Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (227)
- University of Tennessee, Knoxville (41)
- Western University (39)
- California State University, San Bernardino (28)
- University of Massachusetts Amherst (25)
-
- West Virginia University (24)
- Louisiana State University (23)
- University of Louisville (22)
- Air Force Institute of Technology (19)
- San Jose State University (19)
- University of North Florida (19)
- University of Arkansas, Fayetteville (18)
- City University of New York (CUNY) (14)
- Boise State University (12)
- Kennesaw State University (12)
- Michigan Technological University (12)
- Southern Methodist University (11)
- Virginia Commonwealth University (10)
- Clemson University (9)
- Georgia Southern University (9)
- The University of Akron (9)
- University of Kentucky (9)
- University of New Orleans (9)
- University of New Mexico (8)
- The University of Southern Mississippi (7)
- American University in Cairo (6)
- Bard College (6)
- James Madison University (6)
- Edith Cowan University (5)
- Embry-Riddle Aeronautical University (5)
- Keyword
-
- Machine Learning (43)
- Machine learning (35)
- Deep learning (24)
- Deep Learning (23)
- Android (18)
-
- Computer Vision (17)
- Security (16)
- Thesis; University of North Florida; UNF; Dissertations (16)
- Computer Science (15)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (14)
- Software (13)
- Artificial Intelligence (12)
- Cybersecurity (12)
- Java (12)
- Game (11)
- Arduino (10)
- IOS (10)
- Blockchain (8)
- Python (8)
- Web (8)
- Artificial intelligence (7)
- Computer Engineering (7)
- Computer vision (7)
- Convolutional Neural Network (7)
- Data mining (7)
- Image Processing (7)
- Mobile (7)
- Application (6)
- Bluetooth (6)
- Data Science (6)
- Publication Year
- Publication
-
- Computer Engineering (107)
- Master's Theses (64)
- Computer Science and Software Engineering (43)
- Doctoral Dissertations (40)
- Electronic Thesis and Dissertation Repository (39)
-
- Theses and Dissertations (39)
- Electronic Theses and Dissertations (38)
- Electronic Theses, Projects, and Dissertations (28)
- Masters Theses (26)
- Graduate Theses, Dissertations, and Problem Reports (24)
- Master's Projects (19)
- UNF Graduate Theses and Dissertations (19)
- Computer Science and Computer Engineering Undergraduate Honors Theses (14)
- Honors Theses (14)
- Boise State University Theses and Dissertations (12)
- Dissertations, Master's Theses and Master's Reports (12)
- LSU Doctoral Dissertations (12)
- LSU Master's Theses (11)
- Dissertations, Theses, and Capstone Projects (9)
- University of New Orleans Theses and Dissertations (9)
- Williams Honors College, Honors Research Projects (9)
- Computer Science and Engineering Theses and Dissertations (7)
- Liberal Arts and Engineering Studies (7)
- Theses and Dissertations--Computer Science (7)
- Dissertations and Theses (6)
- Electrical and Computer Engineering ETDs (6)
- Master of Science in Computer Science Theses (6)
- All Theses (5)
- Doctoral Dissertations and Master's Theses (5)
- Electrical Engineering (5)
Articles 1 - 30 of 750
Full-Text Articles in Engineering
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Computer Science and Engineering Theses and Dissertations
Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu
Master's Theses
The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.
In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton
Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton
Honors College Theses
This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …
Defining And Labeling Traversable Space In A Forested Environment, James Nguyen
Defining And Labeling Traversable Space In A Forested Environment, James Nguyen
All Theses
This thesis investigates the problem of identifying traversable terrain in outdoor conditions. We are motivated by research in recent years toward identifying drivable space for the purpose of developing autonomous vehicles. Our motivating application is similar but also different. We envision a “Hiker Helper” that assists humans with dismounted navigation in forested terrain. A common challenge in this type of environment is identifying a viable path for moving through terrain that is congested with trees, bushes, other flora, and natural obstacles that would make navigation difficult. We envision training an artificial intelligence (AI) model to automatically analyze images of this …
Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula
Automated Brain Tumor Classifier With Deep Learning, Venkata Sai Krishna Chaitanya Kandula
Electronic Theses, Projects, and Dissertations
Brain Tumors are abnormal growth of cells within the brain that can be categorized as benign (non-cancerous) or malignant (cancerous). Accurate and timely classification of brain tumors is crucial for effective treatment planning and patient care. Medical imaging techniques like Magnetic Resonance Imaging (MRI) provide detailed visualizations of brain structures, aiding in diagnosis and tumor classification[8].
