Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

2018

Discipline
Institution
Publication
Publication Type

Articles 1 - 27 of 27

Full-Text Articles in Computer Engineering

Reasoning About Ideal Interruptible Moments: A Soft Computing Implementation Of An Interruption Classifier In Free-Form Task Environments, Edward R. Sykes Dec 2018

Reasoning About Ideal Interruptible Moments: A Soft Computing Implementation Of An Interruption Classifier In Free-Form Task Environments, Edward R. Sykes

Publications and Scholarship

Current trends in society and technology make the concept of interruption a central human computer interaction problem. In this work, a novel soft computing implementation for an Interruption Classifier was designed, developed and evaluated that draws from a user model and real-time observations of the user's actions as s/he works on computer-based tasks to determine ideal times to interact with the user. This research is timely as the number of interruptions people experience daily has grown considerably over the last decade. Thus, systems are needed to manage interruptions by reasoning about ideal timings of interactions. This research shows: (1) the …


A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris Dec 2018

Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris

Master's Theses

Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to …


Search Rank Fraud Prevention In Online Systems, Md Mizanur Rahman Oct 2018

Search Rank Fraud Prevention In Online Systems, Md Mizanur Rahman

FIU Electronic Theses and Dissertations

The survival of products in online services such as Google Play, Yelp, Facebook and Amazon, is contingent on their search rank. This, along with the social impact of such services, has also turned them into a lucrative medium for fraudulently influencing public opinion. Motivated by the need to aggressively promote products, communities that specialize in social network fraud (e.g., fake opinions and reviews, likes, followers, app installs) have emerged, to create a black market for fraudulent search optimization. Fraudulent product developers exploit these communities to hire teams of workers willing and able to commit fraud collectively, emulating realistic, spontaneous activities …


Domain-Specific Use Cases For Knowledge-Enabled Social Media Analysis, Soon Jye Kho, Swati Padhee, Goonmeet Bajaj, Krishnaprasad Thirunarayan, Amit Sheth Sep 2018

Domain-Specific Use Cases For Knowledge-Enabled Social Media Analysis, Soon Jye Kho, Swati Padhee, Goonmeet Bajaj, Krishnaprasad Thirunarayan, Amit Sheth

Publications

No abstract provided.


Micro-Manipulation Using Learned Model, Matthew A. Lyng, Benjamin V. Johnson, David J. Cappelleri Aug 2018

Micro-Manipulation Using Learned Model, Matthew A. Lyng, Benjamin V. Johnson, David J. Cappelleri

The Summer Undergraduate Research Fellowship (SURF) Symposium

Microscale devices can be found in applications ranging from sensors to structural components. The dominance of surface forces at the microscale hinders the assembly processes through nonlinear interactions that are difficult to model for automation, limiting designs of microsystems to primarily monolithic structures. Methods for modeling surface forces must be presented for viable manufacturing of devices consisting of multiple microparts. This paper proposes the implementation of supervised machine learning models to aid in automated micromanipulation tasks for advanced manufacturing applications. The developed models use sets of training data to implicitly model surface interactions and predict end-effector placement and paths that …


Machine Learning For Internet Of Things Data Analysis: A Survey, Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain, Peyman Adibi, Payam Barnaghi, Amit Sheth Aug 2018

Machine Learning For Internet Of Things Data Analysis: A Survey, Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain, Peyman Adibi, Payam Barnaghi, Amit Sheth

Publications

Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the physical world. By 2020, it is estimated that the total number of Internet-connected devices being used will be between 25 and 50 billion. As these numbers grow and technologies become more mature, the volume of data being published will increase. The technology of Internet-connected devices, referred to as Internet of Things (IoT), continues to extend the current Internet by providing connectivity and interactions between the physical and cyber worlds. In addition to an increased volume, the …


Design Of A Distributed Real-Time E-Health Cyber Ecosystem With Collective Actions: Diagnosis, Dynamic Queueing, And Decision Making, Yanlin Zhou May 2018

Design Of A Distributed Real-Time E-Health Cyber Ecosystem With Collective Actions: Diagnosis, Dynamic Queueing, And Decision Making, Yanlin Zhou

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

In this thesis, we develop a framework for E-health Cyber Ecosystems, and look into different involved actors. The three interested parties in the ecosystem including patients, doctors, and healthcare providers are discussed in 3 different phases. In Phase 1, machine-learning based modeling and simulation analysis is performed to remotely predict a patient's risk level of having heart diseases in real time. In Phase 2, an online dynamic queueing model is devised to pair doctors with patients having high risk levels (diagnosed in Phase 1) to confirm the risk, and provide help. In Phase 3, a decision making paradigm is proposed …


Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke May 2018

Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke

Library Staff Publications

No abstract provided.


Real-Time Object Detection And Tracking On Drones, Tu Le May 2018

Real-Time Object Detection And Tracking On Drones, Tu Le

Undergraduate Research & Mentoring Program

Unmanned aerial vehicles, also known as drones, have been more and more widely used in recent decades because of their mobility. They appear in many applications such as farming, search and rescue, entertainment, military, and so on. Such high demands for drones lead to the need of developments in drone technologies. Next generations of commercial and military drones are expected to be aware of surrounding objects while flying autonomously in different terrains and conditions. One of the biggest challenges to drone automation is the ability to detect and track objects of interest in real-time. While there are many robust machine …


Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum May 2018

Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum

Electronic Theses and Dissertations

This thesis presents an applied horse racing prediction using graph based features on a set of horse races data. We used artificial neural network and logistic regression models to train then test to prediction without graph based features and with graph based features. This thesis can be explained in 4 main parts. Collect data from a horse racing website held from 2015 to 2017. Train data to using predictive models and make a prediction. Create a global directed graph of horses and extract graph-based features (Core Part) . Add graph based features to basic features and train to using same …


End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane May 2018

End-To-End Learning Framework For Circular Rna Classification From Other Long Non-Coding Rnas Using Multi-Modal Deep Learning., Mohamed Chaabane

Electronic Theses and Dissertations

Over the past two decades, a circular form of RNA (circular RNA) produced from splicing mechanism has become the focus of scientific studies due to its major role as a microRNA (miR) ac tivity modulator and its association with various diseases including cancer. Therefore, the detection of circular RNAs is a vital operation for continued comprehension of their biogenesis and purpose. Prediction of circular RNA can be achieved by first distinguishing non-coding RNAs from protein coding gene transcripts, separating short and long non-coding RNAs (lncRNAs), and finally pre dicting circular RNAs from other lncRNAs. However, available tools to distinguish circular …


A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik May 2018

A Framework For Cardio-Pulmonary Resuscitation (Cpr) Scene Retrieval From Medical Simulation Videos Based On Object And Activity Detection., Anju Panicker Madhusoodhanan Sathik

Electronic Theses and Dissertations

In this thesis, we propose a framework to detect and retrieve CPR activity scenes from medical simulation videos. Medical simulation is a modern training method for medical students, where an emergency patient condition is simulated on human-like mannequins and the students act upon. These simulation sessions are recorded by the physician, for later debriefing. With the increasing number of simulation videos, automatic detection and retrieval of specific scenes became necessary. The proposed framework for CPR scene retrieval, would eliminate the conventional approach of using shot detection and frame segmentation techniques. Firstly, our work explores the application of Histogram of Oriented …


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels Apr 2018

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short …


Sistema Para El Aprendizaje Del Lenguaje De Señas Colombiano Usando Visión Por Computador, Iván Camilo Triviño López Jan 2018

Sistema Para El Aprendizaje Del Lenguaje De Señas Colombiano Usando Visión Por Computador, Iván Camilo Triviño López

Ingeniería en Automatización

El reconocimiento de gestos con las manos es un área de investigación que ha capturado la atención de muchos investigadores para el desarrollo de aplicaciones de interacción Humano-Máquina (HCI, por sus siglas en inglés), entre las que se pueden encontrar realidad virtual, realidad aumentada, juegos, aplicaciones educativas, entre otras. En el presente proyecto de investigación se desarrolló un sistema para el apoyo de la enseñanza del lenguaje de señas a través de una aplicación HCI que emplea visión por computador; el sistema propuesto le indica al usuario a través de una imagen o un videoclip, qué seña debe ejecutar y …


Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon Jan 2018

Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon

Browse all Theses and Dissertations

Goals can be described as the user's desired state of the agent and the world and are satisfied when the agent and the world are altered in such a way that the present state matches the desired state. For physical agents, they must act in the world to alter it in a series of individual atomic actions. Traditionally, agents use planning to create a chain of actions each of which altering the current world state and yielding a new one until the final action yields the desired goal state. Once this goal state has been achieved, the goal is said …


Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez Jan 2018

Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez

Other resources

As research on hate speech becomes more and more relevant every day, most of it is still focused on hate speech detection. By attempting to replicate a hate speech detection experiment performed on an existing Twitter corpus annotated for hate speech, we highlight some issues that arise from doing research in the field of hate speech, which is essentially still in its infancy. We take a critical look at the training corpus in order to understand its biases, while also using it to venture beyond hate speech detection and investigate whether it can be used to shed light on other …


Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç Jan 2018

Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç

Turkish Journal of Electrical Engineering and Computer Sciences

Detecting intrusions in a network traffic has remained an issue for researchers over the years. Advances in the area of machine learning provide opportunities to researchers to detect network intrusion without using a signature database. We studied and analyzed the performance of a stacking technique, which is an ensemble method that is used to combine different classification models to create a better classifier, on the KDD'99 dataset. In this study, the stacking method is improved by modifying the model generation and selection techniques and by using different classifications algorithms as a combiner method. Model generation is performed using subsets of …


Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez Jan 2018

Examining A Hate Speech Corpus For Hate Speech Detection And Popularity Prediction, Filip Klubicka, Raquel Fernandez

Conference papers

As research on hate speech becomes more and more relevant every day, most of it is still focused on hate speech detection. By attempting to replicate a hate speech detection experiment performed on an existing Twitter corpus annotated for hate speech, we highlight some issues that arise from doing research in the field of hate speech, which is essentially still in its infancy. We take a critical look at the training corpus in order to understand its biases, while also using it to venture beyond hate speech detection and investigate whether it can be used to shed light on other …


Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam Jan 2018

Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam

Electrical & Computer Engineering Theses & Dissertations

Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …


Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan Jan 2018

Developing A Recurrent Neural Network With High Accuracy For Binary Sentiment Analysis, Kevin Cunanan

CMC Senior Theses

Sentiment analysis has taken on various machine learning approaches in order to optimize accuracy, precision, and recall. However, Long Short-Term Memory (LSTM) Recurrent Neural Networks (RNNs) account for the context of a sentence by using previous predictions as additional input for future sentence predictions. Our approach focused on developing an LSTM RNN that could perform binary sentiment analysis for positively and negatively labeled sentences. In collaboration with Mariam Salloum, I developed a collection of programs to classify individual sentences as either positive or negative. This paper additionally looks into machine learning, neural networks, data preprocessing, implementation, and resulting comparisons.


An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa Jan 2018

An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa

Turkish Journal of Electrical Engineering and Computer Sciences

In data service applications over the Internet, user perception and satisfaction can be assessed by quality of experience (QoE) metrics. QoE depends both on the users' perception and the used service, which together form end-to-end metrics. While network optimization has traditionally focused on optimizing network properties such as QoS, we focus in this work on optimizing end-to-end QoE metrics with the aim to deliver to the client a good QoE that can be monitored in real time. We argue that end-user QoE is a relevant measurement for network operators and service providers. In this paper, we present a machine learning …


Adapt At Semeval-2018 Task 9: Skip-Gram Word Embeddings For Unsupervised Hypernym Discovery In Specialised Corpora, Alfredo Maldonado, Filip Klubicka Jan 2018

Adapt At Semeval-2018 Task 9: Skip-Gram Word Embeddings For Unsupervised Hypernym Discovery In Specialised Corpora, Alfredo Maldonado, Filip Klubicka

Other resources

This paper describes a simple but competitive unsupervised system for hypernym discovery. The system uses skip-gram word embeddings with negative sampling, trained on specialised corpora. Candidate hypernyms for an input word are predicted based on cosine similar- ity scores. Two sets of word embedding mod- els were trained separately on two specialised corpora: a medical corpus and a music indus- try corpus. Our system scored highest in the medical domain among the competing unsu- pervised systems but performed poorly on the music industry domain. Our approach does not depend on any external data other than raw specialised corpora.


From Business Understanding To Deployment: An Application Of Machine Learning Algorithms To Forecast Customer Visits Per Hour To A Fast-Casual Restaurant In Dublin, Odunayo David Adedeji Jan 2018

From Business Understanding To Deployment: An Application Of Machine Learning Algorithms To Forecast Customer Visits Per Hour To A Fast-Casual Restaurant In Dublin, Odunayo David Adedeji

Dissertations

This research project identifies the significant factors that affects the number of customer visits to a fast-casual restaurant every hour and proceeds to develop several machine learning models to forecast customer visits. The core value proposition of fast-casual restaurants is quality food delivered at speed which means they have to prepare meals in advance of customers visit but the problem with this approach is in forecasting future demand, under estimating demand could lead to inadequate meal preparation which would leave customers unsatisfied while over estimation of demand could lead to wastage especially with restaurants having to comply with food safety …


Application Of Synthetic Informative Minority Over-Sampling (Simo) Algorithm Leveraging Support Vector Machine (Svm) On Small Datasets With Class Imbalance, Akshatha Fakkeriah Kallappanamatt Jan 2018

Application Of Synthetic Informative Minority Over-Sampling (Simo) Algorithm Leveraging Support Vector Machine (Svm) On Small Datasets With Class Imbalance, Akshatha Fakkeriah Kallappanamatt

Dissertations

Developing predictive models for classification problems considering imbalanced datasets is one of the basic difficulties in data mining and decision-analytics. A classifier’s performance will decline dramatically when applied to an imbalanced dataset. Standard classifiers such as logistic regression, Support Vector Machine (SVM) are appropriate for balanced training sets whereas provides suboptimal classification results when used on unbalanced dataset. Performance metric with prediction accuracy encourages a bias towards the majority class, while the rare instances remain unknown though the model contributes a high overall precision. There are chances where minority instances might be treated as noise and vice versa. (Haixiang et …


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …


The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman Jan 2018

The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman

Browse all Theses and Dissertations

Dementia caregiver burnout is detrimental to both the familial caregiver and their loved ones with dementia. As the population of older adults increases, both the number of individuals with dementia and their corresponding caregivers increase as well. Thus, we are interested in developing a potential tool to non-invasively detect signs of caregiver burnout using a mobile application combined with machine learning. Hence, the mobile application "Caregiver Assessment using Smart Technology" (CAST) was developed which personalizes a word scramble game. The CAST application utilizes a heuristically constructed Fuzzy Inference System (FIS) optimized via a Genetic Algorithm (GA) to provide an individualized …