Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Classification (7)
- Machine Learning (7)
- Deep Learning (5)
- Deep learning (5)
- Twitter (4)
-
- Artificial intelligence (3)
- LSTM (3)
- Logistic regression (3)
- Natural Language Processing (3)
- Security (3)
- Steganography (3)
- Support Vector Machine (3)
- Accuracy (2)
- Archetypes (2)
- Argumentation theory (2)
- Astronomy (2)
- Authentication (2)
- BERT (2)
- CNN (2)
- Cnn (2)
- Computer Vision (2)
- Computer vision (2)
- Cosine similarity (2)
- Cryptography (2)
- Data Augmentation (2)
- Data encryption (2)
- Deep Belief Networks (2)
- Dementia (2)
- Deterministic chaos (2)
- Document Authentication (2)
- Publication Year
Articles 1 - 30 of 94
Full-Text Articles in Engineering
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Poly-Gan: Regularizing Polygons With Generative Adversarial Networks, Lasith Niroshan, James Carswell
Conference Papers
Regularizing polygons involves simplifying irregular and noisy shapes of built environment objects (e.g. buildings) to ensure that they are accurately represented using a minimum number of vertices. It is a vital processing step when creating/transmitting online digital maps so that they occupy minimal storage space and bandwidth. This paper presents a data-driven and Deep Learning (DL) based approach for regularizing OpenStreetMap building polygon edges. The study introduces a building footprint regularization technique (Poly-GAN) that utilises a Generative Adversarial Network model trained on irregular building footprints and OSM vector data. The proposed method is particularly relevant for map features …
Fair4pghd: A Framework For Fair Implementation Over Pghd, Abdullahi Abubakar Kawu, Dympna O'Sullivan, Lucy Hederman, Mirjam Van Reisen
Fair4pghd: A Framework For Fair Implementation Over Pghd, Abdullahi Abubakar Kawu, Dympna O'Sullivan, Lucy Hederman, Mirjam Van Reisen
Articles
Patient Generated Health Data (PGHD) are being considered for integration with health facilities, however little is known about how such data can be made machine-actionable in a way that meets FAIR guidelines. This article proposes a 5-stage framework that can be used to achieve this.
The Smart Dementia Care Project, Dympna O'Sullivan, Jonathan Turner, Ciaran Nugent, Damon Berry, Michael Wilson, Julie Doyle
The Smart Dementia Care Project, Dympna O'Sullivan, Jonathan Turner, Ciaran Nugent, Damon Berry, Michael Wilson, Julie Doyle
Articles
No abstract provided.
Monitoring Activities Of Daily Living For Maintaining Independent Living In Dementia, Jonathan Turner, Ciaran Nugent, Damon Berry, Dympna O'Sullivan, Michael Wilson, Julie Doyle
Monitoring Activities Of Daily Living For Maintaining Independent Living In Dementia, Jonathan Turner, Ciaran Nugent, Damon Berry, Dympna O'Sullivan, Michael Wilson, Julie Doyle
Articles
Our ability to live independent meaningful lives depends on our ability to perform various activities and to maintain our cognitive functions. Maintaining independent living is important for persons with dementia, it increases selfworth and allows to remain independent and in their own homes for longer. We describe the activities established as being important for the maintenance of independent living, and methods for monitoring these activities using technology.
