Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Electronic Theses and Dissertations
Black-box recommender system models are machine learning models that generate personalized recommendations without explaining how the recommendations were generated to the user or giving them a way to correct wrong assumptions made about them by the model. However, compared to white-box models, which are transparent and scrutable, black-box models are generally more accurate. Recent research has shown that accuracy alone is not sufficient for user satisfaction. One such black-box model is Matrix Factorization, a State of the Art recommendation technique that is widely used due to its ability to deal with sparse data sets and to produce accurate recommendations. Recent …
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Electronic Theses and Dissertations
White blood cells play important rule in the human body immunity and any change in their count may cause serious diseases. In this study, a system is introduced for white blood cells localization and classification. The dataset used in this study is formed by two components, the first is the annotation dataset that will be used in the localization (364 images), and the second is labeled classes that will be used in the classification (12,444 images). For the localization, two approaches will be discussed, a classical approach and a deep learning based approach. For the classification, 5 different deep learning …
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Electronic Theses and Dissertations
Machine learning, data mining, and deep learning has become the methodology of choice for analyzing medical data and images. In this study, we implemented three different machine learning techniques to medical data and image analysis. Our first study was to implement different log base entropy for a decision tree algorithm. Our results suggested that using a higher log base for the dataset with mostly categorical attributes with three or more categories for each attribute can obtain a higher accuracy. For the second study, we analyzed mental health data tuning the parameters of the decision tree (splitting method, depth and entropy). …
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
Electronic Theses and Dissertations
Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less …
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Electronic Theses and Dissertations
Nowadays, algorithmic systems for making decisions are widely used to facilitate decisions in a variety of fields such as medicine, banking, applying for universities or network security. However, many machine learning algorithms are well-known for their complex mathematical internal workings which turn them into black boxes and makes their decision-making process usually difficult to understand even for experts. In this thesis, we try to develop a methodology to explain why a certain exceptional machine learned decision was made incorrectly by using the interpretability of the decision tree classifier. Our approach can provide insights about potential flaws in feature definition or …
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Electronic Theses and Dissertations
The high pace of nowadays industrial evolution is creating an urgent need to design new cost efficient materials that can satisfy both current and future demands. However, with the increase of structural and functional complexity of materials, the ability to rationally design new materials with a precise set of properties has become increasingly challenging. This basic observation has triggered the idea of applying machine learning techniques in the field, which was further encouraged by the launch of the Materials Genome Initiative (MGI) by the US government since 2011. In this work, we present a novel approach to apply machine learning …
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Electronic Theses and Dissertations
Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.