In this project, we propose a brain tumor classifier applying deep learning methodologies to automatically classify brain tumor images without any manual intervention. The classifier uses deep learning architectures to extract and classify brain MRI images. Specifically, a Convolutional Neural Network (CNN) …
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Diegetic Sonification For Low Vision Gamers, Jhané Dawes
Master's Theses
There are not many games designed for all players that provide accommodations for low vision users. This means that low vision users may not get to engage with the gaming community in the same way as their sighted peers. In this thesis, I explore how diegetic sonification can be used as a tool to support these low vision gamers in the typical gaming environment. I asked low vision players to engage with a prototype game level with two diegetic sonification techniques applied, without the use of their corrective lenses. I found that participants had more enjoyment and experienced less difficulty …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut
Gamification Of Speech Therapy With Pronunciation Pal, Parker Zbylut
Theses/Capstones/Creative Projects
This capstone report examines the theory and implementation behind applying game design principles to educational applications, and explores their implementation in an educational game through the Pronunciation Pal application. The gamification of learning tools aims to increase learners' engagement and attentiveness with a subject by restructuring content using game design principles of challenges, rewards and feedback. Feedback can be delivered via visuals and/or sounds, as well as regular indicators of player progress and accomplishment. In addition, a successful game implementation establishes challenges to facilitate a player's intrinsic desire to continue playing and improving at the skills presented by the game. …
Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo
Exploration Of Event-Based Camera Data With Spiking Neural Networks, Charles Peter Rizzo
Doctoral Dissertations
Neuromorphic computing is a novel, non-von Neumann computing architecture that employs power efficient spiking neural networks on specialized hardware. Taking inspiration from the human brain, spiking neural networks are temporal computation units that propagate information throughout the network via binary spikes. Compared to conventional artificial neural networks, these networks can be more sparse, smaller in size, and more efficient power-wise when realized on neuromorphic hardware. Event-based cameras are novel vision sensors that capture visual information through a temporal stream of events instead of as a conventional RGB frame. These cameras are low-power collections of pixels that asynchronously emit events over …
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Building Software At Scale: Understanding Productivity As A Product Of Software Engineering Intrinsic Factors, Gauthier Ingende Wa Boway
Master's Theses
During our education at KSU, we have learned about various factors that affect productivity such as schedule, budget, and risks, but those are often controlled outside of what we could learn as software engineering principles, patterns, or practices. On top of that, other off-work factors such as health conditions, emotional distress, or political climate, just to name a few, could drastically affect the productivity of a software engineering team. We see a demarcation between those factors that affect productivity in software engineering but are not inherent to the discipline itself, which we call resistance factors, and the factors that are …
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Enhancing Information Architecture With Machine Learning For Digital Media Platforms, Taylor N. Mietzner
Honors College Theses
Modern advancements in machine learning are transforming the technological landscape, including information architecture within user experience design. With the unparalleled amount of user data generated on online media platforms and applications, an adjustment in the design process to incorporate machine learning for categorizing the influx of semantic data while maintaining a user-centric structure is essential. Machine learning tools, such as the classification and recommendation system, need to be incorporated into the design for user experience and marketing success. There is a current gap between incorporating the backend modeling algorithms and the frontend information architecture system design together. The aim of …
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos
A Study Of Random Partitions Vs. Patient-Based Partitions In Breast Cancer Tumor Detection Using Convolutional Neural Networks, Joshua N. Ramos
Master's Theses
Breast cancer is one of the deadliest cancers for women. In the US, 1 in 8 women will be diagnosed with breast cancer within their lifetimes. Detection and diagnosis play an important role in saving lives. To this end, many classifiers with varying structures have been designed to classify breast cancer histopathological images. However, randomly partitioning data, like many previous works have done, can lead to artificially inflated accuracies and classifiers that do not generalize. Data leakage occurs when researchers assume that every image in a dataset is independent of each other, which is often not the case for medical …
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Insights Into Cellular Evolution: Temporal Deep Learning Models And Analysis For Cell Image Classification, Xinran Zhao
Master's Theses
