Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Series

2020

Institution
Keyword
Publication

Articles 151 - 179 of 179

Full-Text Articles in Engineering

Content-Based Filtering Recommendation Approach To Label Irish Legal Judgements, Sandesh Gangadhar Jan 2020

Content-Based Filtering Recommendation Approach To Label Irish Legal Judgements, Sandesh Gangadhar

Dissertations

Machine learning approaches are applied across several domains to either simplify or automate tasks which directly result in saved time or cost. Text document labelling is one such task that requires immense human knowledge about the domain and efforts to review, understand and label the documents. The company Stare Decisis summarises legal judgements and labels them as they are made available on Irish public legal source www.courts.ie. This research presents a recommendation-based approach to reduce the time for solicitors at Stare Decisis by reducing many numbers of available labels to pick from to a concentrated few that potentially contains the …


Customer Churn Prediction, Deepshikha Wadikar Jan 2020

Customer Churn Prediction, Deepshikha Wadikar

Dissertations

Churned customers identification plays an essential role for the functioning and growth of any business. Identification of churned customers can help the business to know the reasons for the churn and they can plan their market strategies accordingly to enhance the growth of a business. This research is aimed at developing a machine learning model that can precisely predict the churned customers from the total customers of a Credit Union financial institution. A quantitative and deductive research strategies are employed to build a supervised machine learning model that addresses the class imbalance problem handled feature selection and efficiently predict the …


An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro Jan 2020

An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro

Dissertations

This research project seeks to investigate some of the different sampling techniques that generate and use synthetic data to oversample the minority class as a means of handling the imbalanced distribution between non-fraudulent (majority class) and fraudulent (minority class) classes in a credit-card fraud dataset. The purpose of the research project is to assess the effectiveness of these techniques in the context of fraud detection which is a highly imbalanced and cost-sensitive dataset. Machine learning tasks that require learning from datasets that are highly unbalanced have difficulty learning since many of the traditional learning algorithms are not designed to cope …


Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher Jan 2020

Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher

Dissertations

This study has investigated the potential application of machine learning for video analysis, with a view to creating a system which can determine a person’s hand laterality (handedness) from the way that they walk (their gait). To this end, the convolutional neural network model VGG16 underwent transfer learning in order to classify videos under two ‘activities’: “walking left-handed” and “walking right-handed”. This saw varying degrees of success across five transfer learning trained models: Everything – the entire dataset; FiftyFifty – the dataset with enough right-handed samples removed to produce a set with parity between activities; Female – only the female …


Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li Jan 2020

Identifying Online Sexual Predators Using Support Vector Machine, Yifan Li

Dissertations

A two-stage classification model is built in the research for online sexual predator identification. The first stage identifies the suspicious conversations that have predator participants. The second stage identifies the predators in suspicious conversations. Support vector machines are used with word and character n-grams, combined with behavioural features of the authors to train the final classifier. The unbalanced dataset is downsampled to test the performance of re-balancing an unbalanced dataset. An age group classification model is also constructed to test the feasibility of extracting the age profile of the authors, which can be used as features for classifier training. The …


Transformer Neural Networks For Automated Story Generation, Kemal Araz Jan 2020

Transformer Neural Networks For Automated Story Generation, Kemal Araz

Dissertations

Towards the last two-decade Artificial Intelligence (AI) proved its use on tasks such as image recognition, natural language processing, automated driving. As discussed in the Moore’s law the computational power increased rapidly over the few decades (Moore, 1965) and made it possible to use the techniques which were computationally expensive. These techniques include Deep Learning (DL) changed the field of AI and outperformed other models in a lot of fields some of which mentioned above. However, in natural language generation especially for creative tasks that needs the artificial intelligent models to have not only a precise understanding of the given …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Remote Communication In Wilderness Search And Rescue: Implications For The Design Of Emergency Distributed-Collaboration Tools For Network-Sparse Environments, Brennan Jones, Anthony Tang, Carman Neustaedter Jan 2020

Remote Communication In Wilderness Search And Rescue: Implications For The Design Of Emergency Distributed-Collaboration Tools For Network-Sparse Environments, Brennan Jones, Anthony Tang, Carman Neustaedter

