Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Technological University Dublin

Series

2021

Discipline
Keyword
Publication

Articles 1 - 30 of 36

Full-Text Articles in Computer Engineering

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee Nov 2021

Real-Time Bidding Campaigns Optimization Using User Profile Settings, Luis Miralles-Pechuán, Muhammad Atif Qureshi, Brian Mac Namee

Articles

Real-time bidding is nowadays one of the most promising systems in the online advertising ecosystem. In this study, the performance of RTB campaigns is improved by optimising the parameters of the users' profiles and the publishers' websites. Most studies concerning optimising RTB campaigns are focused on the bidding strategy, i.e., estimating the best value for each bid. However, this research focuses on optimising RTB campaigns by finding out configurations that maximise both the number of impressions and the average profitability of the visits. An online campaign configuration generally consists of a set of parameters along with their values such as …


Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross Nov 2021

Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert J. Ross

Conference papers

One of the key ideas of Cognitive Behavioural Therapy (CBT) is the ability to convert negative or distorted thoughts into more realistic alternatives. Although modern machine learning techniques can be successfully applied to a variety of Natural Language Processing tasks, including Cognitive Behavioural Therapy, the lack of a publicly available dataset makes supervised training difficult for tasks such as reforming distorted thoughts. In this research, we constructed a small CBT dataset via crowd-sourcing, and leveraged state of the art pre-trained architectures to transform cognitive distortions, producing text that is relevant and more positive than the original negative thoughts. In particular, …


Perspectives On Computing Ethics: A Multi-Stakeholder Analysis, Damian Gordon, Ioannis Stavrakakis, Paul J. Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O'Mahony, Dympna O'Sullivan Sep 2021

Perspectives On Computing Ethics: A Multi-Stakeholder Analysis, Damian Gordon, Ioannis Stavrakakis, Paul J. Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O'Mahony, Dympna O'Sullivan

Articles

Purpose:

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether …


Finding Bert’S Idiomatic Key, Vasudevan Nedumpozhimana, John Kelleher Aug 2021

Finding Bert’S Idiomatic Key, Vasudevan Nedumpozhimana, John Kelleher

Conference papers

Sentence embeddings encode information relating to the usage of idioms in a sentence. This paper reports a set of experiments that combine a probing methodology with input masking to analyse where in a sentence this idiomatic information is taken from, and what form it takes. Our results indicate that BERT’s idiomatic key is primarily found within an idiomatic expression, but also draws on information from the surrounding context. Also, BERT can distinguish between the disruption in a sentence caused by words missing and the incongruity caused by idiomatic usage.


Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima Jul 2021

Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima

Conference papers

Data center networks (DCNs) are the backbone of many cloud and Internet services. They are vulnerable to link failures, that occur on a daily basis, with a high frequency. Service disruption due to link failure may incur financial losses, compliance breaches and reputation damage. Performance metrics such as packet loss and routing flaps are negatively affected by these failure events. We propose a new Bayesian learning approach towards adaptive path allocation that aims to improve DCN performance by reducing both packet loss and routing flaps ratios. The proposed approach incorporates historical information about link failure and usage probabilities into its …


Demo: Codec-Aware Video Delivery Over Sdns, Obinna Izima, Ruairí De Fréin, Ali Malik May 2021

Demo: Codec-Aware Video Delivery Over Sdns, Obinna Izima, Ruairí De Fréin, Ali Malik

Other resources

To guarantee quality of delivery for video streaming over software defined networks, efficient predictors and adaptive routing frameworks are required. We demonstrate an agent that predicts video quality of delivery metrics in a scalable way using a bespoke codec-aware learning model. We also demonstrate the integration of this agent with an adaptive framework for centrally controlled software-defined networks that re-configures network operational paths in response to the learning agent, ensuring that good quality of delivery of video is maintained during periods of congestion. The demo scenario highlights the feasibility, scalability and accuracy of the framework.