Morton-Ordered Gpu Lattice Boltzmann Cfd Simulations With Application To Blood Flow, Gerald Gallagher, Fergal J. Boyle
Morton-Ordered Gpu Lattice Boltzmann Cfd Simulations With Application To Blood Flow, Gerald Gallagher, Fergal J. Boyle
Conference Papers
Computational fluid dynamics (CFD) is routinely used for numerically predicting cardiovascular-system medical device fluid flows. Most CFD simulations ignore the suspended cellular phases of blood due to computational constraints, which negatively affects simulation accuracy. A graphics processing unit (GPU) lattice Boltzmann-immersed boundary (LB-IB) CFD software package capable of accurately modelling blood flow is in development by the authors, focusing on the behaviour of plasma and stomatocyte, discocyte and echinocyte red blood cells during flow. Optimised memory ordering and layout schemes yield significant efficiency improvements for LB GPU simulations. In this work, comparisons of row-major-ordered Structure of Arrays (SoA) and Collected …
Accessdesign: An Inclusive Co-Design Toolkit For The Creation Of Accessible Digital Tools., Claudia Fernandez-Rivera, Sarah Boland, Eamon Aswad, John Gilligan, Dympna O'Sullivan, Emma Murphy
Accessdesign: An Inclusive Co-Design Toolkit For The Creation Of Accessible Digital Tools., Claudia Fernandez-Rivera, Sarah Boland, Eamon Aswad, John Gilligan, Dympna O'Sullivan, Emma Murphy
Articles
Existing toolkits and resources to support co-design are not always accessible to designers and co-designers with disabilities. In this paper we present a study based on an innovative co-design programme, in collaboration with St John of God Community Services, where 3rd year computer science students work with service users with intellectual disabilities to create digital applications together. We conducted a series of co-design focus group sessions involving the service users who were previously involved in the co-design collaboration with SJOG Services and TU Dublin. The data collected during these design sessions has been integrated to form an accessible design toolkit …
Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen
Dark Patterns: Effect On Overall User Experience And Site Revisitation, Deon Soul Calawen
Dissertations
Dark patterns are user interfaces purposefully designed to manipulate users into doing something they might not otherwise do for the benefit of an online service. This study investigates the impact of dark patterns on overall user experience and site revisitation in the context of airline websites. In order to assess potential dark pattern effects, two versions of the same airline website were compared: a dark version containing dark pattern elements and a bright version free of manipulative interfaces. User experience for both websites were assessed quantitatively through a survey containing a User Experience Questionnaire (UEQ) and a System Usability Scale …
Investigating How Speech And Animation Realism Influence The Perceived Personality Of Virtual Characters And Agents, Sean A. Thomas, Ylva Ferstl, Rachel Mcdonnell, Cathy Ennis
Investigating How Speech And Animation Realism Influence The Perceived Personality Of Virtual Characters And Agents, Sean A. Thomas, Ylva Ferstl, Rachel Mcdonnell, Cathy Ennis
Articles
The portrayed personality of virtual characters and agents is understood to influence how we perceive and engage with digital applications. Understanding how the features of speech and animation drive portrayed personality allows us to intentionally design characters to be more personalized and engaging. In this study, we use performance capture data of unscripted conversations from a variety of actors to explore the perceptual outcomes associated with the modalities of speech and motion. Specifically, we contrast full performance-driven characters to those portrayed by generated gestures and synthesized speech, analysing how the features of each influence portrayed personality according to the Big …
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
Dissertations
Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …
Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy
Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy
Dissertations
Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …
Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora
Measuring And Comparing Social Bias In Static And Contextual Word Embeddings, Alan Cueva Mora
Dissertations
Word embeddings have been considered one of the biggest breakthroughs of deep learning for natural language processing. They are learned numerical vector representations of words where similar words have similar representations. Contextual word embeddings are the promising second-generation of word embeddings assigning a representation to a word based on its context. This can result in different representations for the same word depending on the context (e.g. river bank and commercial bank). There is evidence of social bias (human-like implicit biases based on gender, race, and other social constructs) in word embeddings. While detecting bias in static (classical or non-contextual) word …
Provenance: An Intermediary-Free Solution For Digital Content Verification, Bilal Yousuf, M. Atif Qureshi, Brendan Spillane, Gary Munnelly, Oisin Carroll, Matthew Runswick, Kirsty Park, Eileen Culloty, Owen Conlan, Jane Suiter
Provenance: An Intermediary-Free Solution For Digital Content Verification, Bilal Yousuf, M. Atif Qureshi, Brendan Spillane, Gary Munnelly, Oisin Carroll, Matthew Runswick, Kirsty Park, Eileen Culloty, Owen Conlan, Jane Suiter
Articles
The threat posed by misinformation and disinformation is one of the defining challenges of the 21st century. Provenance is designed to help combat this threat by warning users when the content they are looking at may be misinformation or disinformation. It is also designed to improve media literacy among its users and ultimately reduce susceptibility to the threat among vulnerable groups within society. The Provenance browser plugin checks the content that users see on the Internet and social media and provides warnings in their browser or social media feed. Unlike similar plugins, which require human experts to provide evaluations and …
Cleanpage: Fast And Clean Document And Whiteboard Capture, Jane Courtney
Cleanpage: Fast And Clean Document And Whiteboard Capture, Jane Courtney
Articles
The move from paper to online is not only necessary for remote working, it is also significantly more sustainable. This trend has seen a rising need for the high-quality digitization of content from pages and whiteboards to sharable online material. However, capturing this information is not always easy nor are the results always satisfactory. Available scanning apps vary in their usability and do not always produce clean results, retaining surface imperfections from the page or whiteboard in their output images. CleanPage, a novel smartphone-based document and whiteboard scanning system, is presented. CleanPage requires one button-tap to capture, identify, crop, and …
Sediqa: Sound Emitting Document Image Quality Assessment In A Reading Aid For The Visually Impaired, Jane Courtney
Sediqa: Sound Emitting Document Image Quality Assessment In A Reading Aid For The Visually Impaired, Jane Courtney
Articles
For visually impaired people (VIPs), the ability to convert text to sound can mean a new level of independence or the simple joy of a good book. With significant advances in optical character recognition (OCR) in recent years, a number of reading aids are appearing on the market. These reading aids convert images captured by a camera to text which can then be read aloud. However, all of these reading aids suffer from a key issue—the user must be able to visually target the text and capture an image of sufficient quality for the OCR algorithm to function—no small task …
Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney
Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney
Articles
With the rise of Deep Learning approaches in computer vision applications, significant strides have been made towards vehicular autonomy. Research activity in autonomous drone navigation has increased rapidly in the past five years, and drones are moving fast towards the ultimate goal of near-complete autonomy. However, while much work in the area focuses on specific tasks in drone navigation, the contribution to the overall goal of autonomy is often not assessed, and a comprehensive overview is needed. In this work, a taxonomy of drone navigation autonomy is established by mapping the definitions of vehicular autonomy levels, as defined by the …
Internet Of Medical Things (Iomt): Overview, Emerging Technologies, And Case Studies, Sahshanu Razdan, Sachin Sharma
Internet Of Medical Things (Iomt): Overview, Emerging Technologies, And Case Studies, Sahshanu Razdan, Sachin Sharma
Articles
No abstract provided.
Near-Field Propagation Analysis For Vivaldi Antenna Design: Insight Into The Propagation Process For Optimizing The Directivity, Integrity Of Signal Transmission, And Efficiency, Ha Hoang, Matthias John, Patrick Mcevoy, Max Ammann
Near-Field Propagation Analysis For Vivaldi Antenna Design: Insight Into The Propagation Process For Optimizing The Directivity, Integrity Of Signal Transmission, And Efficiency, Ha Hoang, Matthias John, Patrick Mcevoy, Max Ammann
Articles
Refined optimization of complex curve–linear-shaped radiators, such as traveling-wave Vivaldi antennas, can be achieved by considering simulated near fields to interpret in detail the structural influences of a design. The relationships between the space and time distributions of electromagnetic (EM) energy clusters and the geometric features are revealed with appropriate use of impulse response analysis combined with the multiple signal classification (MUSIC) algorithm. This article reports a deeper approach when applied to the adjustment of the geometric features of a traveling-wave antenna based on an analysis of near-field propagation features.
