Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Louisville (8)
- Louisiana State University (3)
- Clemson University (2)
- Georgia Southern University (2)
- Western University (2)
-
- American University in Cairo (1)
- Bucknell University (1)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Embry-Riddle Aeronautical University (1)
- James Madison University (1)
- Kennesaw State University (1)
- Louisiana Tech University (1)
- Mississippi State University (1)
- Rochester Institute of Technology (1)
- San Jose State University (1)
- The University of Southern Mississippi (1)
- Union College (1)
- University of New Mexico (1)
- University of Tennessee, Knoxville (1)
- University of the Pacific (1)
- West Virginia University (1)
- Publication Year
- Publication
-
- Electronic Theses and Dissertations (10)
- LSU Doctoral Dissertations (3)
- Doctoral Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Honors Theses (2)
-
- Theses and Dissertations (2)
- All Dissertations (1)
- All Theses (1)
- CMC Senior Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical and Computer Engineering ETDs (1)
- Electronic Theses, Projects, and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Master of Science in Computer Science Theses (1)
- Master's Projects (1)
- Master's Theses (1)
- Masters Theses, 2020-current (1)
- Theses (1)
- University of the Pacific Theses and Dissertations (1)
Articles 1 - 30 of 35
Full-Text Articles in Computer Engineering
Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby
Detection Of Myofascial Trigger Points With Ultrasound Imaging And Machine Learning, Benjamin Formby
All Theses
Myofascial Pain Syndrome (MPS) is a common chronic muscle pain disorder that affects a large portion of the global population, seen in 85-93% of patients in specialty pain clinics [10]. MPS is characterized by hard, palpable nodules caused by a stiffened taut band of muscle fibers. These nodules are referred to as Myofascial Trigger Points (MTrPs) and can be classified by two states: active MTrPs (A-MTrPs) and latent MtrPs (L-MTrPs). Treatment for MPS involves massage therapy, acupuncture, and injections or painkillers. Given the subjectivity of patient pain quantification, MPS can often lead to mistreatment or drug misuse. A deterministic way …
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
User Profiling Through Zero-Permission Sensors And Machine Learning, Ahmed Elhussiny
Theses and Dissertations
With the rise of mobile and pervasive computing, users are often ingesting content on the go. Services are constantly competing for attention in a very crowded field. It is only logical that users would allot their attention to the services that are most likely to adapt to their needs and interests. This matter becomes trivial when users create accounts and explicitly inform the services of their demographics and interests. Unfortunately, due to privacy and security concerns, and due to the fast nature of computing today, users see the registration process as an unnecessary hurdle to bypass, effectively refusing to provide …
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Master of Science in Computer Science Theses
The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …
Predicting Suicide Risk Among Youths Using Machine Learning Methods, Saswati Bhattacharjee
Predicting Suicide Risk Among Youths Using Machine Learning Methods, Saswati Bhattacharjee
Master's Theses
Suicide is the second leading cause of death among youths in the USA. Although machine learning approaches have provided great potential for predicting suicide risk using survey data, prediction accuracy may not meet the need for clinical diagnosis due to the intrinsic characteristics of datasets. In this study, I perform a comparative study of six classification algorithms including naïve Bayes (NB), logistic regression (LR), multilayer perceptron (MLP), AdaBoost (Ada), random forest (RF), and bagging using YRBSS dataset and investigate the effectiveness of several data handling techniques to improve the overall performance of suicide risk prediction.
The dataset consists of 76 …
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Analyzing The Impact Of Automation On Employment In Different Us Regions: A Data-Driven Approach, Thejaas Balasubramanian
Electronic Theses, Projects, and Dissertations
Automation is transforming the US workforce with the increasing prevalence of technologies like robotics, artificial intelligence, and machine learning. As a result, it is essential to understand how this shift will impact the labor market and prepare for its effects. This culminating experience project aimed to examine the influence of computerization on jobs in the United States and answer the following research questions: Q1. What factors affect how likely different jobs will be automated? Q2. What are the possible effects of automation on the US workforce across states and industries? Q3. What are the meaningful predictors of the likelihood of …
Machine-Learning Approaches For Developing An Autograder For High School-Level Cs-For-All Initiatives, Sirazum Munira Tisha
Machine-Learning Approaches For Developing An Autograder For High School-Level Cs-For-All Initiatives, Sirazum Munira Tisha
LSU Doctoral Dissertations
Most existing autograders used for grading programming assignments are based on unit testing, which is tedious to implement for programs with graphical output and does not allow testing for other code aspects, such as programming style or structure. We present a novel autograding approach based on machine learning that can successfully check the quality of coding assignments from a high school-level CS-for-all computational thinking course. For evaluating our autograder, we graded 2,675 samples from five different assignments from the past three years, including open-ended problems from different units of the course curriculum. Our autograder uses features based on lexical analysis …
Estimating Air Pollution Levels Using Machine Learning, Srujay Rao Devaraneni
Estimating Air Pollution Levels Using Machine Learning, Srujay Rao Devaraneni
Master's Projects
Air pollution has emerged as a substantial concern, especially in developing countries worldwide. An important aspect of this issue is the presence of PM2.5. Air pollutants with a diameter of 2.5 or less micrometers are known as PM2.5. Due to their size, these particles are a serious health risk and can quickly infiltrate the lungs, leading to a variety of health problems. Due to growing concerns about air pollution, technology like automatic air quality measurement can offer beneficial assistance for both personal and business decisions. This research suggests an ensemble machine learning model that can efficiently replace the standard air …
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Doctoral Dissertations and Master's Theses
Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Deception Detection Across Domains, Languages And Modalities, Subhadarshi Panda
Dissertations, Theses, and Capstone Projects
With the increase of deception and misinformation especially in social media, it has become crucial to develop machine learning methods to automatically identify deception. In this dissertation, we identify key challenges underlying text-based deception detection in a cross-domain setting, where we do not have training data in the target domain. We analyze the differences between domains and as a result develop methods to improve cross-domain deception detection. We additionally develop approaches that take advantage of cross-lingual properties to support deception detection across languages. This involves the usage of either multilingual NLP models or translation models. Finally, to better understand multi-modal …
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan
All Dissertations
Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a project. A single contract package, especially of a design-build (DB) project, comprises hundreds of documents including thousands of requirements. Precise comprehension and management of the requirements are critical to ensure that all important explicit and implicit requirements of the project scope are captured, managed, and completed. Since requirements are mainly written in a natural human language, the current manual methods impose a significant burden on practitioners to process and restructure them into …
Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan
Machine Learning Assisted Discovery Of Shape Memory Polymers And Their Thermomechanical Modeling, Cheng Yan
LSU Doctoral Dissertations
As a new class of smart materials, shape memory polymer (SMP) is gaining great attention in both academia and industry. One challenge is that the chemical space is huge, while the human intelligence is limited, so that discovery of new SMPs becomes more and more difficult. In this dissertation, by adopting a series of machine learning (ML) methods, two frameworks are established for discovering new thermoset shape memory polymers (TSMPs). Specifically, one of them is performed by a combination of four methods, i.e., the most recently proposed linear notation BigSMILES, supplementing existing dataset by reasonable approximation, a mixed dimension (1D …
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Detecting Malware In Memory With Memory Object Relationships, Demarcus M. Thomas Sr.
Theses and Dissertations
Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system.
This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system …
Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel
Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel
Masters Theses, 2020-current
The world is continually demanding more effective and intelligent solutions and strategies to combat adversary groups across the cyber defense landscape. Cyber Threat Intelligence (CTI) is a field within the domain of cyber security that allows for organizations to utilize threat intelligence and serves as a tool for organizations to proactively harden their defense posture. However, there is a large volume of CTI and it is often a daunting task for organizations to effectively consume, utilize, and apply it to their defense strategies. In this thesis we develop a machine learning solution, named RedAI, to investigate whether open-source intelligence (OSINT) …
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Electronic Theses and Dissertations
Black-box recommender system models are machine learning models that generate personalized recommendations without explaining how the recommendations were generated to the user or giving them a way to correct wrong assumptions made about them by the model. However, compared to white-box models, which are transparent and scrutable, black-box models are generally more accurate. Recent research has shown that accuracy alone is not sufficient for user satisfaction. One such black-box model is Matrix Factorization, a State of the Art recommendation technique that is widely used due to its ability to deal with sparse data sets and to produce accurate recommendations. Recent …
Determination Of Hydrogel Degradation By Passive Mechanical Testing, Avery Rosh-Gorsky
Determination Of Hydrogel Degradation By Passive Mechanical Testing, Avery Rosh-Gorsky
Honors Theses
