Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

A Framework For Clustering And Adaptive Topic Tracking On Evolving Text And Social Media Data Streams., Gopi Chand Nutakki Dec 2017

A Framework For Clustering And Adaptive Topic Tracking On Evolving Text And Social Media Data Streams., Gopi Chand Nutakki

Electronic Theses and Dissertations

Recent advances and widespread usage of online web services and social media platforms, coupled with ubiquitous low cost devices, mobile technologies, and increasing capacity of lower cost storage, has led to a proliferation of Big data, ranging from, news, e-commerce clickstreams, and online business transactions to continuous event logs and social media expressions. These large amounts of online data, often referred to as data streams, because they get generated at extremely high throughputs or velocity, can make conventional and classical data analytics methodologies obsolete. For these reasons, the issues of management and analysis of data streams have been researched extensively …


A Data Science Pipeline For Educational Data : A Case Study Using Learning Catalytics In The Active Learning Classroom., Asuman Cagla Acun Sener Aug 2017

A Data Science Pipeline For Educational Data : A Case Study Using Learning Catalytics In The Active Learning Classroom., Asuman Cagla Acun Sener

Electronic Theses and Dissertations

This thesis presents an applied data science methodology on a set of University of Louisville, Speed School of Engineering student data. We used data mining and classic statistical techniques to help educational researchers quickly see the data trends and peculiarities. Our data includes scores and information about two Engineering Fundamental Class. The format of these classes is called an inverted classroom model or flipped class. The purpose of this study is to analyze the data in order to uncover potentially hidden information, tell interesting stories about the data, examine student learning behavior and learning performance in an active learning environment, …


Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi Aug 2017

Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi

Electronic Theses and Dissertations

While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …


Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani May 2017

Using A Multi Variate Pattern Analysis (Mvpa) Approach To Decode Fmri Responses To Fear And Anxiety., Sajjad Torabian Esfahani

Electronic Theses and Dissertations

This study analyzed fMRI responses to fear and anxiety using a Multi Variate Pattern Analysis (MVPA) approach. Compared to conventional univariate methods which only represent regions of activation, MVPA provides us with more detailed patterns of voxels. We successfully found different patterns for fear and anxiety through separate classification attempts in each subject’s representational space. Further, we transformed all the individual models into a standard space to do group analysis. Results showed that subjects share a more common fear response. Also, the amygdala and hippocampus areas are more important for differentiating fear than anxiety.


Peeking Into The Other Half Of The Glass : Handling Polarization In Recommender Systems., Mahsa Badami May 2017

Peeking Into The Other Half Of The Glass : Handling Polarization In Recommender Systems., Mahsa Badami

Electronic Theses and Dissertations

This dissertation is about filtering and discovering information online while using recommender systems. In the first part of our research, we study the phenomenon of polarization and its impact on filtering and discovering information. Polarization is a social phenomenon, with serious consequences, in real-life, particularly on social media. Thus it is important to understand how machine learning algorithms, especially recommender systems, behave in polarized environments. We study polarization within the context of the users' interactions with a space of items and how this affects recommender systems. We first formalize the concept of polarization based on item ratings and then relate …


Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack Jan 2017

Optimized Multilayer Perceptron With Dynamic Learning Rate To Classify Breast Microwave Tomography Image, Chulwoo Pack

Electronic Theses and Dissertations

Most recently developed Computer Aided Diagnosis (CAD) systems and their related research is based on medical images that are usually obtained through conventional imaging techniques such as Magnetic Resonance Imaging (MRI), x-ray mammography, and ultrasound. With the development of a new imaging technology called Microwave Tomography Imaging (MTI), it has become inevitable to develop a CAD system that can show promising performance using new format of data. The platform can have a flexibility on its input by adopting Artificial Neural Network (ANN) as a classifier. Among the various phases of CAD system, we have focused on optimizing the classification phase …