Research Collection School Of Computing and Information Systems

Wilderness search and rescue (WSAR) requires careful communication between workers in different locations. To understand the contexts from which WSAR workers communicate and the challenges they face, we interviewed WSAR workers and observed a mock-WSAR scenario. Our findings illustrate that WSAR workers face challenges in maintaining a shared mental model. This is primarily done through distributed communication using two-way radios and cell phones for text and photo messaging; yet both implicit and explicit communication suffer. WSAR workers send messages for various reasons and share different types of information with varying levels of urgency. This warrants the use of multiple communication …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


The Effects Of Mixed-Initiative Visualization Systems On Exploratory Data Analysis, Alvitta Ottley, Adam Kern Jan 2020

The Effects Of Mixed-Initiative Visualization Systems On Exploratory Data Analysis, Alvitta Ottley, Adam Kern

All Computer Science and Engineering Research

The primary purpose of information visualization is to act as a window between a user and the data. Historically, this has been accomplished via a single-agent framework: the only decision-maker in the relationship between visualization system and analyst is the analyst herself. Yet this framework arose not from first principles, but a necessity. Before this decade, computers were limited in their decision-making capabilities, especially in the face of large, complex datasets and visualization systems. This paper aims to present the design and evaluation of a mixed-initiative system that aids the user in handling large, complex datasets and dense visualization systems. …


Modeling And Counteracting Exposure Bias In Recommender Systems, Sami Khenissi, Olfa Nasraoui Jan 2020

Modeling And Counteracting Exposure Bias In Recommender Systems, Sami Khenissi, Olfa Nasraoui

Faculty Scholarship

What we discover and see online, and consequently our opinions and decisions, are becoming increasingly affected by automated machine learned predictions. Similarly, the predictive accuracy of learning machines heavily depends on the feedback data that we provide them. This mutual influence can lead to closed-loop interactions that may cause unknown biases which can be exacerbated after several iterations of machine learning predictions and user feedback. Machine-caused biases risk leading to undesirable social effects ranging from polarization to unfairness and filter bubbles. In this paper, we study the bias inherent in widely used recommendation strategies such as matrix factorization. Then we …


Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza Jan 2020

Technological Challenges And Innovations In Cybersecurity And Networking Technology Program, Syed R. Zaidi, Ajaz Sana, Aparicio Carranza

Publications and Research

This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas, stimulated by the multifaceted technological boom expressed in accelerated globalization, digital transformation, the cloud, mobile access apps, and the Internet of Things (IoT)—where more and more devices are connected to the Internet every day. As the use of new Internet-based technologies increase; so does the risk of theft and misuse of sensitive information. This demands the awareness of cyber-criminality and the need for cyber hygiene in corporations, small businesses, and the government. As the need for experienced cybersecurity specialists has skyrocketed in recent years and …


Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato Jan 2020

Cybersecurity Education Through Technological And Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato

STEMPS Faculty Publications

No abstract provided.


Quantifying Seagrass Distribution In Coastal Water With Deep Learning Models, Daniel Perez, Kazi Islam, Victoria Hill, Richard Zimmerman, Blake Schaeffer, Yuzhong Shen, Jiang Li Jan 2020

Quantifying Seagrass Distribution In Coastal Water With Deep Learning Models, Daniel Perez, Kazi Islam, Victoria Hill, Richard Zimmerman, Blake Schaeffer, Yuzhong Shen, Jiang Li

OES Faculty Publications

Coastal ecosystems are critically affected by seagrass, both economically and ecologically. However, reliable seagrass distribution information is lacking in nearly all parts of the world because of the excessive costs associated with its assessment. In this paper, we develop two deep learning models for automatic seagrass distribution quantification based on 8-band satellite imagery. Specifically, we implemented a deep capsule network (DCN) and a deep convolutional neural network (CNN) to assess seagrass distribution through regression. The DCN model first determines whether seagrass is presented in the image through classification. Second, if seagrass is presented in the image, it quantifies the seagrass …


Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy Jan 2020

Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy

Publications

Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering, and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the communication distance and to overcome the high path loss. However, these features in combine negate the use of traditional medium access protocols (MAC). Therefore, novel MAC protocol designs are required to fully exploit their potential benefits including efficient channel access, control message …


Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham Jan 2020

Designing Shared Control Strategies For Teleoperated Robots Across Intrinsic User Qualities, Nancy Pham

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Accounting for variance in human behavior is an integral part of interacting with robotic systems that share control between users and robots in order to reduce errors, improve performance, and maintain safety. In this work we focus on the shared control of a telepresence robot and how individual user traits may affect a person's performance while navigating the robot. This requires understanding which user qualities impact performance and cause conflicts -- with the ultimate goal of building shared controllers that adapt to those qualities. Toward this goal, we develop novel adaptive shared controllers and integrate the study of intrinsic user …


The Picture Fuzzy Distance Measure In Controlling Network Power Consumption, Florentin Smarandache, Ngan Thi Roan, Salvador Coll Arnau, Marina Alonso Diaz, Juan Miguel Martinez Rubio, Pedro Lopez, Fran Andujar, Son Hoang Lee, Manh Van Vu Jan 2020

The Picture Fuzzy Distance Measure In Controlling Network Power Consumption, Florentin Smarandache, Ngan Thi Roan, Salvador Coll Arnau, Marina Alonso Diaz, Juan Miguel Martinez Rubio, Pedro Lopez, Fran Andujar, Son Hoang Lee, Manh Van Vu

Branch Mathematics and Statistics Faculty and Staff Publications

In order to solve the complex decision making problems, there are many approaches and systems based on fuzzy theory were proposed.


A Quantum Algorithm For Automata Encoding, Edison Tsai, Marek Perkowski Jan 2020

A Quantum Algorithm For Automata Encoding, Edison Tsai, Marek Perkowski

Electrical and Computer Engineering Faculty Publications and Presentations

Encoding of finite automata or state machines is critical to modern digital logic design methods for sequential circuits. Encoding is the process of assigning to every state, input value, and output value of a state machine a binary string, which is used to represent that state, input value, or output value in digital logic. Usually, one wishes to choose an encoding that, when the state machine is implemented as a digital logic circuit, will optimize some aspect of that circuit. For instance, one might wish to encode in such a way as to minimize power dissipation or silicon area. For …


Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu Jan 2020

Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu

Electrical & Computer Engineering Faculty Publications

This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only …


Special Section Guest Editorial: Machine Learning In Optics, Jonathan Howe, Travis Axtell, Khan Iftekharuddin Jan 2020

Special Section Guest Editorial: Machine Learning In Optics, Jonathan Howe, Travis Axtell, Khan Iftekharuddin

Electrical & Computer Engineering Faculty Publications

This guest editorial summarizes the Special Section on Machine Learning in Optics.


Priority Based Routing And Link Scheduling For Cognitive Radio Networks, Peng Jiang, Mitchell Zhou, Song Wen Jan 2020

Priority Based Routing And Link Scheduling For Cognitive Radio Networks, Peng Jiang, Mitchell Zhou, Song Wen

Electrical & Computer Engineering Faculty Publications

To address the challenges caused by the time-varying rate requirement for multimedia communication sessions, we propose a Priority Based Routing and link Scheduling (PBRS) scheme for multi-hop cognitive radio networks. The objective is to minimize disruption to communication sessions due to channel switching as well as to minimize network resource consumption for multimedia applications based on a prioritized routing and resource allocation scheme. PBRS includes a priority based optimization formulation and an efficient algorithm to solve the problem. The main idea is to allocate the available resource to different types of services with their Quality of Experience (QoE) expectation as …


Generative Adversarial Networks For Visible To Infrared Video Conversion, Mohammad Shahab Uddin, Jiang Li, Chiman Kwan (Ed.) Jan 2020

Generative Adversarial Networks For Visible To Infrared Video Conversion, Mohammad Shahab Uddin, Jiang Li, Chiman Kwan (Ed.)