Human Age And Gender Classification Using Convolutional Neural Networks, Eamon Kelliher
Human Age And Gender Classification Using Convolutional Neural Networks, Eamon Kelliher
Dissertations
In a world relying ever more on human classification, this papers aims to improve on age and gender image classification through the use of Convolutional Neural Networks (CNN). Age and gender classification has become a popular area of study in the past number of years however there are still improvements to be made, particularly in the area of age classification. This research paper aims to test the currently accepted fact that CNN models are the superior model type for image classification by comparing CNN performance against Support Vector Machine performance on the same dataset. Using the Adience image classification dataset, …
Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power
Identifying Roles Of Software Developers From Their Answers On Stack Overflow, Dean Power
Dissertations
Stack Overflow is the world’s largest community of software developers. Users ask and answer questions on various tagged topics of software development. The set of questions a site user answers is representative of their knowledge base, or “wheelhouse”. It is proposed that clustering users by their wheelhouse yields communities of similar software developers by skill-set. These communities represent the different roles within software development and could be used as the basis to define roles at any point in time in an ever-evolving landscape of software development. A network graph of site users, linked if they answered questions on the same …
A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran
A Comparison Of Instructional Efficiency Models In Third Level Education, Murali Rajendran
Dissertations
This study investigates the validity and sensitivity of a novel model of instructional efficiency: the parabolic model. The novel model is compared against state-of-the-art models present in instructional design today; Likelihood model, Deviational model and Multidimensional model. This models is based on the assumption that optimal mental workload and high performance leads to high efficiency, while other models assume that low mental workload and high performance leads to high efficiency. The investigation makes use of two instructional design conditions: a direct instructions approach to learning and its extension with a collaborative activity. A control group received the former instructional design …
Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar
Feature Augmentation For Improved Topic Modeling Of Youtube Lecture Videos Using Latent Dirichlet Allocation, Nakul Srikumar
Dissertations
Application of Topic Models in text mining of educational data and more specifically, the text data obtained from lecture videos, is an area of research which is largely unexplored yet holds great potential. This work seeks to find empirical evidence for an improvement in Topic Modeling by pre- extracting bigram tokens and adding them as additional features in the Latent Dirichlet Allocation (LDA) algorithm, a widely-recognized topic modeling technique. The dataset considered for analysis is a collection of transcripts of video lectures on Machine Learning scraped from YouTube. Using the cosine similarity distance measure as a metric, the experiment showed …
Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver
Can Generative Adversarial Networks Help Us Fight Financial Fraud?, Sean Mciver
Dissertations
Transactional fraud datasets exhibit extreme class imbalance. Learners cannot make accurate generalizations without sufficient data. Researchers can account for imbalance at the data level, algorithmic level or both. This paper focuses on techniques at the data level. We evaluate the evidence of the optimal technique and potential enhancements. Global fraud losses totalled more than 80 % of the UK’s GDP in 2019. The improvement of preprocessing is inherently valuable in fighting these losses. Synthetic minority oversampling technique (SMOTE) and extensions of SMOTE are currently the most common preprocessing strategies. SMOTE oversamples the minority classes by randomly generating a point between …
Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy
Exploiting Bert And Roberta To Improve Performance For Aspect Based Sentiment Analysis, Gagan Reddy Narayanaswamy
Dissertations
Sentiment Analysis also known as opinion mining is a type of text research that analyses people’s opinions expressed in written language. Sentiment analysis brings together various research areas such as Natural Language Processing (NLP), Data Mining, and Text Mining, and is fast becoming of major importance to companies and organizations as it is started to incorporate online commerce data for analysis. Often the data on which sentiment analysis is performed will be reviews. The data can range from reviews of a small product to a big multinational corporation. The goal of performing sentiment analysis is to extract information from those …
Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin
Performance Comparison Between A Distributed Particle Swarm Algorithm And A Centralised Algorithm, Ciarán O’Loughlin
Dissertations
Particle Swarm optimisation (PSO) is a particular form of swarm intelligence, which itself is an innovative intelligent paradigm for solving optimization problems. PSO is generally used to find a global optimum in a single optimisation function. This typically occurs on one node(machine) but there has been a significant body of research into creating distributed implementations of the PSO algorithm. Such research has often focused on the creation and performance of the distributed implementation in an isolated manner or compared to different distributed algorithms.
