Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (36)
- Old Dominion University (13)
- Technological University Dublin (11)
- Zayed University (11)
- University of Nebraska - Lincoln (9)
-
- University of Texas at Tyler (6)
- Western Kentucky University (4)
- Ateneo de Manila University (3)
- Edith Cowan University (3)
- Michigan Technological University (3)
- Syracuse University (3)
- The University of Southern Mississippi (3)
- Wright State University (3)
- Air Force Institute of Technology (2)
- Brigham Young University (2)
- Chapman University (2)
- Missouri University of Science and Technology (2)
- California Polytechnic State University, San Luis Obispo (1)
- Carleton College (1)
- Central Washington University (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- College of Saint Benedict and Saint John's University (1)
- Florida International University (1)
- Illinois Math and Science Academy (1)
- Indian Statistical Institute (1)
- Kennesaw State University (1)
- Loyola University Chicago (1)
- Macalester College (1)
- Marquette University (1)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (36)
- All Works (11)
- Faculty Publications (9)
- Computer Science Faculty Publications (8)
- Dissertations (8)
-
- Computer Science Faculty Publications and Presentations (6)
- Electrical & Computer Engineering Faculty Publications (5)
- CSE Conference and Workshop Papers (3)
- Department of Information Systems & Computer Science Faculty Publications (3)
- Michigan Tech Publications (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (2)
- Electrical Engineering and Computer Science - All Scholarship (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Kno.e.sis Publications (2)
- Mahurin Honors College Capstone Experience/Thesis Projects (2)
- Mathematics, Physics, and Computer Science Faculty Articles and Research (2)
- Publications (2)
- School of Computing: Faculty Publications (2)
- All College Thesis Program, 2016-2019 (1)
- Articles (1)
- Australian Information Security Management Conference (1)
- CSE Technical Reports (1)
- Computer Science Department Faculty Publication Series (1)
- Computer Science Faculty Research (1)
- Computer Science Faculty Research & Creative Works (1)
- Computer Science Faculty Scholarship (1)
- Computer Science and Engineering Faculty Publications (1)
- Computer Science: Faculty Publications and Other Works (1)
- Conference papers (1)
- Departmental Technical Reports (CS) (1)
- File Type
Articles 1 - 30 of 138
Full-Text Articles in Physical Sciences and Mathematics
Cardiogpt: An Ecg Interpretation Generation Model, Guohua Fu, Jianwei Zheng, Islam Abudayyeh, Chizobam Ani, Cyril Rakovski, Louis Ehwerhemuepha, Hongxia Lu, Yongjuan Guo, Shenglin Liu, Huimin Chu, Bing Yang
Cardiogpt: An Ecg Interpretation Generation Model, Guohua Fu, Jianwei Zheng, Islam Abudayyeh, Chizobam Ani, Cyril Rakovski, Louis Ehwerhemuepha, Hongxia Lu, Yongjuan Guo, Shenglin Liu, Huimin Chu, Bing Yang
Mathematics, Physics, and Computer Science Faculty Articles and Research
Numerous supervised learning models aimed at classifying 12-lead electrocardiograms into different groups have shown impressive performance by utilizing deep learning algorithms. However, few studies are dedicated to applying the Generative Pre-trained Transformer (GPT) model in interpreting electrocardiogram (ECG) using natural language. Thus, we are pioneering the exploration of this uncharted territory by employing the CardioGPT model to tackle this challenge. We used a dataset of ECGs (standard 10s, 12-channel format) from adult patients, with 60 distinct rhythms or conduction abnormalities annotated by board-certified, actively practicing cardiologists. The ECGs were collected from The First Affiliated Hospital of Ningbo University and Shanghai …
Blood Cell Image Segmentation And Classification: A Systematic Review, Muhammad Shahzad, Farman Ali, Syed Hamad Shirazi, Assad Rasheed, Awais Ahmad, Babar Shah, Daehan Kwak
Blood Cell Image Segmentation And Classification: A Systematic Review, Muhammad Shahzad, Farman Ali, Syed Hamad Shirazi, Assad Rasheed, Awais Ahmad, Babar Shah, Daehan Kwak
All Works
Background Blood diseases such as leukemia, anemia, lymphoma, and thalassemia are hematological disorders that relate to abnormalities in the morphology and concentration of blood elements, specifically white blood cells (WBC) and red blood cells (RBC). Accurate and efficient diagnosis of these conditions significantly depends on the expertise of hematologists and pathologists. To assist the pathologist in the diagnostic process, there has been growing interest in utilizing computer-aided diagnostic (CAD) techniques, particularly those using medical image processing and machine learning algorithms. Previous surveys in this domain have been narrowly focused, often only addressing specific areas like segmentation or classification but lacking …
Dataset Of Arabic Spam And Ham Tweets, Sanaa Kaddoura, Safaa Henno
Dataset Of Arabic Spam And Ham Tweets, Sanaa Kaddoura, Safaa Henno
All Works
This data article provides a dataset of 132421 posts and their corresponding information collected from Twitter social media. The data has two classes, ham or spam, where ham indicates non-spam clean tweets. The main target of this dataset is to study a way to classify whether a post is a spam or not automatically. The data is in Arabic language only, which makes the data essential to the researchers in Arabic natural language processing (NLP) due to the lack of resources in this language. The data is made publicly available to allow researchers to use it as a benchmark for …
Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch
Meta-Icvi: Ensemble Validity Metrics For Concise Labeling Of Correct, Under- Or Over-Partitioning In Streaming Clustering, Niklas M. Melton, Sasha A. Petrenko, Donald C. Wunsch
Electrical and Computer Engineering Faculty Research & Creative Works
Understanding the performance and validity of clustering algorithms is both challenging and crucial, particularly when clustering must be done online. Until recently, most validation methods have relied on batch calculation and have required considerable human expertise in their interpretation. Improving real-time performance and interpretability of cluster validation, therefore, continues to be an important theme in unsupervised learning. Building upon previous work on incremental cluster validity indices (iCVIs), this paper introduces the Meta- iCVI as a tool for explainable and concise labeling of partition quality in online clustering. Leveraging a time-series classifier and data-fusion techniques, the Meta- iCVI combines the outputs …
Dilf: Differentiable Rendering-Based Multi-View Image-Language Fusion For Zero-Shot 3d Shape Understanding, Xin Ning, Zaiyang Yu, Lusi Li, Weijun Li, Prayag Tiwari
Dilf: Differentiable Rendering-Based Multi-View Image-Language Fusion For Zero-Shot 3d Shape Understanding, Xin Ning, Zaiyang Yu, Lusi Li, Weijun Li, Prayag Tiwari
Computer Science Faculty Publications
Zero-shot 3D shape understanding aims to recognize “unseen” 3D categories that are not present in training data. Recently, Contrastive Language–Image Pre-training (CLIP) has shown promising open-world performance in zero-shot 3D shape understanding tasks by information fusion among language and 3D modality. It first renders 3D objects into multiple 2D image views and then learns to understand the semantic relationships between the textual descriptions and images, enabling the model to generalize to new and unseen categories. However, existing studies in zero-shot 3D shape understanding rely on predefined rendering parameters, resulting in repetitive, redundant, and low-quality views. This limitation hinders the model’s …
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen
Electrical & Computer Engineering Faculty Publications
The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …
Fine-Grained In-Context Permission Classification For Android Apps Using Control-Flow Graph Embedding, Vikas Kumar Malviya, Naing Tun Yan, Chee Wei Leow, Ailys Xynyn Tee, Lwin Khin Shar, Lingxiao Jiang
Fine-Grained In-Context Permission Classification For Android Apps Using Control-Flow Graph Embedding, Vikas Kumar Malviya, Naing Tun Yan, Chee Wei Leow, Ailys Xynyn Tee, Lwin Khin Shar, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Android is the most popular operating system for mobile devices nowadays. Permissions are a very important part of Android security architecture. Apps frequently need the users’ permission, but many of them only ask for it once—when the user uses the app for the first time—and then they keep and abuse the given permissions. Longing to enhance Android permission security and users’ private data protection is the driving factor behind our approach to explore fine-grained contextsensitive permission usage analysis and thereby identify misuses in Android apps. In this work, we propose an approach for classifying the fine-grained permission uses for each …
Deep Learning-Based Diagnosis Of Disease Activity In Patients With Graves’ Orbitopathy Using Orbital Spect/Ct, Ni Yao, Longxi Li, Zhengyuan Gao, Chen Zhao, Yanting Li, Chuang Han, Jiaofen Nan, Zelin Zhu, Yi Xiao, Fubao Zhu, Min Zhao, Weihua Zhou
Deep Learning-Based Diagnosis Of Disease Activity In Patients With Graves’ Orbitopathy Using Orbital Spect/Ct, Ni Yao, Longxi Li, Zhengyuan Gao, Chen Zhao, Yanting Li, Chuang Han, Jiaofen Nan, Zelin Zhu, Yi Xiao, Fubao Zhu, Min Zhao, Weihua Zhou
Michigan Tech Publications
Purpose: Orbital [99mTc]TcDTPA orbital single-photon emission computed tomography (SPECT)/CT is an important method for assessing inflammatory activity in patients with Graves’ orbitopathy (GO). However, interpreting the results requires substantial physician workload. We aim to propose an automated method called GO-Net to detect inflammatory activity in patients with GO. Materials and methods: GO-Net had two stages: (1) a semantic V-Net segmentation network (SV-Net) that extracts extraocular muscles (EOMs) in orbital CT images and (2) a convolutional neural network (CNN) that uses SPECT/CT images and the segmentation results to classify inflammatory activity. A total of 956 eyes from 478 patients with GO …
Why Softmax? Because It Is The Only Consistent Approach To Probability-Based Classification, Anatole Lokshin, Vladik Kreinovich
Why Softmax? Because It Is The Only Consistent Approach To Probability-Based Classification, Anatole Lokshin, Vladik Kreinovich
Departmental Technical Reports (CS)
In many practical problems, the most effective classification techniques are based on deep learning. In this approach, once the neural network generates values corresponding to different classes, these values are transformed into probabilities by using the softmax formula. Researchers tried other transformation, but they did not work as well as softmax. A natural question is: why is softmax so effective? In this paper, we provide a possible explanation for this effectiveness: namely, we prove that softmax is the only consistent approach to probability-based classification. In precise terms, it is the only approach for which two reasonable probability-based ideas -- Least …