Electrical & Computer Engineering Faculty Publications

Deep learning models are data driven. For example, the most popular convolutional neural network (CNN) model used for image classification or object detection requires large labeled databases for training to achieve competitive performances. This requirement is not difficult to be satisfied in the visible domain since there are lots of labeled video and image databases available nowadays. However, given the less popularity of infrared (IR) camera, the availability of labeled infrared videos or image databases is limited. Therefore, training deep learning models in infrared domain is still challenging. In this chapter, we applied the pix2pix generative adversarial network (Pix2Pix GAN) …


Distributed Strategy For Power Re-Allocation In High Performance Applications, Vaibhav Sundriyal, Masha Sosonkina Jan 2020

Distributed Strategy For Power Re-Allocation In High Performance Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to distribute a given power allocation among the cluster nodes assigned to the application while balancing their performance change. The strategy operates in a timeslice-based manner to estimate the current application performance and power usage per node followed by power redistribution across the nodes. Experiments, performed on four nodes (112 cores) of a modern computing platform interconnected with Infiniband showed that even a significant power budget reduction of 20% may result in …


Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe Jan 2020

Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …


Optimal Feature Selection For Learning-Based Algorithms For Sentiment Classification, Zhaoxia Wang, Zhiping Lin Jan 2020

Optimal Feature Selection For Learning-Based Algorithms For Sentiment Classification, Zhaoxia Wang, Zhiping Lin

Research Collection School Of Computing and Information Systems

Sentiment classification is an important branch of cognitive computation—thus the further studies of properties of sentiment analysis is important. Sentiment classification on text data has been an active topic for the last two decades and learning-based methods are very popular and widely used in various applications. For learning-based methods, a lot of enhanced technical strategies have been used to improve the performance of the methods. Feature selection is one of these strategies and it has been studied by many researchers. However, an existing unsolved difficult problem is the choice of a suitable number of features for obtaining the best sentiment …


An Exact Single-Agent Task Selection Algorithm For The Crowdsourced Logistics, Chung-Kyun Han, Shih-Fen Cheng Jan 2020

An Exact Single-Agent Task Selection Algorithm For The Crowdsourced Logistics, Chung-Kyun Han, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

The trend of moving online in the retail industry has created great pressure for the logistics industry to catch up both in terms of volume and response time. On one hand, volume is fluctuating at greater magnitude, making peaks higher; on the other hand, customers are also expecting shorter response time. As a result, logistics service providers are pressured to expand and keep up with the demands. Expanding fleet capacity, however, is not sustainable as capacity built for the peak seasons would be mostly vacant during ordinary days. One promising solution is to engage crowdsourced workers, who are not employed …


A Review Of Emotion Sensing: Categorization Models And Algorithms, Zhaoxia Wang, Seng-Beng Ho, Erik Cambria Jan 2020

A Review Of Emotion Sensing: Categorization Models And Algorithms, Zhaoxia Wang, Seng-Beng Ho, Erik Cambria

Research Collection School Of Computing and Information Systems

Sentiment analysis consists in the identification of the sentiment polarity associated with a target object, such as a book, a movie or a phone. Sentiments reflect feelings and attitudes, while emotions provide a finer characterization of the sentiments involved. With the huge number of comments generated daily on the Internet, besides sentiment analysis, emotion identification has drawn keen interest from different researchers, businessmen and politicians for polling public opinions and attitudes. This paper reviews and discusses existing emotion categorization models for emotion analysis and proposes methods that enhance existing emotion research. We carried out emotion analysis by inviting experts from …


Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi Jan 2020

Comparison Of Object Detection And Patch-Based Classification Deep Learning Models On Mid- To Late-Season Weed Detection In Uav Imagery, Arun Narenthiran Veeranampalayam Sivakumar, Jiating Li, Stephen Scott, Eric T. Psota, Amit J. Jhala, Joe D. Luck, Yeyin Shi

Biological Systems Engineering: Papers and Publications

Mid- to late-season weeds that escape from the routine early-season weed management threaten agricultural production by creating a large number of seeds for several future growing seasons. Rapid and accurate detection of weed patches in field is the first step of site-specific weed management. In this study, object detection-based convolutional neural network models were trained and evaluated over low-altitude unmanned aerial vehicle (UAV) imagery for mid- to late-season weed detection in soybean fields. The performance of two object detection models, Faster RCNN and the Single Shot Detector (SSD), were evaluated and compared in terms of weed detection performance using mean …