Understanding the temporal evolution of cells poses a significant challenge in developmental biology. This study embarks on a comparative analysis of various machine-learning techniques to classify cell colony images across different timestamps, thereby aiming to capture dynamic transitions of cellular states. By performing Transfer Learning with state-of-the-art classification networks, we achieve high accuracy in categorizing single-timestamp images. Furthermore, this research introduces the integration of temporal models, notably LSTM (Long Short Term Memory Network), R-Transformer (Recurrent Neural Network enhanced Transformer) and ViViT (Video Vision Transformer), to undertake this classification task to verify the effectiveness of incorporating temporal features into the classification …
Multi-Perspective Analysis For Derivative Financial Product Prediction With Stacked Recurrent Neural Networks, Natural Language Processing And Large Language Model, Ethan Lo
Dissertations, Theses, and Capstone Projects
This study developed a multi-perspective, AI-powered model for predicting E-Mini S&P 500 Index Futures prices, tackling the challenging market dynamics of these derivative financial instruments. Leveraging FinBERT for analysis of Wall Street Journal data alongside technical indicators, trader positioning, and economic factors, my stacked recurrent neural network built with LSTMs and GRUs achieves significantly improved accuracy compared to single sub-models. Furthermore, ChatGPT generation of human-readable analysis reports demonstrates the feasibility of using large language models in financial analysis. This research pioneers the use of stacked RNNs and LLMs for multi-perspective financial analysis, offering a novel blueprint for automated prediction and …
Machine Learning For Electronic Structure Prediction, Shashank Pathrudkar
Machine Learning For Electronic Structure Prediction, Shashank Pathrudkar
Dissertations, Master's Theses and Master's Reports
Kohn-Sham density functional theory is the work horse of computational material science research. The core of Kohn-Sham density functional theory, the Kohn-Sham equations, output charge density, energy levels and wavefunctions. In principle, the electron density can be used to obtain several other properties of interest including total potential energy of the system, atomic forces, binding energies and electric constants. In this work we present machine learning models designed to bypass the Kohn-Sham equations by directly predicting electron density. Two distinct models were developed: one tailored to predict electron density for quasi one-dimensional materials under strain, while the other is applicable …
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Honors Theses and Capstones
Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …
Regional Sea Level Rise Prediction In Monterey Bay With Lstms And Vertical Land Motion, Branden Lopez
Regional Sea Level Rise Prediction In Monterey Bay With Lstms And Vertical Land Motion, Branden Lopez
Master's Projects
Earth system data is vast in volume and variety, and is used to forecast weather,
hurricanes, floods, and sea level. Sea Level Rise (SLR) impacts various sectors, espe- cially ecosystems, food production, industry, population, health, and the availability of
clean water. Because of its broad impact, describing the behavior and forecasting SLR is an important topic. Traditional Machine Learning (ML) models vary in use, but many are not capable of capturing all the non-linear spatial and temporal properties of SLR factors. Deep learning models efficaciously handle complex time series data, noise, and high dimensional spaces, making them a focus of …
Stock Price Trend Prediction Using Emotion Analysis Of Financial Headlines With Distilled Llm Model, Rithesh H. Bhat
Stock Price Trend Prediction Using Emotion Analysis Of Financial Headlines With Distilled Llm Model, Rithesh H. Bhat
Computer Science and Engineering Theses
Capturing the volatility of stock prices helps individual traders, stock analysts, and institutions alike increase their returns in the stock market. Financial news headlines have been shown to have a significant effect on stock price mobility. Lately, many financial portals have restricted web scraping of stock prices and other related financial data of companies from their websites. In this study we demonstrate that emotion analysis of financial news headlines alone can be sufficient in predicting stock price movement, even in the absence of any financial data. We propose an approach that eliminates the need for web scraping of financial data. …
Exploring Machine Learning Techniques For Embedded Hardware, Neel R. Vora
Exploring Machine Learning Techniques For Embedded Hardware, Neel R. Vora
Computer Science and Engineering Theses
This thesis delves into the intricate symbiosis between machine learning (ML) methodologies and embedded hardware systems, with a primary focus on augmenting efficiency and real-time processing capabilities across diverse application domains. It confronts the formidable challenge of deploying sophisticated ML algorithms on resource-constrained embedded hardware, aiming not only to optimize performance but also to minimize energy consumption. Innovative strategies are explored to tailor ML models for streamlined execution on embedded platforms, with validation conducted across various real-world application domains. Notable contributions include the development of a deep-learning framework leveraging a variational autoencoder (VAE) for compressing physiological signals from wearables while …
Joint Learning Of Unknown Safety Constraints And Control Policies In Reinforcement Learning, Lunet Abiye Yifru
Joint Learning Of Unknown Safety Constraints And Control Policies In Reinforcement Learning, Lunet Abiye Yifru
Graduate Theses, Dissertations, and Problem Reports
