Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu Aug 2019

Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu

Electronic Thesis and Dissertation Repository

Based on the evolving communications, computing and embedded systems technologies, Internet of Things (IoT) systems can interconnect not only physical users and devices but also virtual services and objects, which have already been applied to many different application scenarios, such as smart home, smart healthcare, and intelligent transportation. With the rapid development, the number of involving devices increases tremendously. The huge number of devices and correspondingly generated data bring critical challenges to the IoT systems. To enhance the overall performance, this thesis aims to address the related technical issues on IoT data processing and physical topology discovery of the subnets …


Machine Learning Methodology Review For Computational Electromagnetics, He Ming Yao, Lijun Jiang, Huan Huan Zhang, Wei E.I. Sha Aug 2019

Machine Learning Methodology Review For Computational Electromagnetics, He Ming Yao, Lijun Jiang, Huan Huan Zhang, Wei E.I. Sha

Electrical and Computer Engineering Faculty Research & Creative Works

While machine learning is revolutionizing every corner of modern technologies, we have been attempting to explore whether machine learning methods could be used in computational electromagnetic (CEM). In this paper, five efforts in line with this direction are reviewed. They include forward methods such as the method of moments (MoM) solved by the artificial neural network training process, FDTD PML (perfectly matched layer) using the hyperbolic tangent basis function (HTBF), etc. There are also inverse problems that use the deep ConvNets for the effective source reconstruction and subwavelength imaging in the far-field. Benchmarks are provided to demonstrate the feasibility of …


Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo Jun 2019

Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo

Electronic Thesis and Dissertation Repository

The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …


Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang Jun 2019

Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang

Computer Science and Engineering

The dimension reduction of large scale high-dimensional data is a challenging task, especially the dimension reduction of face data and the accuracy increment of face recognition in the large scale face recognition system, which may cause large storage space and long recognition time. In order to further reduce the recognition time and the storage space in the large scale face recognition systems, on the basis of the general non-negative matrix factorization based on left semi-tensor (GNMFL) without dimension matching constraints proposed in our previous work, we propose a sparse GNMFL/L (SGNMFL/L) to decompose a large number of face data sets …


A Hierarchical, Fuzzy Inference Approach To Data Filtration And Feature Prioritization In The Connected Manufacturing Enterprise, Phillip Matthew Lacasse Apr 2019

A Hierarchical, Fuzzy Inference Approach To Data Filtration And Feature Prioritization In The Connected Manufacturing Enterprise, Phillip Matthew Lacasse

Theses and Dissertations

The current big data landscape is one such that the technology and capability to capture and storage of data has preceded and outpaced the corresponding capability to analyze and interpret it. This has led naturally to the development of elegant and powerful algorithms for data mining, machine learning, and artificial intelligence to harness the potential of the big data environment. A competing reality, however, is that limitations exist in how and to what extent human beings can process complex information. The convergence of these realities is a tension between the technical sophistication or elegance of a solution and its transparency …


Application Of Machine Learning And Artificial Intelligence In Proxy Modeling For Fluid Flow In Porous Media, Shohreh Amini, Shahab Mohaghegh Jan 2019

Application Of Machine Learning And Artificial Intelligence In Proxy Modeling For Fluid Flow In Porous Media, Shohreh Amini, Shahab Mohaghegh

Faculty & Staff Scholarship

Reservoir simulation models are the major tools for studying fluid flow behavior in hydrocarbon reservoirs. These models are constructed based on geological models, which are developed by integrating data from geology, geophysics, and petro-physics. As the complexity of a reservoir simulation model increases, so does the computation time. Therefore, to perform any comprehensive study which involves thousands of simulation runs, a very long period of time is required. Several efforts have been made to develop proxy models that can be used as a substitute for complex reservoir simulation models. These proxy models aim at generating the outputs of the numerical …


An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N Jan 2019

An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N

Turkish Journal of Electrical Engineering and Computer Sciences

Researchers train and build specific models to classify the presence and absence of a disease and the accuracy of such classification models is continuously improved. The process of building a model and training depends on the medical data utilized. Various machine learning techniques and tools are used to handle different data with respect to disease types and their clinical conditions. Classification is the most widely used technique to classify disease and the accuracy of the classifier largely depends on the attributes. The choice of the attribute largely affects the diagnosis and performance of the classifier. Due to growing large volumes …


Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli Jan 2019

Performance Tuning For Machine Learning-Based Software Development Effort Prediction Models, Egemen Ertuğrul, Zaki̇r Baytar, Çağatay Çatal, Ömer Can Muratli

Turkish Journal of Electrical Engineering and Computer Sciences

Software development effort estimation is a critical activity of the project management process. In this study, machine learning algorithms were investigated in conjunction with feature transformation, feature selection, and parameter tuning techniques to estimate the development effort accurately and a new model was proposed as part of an expert system. We preferred the most general-purpose algorithms, applied parameter optimization technique (GridSearch), feature transformation techniques (binning and one-hot-encoding), and feature selection algorithm (principal component analysis). All the models were trained on the ISBSG datasets and implemented by using the scikit-learn package in the Python language. The proposed model uses a multilayer …


Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq Jan 2019

Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq

Turkish Journal of Electrical Engineering and Computer Sciences

It is a knotty task to amicably identify the sporadically changing real-world context information of a learner during M-learning processes. Contextual information varies greatly during the learning process. Contextual information that affects the learner during a learning process includes background knowledge, learning time, learning location, and environmental situation. The computer programming skills of learners improve rapidly if they are encouraged to solve real-world programming problems. It is important to guide learners based on their contextual information in order to maximize their learning performance. In this paper, we proposed a cloud-supported machine learning system (CSMLS), which assists learners in learning practical …


A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan Jan 2019

A Hybrid Feature-Selection Approach For Finding The Digital Evidence Of Web Application Attacks, Mohammed Babiker, Eni̇s Karaarslan, Yaşar Hoşcan

Turkish Journal of Electrical Engineering and Computer Sciences

The most critical challenge of web attack forensic investigations is the sheer amount of data and level of complexity. Machine learning technology might be an efficient solution for web attack analysis and investigation. Consequently, machine learning applications have been applied in various areas of information security and digital forensics, and have improved over time. Moreover, feature selection is a crucial step in machine learning; in fact, selecting an optimal feature subset could enhance the accuracy and performance of the predictive model. To date, there has not been an adequate approach to select optimal features for the evidence of web attack. …


Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray Jan 2019

Energy Saving Scheduling In A Fog-Based Iot Application By Bayesian Task Classification Approach, Gholamreza Heydari, Dadmehr Rahbari, Mohsen Nickray

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things increases information volume in computer networks and the concept of fog will help us to control this volume more efficiently. Scheduling resources in such an environment would be an NP-Hard problem. This article has studied the concept of scheduling in fog with Bayesian classification which could be applied to gain the task requirements like the processing ones. After classification, virtual machines will be created in accordance with the predicted requirements. The ifogsim simulator has been applied to study our fog-based Bayesian classification scheduling (FBCS) method performance in an EEG tractor application. Algorithms have been evaluated on …