This research piece aims to bridge a gap in the existing literature, by testing a distributed implementation …
Stellar Classification Of Folded Spectra Using The Mk Classification Scheme And Convolutional Neural Networks, John Magee
Dissertations
The year 1943 saw the introduction of the Morgan-Keenan (MK) classification scheme and this replaced the existing Harvard Classification scheme. Both stellar classification scheme are fundamentally grounded in the field of spectroscopy. The Harvard Classification scheme classified stars based on stellar surface temperature. The MK Classification scheme introduced the concept of a luminosity class that is intrinsically linked to the surface gravity of a star. Temperature and luminosity class values are estimated directly from the stellar spectrum.
Machine learning is a well-established technique in astronomy. Traditionally, a spectrum is treated as a one-dimensional sequence of data. Techniques such as artificial …
Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard
Event-Driven Servers Using Asynchronous, Non-Blocking Network I/O: Performance Evaluation Of Kqueue And Epoll, Lorcan Leonard
Dissertations
This research project evaluates the performance of kqueue and epoll in the context of event-driven servers. The evaluation is done through benchmarking and tracing which are used to measure throughput and execution time respectively. The experiment is repeated for both a virtualised and native server environment. The results from the experiment are statistically analysed and compared. These results show significant differences between kqueue and epoll, and a profound impact of virtualisation as a variable.
Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti
Improving A Network Intrusion Detection System’S Efficiency Using Model-Based Data Augmentation, Vinicius Waterkemper Lodetti
Dissertations
A network intrusion detection system (NIDS) is one important element to mitigate cybersecurity risks, the NIDS allow for detecting anomalies in a network which may be a cyberattack to a corporate network environment. A NIDS can be seen as a classification problem where the ultimate goal is to distinguish between malicious traffic among a majority of benign traffic. Researches on NIDS are often performed using outdated datasets that don’t represent the actual cyberspace. Datasets such as the CICIDS2018 address this gap by being generated from attacks and an infrastructure that reflects an up-to-date scenario.
A problem may arise when machine …
A Hybrid Neural Network For Stock Price Direction Forecasting, Daniel Devine
A Hybrid Neural Network For Stock Price Direction Forecasting, Daniel Devine
Dissertations
The volatility of stock markets makes them notoriously difficult to predict and is the reason that many investors sell out at the wrong time. Contrary to the efficient market hypothesis (EMH) and the random walk theory, contribution to the study of machine learning models for stock price forecasting has shown evidence of stock markets predictability with varying degrees of success. Contemporary approaches have sought to use a hybrid of convolutional neural network (CNN) for its feature extraction capabilities and long short-term memory (LSTM) neural network for its time series prediction. This comparative study aims to determine the predictability of stock …
Identifying Significant Features For Player Evaluation In Nfl Comparing Anns And Traditional Models, Ronan Walsh
Identifying Significant Features For Player Evaluation In Nfl Comparing Anns And Traditional Models, Ronan Walsh
Dissertations
The evaluation of player performance in sports is popular and important in modern sports, enabling teams to use real data in the construction of their rosters. This dissertation proposes to apply machine learning algorithms to predicting the player evaluations from a leading NFL analytics company who use a combination of statistics and expert evaluation. In addition, it will investigate what features are significant in the evaluation of a position. Data for the dissertation is obtained from multiple online sources - Pro Football Reference and Pro Football Focus (the the NFL analytics company). These data sets are combined and analysed before …
Evaluating The Performance Of Transformer Architecture Over Attention Architecture On Image Captioning, Deepti Balasubramaniam
Evaluating The Performance Of Transformer Architecture Over Attention Architecture On Image Captioning, Deepti Balasubramaniam
Dissertations
Over the last few decades computer vision and Natural Language processing has shown tremendous improvement in different tasks such as image captioning, video captioning, machine translation etc using deep learning models. However, there were not much researches related to image captioning based on transformers and how it outperforms other models that were implemented for image captioning. In this study will be designing a simple encoder-decoder model, attention model and transformer model for image captioning using Flickr8K dataset where will be discussing about the hyperparameters of the model, type of pre-trained model used and how long the model has been trained. …