Reinforcement learning (RL) has revolutionized decision-making across a wide range of domains over the past few decades. Yet, deploying RL policies in real-world scenarios presents the crucial challenge of ensuring safety. Traditional safe RL approaches have predominantly focused on incorporating predefined safety constraints into the policy learning process. However, this reliance on predefined safety constraints poses limitations in dynamic and unpredictable real-world settings where such constraints may not be available or sufficiently adaptable. Bridging this gap, we propose a novel approach that concurrently learns a safe RL control policy and identifies the unknown safety constraint parameters of a given environment. …
Machine Learning For Environmental Sustainability, Syeda Nyma Ferdous
Machine Learning For Environmental Sustainability, Syeda Nyma Ferdous
Graduate Theses, Dissertations, and Problem Reports
This research proposes a comprehensive approach to address pressing challenges in environmental sustainability, agricultural residue management, using machine learning based approaches. Machine learning (ML) techniques have emerged as powerful tools for addressing environmental sustainability challenges by facilitating the analysis and prediction of ecological phenomena, and optimization of resource management strategies. The study explores the synergies between environmental sustainability and machine learning to develop a framework that leverages artificial intelligence techniques covering a wide range of tasks including crop residue management, soil CO2 flux prediction, and forest carbon system prediction for sustainable development. The study analyze various ML models, such as, …
Few-Shot Learning For Ner Using Maml, Nourchene Bargaoui
Few-Shot Learning For Ner Using Maml, Nourchene Bargaoui
Theses and Dissertations
This thesis investigates the application of Few-Shot Learning (FSL) using Model-Agnostic Meta-Learning (MAML) to enhance Named Entity Recognition (NER) within the domain of Natural Language Processing (NLP), specifically focusing on chemical datasets. The primary challenge addressed is the impracticality of relying on extensive annotated datasets, especially in specialized fields like chemistry. The research primarily explores the concept of Few-Shot Learning, aiming to train models on minimal data while maintaining performance across diverse tasks. It delves into the N-way K-shot methodology, where "N" represents the number of classes and "K" signifies the number of examples per class. This approach is further …
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar
Promise And Limitations Of Supervised Optimal Transport-Based Graph Summarization Via Information Theoretic Measures, Sepideh Neshatfar
Electronic Theses and Dissertations
Graph summarization is a fundamental problem in the field of data analysis, aiming to distill extensive graph datasets into more manageable, yet informative representations. The challenge lies in creating compressed graphs that faithfully retain crucial structural information for downstream tasks. A recent advancement in this domain introduces an optimal transport-based framework that enables the incorporation of a priori knowledge regarding the importance of nodes, edges, and attributes during the graph summarization process. However, the statistical properties of this innovative framework remain largely unexplored. This master's thesis embarks on a comprehensive exploration of the field of graph summarization, with a particular …
Docai, Riley Badnin, Justin Brunings
Docai, Riley Badnin, Justin Brunings
Computer Science and Software Engineering
DocAI presents a user-friendly platform for recording, transcribing, summarizing, and classifying doctor-patient consultations. The application utilizes AssemblyAI for conversational transcription, and the user interface allows users to either live-record consultations or upload an existing MP3 file. The classification process, powered by 'ml-classify-text,' organizes the consultation transcription into SOAP (Subjective, Objective, Assessment, and Plan) format – a widely used method of documentation for healthcare providers. The result of this development is a simple yet effective interface that effectively plays the role of a medical scribe. However, the application is still facing challenges of inconsistent summarization from the AssemblyAI backend. Future work …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
Quiz Web Application, Dipti Rathod
Quiz Web Application, Dipti Rathod
Electronic Theses, Projects, and Dissertations
The Quiz web application is designed to facilitate the process of quiz creation and participation. This web application mainly consists of three roles: Admin, Instructor, and Student. Each role has specific features, functionalities, and permissions. With a user-friendly interface, the admin role can handle the departments, courses, and instructors. This web application also ensures smooth quiz management, allowing the instructors to schedule the upcoming quizzes, create the questions, and manage the students with ease. Student roles have features like taking quizzes and seeing their results. Additionally, this web application includes a significant feature to prevent cheating during online tests, ensuring …
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …
Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh
Early-Warning Prediction For Machine Failures In Automated Industries Using Advanced Machine Learning Techniques, Satnam Singh
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project explores the use of machine learning algorithms to detect machine failure. The research questions are: Q1) How does the quality of input data, including issues such as outliers, and noise, impact the accuracy and reliability of machine failure prediction models in industrial settings? Q2) How does the integration of SMOTE with feature engineering techniques influence the overall performance of machine learning models in detecting and preventing machine failures? Q3) What is the performance of different machine learning algorithms in predicting machine failures, and which algorithm is the most effective? The research findings are: Q1) Effective outlier …