Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Engineering

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan Dec 2020

Representational Learning Approach For Predicting Developer Expertise Using Eye Movements, Sumeet Maan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The thesis analyzes an existing eye-tracking dataset collected while software developers were solving bug fixing tasks in an open-source system. The analysis is performed using a representational learning approach namely, Multi-layer Perceptron (MLP). The novel aspect of the analysis is the introduction of a new feature engineering method based on the eye-tracking data. This is then used to predict developer expertise on the data. The dataset used in this thesis is inherently more complex because it is collected in a very dynamic environment i.e., the Eclipse IDE using an eye-tracking plugin, iTrace. Previous work in this area only worked on …


Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon Dec 2020

Proportional Voting Based Semi-Unsupervised Machine Learning Intrusion Detection System, Yang G. Kim, Ohbong Kwon, John Yoon

Publications and Research

Feature selection of NSL-KDD data set is usually done by finding co-relationships among features, irrespective of target prediction. We aim to determine the relationship between features and target goals to facilitate different target detection goals regardless of the correlated feature selection. The unbalanced data structure in NSL-KDD data can be relaxed by Proportional Representation (PR). However, adopting PR would deny the notion of winner-take-all by attracting a majority of the vote and also provide a fairly proportional share for any grouping of like-minded data. Furthermore, minorities and majorities would get a fair share of power and representation in data structure …


A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha Nov 2020

A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificial Intelligence-enabled wearables show an ability to transform the health insurance sector. This would not only enable self-management of individual health but also help them focus from treatments to the preventions of health hazards. With this customer-centric approach to health care, it will enable the insurance companies to track the …


Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary Sep 2020

Forecasting Vegetation Health In The Mena Region By Predicting Vegetation Indicators With Machine Learning Models, Sachi Perera, Wenzhao Li, Erik Linstead, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Machine learning (ML) techniques can be applied to predict and monitor drought conditions due to climate change. Predicting future vegetation health indicators (such as EVI, NDVI, and LAI) is one approach to forecast drought events for hotspots (e.g. Middle East and North Africa (MENA) regions). Recently, ML models were implemented to predict EVI values using parameters such as land types, time series, historical vegetation indices, land surface temperature, soil moisture, evapotranspiration etc. In this work, we collected the MODIS atmospherically corrected surface spectral reflectance imagery with multiple vegetation related indices for modeling and evaluation of drought conditions in the MENA …


Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem Sep 2020

Machine Learning Techniques For Credit Card Fraud Detection, Hossam Eldin Mohammed Abd El-Hamid Ahmed Abdou, Wael Khalifa, Mohamed Ismail Roushdy, Abdel-Badeeh M. Salem

Future Computing and Informatics Journal

The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they …


Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof Sep 2020

Intelligent Technique For Automating The Conversion Between Major And Minor Melodies, Nermin N. J. Siphocly, El-Sayed M. El-Horbaty, Abd El-Badea Mohamed Salem Prof

Future Computing and Informatics Journal

Nowadays, computers are extremely beneficial to music composers. Computer music generation tools are developed for aiding composers in producing satisfying musical pieces. The automation of music composition tasks is a challenging research point, specially to the field of Artificial Intelligence. Converting melodies that are played on a major scale to minor (or vice versa) is interesting to both composers and music listeners. Newly converted melodies of famous songs, either from major to minor or the opposite, are becoming blockbusters on the social media. In this paper we propose an intelligent method for automating the conversion between major and minor melodies …


Short Term Energy Forecasting For A Microgird Load Using Lstm Rnn, Akhil Soman Sep 2020

Short Term Energy Forecasting For A Microgird Load Using Lstm Rnn, Akhil Soman

Masters Theses

Decentralization of the electric grid can increase resiliency (during natural disasters) and can reduce T&D energy losses and emissions. Microgrids and DERs can enable this to happen. It is important to optimally control microgrids and DERs to extract the greatest economic, environmental and resiliency benefits. This is enabled by robust forecasting to optimally control loads and energy sources. An integral part of microgrid control is power side and load side demand forecasting.

In this thesis, we look at the ability of a powerful neural network algorithm to forecast the load side demand for a microgrid using the UMass campus as …


Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell Aug 2020

Terramechanics And Machine Learning For The Characterization Of Terrain, Bryan W. Southwell

Electronic Thesis and Dissertation Repository

An instrumented rover wheel can collect vast amounts of data about a planetary surface. Planetary surfaces are changed by complex geological processes which can be better understood with an abundance of surface data and the use of terramechanics. Identifying terrain parameters such as cohesion and angle of friction hold importance for both the rover driver and the planetary scientist. Knowledge of terrain characteristics can warn of unsafe terrain and flag potential interesting scientific sites. The instrumented wheel in this research utilizes a pressure pad to sense load and sinkage, a string potentiometer to measure slip, and records motor current draw. …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


An Investigation Into Multi-View Error Correcting Output Code Classifiers Applied To Organ Tissue Classification, Daniel Alvarez Aug 2020

An Investigation Into Multi-View Error Correcting Output Code Classifiers Applied To Organ Tissue Classification, Daniel Alvarez

UNLV Theses, Dissertations, Professional Papers, and Capstones

Large amounts of data is being generated constantly each day, so much data that it is difficult to find patterns in order to predict outcomes and make decisions for both humans and machines alike. It would be useful if this data could be simplified using machine learning techniques. For example, biological cell identity is dependent on many factors tied to genetic processes. Such factors include proteins, gene transcription, and gene methylation. Each of these factors are highly complex mechanism with immense amounts of data. Simplifying these can then be helpful in finding patterns in them. Error-Correcting Output Codes (ECOC) does …


Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat Jul 2020

Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat

Electronic Thesis and Dissertation Repository

The rapid growth of the Internet and related technologies has led to the collection of large amounts of data by individuals, organizations, and society in general [1]. However, this often leads to information overload which occurs when the amount of input (e.g. data) a human is trying to process exceeds their cognitive capacities [2]. Machine learning (ML) has been proposed as one potential methodology capable of extracting useful information from large sets of data [1]. This thesis focuses on two applications. The first is education, namely e-Learning environments. Within this field, this thesis proposes different optimized ML ensemble models to …


Machine Learning For The Internet Of Things: Applications, Implementation, And Security, Vishalini Laguduva Ramnath Jul 2020

Machine Learning For The Internet Of Things: Applications, Implementation, And Security, Vishalini Laguduva Ramnath

USF Tampa Graduate Theses and Dissertations

Artificial intelligence and ubiquitous sensor systems have seen tremendous advances in recent times, resulting in groundbreaking impact across domains such as healthcare, entertainment, and transportation through a collective ecosystem called the Internet of Things. The advent of 5G and improved wireless networks will further accelerate the research and development of tools in deep learning, sensor systems, and computing platforms by providing improved network latency and bandwidth. While tremendous progress has been made in the Internet of Things, current work has largely focused on building robust applications that leverage the data collected through ubiquitous sensor nodes to provide actionable rules and …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li Apr 2020

Advanced Techniques To Detect Complex Android Malware, Zhiqiang Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Android is currently the most popular operating system for mobile devices in the world. However, its openness is the main reason for the majority of malware to be targeting Android devices. Various approaches have been developed to detect malware.

Unfortunately, new breeds of malware utilize sophisticated techniques to defeat malware detectors. For example, to defeat signature-based detectors, malware authors change the malware’s signatures to avoid detection. As such, a more effective approach to detect malware is by leveraging malware’s behavioral characteristics. However, if a behavior-based detector is based on static analysis, its reported results may contain a large number of …


Drone Proximity Detection Via Air Disturbance Analysis, Qian Zhao, Jason Hughes Apr 2020

Drone Proximity Detection Via Air Disturbance Analysis, Qian Zhao, Jason Hughes

Faculty Publications

The use of unmanned aerial vehicles (drones) is expanding to commercial, scientific, and agriculture applications, including surveillance, product deliveries and aerial photography. One challenge for applications of drones is detecting obstacles and avoiding collisions. A typical solution to this issue is the use of camera sensors or ultrasonic sensors for obstacle detection or sometimes just manual control (teleoperation). However, these solutions have costs in battery lifetime, payload, operator skill. We note that there will be an air disturbance in the vicinity of the drone when it’s moving close to obstacles or other drones. Our objective is to detect obstacles from …


Evaluating Flow Features For Network Application Classification, Carlos Alcantara Jan 2020

Evaluating Flow Features For Network Application Classification, Carlos Alcantara

Open Access Theses & Dissertations

Communication networks provide the foundational services on which our modern economy depends. These services include data storage and transfer, video and voice telephony, gaming, multimedia streaming, remote invocation, and the world wide web. Communication networks are large-scale distributed systems composed of heterogeneous equipment. As a result of scale and heterogeneity, communication networks are cumbersome to manage (e.g., configure, assess performance, detect faults) by human operators. With the emergence of easily accessible network data and machine learning algorithms, there is a great opportunity to move network management towards increasing automation. Network management automation will allow for a reduced likelihood of human …


Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany Jan 2020

Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany

Conference papers

Abstract. The Named Entity Recognition (NER) task has attracted significant attention in Natural Language Processing (NLP) as it can enhance the performance of many NLP applications. In this paper, we compare English NER with Arabic NER in an experimental way to investigate the impact of using different classifiers and sets of features including language-independent and language-specific features. We explore the features and classifiers on five different datasets. We compare deep neural network architectures for NER with more traditional machine learning approaches to NER. We discover that most of the techniques and features used for English NER perform well on Arabic …


Applications Of Artificial Intelligence To Cryptography, Jonathan Blackledge, Napo Mosola Jan 2020

Applications Of Artificial Intelligence To Cryptography, Jonathan Blackledge, Napo Mosola

Articles

This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI). It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) to analyze and encrypt data. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning using Deep ANNs. In this context, the paper considers: (i) the implementation of EC and ANNs for generating unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of finite binary strings for applications in Cryptanalysis. The aim of the paper is to provide an overview on …


Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed Jan 2020

Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed

Theses and Dissertations

Radiation oncology is the field of medicine that deals with treating cancer patients through ionizing radiation. The clinical modality or technique used to treat the cancer patients in the radiation oncology domain is referred to as radiation therapy. Radiation therapy aims to deliver precisely measured dose irradiation to a defined tumor volume (target) with as minimal damage as possible to surrounding healthy tissue (organs-at-risk), resulting in eradication of the tumor, high quality of life, and prolongation of survival. A typical radiotherapy process requires the use of different clinical systems at various stages of the workflow. The data generated in these …


An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro Jan 2020

An Examination Of The Smote And Other Smote-Based Techniques That Use Synthetic Data To Oversample The Minority Class In The Context Of Credit-Card Fraud Classification, Eduardo Parkinson De Castro

Dissertations

This research project seeks to investigate some of the different sampling techniques that generate and use synthetic data to oversample the minority class as a means of handling the imbalanced distribution between non-fraudulent (majority class) and fraudulent (minority class) classes in a credit-card fraud dataset. The purpose of the research project is to assess the effectiveness of these techniques in the context of fraud detection which is a highly imbalanced and cost-sensitive dataset. Machine learning tasks that require learning from datasets that are highly unbalanced have difficulty learning since many of the traditional learning algorithms are not designed to cope …


Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher Jan 2020

Machine Learning Assisted Gait Analysis For The Determination Of Handedness In Able-Bodied People, Hugh Gallagher

Dissertations

This study has investigated the potential application of machine learning for video analysis, with a view to creating a system which can determine a person’s hand laterality (handedness) from the way that they walk (their gait). To this end, the convolutional neural network model VGG16 underwent transfer learning in order to classify videos under two ‘activities’: “walking left-handed” and “walking right-handed”. This saw varying degrees of success across five transfer learning trained models: Everything – the entire dataset; FiftyFifty – the dataset with enough right-handed samples removed to produce a set with parity between activities; Female – only the female …


Optimization Of Home Mortgage Mover Predictive Model Applying Geo-Spatial Analysis And Machine Learning Techniques, Natalia Riscovaia Jan 2020

Optimization Of Home Mortgage Mover Predictive Model Applying Geo-Spatial Analysis And Machine Learning Techniques, Natalia Riscovaia

Dissertations

In the last decade digital innovations and online banking services have significantly changed customers banking preferences and behaviour. Banking industry is going through the changes and developments in the provision of banking services that are affecting the structure and the organization of the bank network. However, private home loan, referred as Home Mortgage hereinafter, continue to remain among the products, that customers prefer to have personal interaction about with professional advisors prior making the decision to apply for the loan with financial institution.


Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga Jan 2020

Automatic Chest X-Rays Analysis Using Statistical Machine Learning Strategies, Hermann Yepdjio Nkouanga

All Master's Theses

Tuberculosis (TB) is a disease responsible for the deaths of more than one million people worldwide every year. Even though it is preventable and curable, it remains a major threat to humanity that needs to be taken care of. It is often diagnosed in developed countries using approaches such as sputum smear microscopy and culture methods. However, since these approaches are rather expensive, they are not commonly used in poor regions of the globe such as India, Africa, and Bangladesh. Instead, the well known and affordable chest x-ray (CXR) interpretation by radiologists is the technique employed in those places. Nevertheless, …