Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Machine learning

Series

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 102

Full-Text Articles in Computer Engineering

Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo Mar 2024

Comparing Anova And Powershap Feature Selection Methods Via Shapley Additive Explanations Of Models Of Mental Workload Built With The Theta And Alpha Eeg Band Ratios, Bujar Raufi, Luca Longo

Articles

Background: Creating models to differentiate self-reported mental workload perceptions is challenging and requires machine learning to identify features from EEG signals. EEG band ratios quantify human activity, but limited research on mental workload assessment exists. This study evaluates the use of theta-to-alpha and alpha-to-theta EEG band ratio features to distinguish human self-reported perceptions of mental workload. Methods: In this study, EEG data from 48 participants were analyzed while engaged in resting and task-intensive activities. Multiple mental workload indices were developed using different EEG channel clusters and band ratios. ANOVA’s F-score and PowerSHAP were used to extract the statistical features. At …


Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening Dec 2023

Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever Sep 2023

Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever

Articles

Abstract: Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posing a global challenge for law enforcement. Our objective is to analyze CSAM discussions in this concealed space using a Support Vector Machine model, achieving an accuracy of 87.6%. Across eight forums, approximately 28.4% of posts contained CSAM, with victim ages most commonly reported as 12, 14, 13, and 11 years old for YouTube, Skype, Instagram, and Facebook, respectively. Additionally, in forums discussing boys, the most frequently mentioned nationalities in CSAM posts were English, German, and American, accounting for 12%, 7.8%, and 6% of …


Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali Sep 2023

Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali

Brain and Mind Institute

Objective:This study proposes to identify and validate weighted sensor stream signatures that predict near-term risk of a major depressive episode and future mood among healthcare workers in Kenya.

Approach: The study will deploy a mobile application (app) platform and use novel data science analytic approaches (Artificial Intelligence and Machine Learning) to identifying predictors of mental health disorders among 500 randomly sampled healthcare workers from five healthcare facilities in Nairobi, Kenya.

Expectation: This study will lay the basis for creating agile and scalable systems for rapid diagnostics that could inform precise interventions for mitigating depression and ensure a healthy, resilient …


Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak Jul 2023

Using Machine Learning To Assist Auditory Processing Evaluation, Hasitha Wimalarathna, Sangamanatha Veeranna, Minh Vu Duong, Chris Allan Prof, Sumit K. Agrawal, Prudence Allen, Jagath Samarabandu, Hanif M. Ladak

Electrical and Computer Engineering Publications

Introduction: Approximately 0.2–5% of school-age children complain of listening difficulties in the absence of hearing loss. These children are often referred to an audiologist for an auditory processing disorder (APD) assessment. Adequate experience and training is necessary to arrive at an accurate diagnosis due to the heterogeneity of the disorder.

Objectives: The main goal of the study was to determine if machine learning (ML) can be used to analyze data from the APD clinical test battery to accurately categorize children with suspected APD into clinical sub-groups, similar to expert labels.

Methods: The study retrospectively collected data from 134 children referred …


Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz Jun 2023

Assessment Of E-Senses Performance Through Machine Learning Models For Colombian Herbal Teas Classification, Jeniffer Katerine Carrillo, Cristhian Manuel Durán, Juan Martin Cáceres, Carlos Alberto Cuastumal, Jordana Ferreira, José Ramos, Brian Bahder, Martin Oates, Antonio Ruiz

CCE Faculty Articles

This paper describes different E-Senses systems, such as Electronic Nose, Electronic Tongue, and Electronic Eyes, which were used to build several machine learning models and assess their performance in classifying a variety of Colombian herbal tea brands such as Albahaca, Frutos Verdes, Jaibel, Toronjil, and Toute. To do this, a set of Colombian herbal tea samples were previously acquired from the instruments and processed through multivariate data analysis techniques (principal component analysis and linear discriminant analysis) to feed the support vector machine, K-nearest neighbors, decision trees, naive Bayes, and random forests algorithms. The results of the E-Senses were validated using …


Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz Jun 2023

Cometrics: A New Software Tool For Behavior‑Analytic Clinicians And Machine Learning Researchers, Walker S. Arce, Seth G. Walker, Morgan L. Hurtz

Department of Electrical and Computer Engineering: Faculty Publications

Cometrics is a Microsoft Windows compatible clinical tool for the collection and recording of frequency- and duration-based target behaviors, physiological signals, and video data. This software package is designed to record in-vivo observational and physiological data. In addition, we have included features that allow observers to capture video from real-time camera feeds and import saved video for retroactive data collection. By using Microsoft Excel-based spreadsheets, also called keystroke files, assessment and treatment sessions are exported into a single document using the click of a button. Integrated interobserver agreement metrics allow comparisons across primary and reliability observers, with the output exported …


Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce May 2023

Unobtrusive Data Collection In Clinical Settings For Advanced Patient Monitoring And Machine Learning, Walker Arce

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

When applying machine learning to clinical practice, a major hurdle that will be encountered is the lack of available data. While the data collected in clinical therapies is suitable for the types of analysis that are needed to measure and track clinical outcomes, it may not be suitable for other types of analysis. For instance, video data may have poor alignment with behavioral data, making it impossible to extract the videos frames that directly correlate with the observed behavior. Alternatively, clinicians may be exploring new data modalities, such as physiological signal collection, to research methods of improving clinical outcomes that …


Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq Feb 2023

Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq

All Works

Field-Programmable Gate Array (FPGA) is at the core of System on Chip (SoC) design across various Industry 5.0 digital systems—healthcare devices, farming equipment, autonomous vehicles and aerospace gear to name a few. Given that pre-silicon verification using Computer Aided Design (CAD) accounts for about 70% of the time and money spent on the design of modern digital systems, this paper summarizes the machine learning (ML)-oriented efforts in different FPGA CAD design steps. With the recent breakthrough of machine learning, FPGA CAD tasks—high-level synthesis (HLS), logic synthesis, placement and routing—are seeing a renewed interest in their respective decision-making steps. We focus …


Exploring Gender Bias In Semantic Representations For Occupational Classification In Nlp: Techniques And Mitigation Strategies, Joseph Michael O'Carroll Jan 2023

Exploring Gender Bias In Semantic Representations For Occupational Classification In Nlp: Techniques And Mitigation Strategies, Joseph Michael O'Carroll

Dissertations

Gender bias in Natural Language Processing (NLP) models is a non-trivial problem that can perpetuate and amplify existing societal biases. This thesis investigates gender bias in occupation classification and explores the effectiveness of different debiasing methods for language models to reduce the impact of bias in the model’s representations. The study employs a data-driven empirical methodology focusing heavily on experimentation and result investigation. The study uses five distinct semantic representations and models with varying levels of complexity to classify the occupation of individuals based on their biographies.


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


An Evaluation Of The Eeg Alpha-To-Theta And Theta-To-Alpha Band Ratios As Indexes Of Mental Workload, Bujar Raufi, Luca Longo Jan 2023

An Evaluation Of The Eeg Alpha-To-Theta And Theta-To-Alpha Band Ratios As Indexes Of Mental Workload, Bujar Raufi, Luca Longo

Articles

Many research works indicate that EEG bands, specifically the alpha and theta bands, have been potentially helpful cognitive load indicators. However, minimal research exists to validate this claim. This study aims to assess and analyze the impact of the alpha-to-theta and the theta-to-alpha band ratios on supporting the creation of models capable of discriminating self-reported perceptions of mental workload. A dataset of raw EEG data was utilized in which 48 subjects performed a resting activity and an induced task demanding exercise in the form of a multitasking SIMKAP test. Band ratios were devised from frontal and parietal electrode clusters. Building …


Probability Expressions In Ai Decision Support: Impacts On Human+Ai Team Performance, Elias Spinn Jan 2023

Probability Expressions In Ai Decision Support: Impacts On Human+Ai Team Performance, Elias Spinn

Dissertations

AI decision support systems aim to assist people in highly complex and consequential domains to make efficient, effective, and high-quality decisions. AI alone cannot be guaranteed to be correct in these complex decision tasks, and a human is often needed to ensure decision accuracy. The ambition is for these human+ AI teams to perform better together than either would individually. To realise this, decision makers must trust their AI partners appropriately, knowing when to rely on their recommendations and when to be sceptical. However, research has shown that decision makers often either mistrust and underutilise these systems, or trust them …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Enhancing Zero‑Shot Action Recognition In Videos By Combining Gans With Text And Images, Kaiqiang Huang, Luis Miralles-Pechuán, Susan Mckeever Jan 2023

Enhancing Zero‑Shot Action Recognition In Videos By Combining Gans With Text And Images, Kaiqiang Huang, Luis Miralles-Pechuán, Susan Mckeever

Articles

Zero-shot action recognition (ZSAR) tackles the problem of recognising actions that have not been seen by the model during the training phase. Various techniques have been used to achieve ZSAR in the field of human action recognition (HAR) in videos. Techniques based on generative adversarial networks (GANs) are the most promising in terms of performance. GANs are trained to generate representations of unseen videos conditioned on information related to the unseen classes, such as class label embeddings. In this paper, we present an approach based on combining information from two different GANs, both of which generate a visual representation of …


How Visual Stimuli Evoked P300 Is Transforming The Brain–Computer Interface Landscape: A Prisma Compliant Systematic Review, Jai Kalra, Prashasti Mittal, Nirmiti Mittal, Abhishek Arora, Utkarsh Tewari, Aviral Chharia, Rahul Upadhyay, Vinay Kumar, Luca Longo Jan 2023

How Visual Stimuli Evoked P300 Is Transforming The Brain–Computer Interface Landscape: A Prisma Compliant Systematic Review, Jai Kalra, Prashasti Mittal, Nirmiti Mittal, Abhishek Arora, Utkarsh Tewari, Aviral Chharia, Rahul Upadhyay, Vinay Kumar, Luca Longo

Articles

Non-invasive Visual Stimuli evoked-EEGbased P300 BCIs have gained immense attention in recent years due to their ability to help patients with disability using BCI-controlled assistive devices and applications. In addition to the medical field, P300 BCI has applications in entertainment, robotics, and education. The current article systematically reviews 147 articles that were published between 2006-2021*. Articles that pass the pre-defined criteria are included in the study. Further, classification based on their primary focus, including article orientation, participants’ age groups, tasks given, databases, the EEG devices used in the studies, classification models, and application domain, is performed. The application-based classification considers …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Comparing Poor And Favorable Outcome Prediction With Machine Learning After Mechanical Thrombectomy In Acute Ischemic Stroke, Matthias A. Mutke, Vince I. Madai, Adam Hilbert, Esra Zihni, Arne Potreck, Charlotte S. Weyland, Markus A. Mohlenbruch, Sabine Heiland, Peter A. Ringleb, Simon Nagel, Martin Beendszus, Dietmar Frey Jan 2023

Comparing Poor And Favorable Outcome Prediction With Machine Learning After Mechanical Thrombectomy In Acute Ischemic Stroke, Matthias A. Mutke, Vince I. Madai, Adam Hilbert, Esra Zihni, Arne Potreck, Charlotte S. Weyland, Markus A. Mohlenbruch, Sabine Heiland, Peter A. Ringleb, Simon Nagel, Martin Beendszus, Dietmar Frey

Articles

Outcome prediction after mechanical thrombectomy (MT) in patients with acute ischemic stroke (AIS) and large vessel occlusion (LVO) is commonly performed by focusing on favorable outcome (modified Rankin Scale, mRS 0–2) after 3 months but poor outcome representing severe disability and mortality (mRS 5 and 6) might be of equal importance for clinical decision-making.


Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio Jan 2023

Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio

Articles

Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine learning (ML) methods to identify individuals who respond well to certain linguistic styles/persuasion techniques based on Aristotle’s means of persuasion, rhetorical devices, cognitive theories and Cialdini’s principles, given their psychometric profile.


Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu Dec 2022

Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu

Computer Science Faculty Publications and Presentations

Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.


Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr. Nov 2022

Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.

Technical Collection

The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …


Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan Sep 2022

Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan

Department of Electrical and Computer Engineering: Faculty Publications

Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …


Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan Sep 2022

Sers Spectroscopy With Machine Learning To Analyze Human Plasma Derived Sevs For Coronary Artery Disease Diagnosis And Prognosis, Xi Huang, Bo Liu, Shenghan Guo, Weihong Guo, Ke Liao, Guoku Hu, Wen Shi, Mitchell Kuss, Michael J. Duryee, Daniel R. Anderson, Yongfeng Lu, Bin Duan

Department of Electrical and Computer Engineering: Faculty Publications

Coronary artery disease (CAD) is one of the major cardiovascular diseases and represents the leading causes of global mortality. Developing new diagnostic and therapeutic approaches for CAD treatment are critically needed, especially for an early accurate CAD detection and further timely intervention. In this study, we successfully isolated human plasma small extracellular vesicles (sEVs) from four stages of CAD patients, that is, healthy control, stable plaque, non-ST-elevation myocardial infarction, and ST-elevation myocardial infarction. Surface-enhanced Raman scattering (SERS) measurement in conjunction with five machine learning approaches, including Quadratic Discriminant Analysis, Support Vector Machine (SVM), K-Nearest Neighbor, Artificial Neural network, were then …


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina Jun 2022

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin May 2022

Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin

Articles

Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert Apr 2022

A Brief Literature Review For Machine Learning In Autonomous Robotic Navigation, Jake Biddy, Jeremy Evert

Student Research

Machine learning is becoming very popular in many technological aspects worldwide, including robotic applications. One of the unique aspects of using machine learning in robotics is that it no longer requires the user to program every situation. The robotic application will be able to learn and adapt from its mistakes. In most situations, robotics using machine learning is designed to fulfill a task better than a human could, and with the machine learning aspect, it can function at the highest level of efficiency and quality. However, creating a machine learning program requires extensive coding and programming knowledge that can be …


Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen Apr 2022

Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen

Engineering Faculty Articles and Research

Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …


Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia Jan 2022

Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia

Articles

T In many machine learning classification problems, datasets are usually of high dimensionality and therefore require efficient and effective methods for identifying the relative importance of their attributes, eliminating the redundant and irrelevant ones. Due to the huge size of the search space of the possible solutions, the attribute subset evaluation feature selection methods are not very suitable, so in these scenarios feature ranking methods are used. Most of the feature ranking methods described in the literature are univariate methods, which do not detect interactions between factors. In this paper, we propose two new multivariate feature ranking methods based on …