Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 149

Full-Text Articles in Entire DC Network

The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein Feb 2024

The Impact Of Artificial Intelligence And Machine Learning On Organizations Cybersecurity, Mustafa Abdulhussein

Doctoral Dissertations and Projects

As internet technology proliferate in volume and complexity, the ever-evolving landscape of malicious cyberattacks presents unprecedented security risks in cyberspace. Cybersecurity challenges have been further exacerbated by the continuous growth in the prevalence and sophistication of cyber-attacks. These threats have the capacity to disrupt business operations, erase critical data, and inflict reputational damage, constituting an existential threat to businesses, critical services, and infrastructure. The escalating threat is further compounded by the malicious use of artificial intelligence (AI) and machine learning (ML), which have increasingly become tools in the cybercriminal arsenal. In this dynamic landscape, the emergence of offensive AI introduces …


Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud Jan 2024

Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud

Journal of Statistics Applications & Probability

Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics …


Algorithm Selection Using Edge Ml And Case-Based Reasoning, Rahman Ali, Muhammad Sadiq Hassan Zada, Asad Masood Khatak, Jamil Hussain Dec 2023

Algorithm Selection Using Edge Ml And Case-Based Reasoning, Rahman Ali, Muhammad Sadiq Hassan Zada, Asad Masood Khatak, Jamil Hussain

All Works

In practical data mining, a wide range of classification algorithms is employed for prediction tasks. However, selecting the best algorithm poses a challenging task for machine learning practitioners and experts, primarily due to the inherent variability in the characteristics of classification problems, referred to as datasets, and the unpredictable performance of these algorithms. Dataset characteristics are quantified in terms of meta-features, while classifier performance is evaluated using various performance metrics. The assessment of classifiers through empirical methods across multiple classification datasets, while considering multiple performance metrics, presents a computationally expensive and time-consuming obstacle in the pursuit of selecting the optimal …


Predicting University Campus Parking Demand Using Machine Learning Models, Sohil Paudel, Matthew Vechione, Okan Gurbuz Sep 2023

Predicting University Campus Parking Demand Using Machine Learning Models, Sohil Paudel, Matthew Vechione, Okan Gurbuz

Civil Engineering Faculty Publications and Presentations

Parking demand at university campuses has been an issue for decades and is gradually increasing each year. With limited capacity, space, and funds to expand parking facilities, there is a dire need to better understand parking behavior on a university campus so that universities can better utilize the limited resources available. One methodology that has been used by Metropolitan Planning Organizations to predict traveler behavior is known as travel demand modeling, where the most common modeling technique is a four-step procedure that utilizes socioeconomic data to predict current and future traffic volumes in a network (e.g., a city). This study …


Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez Aug 2023

Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez

Masters Theses

In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …


Cyber Attack Surface Mapping For Offensive Security Testing, Douglas Everson Aug 2023

Cyber Attack Surface Mapping For Offensive Security Testing, Douglas Everson

All Dissertations

Security testing consists of automated processes, like Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST), as well as manual offensive security testing, like Penetration Testing and Red Teaming. This nonautomated testing is frequently time-constrained and difficult to scale. Previous literature suggests that most research is spent in support of improving fully automated processes or in finding specific vulnerabilities, with little time spent improving the interpretation of the scanned attack surface critical to nonautomated testing. In this work, agglomerative hierarchical clustering is used to compress the Internet-facing hosts of 13 representative companies as collected by the Shodan search …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Development Of A Scalable Edge-Cloud Computing Based Variable Rate Irrigation Scheduling Framework, Eric J. Wilkening, Derek M. Heeren, Yeyin Shi, Abia Katimbo, Precious N. Amori, Guillermo R. Balboa, Laila A. Puntel, Kuan Zhang, Daran R. Rudnick Jul 2023

Development Of A Scalable Edge-Cloud Computing Based Variable Rate Irrigation Scheduling Framework, Eric J. Wilkening, Derek M. Heeren, Yeyin Shi, Abia Katimbo, Precious N. Amori, Guillermo R. Balboa, Laila A. Puntel, Kuan Zhang, Daran R. Rudnick

