accuracy and the granularity of solar power generation predictions in order to reduce the cost of grid management. This project aims to evaluate how sky imaging technology may contribute to the accuracy of those predictions.


Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez Feb 2019

Clinical Research In Pneumonia: Role Of Artificial Intelligence, Timothy L. Wiemken, Robert R. Kelley, William A. Mattingly, Julio A. Ramirez

The University of Louisville Journal of Respiratory Infections

No abstract provided.


Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang Jan 2019

Novel Applications Of Machine Learning In Bioinformatics, Yi Zhang

Theses and Dissertations--Computer Science

Technological advances in next-generation sequencing and biomedical imaging have led to a rapid increase in biomedical data dimension and acquisition rate, which is challenging the conventional data analysis strategies. Modern machine learning techniques promise to leverage large data sets for finding hidden patterns within them, and for making accurate predictions. This dissertation aims to design novel machine learning-based models to transform biomedical big data into valuable biological insights. The research presented in this dissertation focuses on three bioinformatics domains: splice junction classification, gene regulatory network reconstruction, and lesion detection in mammograms.

A critical step in defining gene structures and mRNA …


Identifying Key Topics Bearing Negative Sentiment On Twitter: Insights Concerning The 2015-2016 Zika Epidemic, Ravali Mamidi, Michele Miller, Tanvi Banerjee, William Romine, Amit Sheth Jan 2019

Identifying Key Topics Bearing Negative Sentiment On Twitter: Insights Concerning The 2015-2016 Zika Epidemic, Ravali Mamidi, Michele Miller, Tanvi Banerjee, William Romine, Amit Sheth

Publications

Background To understand the public sentiment regarding the Zika virus, social media can be leveraged to understand how positive, negative, and neutral sentiments are expressed in society. Specifically, understanding the characteristics of negative sentiment could help inform federal disease control agencies’ efforts to disseminate relevant information to the public about Zika-related issues.

Objective The purpose of this study was to analyze the public sentiment concerning Zika using posts on Twitter and determine the qualitative characteristics of positive, negative, and neutral sentiments expressed.

Methods Machine learning techniques and algorithms were used to analyze the sentiment of tweets concerning Zika. A supervised …


Predicting Cascading Failures In Power Grids Using Machine Learning Algorithms, Rezoan Ahmed Shuvro, Pankaz Das, Majeed M. Hayat, Mitun Talukder Jan 2019

Predicting Cascading Failures In Power Grids Using Machine Learning Algorithms, Rezoan Ahmed Shuvro, Pankaz Das, Majeed M. Hayat, Mitun Talukder

Electrical and Computer Engineering Faculty Research and Publications

Although there has been notable progress in modeling cascading failures in power grids, few works included using machine learning algorithms. In this paper, cascading failures that lead to massive blackouts in power grids are predicted and classified into no, small, and large cascades using machine learning algorithms. Cascading-failure data is generated using a cascading failure simulator framework developed earlier. The data set includes the power grid operating parameters such as loading level, level of load shedding, the capacity of the failed lines, and the topological parameters such as edge betweenness centrality and the average shortest distance for numerous combinations of …


Communications Using Deep Learning Techniques, Priti Gopal Pachpande Jan 2019

Communications Using Deep Learning Techniques, Priti Gopal Pachpande

Legacy Theses & Dissertations (2009 - 2024)

Deep learning (DL) techniques have the potential of making communication systems


Improving Anomaly Detection In Bgp Time-Series Data By New Guide Features And Moderated Feature Selection Algorithm, Mahmoud Hashem, Ahmed Bashandy, Samir Shaheen Jan 2019

Improving Anomaly Detection In Bgp Time-Series Data By New Guide Features And Moderated Feature Selection Algorithm, Mahmoud Hashem, Ahmed Bashandy, Samir Shaheen

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet infrastructure relies on the Border Gateway Protocol (BGP) to provide essential routing information where abnormal routing behavior impairs global Internet connectivity and stability. Hence, employing anomaly detection algorithms is important for improving the performance of BGP routing protocol. In this paper, we propose two algorithms; the first is the guide feature generator (GFG), which generates guide features from traditional features in BGP time-series data using moving regression in combination with smoothed moving average. The second is a modified random forest feature selection algorithm which is employed to automatically select the most dominant features (ASMDF). Our mechanism shows that …


Dop: Discover Objects And Paths, A Model For Automated Navigation Andselection In Virtual Environments, Muhammad Raees, Sehat Ullah Jan 2019

Dop: Discover Objects And Paths, A Model For Automated Navigation Andselection In Virtual Environments, Muhammad Raees, Sehat Ullah

Turkish Journal of Electrical Engineering and Computer Sciences

Navigation and selection are the two interaction tasks often needed for the manipulation of an object in a synthetic world. An interface that supports automatic navigation and selection may increase the realism of a virtual reality (VR) system. Such an engrossing interface of a VR system is possible by incorporating machine learning (ML) into the realm of the virtual environment (VE). The use of intelligence in VR systems, however, is a milestone yet to be achieved to make seamless realism in a VE possible. To improve the believability of an intelligent virtual agent (IVA), this research work presents DOP (Discover …


An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N Jan 2019

An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N

Turkish Journal of Electrical Engineering and Computer Sciences

Researchers train and build specific models to classify the presence and absence of a disease and the accuracy of such classification models is continuously improved. The process of building a model and training depends on the medical data utilized. Various machine learning techniques and tools are used to handle different data with respect to disease types and their clinical conditions. Classification is the most widely used technique to classify disease and the accuracy of the classifier largely depends on the attributes. The choice of the attribute largely affects the diagnosis and performance of the classifier. Due to growing large volumes …


Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq Jan 2019

Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq

Turkish Journal of Electrical Engineering and Computer Sciences

It is a knotty task to amicably identify the sporadically changing real-world context information of a learner during M-learning processes. Contextual information varies greatly during the learning process. Contextual information that affects the learner during a learning process includes background knowledge, learning time, learning location, and environmental situation. The computer programming skills of learners improve rapidly if they are encouraged to solve real-world programming problems. It is important to guide learners based on their contextual information in order to maximize their learning performance. In this paper, we proposed a cloud-supported machine learning system (CSMLS), which assists learners in learning practical …


Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ Jan 2019

Towards Wearable Blood Pressure Measurement Systems From Biosignals: A Review, Ümi̇t Şentürk, Kemal Polat, İbrahi̇m Yücedağ

Turkish Journal of Electrical Engineering and Computer Sciences

Blood pressure is the pressure by the blood to the vein wall. High blood pressure, which is called silent death, is the cause of nearly 13 % of mortality all over the world. Blood pressure is not only measured in the medical environment, but the blood pressure measurement is also a need for people in their daily life. Blood pressure estimation systems with low error rates have been developed besides the new technologies and algorithms. Blood pressure measurements are differentiated as invasive blood pressure (IBP) measurement and noninvasive blood pressure (NIBP) measurement methods. Although IBP measurement provides the most accurate …


A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan Jan 2019

A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan

Turkish Journal of Electrical Engineering and Computer Sciences

The most critical challenge of web attack forensic investigations is the sheer amount of data and level of complexity. Machine learning technology might be an efficient solution for web attack analysis and investigation. Consequently, machine learning applications have been applied in various areas of information security and digital forensics, and have improved over time. Moreover, feature selection is a crucial step in machine learning; in fact, selecting an optimal feature subset could enhance the accuracy and performance of the predictive model. To date, there has not been an adequate approach to select optimal features for the evidence of web attack. …


Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray Jan 2019

Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things increases information volume in computer networks and the concept of fog will help us to control this volume more efficiently. Scheduling resources in such an environment would be an NP-Hard problem. This article has studied the concept of scheduling in fog with Bayesian classification which could be applied to gain the task requirements like the processing ones. After classification, virtual machines will be created in accordance with the predicted requirements. The ifogsim simulator has been applied to study our fog-based Bayesian classification scheduling (FBCS) method performance in an EEG tractor application. Algorithms have been evaluated on …


Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman Jan 2019

Heart Attack Mortality Prediction: An Application Of Machine Learning Methods, Issam Salman

Turkish Journal of Electrical Engineering and Computer Sciences

The heart is an important organ in the human body, and acute myocardial infarction (AMI) is the leading cause of death in most countries. Researchers are doing a lot of data analysis work to assist doctors in predicting the heart problem. An analysis of the data related to different health problems and its functions can help in predicting the wellness of this organ with a degree of certainty. Our research reported in this paper consists of two main parts. In the first part of the paper, we compare different predictive models of hospital mortality for patients with AMI. All results …


Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever Jan 2019

Identifying Criminal Organizations From Their Social Network Structures, Muhammet Serkan Çi̇nar, Burkay Genç, Hayri̇ Sever

Turkish Journal of Electrical Engineering and Computer Sciences

Identification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. We evaluate the effectiveness of three different methods for classifying an unknown network as terrorist, cocaine, or noncriminal. We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. The empirical results show that these three methods can provide significant improvements in distinguishing all three network types. We show that these …


Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli Jan 2019

Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli

Turkish Journal of Electrical Engineering and Computer Sciences

Software development effort estimation is a critical activity of the project management process. In this study, machine learning algorithms were investigated in conjunction with feature transformation, feature selection, and parameter tuning techniques to estimate the development effort accurately and a new model was proposed as part of an expert system. We preferred the most general-purpose algorithms, applied parameter optimization technique (GridSearch), feature transformation techniques (binning and one-hot-encoding), and feature selection algorithm (principal component analysis). All the models were trained on the ISBSG datasets and implemented by using the scikit-learn package in the Python language. The proposed model uses a multilayer …