Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab Dec 2018

A Transfer Learning Approach For Sentiment Classification., Omar Abdelwahab

Electronic Theses and Dissertations

The idea of developing machine learning systems or Artificial Intelligence agents that would learn from different tasks and be able to accumulate that knowledge with time so that it functions successfully on a new task that it has not seen before is an idea and a research area that is still being explored. In this work, we will lay out an algorithm that allows a machine learning system or an AI agent to learn from k different domains then uses some or no data from the new task for the system to perform strongly on that new task. In order …


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels Apr 2018

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short …


Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon Jan 2018

Measuring Goal Similarity Using Concept, Context And Task Features, Vahid Eyorokon

Browse all Theses and Dissertations

Goals can be described as the user's desired state of the agent and the world and are satisfied when the agent and the world are altered in such a way that the present state matches the desired state. For physical agents, they must act in the world to alter it in a series of individual atomic actions. Traditionally, agents use planning to create a chain of actions each of which altering the current world state and yielding a new one until the final action yields the desired goal state. Once this goal state has been achieved, the goal is said …


Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç Jan 2018

Modified Stacking Ensemble Approach To Detect Network Intrusion, Necati̇ Demi̇r, Gökhan Dalkiliç

Turkish Journal of Electrical Engineering and Computer Sciences

Detecting intrusions in a network traffic has remained an issue for researchers over the years. Advances in the area of machine learning provide opportunities to researchers to detect network intrusion without using a signature database. We studied and analyzed the performance of a stacking technique, which is an ensemble method that is used to combine different classification models to create a better classifier, on the KDD'99 dataset. In this study, the stacking method is improved by modifying the model generation and selection techniques and by using different classifications algorithms as a combiner method. Model generation is performed using subsets of …


An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa Jan 2018

An Adaptive Machine Learning-Based Qoe Approach In Sdn Context For Video-Streaming Services, Asma Ben Letaifa

Turkish Journal of Electrical Engineering and Computer Sciences

In data service applications over the Internet, user perception and satisfaction can be assessed by quality of experience (QoE) metrics. QoE depends both on the users' perception and the used service, which together form end-to-end metrics. While network optimization has traditionally focused on optimizing network properties such as QoS, we focus in this work on optimizing end-to-end QoE metrics with the aim to deliver to the client a good QoE that can be monitored in real time. We argue that end-user QoE is a relevant measurement for network operators and service providers. In this paper, we present a machine learning …


The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman Jan 2018

The Feasibility Of Dementia Caregiver Task Performance Measurement Using Smart Gaming Technology, Garrett G. Goodman

Browse all Theses and Dissertations

Dementia caregiver burnout is detrimental to both the familial caregiver and their loved ones with dementia. As the population of older adults increases, both the number of individuals with dementia and their corresponding caregivers increase as well. Thus, we are interested in developing a potential tool to non-invasively detect signs of caregiver burnout using a mobile application combined with machine learning. Hence, the mobile application "Caregiver Assessment using Smart Technology" (CAST) was developed which personalizes a word scramble game. The CAST application utilizes a heuristically constructed Fuzzy Inference System (FIS) optimized via a Genetic Algorithm (GA) to provide an individualized …


Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam Jan 2018

Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam

Electrical & Computer Engineering Theses & Dissertations

Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …