Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki Dec 2016

A Reduced Labeled Samples (Rls) Framework For Classification Of Imbalanced Concept-Drifting Streaming Data., Elaheh Arabmakki

Electronic Theses and Dissertations

Stream processing frameworks are designed to process the streaming data that arrives in time. An example of such data is stream of emails that a user receives every day. Most of the real world data streams are also imbalanced as is in the stream of emails, which contains few spam emails compared to a lot of legitimate emails. The classification of the imbalanced data stream is challenging due to the several reasons: First of all, data streams are huge and they can not be stored in the memory for one time processing. Second, if the data is imbalanced, the accuracy ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki May 2016

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as Snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is matched with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki May 2016

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is match with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


Content-Based Image Analysis With Applications To The Multifunction Printer Imaging Pipeline And Image Databases, Cheng Lu Apr 2016

Content-Based Image Analysis With Applications To The Multifunction Printer Imaging Pipeline And Image Databases, Cheng Lu

Open Access Dissertations

Image understanding is one of the most important topics for various applications. Most of image understanding studies focus on content-based approach while some others also rely on meta data of images. Image understanding includes several sub-topics such as classification, segmentation, retrieval and automatic annotation etc., which are heavily studied recently. This thesis proposes several new methods and algorithms for image classification, retrieval and automatic tag generation. The proposed algorithms have been tested and verified in multiple platforms. For image classification, our proposed method can complete classification in real-time under hardware constraints of all-in-one printer and adaptively improve itself by online ...


Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis Jan 2016

Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis

Faculty Publications

The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and attain their goals. These applications fail to engage and motivate users who have busy schedules, or are not as committed and self-motivated. In this work, we present PRO-Fit, a personalized fitness assistant application that employs machine learning and recommendation algorithms in ...


Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo Jan 2016

Breast Cancer Classification Of Mammographic Masses Using Circularity Max Metric, A New Method, Tae Keun Heo

Electronic Theses and Dissertations

Breast cancer classification can be divided into two categories. The first category is a benign tumor, and the other is a malignant tumor. The main purpose of breast cancer classification is to classify abnormalities into benign or malignant classes and thus help physicians with further analysis by minimizing potential errors that can be made by fatigued or inexperienced physicians. This paper proposes a new shape metric based on the area ratio of a circle to classify mammographic images into benign and malignant class. Support Vector Machine is used as a machine learning tool for training and classification purposes. The improved ...