A Systematic Review Of Urban Navigation Systems For Visually Impaired People, Fatma Eltaher, Ayman Taha, Jane Courtney, Susan Mckeever Apr 2021

A Systematic Review Of Urban Navigation Systems For Visually Impaired People, Fatma Eltaher, Ayman Taha, Jane Courtney, Susan Mckeever

Articles

Blind and Visually impaired people (BVIP) face a range of practical difficulties when undertaking outdoor journeys as pedestrians. Over the past decade, a variety of assistive devices have been researched and developed to help BVIP navigate more safely and independently. In~addition, research in overlapping domains are addressing the problem of automatic environment interpretation using computer vision and machine learning, particularly deep learning, approaches. Our aim in this article is to present a comprehensive review of research directly in, or relevant to, assistive outdoor navigation for BVIP. We breakdown the navigation area into a series of navigation phases and tasks. We …


Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma Mar 2021

Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma

Articles

Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange between the different healthcare providers. The work proposes the shift from patient’s electronic health records being managed and controlled by the healthcare industry to a patient-centric application where patients are in control of their data. The aim of this research is to build an Electronic Healthcare Record (EHR) system that is layered on the Ethereum blockchain platform and smart contract in …


A Comparison Of Risk Factors And Risk Models For Stroke By Age Group Using Tilda Data, Elizabeth Hunter, John D. Kelleher Mar 2021

A Comparison Of Risk Factors And Risk Models For Stroke By Age Group Using Tilda Data, Elizabeth Hunter, John D. Kelleher

Conference papers

Models to predict stroke risk with the aim of stroke prevention often use age as a factor in the model (Choudhury et al., 2015; Conroy et al., 2003; D’Agostino etal., 2008; Wolf et al., 1991). However, stroke risk scores often underestimate risk
for specific age groups, particularly younger age groups and the contribution of different risk factors to overall stroke risk changes over time (Boehme et al., 2017; Seshadri et al., 2006). Additionally, because age is a strong predictor of stroke, age can dominate the risk score (Leening et al., 2017). Longitudinal Studies such as the Irish Longitudinal study on …


Examining The Modelling Capabilities Of Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning, Luca Longo, Lucas Rizzo, Pierpaolo Dondio Jan 2021

Examining The Modelling Capabilities Of Defeasible Argumentation And Non-Monotonic Fuzzy Reasoning, Luca Longo, Lucas Rizzo, Pierpaolo Dondio

Articles

Knowledge-representation and reasoning methods have been extensively researched within Artificial Intelligence. Among these, argumentation has emerged as an ideal paradigm for inference under uncertainty with conflicting knowledge. Its value has been predominantly demonstrated via analyses of the topological structure of graphs of arguments and its formal properties. However, limited research exists on the examination and comparison of its inferential capacity in real-world modelling tasks and against other knowledge-representation and non-monotonic reasoning methods. This study is focused on a novel comparison between defeasible argumentation and non-monotonic fuzzy reasoning when applied to the representation of the ill-defined construct of human mental workload …


Developing An Open-Book Online Exam For Final Year Students, Keith Quille, Keith Nolan, Brett Becker, Sean Mchugh Jan 2021

Developing An Open-Book Online Exam For Final Year Students, Keith Quille, Keith Nolan, Brett Becker, Sean Mchugh

Conference Papers

Like many others, our institution had to adapt our traditional proctored, written examinations to open-book online variants due to the COVID-19 pandemic. This paper describes the process applied to develop open-book online exams for final year (undergraduate) students studying Applied Machine Learning and Applied Artificial Intelligence and Deep Learning courses as part of a four-year BSc in Computer Science. We also present processes used to validate the examinations as well as plagiarism detection methods implemented. Findings from this study highlight positive effects of using open-book online exams, with 85% of students reporting that they either prefer online open-book examinations or …


Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver Jan 2021

Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver

Dissertations

Transactional fraud datasets exhibit extreme class imbalance. Learners cannot make accurate generalizations without sufficient data. Researchers can account for imbalance at the data level, algorithmic level or both. This paper focuses on techniques at the data level. We evaluate the evidence of the optimal technique and potential enhancements. Global fraud losses totalled more than 80 % of the UK’s GDP in 2019. The improvement of preprocessing is inherently valuable in fighting these losses. Synthetic minority oversampling technique (SMOTE) and extensions of SMOTE are currently the most common preprocessing strategies. SMOTE oversamples the minority classes by randomly generating a point between …


A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran Jan 2021

A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran

Dissertations

This study investigates the validity and sensitivity of a novel model of instructional efficiency: the parabolic model. The novel model is compared against state-of-the-art models present in instructional design today; Likelihood model, Deviational model and Multidimensional model. This models is based on the assumption that optimal mental workload and high performance leads to high efficiency, while other models assume that low mental workload and high performance leads to high efficiency. The investigation makes use of two instructional design conditions: a direct instructions approach to learning and its extension with a collaborative activity. A control group received the former instructional design …


Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti Jan 2021

Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti

Dissertations

A network intrusion detection system (NIDS) is one important element to mitigate cybersecurity risks, the NIDS allow for detecting anomalies in a network which may be a cyberattack to a corporate network environment. A NIDS can be seen as a classification problem where the ultimate goal is to distinguish between malicious traffic among a majority of benign traffic. Researches on NIDS are often performed using outdated datasets that don’t represent the actual cyberspace. Datasets such as the CICIDS2018 address this gap by being generated from attacks and an infrastructure that reflects an up-to-date scenario.

A problem may arise when machine …


Fedoram: A Federated Oblivious Ram Scheme, Alexandre Pujol, Liam Murphy, Christina Thorpe Jan 2021

Fedoram: A Federated Oblivious Ram Scheme, Alexandre Pujol, Liam Murphy, Christina Thorpe

Articles

Instant messaging (IM) applications, even with end-to-end encryption enabled, pose privacy issues due to metadata and pattern leakage. Our goal is to develop a model for a privacy preserving IM application, by designing an IM application that focuses on hiding metadata and discussion patterns. To solve the issue of privacy preservation through the obfuscation of metadata, cryptographic constructions like Oblivious Random Access Machines (ORAM) have been proposed in recent years. However, although they completely hide the user access patterns, they incur high computational costs, often resulting in excessively slow performance in practice. We propose a new federated model, FedORAM, which …


Covid-19 Prediction Using Lstm Algorithm: Gcc Case Study, Kareem Kamal A. Ghany, Hossam Zawbaa, Heba M. Sabri Jan 2021

Covid-19 Prediction Using Lstm Algorithm: Gcc Case Study, Kareem Kamal A. Ghany, Hossam Zawbaa, Heba M. Sabri

Articles

Coronavirus-19 (COVID-19) is the black swan of 2020. Still, the human response to restrain the virus is also creating massive ripples through different systems, such as health, economy, education, and tourism. This paper focuses on research and applying Artificial Intelligence (AI) algorithms to predict COVID-19 propagation using the available time-series data and study the effect of the quality of life, the number of tests performed, and the awareness of citizens on the virus in the Gulf Cooperation Council (GCC) countries at the Gulf area. So we focused on cases in the Kingdom of Saudi Arabia (KSA), United Arab of Emirates …


Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy Jan 2021

Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy

Dissertations

Sentiment Analysis also known as opinion mining is a type of text research that analyses people’s opinions expressed in written language. Sentiment analysis brings together various research areas such as Natural Language Processing (NLP), Data Mining, and Text Mining, and is fast becoming of major importance to companies and organizations as it is started to incorporate online commerce data for analysis. Often the data on which sentiment analysis is performed will be reviews. The data can range from reviews of a small product to a big multinational corporation. The goal of performing sentiment analysis is to extract information from those …


An Evaluation On The Performance Of Code Generated With Webassembly Compilers, Raymond Phelan Jan 2021

An Evaluation On The Performance Of Code Generated With Webassembly Compilers, Raymond Phelan

Dissertations

WebAssembly is a new technology that is revolutionizing the web. Essentially it is a low-level binary instruction set that can be run on browsers, servers or stand-alone environments. Many programming languages either currently have, or are working on, compilers that will compile the language into WebAssembly. This means that applications written in languages like C++ or Rust can now be run on the web, directly in a browser or other environment. However, as we will highlight in this research, the quality of code generated by the different WebAssembly compilers varies and causes performance issues. This research paper aims to evaluate …


Case Study: Transition To A Vegan Diet In An Elite Male Gaelic Football Player, Daniel Davey, Shane Malone, Brendan Egan Jan 2021

Case Study: Transition To A Vegan Diet In An Elite Male Gaelic Football Player, Daniel Davey, Shane Malone, Brendan Egan

Articles

Vegan diets are increasingly of interest to athletes, but require a well-planned approach in order to mitigate the risk of potential adverse effects on nutrient intakes, and consequently performance. This case study reports the process of an elite male Gaelic football player (age 25 years; height, 1.88 m; body mass, 87.8 kg; lean body mass, 73.26 kg; body fat, 11.3%) transitioning from an omnivorous diet to a vegan diet at the beginning of a competitive season. The report encompasses key considerations in the planning and provision of nutrition support in this context, in addition to iterations needed based on challenges …


Detecting Interlocutor Confusion In Situated Human-Avatar Dialogue: A Pilot Study, Na Li, John D. Kelleher, Robert J. Ross Jan 2021

Detecting Interlocutor Confusion In Situated Human-Avatar Dialogue: A Pilot Study, Na Li, John D. Kelleher, Robert J. Ross

Conference papers

In order to enhance levels of engagement with conversational systems, our long term research goal seeks to monitor the confusion state of a user and adapt dialogue policies in response to such user confusion states. To this end, in this paper, we present our initial research centred on a user-avatar dialogue scenario that we have developed to study the manifestation of confusion and in the long term its mitigation. We present a new definition of confusion that is particularly tailored to the requirements of intelligent conversational system development for task-oriented dialogue. We also present the details of our Wizard-of-Oz based …


Disaster Analysis Using Satellite Image Data With Knowledge Transfer And Semi-Supervised Learning Techniques, Palavi Jain Jan 2021

Disaster Analysis Using Satellite Image Data With Knowledge Transfer And Semi-Supervised Learning Techniques, Palavi Jain

Reports

With the increase in frequency of disasters and crisis situations like floods, earthquake and hurricanes, the requirement to handle the situation efficiently through disaster response and humanitarian relief has increased. Disasters are mostly unpredictable in nature with respect to their impact on people and property. Moreover, the dynamic and varied nature of disasters makes it difficult to predict their impact accurately for advanced preparation of responses [104]. It is also notable that the economical loss due to natural disasters has increased in recent years, and it, along with the pure humanitarian need, is one of the reasons to research innovative …


Stellar Classification Of Folded Spectra Using The Mk Classification Scheme And Convolutional Neural Networks, John Magee Jan 2021

Stellar Classification Of Folded Spectra Using The Mk Classification Scheme And Convolutional Neural Networks, John Magee

Dissertations

The year 1943 saw the introduction of the Morgan-Keenan (MK) classification scheme and this replaced the existing Harvard Classification scheme. Both stellar classification scheme are fundamentally grounded in the field of spectroscopy. The Harvard Classification scheme classified stars based on stellar surface temperature. The MK Classification scheme introduced the concept of a luminosity class that is intrinsically linked to the surface gravity of a star. Temperature and luminosity class values are estimated directly from the stellar spectrum.

Machine learning is a well-established technique in astronomy. Traditionally, a spectrum is treated as a one-dimensional sequence of data. Techniques such as artificial …


Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard Jan 2021

Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard

Dissertations

This research project evaluates the performance of kqueue and epoll in the context of event-driven servers. The evaluation is done through benchmarking and tracing which are used to measure throughput and execution time respectively. The experiment is repeated for both a virtualised and native server environment. The results from the experiment are statistically analysed and compared. These results show significant differences between kqueue and epoll, and a profound impact of virtualisation as a variable.


On The Mandelbrot Set For I**2 = ±1 And Imaginary Higgs Fields, Jonathan Blackledge Jan 2021

On The Mandelbrot Set For I**2 = ±1 And Imaginary Higgs Fields, Jonathan Blackledge

Articles

We consider the consequence of breaking with a fundamental result in complex analysisby lettingi2=±1wherei=√−1is the basic unit of all imaginary numbers. An analysis of theMandelbrot set for this case shows that a demarcation between a Fractal and a Euclidean object ispossible based oni2=−1andi2= +1, respectively. Further, we consider the transient behaviourassociated with the two cases to produce a range of non-standard sets in which a Fractal geometricstructure is transformed into a Euclidean object. In the case of the Mandelbrot set, the Euclideanobject is a square whose properties are investigate. Coupled with the associated Julia sets and othercomplex plane mappings, this …


Codec-Aware Video Delivery Over Sdns, Obinna Izima, Ruairi Defrein, Ali Malik Jan 2021

Codec-Aware Video Delivery Over Sdns, Obinna Izima, Ruairi Defrein, Ali Malik

Conference papers

To guarantee quality of delivery for video streaming over software defined networks, efficient predictors and adaptive routing frameworks are required. We demonstrate an agent that predicts video quality of delivery metrics in a scalable way using a bespoke codec-aware learning model. We also demonstrate the integration of this agent with an adaptive framework for centrally controlled software-defined networks that re-configures network operational paths in response to the learning agent, ensuring that good quality of delivery of video is maintained during periods of congestion. The demo scenario highlights the feasibility, scalability and accuracy of the framework


Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power Jan 2021

Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power

Dissertations

Stack Overflow is the world’s largest community of software developers. Users ask and answer questions on various tagged topics of software development. The set of questions a site user answers is representative of their knowledge base, or “wheelhouse”. It is proposed that clustering users by their wheelhouse yields communities of similar software developers by skill-set. These communities represent the different roles within software development and could be used as the basis to define roles at any point in time in an ever-evolving landscape of software development. A network graph of site users, linked if they answered questions on the same …


Adequately Generating Captions For An Image Using Adaptive And Global Attention Mechanisms., Shravan Kumar Talanki Venkatarathanaiahsetty Jan 2021

Adequately Generating Captions For An Image Using Adaptive And Global Attention Mechanisms., Shravan Kumar Talanki Venkatarathanaiahsetty

Dissertations

Generating description to images is a recent surge and with latest developments in the field of Artificial Intelligence, it can be one of the prominent applications to bridge the gap between Computer vision and Natural language processing fields. In terms of the learning curve, Deep learning has become the main backbone in driving many new applications. Image Captioning is one such application where the usage of Deep learning methods enhanced the performance of the captioning accuracy. The introduction of the Encoder-Decoder framework was a breakthrough in Image captioning. But as the sequences got longer the performance of captions was affected. …


Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar Jan 2021

Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar

Dissertations

Application of Topic Models in text mining of educational data and more specifically, the text data obtained from lecture videos, is an area of research which is largely unexplored yet holds great potential. This work seeks to find empirical evidence for an improvement in Topic Modeling by pre- extracting bigram tokens and adding them as additional features in the Latent Dirichlet Allocation (LDA) algorithm, a widely-recognized topic modeling technique. The dataset considered for analysis is a collection of transcripts of video lectures on Machine Learning scraped from YouTube. Using the cosine similarity distance measure as a metric, the experiment showed …


Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin Jan 2021

Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin

Dissertations

Particle Swarm optimisation (PSO) is a particular form of swarm intelligence, which itself is an innovative intelligent paradigm for solving optimization problems. PSO is generally used to find a global optimum in a single optimisation function. This typically occurs on one node(machine) but there has been a significant body of research into creating distributed implementations of the PSO algorithm. Such research has often focused on the creation and performance of the distributed implementation in an isolated manner or compared to different distributed algorithms.

This research piece aims to bridge a gap in the existing literature, by testing a distributed implementation …