Convolutional Neural Networks Analysis Reveals Three Possible Sources Of Bronze Age Writings Between Greece And India, Shruti Daggumati, Peter Z. Revesz
Convolutional Neural Networks Analysis Reveals Three Possible Sources Of Bronze Age Writings Between Greece And India, Shruti Daggumati, Peter Z. Revesz
School of Computing: Faculty Publications
This paper analyzes the relationships among eight ancient scripts from between Greece and India. We used convolutional neural networks combined with support vector machines to give a numerical rating of the similarity between pairs of signs (one sign from each of two different scripts). Two scripts that had a one-to-one matching of their signs were determined to be related. The result of the analysis is the finding of the following three groups, which are listed in chronological order: (1) Sumerian pictograms, the Indus Valley script, and the proto-Elamite script; (2) Cretan hieroglyphs and Linear B; and (3) the Phoenician, Greek, …
Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni
Convolution Neural Networks For Phishing Detection, Arun D. Kulkarni
Computer Science Faculty Publications and Presentations
Phishing is one of the significant threats in cyber security. Phishing is a form of social engineering that uses e-mails with malicious websites to solicitate personal information. Phishing e-mails are growing in alarming number. In this paper we propose a novel machine learning approach to classify phishing websites using Convolution Neural Networks (CNNs) that use URL based features. CNNs consist of a stack of convolution, pooling layers, and a fully connected layer. CNNs accept images as input and perform feature extraction and classification. Many CNN models are available today. To avoid vanishing gradient problem, recent CNNs use entropy loss function …
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Electrical and Computer Engineering Faculty Publications
The use of network connected devices has grown exponentially in recent years revolutionizing our daily lives. However, it has also attracted the attention of cybercriminals making the attacks targeted towards these devices increase not only in numbers but also in sophistication. To detect such attacks, a Network Intrusion Detection System (NIDS) has become a vital component in network applications. However, network devices produce large scale high-dimensional data which makes it difficult to accurately detect various known and unknown attacks. Moreover, the complex nature of network data makes the feature selection process of a NIDS a challenging task. In this study, …
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
All Works
Facial expression is a type of communication and is useful in many areas of computer vision, including intelligent visual surveillance, human-robot interaction and human behavior analysis. A deep learning approach is presented to classify happy, sad, angry, fearful, contemptuous, surprised and disgusted expressions. Accurate detection and classification of human facial expression is a critical task in image processing due to the inconsistencies amid the complexity, including change in illumination, occlusion, noise and the over-fitting problem. A stacked sparse auto-encoder for facial expression recognition (SSAE-FER) is used for unsupervised pre-training and supervised fine-tuning. SSAE-FER automatically extracts features from input images, and …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Electrical & Computer Engineering Faculty Publications
This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Conference papers
Child sexual abuse inflicts lifelong devastating consequences for victims and is a growing social concern. In most countries, child sexual abuse material (CSAM) distribution is illegal. As a result, there are many research papers in the literature which proposed technologies to detect and investigate CSAM. In this survey, a comprehensive search of the peer reviewed journal and conference paper databases (including preprints) is conducted to identify high-quality literature. We use the PRISMA methodology to refine our search space to 2,761 papers published by Springer, Elsevier, IEEE and ACM. After iterative reviews of title, abstract and full text for relevance to …
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Publications
Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …
A Gpu-Based Machine Learning Approach For Detection Of Botnet Attacks, Michal Motylinski, Áine Macdermott, Farkhund Iqbal, Babar Shah
A Gpu-Based Machine Learning Approach For Detection Of Botnet Attacks, Michal Motylinski, Áine Macdermott, Farkhund Iqbal, Babar Shah
All Works
Rapid development and adaptation of the Internet of Things (IoT) has created new problems for securing these interconnected devices and networks. There are hundreds of thousands of IoT devices with underlying security vulnerabilities, such as insufficient device authentication/authorisation making them vulnerable to malware infection. IoT botnets are designed to grow and compete with one another over unsecure devices and networks. Once infected, the device will monitor a Command-and-Control (C&C) server indicating the target of an attack via Distributed Denial of Service (DDoS) attack. These security issues, coupled with the continued growth of IoT, presents a much larger attack surface for …
Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi
Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi
All Works
COVID-19 detection from medical imaging is a difficult challenge that has piqued the interest of experts worldwide. Chest X-rays and computed tomography (CT) scanning are the essential imaging modalities for diagnosing COVID-19. All researchers focus their efforts on developing viable methods and rapid treatment procedures for this pandemic. Fast and accurate automated detection approaches have been devised to alleviate the need for medical professionals. Deep Learning (DL) technologies have successfully recognized COVID-19 situations. This paper proposes a developed set of nine deep learning models for diagnosing COVID-19 based on transfer learning and implementation in a novel architecture (SEL-COVIDNET). In which …
Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian
Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian
Publications and Research
Empirical Software Engineering (ESE) researchers study (open-source) project issues and the comments and threads within to discover—among others—challenges developers face when incorporating new technologies, platforms, and programming language constructs. However, such threads accumulate, becoming unwieldy and hindering any insight researchers may gain. While existing approaches alleviate this burden by classifying issue thread comments, there is a gap between searching popular open-source software repositories (e.g., those on GitHub) for issues containing particular keywords and feeding the results into a classification model. This paper demonstrates a research infrastructure tool called QuerTCI that bridges this gap by integrating the GitHub issue comment search …
A Few-Shot Learning Model Based On A Triplet Network For The Prediction Of Energy Coincident Peak Days, Jinxiang Liu, Laura Brown
A Few-Shot Learning Model Based On A Triplet Network For The Prediction Of Energy Coincident Peak Days, Jinxiang Liu, Laura Brown
Michigan Tech Publications
In an electricity system, a coincident peak (CP) is defined as the highest daily power demand in a year, which plays an important role in keeping the balance between power supply and its demand. Advanced information about the time of coincident peaks would be helpful for both utility companies and their customers. This work addresses the prediction of the five coincident peak days (5CP) in a year. We present a few-shot learning model to classify a day as a 5CP day or a non-5CP day 24-hours ahead. A triplet network is implemented for the 2-way-5-shot classifications on six different historical …
Studying The Role Of Cerebrovascular Changes In Different Compartments In Human Brains In Hypertension Prediction, Heba Kandil, Ahmed Soliman, Nada Elsaid, Ahmed Saied, Norah Saleh Alghamdi, Ali Mahmoud, Fatma Taher, Ayman El-Baz
Studying The Role Of Cerebrovascular Changes In Different Compartments In Human Brains In Hypertension Prediction, Heba Kandil, Ahmed Soliman, Nada Elsaid, Ahmed Saied, Norah Saleh Alghamdi, Ali Mahmoud, Fatma Taher, Ayman El-Baz
All Works
Hypertension is a major cause of mortality of millions of people worldwide. Cerebral vascular changes are clinically observed to precede the onset of hypertension. The early detection and quantification of these cerebral changes would help greatly in the early prediction of the disease. Hence, preparing appropriate medical plans to avoid the disease and mitigate any adverse events. This study aims to investigate whether studying the cerebral changes in specific regions of human brains (specifically, the anterior, and the posterior compartments) separately, would increase the accuracy of hypertension prediction compared to studying the vascular changes occurring over the entire brain’s vasculature. …
Afnd: Arabic Fake News Dataset For The Detection And Classification Of Articles Credibility, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, Manar Jaradat
Afnd: Arabic Fake News Dataset For The Detection And Classification Of Articles Credibility, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, Manar Jaradat
All Works
The news credibility detection task has started to gain more attention recently due to the rapid increase of news on different social media platforms. This article provides a large, labeled, and diverse Arabic Fake News Dataset (AFND) that is collected from public Arabic news websites. This dataset enables the research community to use supervised and unsupervised machine learning algorithms to classify the credibility of Arabic news articles. AFND consists of 606912 public news articles that were scraped from 134 public news websites of 19 different Arab countries over a 6-month period using Python scripts. The Arabic fact-check platform, Misbar, is …
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
FIU Electronic Theses and Dissertations
Cancer is a complex molecular process due to abnormal changes in the genome, such as mutation and copy number variation, and epigenetic aberrations such as dysregulations of long non-coding RNA (lncRNA). These abnormal changes are reflected in transcriptome by turning oncogenes on and tumor suppressor genes off, which are considered cancer biomarkers.
However, transcriptomic data is high dimensional, and finding the best subset of genes (features) related to causing cancer is computationally challenging and expensive. Thus, developing a feature selection framework to discover molecular biomarkers for cancer is critical.
Traditional approaches for biomarker discovery calculate the fold change for each …
Split Classification Model For Complex Clustered Data, Katherine Gerot
Split Classification Model For Complex Clustered Data, Katherine Gerot
Honors Theses
Classification in high-dimensional data has generated tremendous interest in a multitude of fields. Data in higher dimensions often tend to reside in non-Euclidean metric space. This prevents Euclidean-based classification methodologies, such as regression, from reliably modeling the data. Many proposed models rely on computationally-complex embedding to convert the data to a more usable format. Others, namely the Support Vector Machine, rely on kernel manipulation to implicitly describe the "feature space" to arrive at a non-linear decision boundary. The proposed methodology in this paper seeks to classify complex data in a relatively computationally-simple and explainable manner.
Efficient Search Of Live-Coding Screencasts From Online Videos, Chengran Yang, Ferdian Thung, David Lo
Efficient Search Of Live-Coding Screencasts From Online Videos, Chengran Yang, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Programming videos on the Internet are valuable resources for learning programming skills. To find relevant videos, developers typically search online video platforms (e.g., YouTube) with keywords on topics they wish to learn. Developers often look for live-coding screencasts, in which the videos’ authors perform live coding. Yet, not all programming videos are livecoding screencasts. In this work, we develop a tool named PSFinder to identify live-coding screencasts. PSFinder leverages a classifier to identify whether a video frame contains an IDE window. It uses a sampling strategy to pick a number of frames from an input video, runs the classifer on …
Measuring Semantic Similarity Of Documents By Using Named Entity Recognition Methods, David Efraín Muñoz Morales
Measuring Semantic Similarity Of Documents By Using Named Entity Recognition Methods, David Efraín Muñoz Morales
Masters
The work presented in this thesis was born from the desire to map documents with similar semantic concepts between them. We decided to address this problem as a named entity recognition task, where we have identified key concepts in the texts we use, and we have categorized them. So, we can apply named entity recognition techniques and automatically recognize these key concepts inside other documents. However, we propose the use of a classification method based on the recognition of named entities or key phrases, where the method can detect similarities between key concepts of the texts to be analyzed, and …
Smart Covid-3d-Scnn: A Novel Method To Classify X-Ray Images Of Covid-19, Ahed Abugabah, Atif Mehmood, Ahmad Ali Al Zubi, Louis Sanzogni
Smart Covid-3d-Scnn: A Novel Method To Classify X-Ray Images Of Covid-19, Ahed Abugabah, Atif Mehmood, Ahmad Ali Al Zubi, Louis Sanzogni
All Works
The outbreak of the novel coronavirus has spread worldwide, and millions of people are being infected. Image or detection classification is one of the first application areas of deep learning, which has a significant contribution to medical image analysis. In classification detection, one or more images (detection) are usually used as input, and diagnostic variables (such as whether there is a disease) are used as output. The novel coronavirus has spread across the world, infecting millions of people. Early-stage detection of critical cases of COVID-19 is essential. X-ray scans are used in clinical studies to diagnose COVID-19 and Pneumonia early. …
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Engineering Management & Systems Engineering Faculty Publications
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …
Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh
Modelling Customers Credit Card Behaviour Using Bidirectional Lstm Neural Networks, Maher Ala’Raj, Maysam F. Abbod, Munir Majdalawieh
All Works
With the rapid growth of consumer credit and the huge amount of financial data developing effective credit scoring models is very crucial. Researchers have developed complex credit scoring models using statistical and artificial intelligence (AI) techniques to help banks and financial institutions to support their financial decisions. Neural networks are considered as a mostly wide used technique in finance and business applications. Thus, the main aim of this paper is to help bank management in scoring credit card clients using machine learning by modelling and predicting the consumer behaviour with respect to two aspects: the probability of single and consecutive …