Department of Biological Systems Engineering: Conference Presentations and White Papers

Currently, variable-rate precision irrigation (VRI) scheduling methods require large amounts of data and processing time to accurately determine crop water demands and spatially process those demands into an irrigation prescription. Unfortunately, irrigated crops continue to develop additional water stress when the previously collected data is being processed. Machine learning is a helpful tool, but handling and transmitting large datasets can be problematic; more rural areas may not have access to necessary wireless data transmission infrastructure to support cloud interaction. The introduction of “edge-cloud” processing to agricultural applications has shown to be effective at increasing data processing speed and reducing the …


Cropland Mapping In Tropical Smallholder Systems With Seasonally Stratified Sentinel-1 And Sentinel-2 Spectral And Textural Features, Manushi B. Trivedi, Michael Marshall, Lyndon Estes, C.A.J.M. De Bie, Ling Chang, Andrew Nelson Jun 2023

Cropland Mapping In Tropical Smallholder Systems With Seasonally Stratified Sentinel-1 And Sentinel-2 Spectral And Textural Features, Manushi B. Trivedi, Michael Marshall, Lyndon Estes, C.A.J.M. De Bie, Ling Chang, Andrew Nelson

Geography

Mapping arable field areas is crucial for assessing agricultural productivity but poses challenges in sub-Saharan agroecosystems because of diverse crop calendars, small and irregularly shaped fields, persistent cloud cover, and lack of high-quality model training data. This study proposes several methodological improvements to overcome these challenges. Specifically, it utilizes long-term MODIS data to stratify finer Sentinel-2 reflectance and Sentinel-1 backscatter image features on a per-pixel basis. It also incorporates texture features and employs a machine learning approach with over 300,000 samples. The eastern region of Ghana was stratified into seven seasonal strata exhibiting distinct vegetation seasonality, capturing diversity in crop …


Hardware Accelerators And Their Use In Computer Vision, Cameron Villone May 2023

Hardware Accelerators And Their Use In Computer Vision, Cameron Villone

Theses

The evolution of technology is impressive. Before digital, there was analog; before software, there needed hardware. This evolution is natural as we try and optimize technology for our needs. The shift to digital was fueled by the space saved from using digital systems compared to analog. When it came to software, the ability to use generic hardware in the forms of cen- tral processing units; CPUs, Graphics Processing Units; GPUs, and Random Access Memory; RAM allowed for complex software solutions to be able to run on many different devices with- out much need for translations. With software development getting so …


A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang May 2023

A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang

Research outputs 2022 to 2026

Recently, various sophisticated methods, including machine learning and artificial intelligence, have been employed to examine health-related data. Medical professionals are acquiring enhanced diagnostic and treatment abilities by utilizing machine learning applications in the healthcare domain. Medical data have been used by many researchers to detect diseases and identify patterns. In the current literature, there are very few studies that address machine learning algorithms to improve healthcare data accuracy and efficiency. We examined the effectiveness of machine learning algorithms in improving time series healthcare metrics for heart rate data transmission (accuracy and efficiency). In this paper, we reviewed several machine learning …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Ambient Electromagnetic Radiation As A Predictor Of Honey Bee (Apis Mellifera) Traffic In Linear And Non-Linear Regression: Numerical Stability, Physical Time And Energy Efficiency, Vladimir Kulyukin, Daniel Coster, Anastasiia Tkachenko, Daniel Hornberger, Aleksey V. Kulyukin Feb 2023

Ambient Electromagnetic Radiation As A Predictor Of Honey Bee (Apis Mellifera) Traffic In Linear And Non-Linear Regression: Numerical Stability, Physical Time And Energy Efficiency, Vladimir Kulyukin, Daniel Coster, Anastasiia Tkachenko, Daniel Hornberger, Aleksey V. Kulyukin

Computer Science Faculty and Staff Publications

Since bee traffic is a contributing factor to hive health and electromagnetic radiation has a growing presence in the urban milieu, we investigate ambient electromagnetic radiation as a predictor of bee traffic in the hive’s vicinity in an urban environment. To that end, we built two multi-sensor stations and deployed them for four and a half months at a private apiary in Logan, Utah, U.S.A. to record ambient weather and electromagnetic radiation. We placed two non-invasive video loggers on two hives at the apiary to extract omnidirectional bee motion counts from videos. The time-aligned datasets were used to evaluate 200 …


Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq Feb 2023

Towards Machine Learning-Based Fpga Backend Flow: Challenges And Opportunities, Imran Taj, Umer Farooq

All Works

Field-Programmable Gate Array (FPGA) is at the core of System on Chip (SoC) design across various Industry 5.0 digital systems—healthcare devices, farming equipment, autonomous vehicles and aerospace gear to name a few. Given that pre-silicon verification using Computer Aided Design (CAD) accounts for about 70% of the time and money spent on the design of modern digital systems, this paper summarizes the machine learning (ML)-oriented efforts in different FPGA CAD design steps. With the recent breakthrough of machine learning, FPGA CAD tasks—high-level synthesis (HLS), logic synthesis, placement and routing—are seeing a renewed interest in their respective decision-making steps. We focus …


A Quantum Approach To Language Modeling, Constantijn Van Der Poel Feb 2023

A Quantum Approach To Language Modeling, Constantijn Van Der Poel

Dissertations, Theses, and Capstone Projects

This dissertation consists of six chapters. . . Chapter 1: We introduce language modeling, outline the software used for this thesis, and discuss related work. Chapter 2: We will unpack the transition from classical to quantum probabilities, as well as motivate their use in building a model to understand language-like datasets. Chapter 3: We motivate the Motzkin dataset, the models we will be investigating, as well as the necessary algorithms to do calculations with them. Chapter 4: We investigate our models’ sensitivity to various hyperparameters. Chapter 5: We compare the performance and robustness of the models. Chapter 6: We conclude …


Investigating The Effects Of Network Dynamics On Quality Of Delivery Prediction And Monitoring For Video Delivery Networks, Obinna C. Izima Jan 2023

Investigating The Effects Of Network Dynamics On Quality Of Delivery Prediction And Monitoring For Video Delivery Networks, Obinna C. Izima

Doctoral

Video streaming over the Internet requires an optimized delivery system given the advances in network architecture, for example, Software Defined Networks. Machine Learning (ML) models have been deployed in an attempt to predict the quality of the video streams. Some of these efforts have considered the prediction of Quality of Delivery (QoD) metrics of the video stream in an effort to measure the quality of the video stream from the network perspective. In most cases, these models have either treated the ML algorithms as black-boxes or failed to capture the network dynamics of the associated video streams.

This PhD investigates …


Quantum Computing And Its Applications In Healthcare, Vu Giang Jan 2023

Quantum Computing And Its Applications In Healthcare, Vu Giang

OUR Journal: ODU Undergraduate Research Journal

This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


Health Care Equity Through Intelligent Edge Computing And Augmented Reality/Virtual Reality: A Systematic Review, Vishal Lakshminarayanan, Aswathy Ravikumar, Harini Sriraman, Sujatha Alla, Vijay Kumar Chattu Jan 2023

Health Care Equity Through Intelligent Edge Computing And Augmented Reality/Virtual Reality: A Systematic Review, Vishal Lakshminarayanan, Aswathy Ravikumar, Harini Sriraman, Sujatha Alla, Vijay Kumar Chattu

Engineering Management & Systems Engineering Faculty Publications

Intellectual capital is a scarce resource in the healthcare industry. Making the most of this resource is the first step toward achieving a completely intelligent healthcare system. However, most existing centralized and deep learning-based systems are unable to adapt to the growing volume of global health records and face application issues. To balance the scarcity of healthcare resources, the emerging trend of IoMT (Internet of Medical Things) and edge computing will be very practical and cost-effective. A full examination of the transformational role of intelligent edge computing in the IoMT era to attain health care equity is offered in this …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu Jan 2023

Early Diagnosis Of Pancreatic Cancer By Machine Learning Methods Using Urine Biomarker Combinations, İrem Acer, Firat Orhan Bulucu, Semra İçer, Fatma Lati̇foğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The most common type of pancreatic cancer is pancreatic ductal adenocarcinoma (PDAC), which accounts for the vast majority of pancreatic cancers. The five-year survival rate for PDAC due to late diagnosis is 9%. Early diagnosed PDAC patients survive longer than patients diagnosed at a more advanced stage. Biomarkers can play an essential role in the early detection of PDAC to assist the health professional. Machine learning and deep learning methods are used with biomarkers obtained in recent studies for diagnostic purposes. In order to increase the survival rates of PDAC patients, early diagnosis of the disease with a noninvasive test …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown Dec 2022

Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown

Graduate Theses and Dissertations

Machine learning has become a highly utilized technology to perform decision making on high dimensional data. As dataset sizes have become increasingly large so too have the neural networks to learn the complex patterns hidden within. This expansion has continued to the degree that it may be infeasible to train a model from a singular device due to computational or memory limitations of underlying hardware. Purpose built computing clusters for training large models are commonplace while access to networks of heterogeneous devices is still typically more accessible. In addition, with the rise of 5G networks, computation at the edge becoming …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed Dec 2022

Iot In Smart Communities, Technologies And Applications., Muhammad Zaigham Abbas Shah Syed

Electronic Theses and Dissertations

Internet of Things is a system that integrates different devices and technologies, removing the necessity of human intervention. This enables the capacity of having smart (or smarter) cities around the world. By hosting different technologies and allowing interactions between them, the internet of things has spearheaded the development of smart city systems for sustainable living, increased comfort and productivity for citizens. The Internet of Things (IoT) for Smart Cities has many different domains and draws upon various underlying systems for its operation, in this work, we provide a holistic coverage of the Internet of Things in Smart Cities by discussing …


Ag-Iot For Crop And Environment Monitoring: Past, Present, And Future, Nipuna Chamara, Md Didarul Islam, Geng Bai, Yeyin Shi, Yufeng Ge Sep 2022

Ag-Iot For Crop And Environment Monitoring: Past, Present, And Future, Nipuna Chamara, Md Didarul Islam, Geng Bai, Yeyin Shi, Yufeng Ge

Biological Systems Engineering: Papers and Publications

CONTEXT: Automated monitoring of the soil-plant-atmospheric continuum at a high spatiotemporal resolution is a key to transform the labor-intensive, experience-based decision making to an automatic, data-driven approach in agricultural production. Growers could make better management decisions by leveraging the real-time field data while researchers could utilize these data to answer key scientific questions. Traditionally, data collection in agricultural fields, which largely relies on human labor, can only generate limited numbers of data points with low resolution and accuracy. During the last two decades, crop monitoring has drastically evolved with the advancement of modern sensing technologies. Most importantly, the introduction …


Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona Jun 2022

Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona

Doctoral Dissertations

The enormous innovation in computational intelligence has disrupted the traditional ways we solve the main problems of our society and allowed us to make more data-informed decisions. Energy systems and the ways we deliver electricity are not exceptions to this trend: cheap and pervasive sensing systems and new communication technologies have enabled the collection of large amounts of data that are being used to monitor and predict in real-time the behavior of this infrastructure. Bringing intelligence to the power grid creates many opportunities to integrate new renewable energy sources more efficiently, facilitate grid planning and expansion, improve reliability, optimize electricity …


Studying The Executive Perception Of Investment In Intelligent Systems And The Effect On Firm Performance, Noel Romesh Wijesinha Jun 2022

Studying The Executive Perception Of Investment In Intelligent Systems And The Effect On Firm Performance, Noel Romesh Wijesinha

FIU Electronic Theses and Dissertations

This research was conducted to examine the relationship between investment in intelligent systems resources and capabilities (based on artificial intelligence and machine learning algorithms) and the effect on company performance. Despite existing research on the benefits of adopting intelligent systems, companies have been slow to adopt as there is lack of research on intelligent systems use cases that will increase firm performance. This research study used resource-based view (RBV) and dynamic capabilities (DCF) theory to investigate firms’ investment in intelligent systems resources that build intelligent systems capabilities and the association to organization performance dimensions, revenue and profits. To answer this …