Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Engineering

Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan May 2022

Digitalization Of Construction Project Requirements Using Natural Language Processing (Nlp) Techniques, Fahad Ul Hassan

All Dissertations

Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a project. A single contract package, especially of a design-build (DB) project, comprises hundreds of documents including thousands of requirements. Precise comprehension and management of the requirements are critical to ensure that all important explicit and implicit requirements of the project scope are captured, managed, and completed. Since requirements are mainly written in a natural human language, the current manual methods impose a significant burden on practitioners to process and restructure them into …


Bibliometric Analysis Of Emerging Technologies In The Field Of Computer Science Helping In Ovarian Cancer Research, Sonali Kothari Dr., Anvita Gupta, Muskaan Agrawal Agrawal, Kajal Jaggi, Adhiraj Dev Goswami, Ketan Kotecha, M. Karthikeyan Dr., Vijayshri Khedkar Apr 2021

Bibliometric Analysis Of Emerging Technologies In The Field Of Computer Science Helping In Ovarian Cancer Research, Sonali Kothari Dr., Anvita Gupta, Muskaan Agrawal Agrawal, Kajal Jaggi, Adhiraj Dev Goswami, Ketan Kotecha, M. Karthikeyan Dr., Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

This study is carried out to provide an analysis of the literature available at the intersection of ovarian cancer and computing. A comprehensive search was conducted using Scopus database for English-language peer-reviewed articles. The study administers chronological, domain clustering and text analysis of the articles under consideration to provide high-level concept map composed of specific words and the connections between them.


A Direct Data-Cluster Analysis Method Based On Neutrosophic Set Implication, Florentin Smarandache, Sudan Jha, Gyanendra Prasad Joshi, Lewis Nkenyereya, Dae Wan Kim Jan 2020

A Direct Data-Cluster Analysis Method Based On Neutrosophic Set Implication, Florentin Smarandache, Sudan Jha, Gyanendra Prasad Joshi, Lewis Nkenyereya, Dae Wan Kim

Branch Mathematics and Statistics Faculty and Staff Publications

Raw data are classified using clustering techniques in a reasonable manner to create disjoint clusters. A lot of clustering algorithms based on specific parameters have been proposed to access a high volume of datasets. This paper focuses on cluster analysis based on neutrosophic set implication, i.e., a k-means algorithm with a threshold-based clustering technique. This algorithm addresses the shortcomings of the k-means clustering algorithm by overcoming the limitations of the threshold-based clustering algorithm. To evaluate the validity of the proposed method, several validity measures and validity indices are applied to the Iris dataset (from the University of California, Irvine, Machine …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Applications Of Supervised Machine Learning In Autism Spectrum Disorder Research: A Review, Kayleigh K. Hyde, Marlena N. Novack, Nicholas Lahaye, Chelsea Parlett-Pelleriti, Raymond Anden, Dennis R. Dixon, Erik Linstead Feb 2019

Applications Of Supervised Machine Learning In Autism Spectrum Disorder Research: A Review, Kayleigh K. Hyde, Marlena N. Novack, Nicholas Lahaye, Chelsea Parlett-Pelleriti, Raymond Anden, Dennis R. Dixon, Erik Linstead

Engineering Faculty Articles and Research

Autism spectrum disorder (ASD) research has yet to leverage "big data" on the same scale as other fields; however, advancements in easy, affordable data collection and analysis may soon make this a reality. Indeed, there has been a notable increase in research literature evaluating the effectiveness of machine learning for diagnosing ASD, exploring its genetic underpinnings, and designing effective interventions. This paper provides a comprehensive review of 45 papers utilizing supervised machine learning in ASD, including algorithms for classification and text analysis. The goal of the paper is to identify and describe supervised machine learning trends in ASD literature as …


Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman May 2018

Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman

Electronic Theses and Dissertations

The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The …


Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni Jul 2017

Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni

Computer Science ETDs

In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben May 2013

A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben

Publications

Objective: This paper presents continued research toward the development of a knowledge-based system for the diagnosis of human toxic exposures. In particular, this research focuses on the challenging task of diagnosing exposures to multiple toxins. Although only 10% of toxic exposures in the United States involve multiple toxins, multiple exposures account for more than half of all toxin-related fatalities. Using simple medical mathematics, we seek to produce a practical decision support system capable of supplying useful information to aid in the diagnosis of complex cases involving multiple unknown substances.

Methods: The system is automatically trained using data mining …


A Window Of Opportunity: Assessing Behavioural Scoring, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany, Michael O'Sullivan, Neil Watson Jan 2013

A Window Of Opportunity: Assessing Behavioural Scoring, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany, Michael O'Sullivan, Neil Watson

Articles

After credit has been granted, lenders use behavioural scoring to assess the likelihood of default occurring during some specific outcome period. This assessment is based on customers’ repayment performance over a given fixed period. Often the outcome period and fixed performance period are arbitrarily selected, causing instability in making predictions. Behavioural scoring has failed to receive the same attention from researchers as application scoring. The bias for application scoring research can be attributed, in part, to the large volume of data required for behavioural scoring studies. Furthermore, the commercial sensitivities associated with such a large pool of customer data often …


An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri Mar 2012

An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri

Master's Theses

The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …


Data Mining Based Learning Algorithms For Semi-Supervised Object Identification And Tracking, Michael P. Dessauer Jan 2011

Data Mining Based Learning Algorithms For Semi-Supervised Object Identification And Tracking, Michael P. Dessauer

Doctoral Dissertations

Sensor exploitation (SE) is the crucial step in surveillance applications such as airport security and search and rescue operations. It allows localization and identification of movement in urban settings and can significantly boost knowledge gathering, interpretation and action. Data mining techniques offer the promise of precise and accurate knowledge acquisition techniques in high-dimensional data domains (and diminishing the “curse of dimensionality” prevalent in such datasets), coupled by algorithmic design in feature extraction, discriminative ranking, feature fusion and supervised learning (classification). Consequently, data mining techniques and algorithms can be used to refine and process captured data and to detect, recognize, classify, …


Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb May 2010

Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb

Masters Theses

The battle for cyber supremacy is a cat and mouse game: evolving threats from internal and external sources make it difficult to protect critical systems. With the diverse and high risk nature of these threats, there is a need for robust techniques that can quickly adapt and address this evolution. Existing tools such as Splunk, Snort, and Bro help IT administrators defend their networks by actively parsing through network traffic or system log data. These tools have been thoroughly developed and have proven to be a formidable defense against many cyberattacks. However, they are vulnerable to zero-day attacks, slow attacks, …