This paper details a new technique to measure the mechanical properties of ETTMP PEGDA hydrogels using Hertz Contact Theory and simultaneously analyze both the model drug release and gel erosion in situ. This method involves curing a drug loaded hydrogel in a standard cuvette and placing a glass bead and phosphate buffer solution (PBS). Over time, the cross-linked network of the hydrogel breaks down, and, as a result, the ball sinks into the hydrogel. This method provides a macroscopic and inexpensive way to continuously and passively measure properties of the hydrogel as the hydrogel degrades. By plotting both the …
Iot Malicious Traffic Classification Using Machine Learning, Michael Austin
Iot Malicious Traffic Classification Using Machine Learning, Michael Austin
Graduate Theses, Dissertations, and Problem Reports
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Things (IoT) devices have become more recent targets. Lightbulbs, outdoor cameras, watches, and many other small items are connected to WiFi and each other; and few have well-developed security or hardening. Research on botnets typically leverages honeypots, PCAPs, and network traffic analysis tools to develop detection models. The research questions addressed in this Problem Report are: (1) What machine learning algorithm performs the best in a binary classification task for a representative dataset of malicious and benign IoT traffic; and (2) What features have the most …
Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene
Machine Learning Prediction Of Shear Capacity Of Steel Fiber Reinforced Concrete, Wassim Ben Chaabene
Electronic Thesis and Dissertation Repository
The use of steel fibers for concrete reinforcement has been growing in recent years owing to the improved shear strength and post-cracking toughness imparted by fiber inclusion. Yet, there is still lack of design provisions for steel fiber-reinforced concrete (SFRC) in building codes. This is mainly due to the complex shear transfer mechanism in SFRC. Existing empirical equations for SFRC shear strength have been developed with relatively limited data examples, making their accuracy restricted to specific ranges. To overcome this drawback, the present study suggests novel machine learning models based on artificial neural network (ANN) and genetic programming (GP) to …
Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson
Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson
Honors Theses
The purpose of this project was to implement a human facial emotion recognition system in a real-time, mobile setting. There are many aspects of daily life that can be improved with a system like this, like security, technology and safety.
There were three main design requirements for this project. The first was to get an accuracy rate of 70%, which must remain consistent for people with various distinguishing facial features. The second goal was to have one execution of the system take no longer than half of a second to keep it as close to real time as possible. Lastly, …
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Electronic Theses and Dissertations
White blood cells play important rule in the human body immunity and any change in their count may cause serious diseases. In this study, a system is introduced for white blood cells localization and classification. The dataset used in this study is formed by two components, the first is the annotation dataset that will be used in the localization (364 images), and the second is labeled classes that will be used in the classification (12,444 images). For the localization, two approaches will be discussed, a classical approach and a deep learning based approach. For the classification, 5 different deep learning …
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
University of the Pacific Theses and Dissertations
The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis …
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman
Electronic Theses and Dissertations
Machine learning, data mining, and deep learning has become the methodology of choice for analyzing medical data and images. In this study, we implemented three different machine learning techniques to medical data and image analysis. Our first study was to implement different log base entropy for a decision tree algorithm. Our results suggested that using a higher log base for the dataset with mostly categorical attributes with three or more categories for each attribute can obtain a higher accuracy. For the second study, we analyzed mental health data tuning the parameters of the decision tree (splitting method, depth and entropy). …
Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling
Using Uncertainty To Interpret Supervised Machine Learning Predictions, Michael C. Darling
Electrical and Computer Engineering ETDs
Traditionally, machine learning models are assessed using methods that estimate an average performance against samples drawn from a particular distribution. Examples include the use of cross-validation or hold0out to estimate classification error, F-score, precision, and recall.
While these measures provide valuable information, they do not tell us a model's certainty relative to particular regions of the input space. Typically there are regions where the model can differentiate the classes with certainty, and regions where the model is much less certain about its predictions.
In this dissertation we explore numerous approaches for quantifying uncertainty in the individual predictions made by supervised …
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
Electronic Theses and Dissertations
Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less …
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Electronic Thesis and Dissertation Repository
The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan
Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan
CMC Senior Theses
Sentiment analysis has taken on various machine learning approaches in order to optimize accuracy, precision, and recall. However, Long Short-Term Memory (LSTM) Recurrent Neural Networks (RNNs) account for the context of a sentence by using previous predictions as additional input for future sentence predictions. Our approach focused on developing an LSTM RNN that could perform binary sentiment analysis for positively and negatively labeled sentences. In collaboration with Mariam Salloum, I developed a collection of programs to classify individual sentences as either positive or negative. This paper additionally looks into machine learning, neural networks, data preprocessing, implementation, and resulting comparisons.
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
LSU Doctoral Dissertations
The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't guarantee …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Electronic Theses and Dissertations
The high pace of nowadays industrial evolution is creating an urgent need to design new cost efficient materials that can satisfy both current and future demands. However, with the increase of structural and functional complexity of materials, the ability to rationally design new materials with a precise set of properties has become increasingly challenging. This basic observation has triggered the idea of applying machine learning techniques in the field, which was further encouraged by the launch of the Materials Genome Initiative (MGI) by the US government since 2011. In this work, we present a novel approach to apply machine learning …