Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman Jan 2020

Applying Artificial Intelligence To Medical Data, Shaikh Shiam Rahman

Electronic Theses and Dissertations

Machine learning, data mining, and deep learning has become the methodology of choice for analyzing medical data and images. In this study, we implemented three different machine learning techniques to medical data and image analysis. Our first study was to implement different log base entropy for a decision tree algorithm. Our results suggested that using a higher log base for the dataset with mostly categorical attributes with three or more categories for each attribute can obtain a higher accuracy. For the second study, we analyzed mental health data tuning the parameters of the decision tree (splitting method, depth and entropy). …


Instructor Activity Recognition Using Smartwatch And Smartphone Sensors, Zayed Uddin Chowdhury Jan 2020

Instructor Activity Recognition Using Smartwatch And Smartphone Sensors, Zayed Uddin Chowdhury

Electronic Theses and Dissertations

During a classroom session, an instructor performs several activities, such as writing on the board, speaking to the students, gestures to explain a concept. A record of the time spent in each of these activities could be valuable information for the instructors to virtually observe their own style of instruction. It can help in identifying activities that engage the students more, thereby enhancing teaching effectiveness and efficiency. In this work, we present a preliminary study on profiling multiple activities of an instructor in the classroom using smartwatch and smartphone sensor data. We use 2 benchmark datasets to test out the …


Building A Classification Model Using Affinity Propagation, Christopher R. Klecker Jan 2019

Building A Classification Model Using Affinity Propagation, Christopher R. Klecker

Electronic Theses and Dissertations

Regular classification of data includes a training set and test set. For example for Naïve Bayes, Artificial Neural Networks, and Support Vector Machines, each classifier employs the whole training set to train itself. This thesis will explore the possibility of using a condensed form of the training set in order to get a comparable classification accuracy. The technique explored in this thesis will use a clustering algorithm to explore with data records can be labeled as exemplar, or a quality of multiple records. For example, is it possible to compress say 50 records into one single record? Can a single …


Eaglebot: A Chatbot Based Multi-Tier Question Answering System For Retrieving Answers From Heterogeneous Sources Using Bert, Muhammad Rana Jan 2019

Eaglebot: A Chatbot Based Multi-Tier Question Answering System For Retrieving Answers From Heterogeneous Sources Using Bert, Muhammad Rana

Electronic Theses and Dissertations

This paper proposes to tackle Question Answering on a specific domain by developing a multi-tier system using three different types of data storage for storing answers. For testing our system on University domain we have used extracted data from Georgia Southern University website. For the task of faster retrieval we have divided our answer data sources into three distinct types and utilized Dialogflow's Natural Language Understanding engine for route selection. We compared different word and sentence embedding techniques for making a semantic question search engine and BERT sentence embedding gave us the best result and for extracting answer from a …


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …


Application Of Self-Monitoring For Situational Awareness, Christopher Trickler Jan 2013

Application Of Self-Monitoring For Situational Awareness, Christopher Trickler

Electronic Theses and Dissertations

Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute to …