Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Business

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan Jul 2023

Using Machine Learning Techniques To Model Encoder/Decoder Pair For Non-Invasive Electroencephalographic Wireless Signal Transmission, Ernst Fanfan

Master of Science in Computer Science Theses

This study investigated the application and enhancement of Non-Invasive Brain-Computer Interfaces (NI-BCIs), focused on enhancing the efficiency and effectiveness of this technology for individuals with severe physical limitations. The core research goal was to improve current limitations associated with wires, noise, and invasive procedures often associated with BCI technology. The key discussed solution involves developing an optimized Encoder/Decoder (E/D) pair using machine learning techniques, particularly those borrowed from Generative Adversarial Networks (GAN) and other Deep Neural Networks, to minimize data transmission and ensure robustness against data degradation. The study highlighted the crucial role of machine learning in self-adjusting and isolating …


Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak Jul 2023

Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak

Journal of Cybersecurity Education, Research and Practice

A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …


A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon May 2023

A Systematic Literature Review Of Ransomware Attacks In Healthcare, Jasler Klien Adlaon

Electronic Theses, Projects, and Dissertations

This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is …


The Impact Of Case Management Intervention For Insured Asthma Patients In Louisiana, An Empirical Study, Mohamed Mohamed Ohaiba Mar 2023

The Impact Of Case Management Intervention For Insured Asthma Patients In Louisiana, An Empirical Study, Mohamed Mohamed Ohaiba

LSU Doctoral Dissertations

Asthma is a chronic condition whose symptoms are managed/prevented using medication and interventions. The overarching objective of this study was to evaluate the impact of patients' demographics on case management enrollment and healthcare utilization, as well as to develop machine learning models to predict high-cost patients.

To accomplish these goals, the Man-Whiteness test, the chi-squares test, logistic regression and odds ratios, and machine learning models were implemented. The average cost of the non-enrolled CM group was significantly higher than the enrolled group (p-value .0001). In addition, the non-enrolled groups had considerably more visits to the emergency department than the other …


Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web Feb 2023

Cyber Threat Intelligence Discovery Using Machine Learning From The Dark Web

Communications of the IIMA

Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to understand potential vulnerabilities it does have and threats it is facing. One important CTI for proactive cyber defense is exploit type with possible values system, web, network, website or Mobile. This study compares the performance of machine learning algorithms in predicating exploit types using form posts in the dark web, which is a semi- structured dataset collected from dark web. The study uses the CRISP data science approach. The results of the study show that machine learning algorithms which are function-based including support vector machine and …


Pict-Dpa: A Quality-Compliance Data Processing Architecture To Improve The Performance Of Integrated Emergency Care Clinical Decision Support System, Ruizhi Yu Jan 2023

Pict-Dpa: A Quality-Compliance Data Processing Architecture To Improve The Performance Of Integrated Emergency Care Clinical Decision Support System, Ruizhi Yu

CGU Theses & Dissertations

Emergency Care System (ECS) is a critical component of health care systems by providing acute resuscitation and life-saving care. As a time-sensitive care operation system, any delay and mistake in the decision-making of these EC functions can create additional risks of adverse events and clinical incidents. The Emergency Care Clinical Decision Support System (EC-CDSS) has proven to improve the quality of the aforementioned EC functions. However, the literature is scarce on how to implement and evaluate the EC-CDSS with regard to the improvement of PHOs, which is the ultimate goal of ECS. The reasons are twofold: 1) lack of clear …


Making Vending Machines Smarter With The Use Of Machine Learning And Artificial Intelligence: Set-Up And Architecture, Dashmir Istrefi, Eftim Zdravevski Oct 2020

Making Vending Machines Smarter With The Use Of Machine Learning And Artificial Intelligence: Set-Up And Architecture, Dashmir Istrefi, Eftim Zdravevski

UBT International Conference

Machine Learning and Robust Optimization techniques can significantly improve logistics operations and improve stock quantity and maintenance intervals. Machine Learning will be used to forecast item demands for each of the vending machines, taking into account past demands and calendar effects. By performing such predictions which are forwarded to a Robust Optimization model, and whose outputs will be the cash transport that each vending machine should require. These transports guarantee that demand is fulfilled up to the desired confidence level, preventing downtime of vending machines due to unplanned maintenance and out-of-stock situations, while also satisfying additional constraints arising in this …


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …