Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Machine learning

Discipline
Institution
Publication Year
Publication

Articles 91 - 102 of 102

Full-Text Articles in Computer Engineering

Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla Oct 2015

Distributed Approach For Peptide Identification, Naga V K Abhinav Vedanbhatla

Masters Theses & Specialist Projects

A crucial step in protein identification is peptide identification. The Peptide Spectrum Match (PSM) information set is enormous. Hence, it is a time-consuming procedure to work on a single machine. PSMs are situated by a cross connection, a factual score, or a probability that the match between the trial and speculative is right and original. This procedure takes quite a while to execute. So, there is demand for enhancement of the performance to handle extensive peptide information sets. Development of appropriate distributed frameworks are expected to lessen the processing time.

The designed framework uses a peptide handling algorithm named C-Ranker, …


An Understanding Of Student Satisfaction, Lorraine Sweeney Sep 2015

An Understanding Of Student Satisfaction, Lorraine Sweeney

Dissertations

Retention is a challenge for all third level institutions and retention rates remain higher than colleges would like them to be, this has intensified in recent years as participants in higher education has increased and diversified. Third level institutions which would not only benefit from increased fees but also through low cost word of mouth promotion and an enhanced reputation. As such, an important concern for colleges is retaining students and understanding the reasons why students may choose to leave a program. While student satisfaction and retention is a well researched topic there remains questions to be answered in terms …


Eliciting Knowledge Bases With Defeasible Reasoning: A Comparative Analysis With Machine Learning, Peter Keogh May 2015

Eliciting Knowledge Bases With Defeasible Reasoning: A Comparative Analysis With Machine Learning, Peter Keogh

Dissertations

This thesis compares the ability of an implementation of Defeasible Reasoning (via Argumentation Theory) to model a construct (mental workload) with Machine Learning. In order to perform this comparison a defeasible reasoning system was designed and implemented in software. This software was used to elicit a knowledge base from an expert in an experiment which was then compared with machine learning. The central findings of this thesis were that the knowledge based approach was better at predicting an objective performance measure, time, than machine learning. However, machine learning was better equiped to identify another object measure task membership. The knowledge …


Energy Cost Forecasting For Event Venues, Katarina Grolinger, Andrea Zagar, Miriam Am Capretz, Luke Seewald Jan 2015

Energy Cost Forecasting For Event Venues, Katarina Grolinger, Andrea Zagar, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

Electricity price, consumption, and demand forecasting has been a topic of research interest for a long time. The proliferation of smart meters has created new opportunities in energy prediction. This paper investigates energy cost forecasting in the context of entertainment event-organizing venues, which poses significant difficulty due to fluctuations in energy demand and wholesale electricity prices. The objective is to predict the overall cost of energy consumed during an entertainment event. Predictions are carried out separately for each event category and feature selection is used to select the most effective combination of event attributes for each category. Three machine learning …


Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong Dec 2014

Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong

Research Collection School Of Computing and Information Systems

The ability to identify or predict a target audience from the increasingly crowded social space will provide a company some competitive advantage over other companies. In this paper, we analyze various training datasets, which include Twitter contents of an account owner and its list of followers, using features generated in different ways for two machine learning approaches - the Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Various configurations of the ELM and SVM have been evaluated. The results indicate that training datasets using features generated from the owner tweets achieve the best performance, relative to other feature sets. …


Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong Nov 2014

Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong

Research Collection School Of Computing and Information Systems

Doing business on social media has become a common practice for many companies these days. While the contents shared on Twitter and Facebook offer plenty of opportunities to uncover business insights, it remains a challenge to sift through the huge amount of social media data and identify the potential social audience who is highly likely to be interested in a particular company. In this paper, we analyze the Twitter content of an account owner and its list of followers through various text mining methods, which include fuzzy keyword matching, statistical topic modeling and machine learning approaches. We use tweets of …


Using The K-Means Clustering Algorithm To Classify Features For Choropleth Maps, Mark Polczynski, Michael Polczynski Apr 2014

Using The K-Means Clustering Algorithm To Classify Features For Choropleth Maps, Mark Polczynski, Michael Polczynski

Electrical and Computer Engineering Faculty Research and Publications

Common methods for classifying choropleth map features typically form classes based on a single feature attribute. This technical note reviews the use of the k-means clustering algorithm to perform feature classification using multiple feature attributes. The k-means clustering algorithm is described and compared to other common classification methods, and two examples of choropleth maps prepared using k-means clustering are provided.


Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi Jan 2014

Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi

Conference papers

Machine Learning (ML) is a powerful tool to support the development of objective visual quality assessment metrics, serving as a substitute model for the perceptual mechanisms acting in visual quality appreciation. Nevertheless, the reliability of ML-based techniques within objective quality assessment metrics is often questioned. In this study, the robustness of ML in supporting objective quality assessment is investigated, specifically when the feature set adopted for prediction is suboptimal. A Principal Component Regression based algorithm and a Feed Forward Neural Network are compared when pooling the Structural Similarity Index (SSIM) features perturbed with noise. The neural network adapts better with …


User Modeling Via Machine Learning And Rule-Based Reasoning To Understand And Predict Errors In Survey Systems, Leonard Cleve Stuart Aug 2013

User Modeling Via Machine Learning And Rule-Based Reasoning To Understand And Predict Errors In Survey Systems, Leonard Cleve Stuart

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

User modeling is traditionally applied to systems were users have a large degree of control over their goals, the content they view, and the manner in which they navigate through the system. These systems aim to both recommend useful goals to users and to assist them in achieving perceived goals. Systems such as online or telephone surveys are different in that users have only a singular goal of survey completion, extremely limited control over navigation, and content is restricted to prescribed set of survey tasks; changing the user modeling problem to one in which the best means of assisting users …


A Review Of Situation Identification Techniques In Pervasive Computing, Juan Ye, Simon Dobson, Susan Mckeever Feb 2012

A Review Of Situation Identification Techniques In Pervasive Computing, Juan Ye, Simon Dobson, Susan Mckeever

Articles

Pervasive systems must offer an open, extensible, and evolving portfolio of services which integrate sensor data from a diverse range of sources. The core challenge is to provide appropriate and consistent adaptive behaviours for these services in the face of huge volumes of sensor data exhibiting varying degrees of precision, accuracy and dynamism. Situation identification is an enabling technology that resolves noisy sensor data and abstracts it into higher-level concepts that are interesting to applications. We provide a comprehensive analysis of the nature and characteristics of situations, discuss the complexities of situation identification, and review the techniques that are most …


Sports Data Mining Technology Used In Basketball Outcome Prediction, Chenjie Cao Jan 2012

Sports Data Mining Technology Used In Basketball Outcome Prediction, Chenjie Cao

Dissertations

Driven by the increasing comprehensive data in sports datasets and data mining technique successfully used in different area, sports data mining technique emerges and enables us to find hidden knowledge to impact the sport industry. In many instances, predicting the outcomes of sporting events has always been a challenging and attractive work and is therefore drawing a wide concern to conduct research in this field. This project focuses on using machine learning algorithms to build a model for predicting the NBA game outcomes and the algorithms involve Simple Logistics Classifier, Artificial Neural Networks, SVM and Naïve Bayes. In order to …


Constructive Induction Machines For Data Mining, Marek Perkowski, Stanislaw Grygiel, Qihong Chen, Dave Mattson Mar 1999

Constructive Induction Machines For Data Mining, Marek Perkowski, Stanislaw Grygiel, Qihong Chen, Dave Mattson

Electrical and Computer Engineering Faculty Publications and Presentations

"Learning Hardware" approach involves creating a computational network based on feedback from the environment (for instance, positive and negative examples from the trainer), and realizing this network in an array of Field Programmable Gate Arrays (FPGAs). Computational networks can be built based on incremental supervised learning (Neural Net training) or global construction (Decision Tree design). Here we advocate the approach to Learning Hardware based on Constructive Induction methods of Machine Learning (ML) using multivalued functions. This is contrasted with the Evolvable Hardware (EHW) approach in which learning/evolution is based on the genetic algorithm only.