Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (250)
- Physical Sciences and Mathematics (244)
- Computer and Systems Architecture (209)
- Computer Sciences (199)
- Digital Communications and Networking (176)
-
- Social and Behavioral Sciences (126)
- Other Electrical and Computer Engineering (116)
- Data Storage Systems (111)
- Hardware Systems (111)
- Other Computer Sciences (100)
- Robotics (81)
- Mathematics (71)
- Systems and Communications (67)
- Computational Engineering (64)
- Logic and Foundations (59)
- Other Mathematics (59)
- Arts and Humanities (58)
- Signal Processing (55)
- Algebra (46)
- VLSI and Circuits, Embedded and Hardware Systems (45)
- Education (44)
- Artificial Intelligence and Robotics (38)
- Business (38)
- Software Engineering (37)
- Communication (36)
- Library and Information Science (33)
- Medicine and Health Sciences (33)
- Institution
-
- California Polytechnic State University, San Luis Obispo (226)
- Chapman University (85)
- Selected Works (56)
- University of Nebraska - Lincoln (55)
- SelectedWorks (54)
-
- Technological University Dublin (47)
- Western University (41)
- University of Tennessee, Knoxville (40)
- University of New Mexico (32)
- California State University, San Bernardino (29)
- Purdue University (29)
- University of Massachusetts Amherst (29)
- Embry-Riddle Aeronautical University (26)
- Kennesaw State University (24)
- Louisiana State University (24)
- City University of New York (CUNY) (22)
- University of Louisville (22)
- West Virginia University (22)
- University of Arkansas, Fayetteville (20)
- University of North Florida (20)
- Florida International University (19)
- San Jose State University (19)
- Southern Methodist University (19)
- Air Force Institute of Technology (18)
- Association of Arab Universities (15)
- Boise State University (15)
- University of Central Florida (14)
- Michigan Technological University (12)
- The University of Akron (10)
- University of Kentucky (9)
- Keyword
-
- Machine learning (56)
- Machine Learning (51)
- Deep learning (35)
- Deep Learning (33)
- Cybersecurity (26)
-
- Security (23)
- Inventive Problem Solving (22)
- Software Patents (21)
- Artificial intelligence (20)
- Software inventions (20)
- Android (19)
- Computer Science (19)
- Computer Vision (19)
- Graphical User Interface (19)
- Software (19)
- TRIZ (18)
- Blockchain (17)
- Artificial Intelligence (16)
- Computer security (16)
- GUI (16)
- Thesis; University of North Florida; UNF; Dissertations (16)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (14)
- Anti-virus (14)
- Computer Anti-Virus (14)
- Computer virus (14)
- Innovation (14)
- Virtual reality (14)
- Anti-virus design (13)
- Anti-virus software (13)
- Coalgebra (13)
- Publication Year
- Publication
-
- Computer Engineering (104)
- Engineering Faculty Articles and Research (79)
- Master's Theses (59)
- Computer Science and Software Engineering (43)
- Doctoral Dissertations (39)
-
- Electronic Thesis and Dissertation Repository (39)
- Umakant Mishra (39)
- Electronic Theses and Dissertations (38)
- Theses and Dissertations (36)
- Library Philosophy and Practice (e-journal) (33)
- Conference papers (30)
- Electronic Theses, Projects, and Dissertations (27)
- Masters Theses (26)
- Branch Mathematics and Statistics Faculty and Staff Publications (24)
- Graduate Theses, Dissertations, and Problem Reports (22)
- UNF Graduate Theses and Dissertations (19)
- FIU Electronic Theses and Dissertations (18)
- Honors Theses (18)
- Master's Projects (18)
- Computer Science and Computer Engineering Undergraduate Honors Theses (14)
- Future Computing and Informatics Journal (13)
- Boise State University Theses and Dissertations (12)
- Human-Machine Communication (12)
- LSU Doctoral Dissertations (12)
- Articles (11)
- Dissertations, Master's Theses and Master's Reports (11)
- LSU Master's Theses (11)
- Dissertations, Theses, and Capstone Projects (9)
- Martin L Griss (9)
- SMU Data Science Review (9)
Articles 1 - 30 of 1330
Full-Text Articles in Other Computer Engineering
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Undergraduate Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Breast Cancer Classification With Machine Learning, Rahanuma Tarannum
Breast Cancer Classification With Machine Learning, Rahanuma Tarannum
ATU Research Symposium
Breast cancer is one of the foremost causes of death amongst women worldwide. Breast tumours are characteristically classified as either benign (non-cancerous) or malignant (cancerous). Benign tumours do not spread external side of the breast and are not fatal, whereas malignant tumours can metastasize and be incurable if untreated. Rapidly and accurate diagnosis of malignant tumours is significant for efficient treatment and advanced outcomes. In 2022, breast cancer claimed 670 000 lives worldwide. Women without any particular risk factors other than age and sex account for half of all cases of breast cancer. In 157 out of 185 nations, breast …
Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson
Pyroscan: Wildfire Behavior Prediction System, Derek H. Thompson, Parker A. Padgett, Timothy C. Johnson
ATU Research Symposium
During a wildfire, it is of the utmost importance to be updated about all information of the wildfire. Wind speed, wind direction and dry grass often works as fuel for the fire allowing it to spread in multiple directions. These different factors are often issues for any firefighting organization that is trying to help fight the fire. An uncontrolled wildfire is often a threat to wildlife, property, and worse, human and animal lives. In our paper, we propose an artificial intelligence (AI) powered fire tracking and prediction application utilizing Unmanned Aerial Vehicles (UAV) to inform fire fighters regarding the probability …
League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman
League Of Learning: Deep Learning For Soccer Action Video Classification, Musfikur Rahaman
ATU Research Symposium
The field of sports video analysis using deep learning is rapidly advancing. Proper classification and analysis of sports videos are essential to manage the growing sports media content. It offers numerous benefits for the media, advertising, analytics, and education sectors. Soccer, also known as football, worldwide, is among the most popular sports. This research study used a deep learning-based approach for soccer action detection. Deep learning has become a popular machine learning technique, especially for image and video classification. We have used the SoccerAct dataset, which consists of ten soccer actions like corner, foul, freekick, goal kick, long pass, on …
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Cybersecurity Undergraduate Research Showcase
This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Revolutionizing Feature Selection: A Breakthrough Approach For Enhanced Accuracy And Reduced Dimensions, With Implications For Early Medical Diagnostics, Shabia Shabir Khan, Majid Shafi Kawoosa, Bonny Bannerjee, Subhash C. Chauhan, Sheema Khan
Research Symposium
Background: The system's performance may be impacted by the high-dimensional feature dataset, attributed to redundant, non-informative, or irrelevant features, commonly referred to as noise. To mitigate inefficiency and suboptimal performance, our goal is to identify the optimal and minimal set of features capable of representing the entire dataset. Consequently, the Feature Selector (Fs) serves as an operator, transforming an m-dimensional feature set into an n-dimensional feature set. This process aims to generate a filtered dataset with reduced dimensions, enhancing the algorithm's efficiency.
Methods: This paper introduces an innovative feature selection approach utilizing a genetic algorithm with an ensemble crossover operation …
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
ELAIA
A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Master's Theses
Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …
Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada
Text Summarization, Varun Gottam, Anusha Vunnam, Purna Sarovar Puvvada
Symposium of Student Scholars
The current era is known as the information era. Every day, millions of gigabytes of data are being transferred from one point to another. As the creation of data became easy, it became hard to keep track of the important points and the gist of data especially in areas such as research and news. To solve this conundrum, text summarization is introduced. This is a process of summarizing text from across different documents or large datasets such that it can be read and understood easily by both humans and machines.
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino
Center for Cybersecurity
In brief:
- Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
- This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.
Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)
Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo
Dissertations, Theses, and Capstone Projects
This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
Journal of Police and Legal Sciences
The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
Arkansas Law Review
As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Al-Azhar Bulletin of Science
Smart homes represent intelligent environments where interconnected devices gather information, enhancing users’ living experiences by ensuring comfort, safety, and efficient energy management. To enhance the quality of life, companies in the smart device industry collect user data, including activities, preferences, and power consumption. However, sharing such data necessitates privacy-preserving practices. This paper introduces a robust method for secure sharing of data to service providers, grounded in differential privacy (DP). This empowers smart home residents to contribute usage statistics while safeguarding their privacy. The approach incorporates the Synthetic Minority Oversampling technique (SMOTe) and seamlessly integrates Gaussian noise to generate synthetic data, …
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar
Electronic Theses and Dissertations
Graph summarization is a fundamental problem in the field of data analysis, aiming to distill extensive graph datasets into more manageable, yet informative representations. The challenge lies in creating compressed graphs that faithfully retain crucial structural information for downstream tasks. A recent advancement in this domain introduces an optimal transport-based framework that enables the incorporation of a priori knowledge regarding the importance of nodes, edges, and attributes during the graph summarization process. However, the statistical properties of this innovative framework remain largely unexplored. This master's thesis embarks on a comprehensive exploration of the field of graph summarization, with a particular …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Docai, Riley Badnin, Justin Brunings
Docai, Riley Badnin, Justin Brunings
Computer Science and Software Engineering
DocAI presents a user-friendly platform for recording, transcribing, summarizing, and classifying doctor-patient consultations. The application utilizes AssemblyAI for conversational transcription, and the user interface allows users to either live-record consultations or upload an existing MP3 file. The classification process, powered by 'ml-classify-text,' organizes the consultation transcription into SOAP (Subjective, Objective, Assessment, and Plan) format – a widely used method of documentation for healthcare providers. The result of this development is a simple yet effective interface that effectively plays the role of a medical scribe. However, the application is still facing challenges of inconsistent summarization from the AssemblyAI backend. Future work …
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Development Of A Machine Learning System For Irrigation Decision Support With Disparate Data Streams, Eric Wilkening
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
In recent years, advancements in irrigation technologies have led to increased efficiency in irrigation applications, encompassing the adoption of practices that utilize data-driven irrigation scheduling and leveraging variable rate irrigation (VRI). These technological improvements have the potential to reduce water withdrawals and diversions from both groundwater and surface water sources. However, it is vital to recognize that improved application efficiency does not necessarily equate to increased water availability for future or downstream use. This is particularly crucial in the context of consumptive water use, which refers to water consumed and not returned to the local or sub-regional watershed, representing a …
An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks
An Investigation Of Match For Lossless Video Compression, Brittany Sullivan-Reicks
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
A new lossless video compression technique, Match, is investigated. Match uses the similarity between the frames of a video or the slices of medical images to find a prediction for the current pixel. A portion of the previous frame is searched to find a matching context, which is the pixels surrounding the current pixel, within some distance centered on the current location. The best distance to use for each dataset is found experimentally. The matching context refers to the neighborhood of w, nw, n, and ne, where the pixel in the previous frame with the closest matching context becomes the …
Quiz Web Application, Dipti Rathod
Quiz Web Application, Dipti Rathod
Electronic Theses, Projects, and Dissertations
The Quiz web application is designed to facilitate the process of quiz creation and participation. This web application mainly consists of three roles: Admin, Instructor, and Student. Each role has specific features, functionalities, and permissions. With a user-friendly interface, the admin role can handle the departments, courses, and instructors. This web application also ensures smooth quiz management, allowing the instructors to schedule the upcoming quizzes, create the questions, and manage the students with ease. Student roles have features like taking quizzes and seeing their results. Additionally, this web application includes a significant feature to prevent cheating during online tests, ensuring …
Real-Time Analysis Of Aerosol Size Distributions With The Fast Integrated Mobility Spectrometer (Fims), Daisy Wang
Real-Time Analysis Of Aerosol Size Distributions With The Fast Integrated Mobility Spectrometer (Fims), Daisy Wang
McKelvey School of Engineering Theses & Dissertations
The Fast Integrated Mobility Spectrometer (FIMS) has emerged as an innovative instrument in the aerosol science domain. It employs a spatially varying electric field to separate charged aerosol particles by their electrical mobilities. These separated particles are then enlarged through vapor condensation and imaged in real time by a high-speed CCD camera. FIMS achieves near 100% detection efficiency for particles ranging from 10 nm to 600 nm with a temporal resolution of one second. However, FIMS’ real-time capabilities are limited by an offline data analysis process. Deferring analysis until hours or days after measurement makes FIMS' capabilities less valuable for …
Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh
Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project explores the use of machine learning algorithms to detect machine failure. The research questions are: Q1) How does the quality of input data, including issues such as outliers, and noise, impact the accuracy and reliability of machine failure prediction models in industrial settings? Q2) How does the integration of SMOTE with feature engineering techniques influence the overall performance of machine learning models in detecting and preventing machine failures? Q3) What is the performance of different machine learning algorithms in predicting machine failures, and which algorithm is the most effective? The research findings are: Q1) Effective outlier …
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …