Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Other Computer Engineering (8)
- Biomedical Engineering and Bioengineering (3)
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Artificial Intelligence and Robotics (1)
-
- Bioelectrical and Neuroengineering (1)
- Biomedical Devices and Instrumentation (1)
- Chemical Engineering (1)
- Databases and Information Systems (1)
- Education (1)
- Electrical and Computer Engineering (1)
- Electrical and Electronics (1)
- Engineering Science and Materials (1)
- Information Security (1)
- Materials Science and Engineering (1)
- Molecular, Cellular, and Tissue Engineering (1)
- Other Chemical Engineering (1)
- Other Computer Sciences (1)
- Other Engineering Science and Materials (1)
- Other Materials Science and Engineering (1)
- Robotics (1)
- Signal Processing (1)
- Special Education and Teaching (1)
Articles 1 - 17 of 17
Full-Text Articles in Computer Engineering
Metabolomic Differentiation Of Tumor Core And Edge In Glioma., Mary E. Baxter
Metabolomic Differentiation Of Tumor Core And Edge In Glioma., Mary E. Baxter
Electronic Theses and Dissertations
Glioma is one of the most aggressive forms of brain cancer. It has been shown that the microenvironments differ significantly between the core and edge regions of glioma tumors. This study obtained metabolomic profiles of glioma core and edge regions using paired glioma core and edge tissue samples from 27 human patients. Data was acquired by performing liquid-liquid metabolite extraction and 2DLC-MS/MS on the tissue samples. In addition, a boosted generalized linear machine learning model was employed to predict the metabolomic profiles associated with O-6-methylguanine-DNA methyltransferase (MGMT) promoter methylation.
A panel of 66 metabolites was found to be statistically significant …
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed
Electronic Theses and Dissertations
Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Multi-Style Explainable Matrix Factorization Techniques For Recommender Systems., Olurotimi Nugbepo Seton
Electronic Theses and Dissertations
Black-box recommender system models are machine learning models that generate personalized recommendations without explaining how the recommendations were generated to the user or giving them a way to correct wrong assumptions made about them by the model. However, compared to white-box models, which are transparent and scrutable, black-box models are generally more accurate. Recent research has shown that accuracy alone is not sufficient for user satisfaction. One such black-box model is Matrix Factorization, a State of the Art recommendation technique that is widely used due to its ability to deal with sparse data sets and to produce accurate recommendations. Recent …
Machine Learning Approaches For Lung Cancer Diagnosis., Ahmed Mahmoud Ahmed Shaffie
Machine Learning Approaches For Lung Cancer Diagnosis., Ahmed Mahmoud Ahmed Shaffie
Electronic Theses and Dissertations
The enormity of changes and development in the field of medical imaging technology is hard to fathom, as it does not just represent the technique and process of constructing visual representations of the body from inside for medical analysis and to reveal the internal structure of different organs under the skin, but also it provides a noninvasive way for diagnosis of various disease and suggest an efficient ways to treat them. While data surrounding all of our lives are stored and collected to be ready for analysis by data scientists, medical images are considered a rich source that could provide …
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Computational Techniques In Medical Image Analysis Application For White Blood Cells Classification., Omar Dekhil
Electronic Theses and Dissertations
White blood cells play important rule in the human body immunity and any change in their count may cause serious diseases. In this study, a system is introduced for white blood cells localization and classification. The dataset used in this study is formed by two components, the first is the annotation dataset that will be used in the localization (364 images), and the second is labeled classes that will be used in the classification (12,444 images). For the localization, two approaches will be discussed, a classical approach and a deep learning based approach. For the classification, 5 different deep learning …
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
An Explainable Recommender System Based On Semantically-Aware Matrix Factorization., Mohammed Sanad Alshammari
Electronic Theses and Dissertations
Collaborative Filtering techniques provide the ability to handle big and sparse data to predict the ratings for unseen items with high accuracy. Matrix factorization is an accurate collaborative filtering method used to predict user preferences. However, it is a black box system that recommends items to users without being able to explain why. This is due to the type of information these systems use to build models. Although rich in information, user ratings do not adequately satisfy the need for explanation in certain domains. White box systems, in contrast, can, by nature, easily generate explanations. However, their predictions are less …
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab
Electronic Theses and Dissertations
The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …
A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik
A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik
Electronic Theses and Dissertations
In this thesis, we propose a framework to detect and retrieve CPR activity scenes from medical simulation videos. Medical simulation is a modern training method for medical students, where an emergency patient condition is simulated on human-like mannequins and the students act upon. These simulation sessions are recorded by the physician, for later debriefing. With the increasing number of simulation videos, automatic detection and retrieval of specific scenes became necessary. The proposed framework for CPR scene retrieval, would eliminate the conventional approach of using shot detection and frame segmentation techniques. Firstly, our work explores the application of Histogram of Oriented …
Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum
Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum
Electronic Theses and Dissertations
This thesis presents an applied horse racing prediction using graph based features on a set of horse races data. We used artificial neural network and logistic regression models to train then test to prediction without graph based features and with graph based features. This thesis can be explained in 4 main parts. Collect data from a horse racing website held from 2015 to 2017. Train data to using predictive models and make a prediction. Create a global directed graph of horses and extract graph-based features (Core Part) . Add graph based features to basic features and train to using same …
End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane
End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane
Electronic Theses and Dissertations
Over the past two decades, a circular form of RNA (circular RNA) produced from splicing mechanism has become the focus of scientific studies due to its major role as a microRNA (miR) ac tivity modulator and its association with various diseases including cancer. Therefore, the detection of circular RNAs is a vital operation for continued comprehension of their biogenesis and purpose. Prediction of circular RNA can be achieved by first distinguishing non-coding RNAs from protein coding gene transcripts, separating short and long non-coding RNAs (lncRNAs), and finally pre dicting circular RNAs from other lncRNAs. However, available tools to distinguish circular …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Uncovering Exceptional Predictions Using Exploratory Analysis Of Second Stage Machine Learning., Aneseh Alvanpour
Electronic Theses and Dissertations
Nowadays, algorithmic systems for making decisions are widely used to facilitate decisions in a variety of fields such as medicine, banking, applying for universities or network security. However, many machine learning algorithms are well-known for their complex mathematical internal workings which turn them into black boxes and makes their decision-making process usually difficult to understand even for experts. In this thesis, we try to develop a methodology to explain why a certain exceptional machine learned decision was made incorrectly by using the interpretability of the decision tree classifier. Our approach can provide insights about potential flaws in feature definition or …
Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani
Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani
Electronic Theses and Dissertations
This study analyzed fMRI responses to fear and anxiety using a Multi Variate Pattern Analysis (MVPA) approach. Compared to conventional univariate methods which only represent regions of activation, MVPA provides us with more detailed patterns of voxels. We successfully found different patterns for fear and anxiety through separate classification attempts in each subject’s representational space. Further, we transformed all the individual models into a standard space to do group analysis. Results showed that subjects share a more common fear response. Also, the amygdala and hippocampus areas are more important for differentiating fear than anxiety.
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Data Driven Discovery Of Materials Properties., Fadoua Khmaissia
Electronic Theses and Dissertations
The high pace of nowadays industrial evolution is creating an urgent need to design new cost efficient materials that can satisfy both current and future demands. However, with the increase of structural and functional complexity of materials, the ability to rationally design new materials with a precise set of properties has become increasingly challenging. This basic observation has triggered the idea of applying machine learning techniques in the field, which was further encouraged by the launch of the Materials Genome Initiative (MGI) by the US government since 2011. In this work, we present a novel approach to apply machine learning …
Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi
Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi
Electronic Theses and Dissertations
Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by ongoing problems in social interaction and communication, and engagement in repetitive behaviors. According to Centers for Disease Control and Prevention, an estimated 1 in 68 children in the United States has ASD. Mounting evidence shows that many of these individuals display an interest in social interaction with computers and robots and, in general, feel comfortable spending time in such environments. It is known that the subtlety and unpredictability of people’s social behavior are intimidating and confusing for many individuals with ASD. Computerized learning environments and robots, however, prepare a predictable, …
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Electronic Theses and Dissertations
The current trends in technology suggest that the next generation of services and devices allows smarter customization and automatic context recognition. Computers learn the behavior of the users and can offer them customized services depending on the context, location, and preferences. One of the most important challenges in human-machine interaction is the proper understanding of human emotions by machines and automated systems. In the recent years, the progress made in machine learning and pattern recognition led to the development of algorithms that are able to learn the detection and identification of human emotions from experience. These algorithms use different modalities …
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Electronic Theses and Dissertations
Bots are malicious, automated computer programs that execute malicious scripts and predefined functions on an affected computer. They pose cybersecurity threats and are one of the most sophisticated and common types of cybercrime tools today. They spread viruses, generate spam, steal personal sensitive information, rig online polls and commit other types of online crime and fraud. They sneak into unprotected systems through the Internet by seeking vulnerable entry points. They access the system’s resources like a human user does. Now the question arises how do we counter this? How do we prevent bots and on the other hand allow human …