Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (65)
- Singapore Management University (38)
- Old Dominion University (13)
- Selected Works (13)
- Technological University Dublin (11)
-
- Zayed University (11)
- University of Nebraska - Lincoln (9)
- Nova Southeastern University (7)
- University of Texas at El Paso (7)
- Wright State University (7)
- Edith Cowan University (6)
- San Jose State University (6)
- University of Texas at Tyler (6)
- Virginia Commonwealth University (6)
- Missouri University of Science and Technology (5)
- Southern Methodist University (5)
- University of Texas at Arlington (5)
- University of Wisconsin Milwaukee (5)
- Utah State University (5)
- Western Kentucky University (5)
- Air Force Institute of Technology (4)
- Brigham Young University (4)
- California Polytechnic State University, San Luis Obispo (4)
- Michigan Technological University (4)
- University of Arkansas, Fayetteville (4)
- University of South Florida (4)
- Western University (4)
- Ateneo de Manila University (3)
- Chapman University (3)
- Clemson University (3)
- Publication Year
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (65)
- Research Collection School Of Computing and Information Systems (36)
- Theses and Dissertations (15)
- All Works (11)
- Dissertations (11)
-
- Electronic Theses and Dissertations (11)
- Faculty Publications (9)
- Computer Science Faculty Publications (8)
- CCE Theses and Dissertations (7)
- Arun Kulkarni (6)
- Computer Science Faculty Publications and Presentations (6)
- Open Access Theses & Dissertations (6)
- Computer Science and Engineering Theses (5)
- Electrical & Computer Engineering Faculty Publications (5)
- Master's Projects (5)
- SMU Data Science Review (5)
- Browse all Theses and Dissertations (4)
- Doctoral Dissertations (4)
- Electronic Thesis and Dissertation Repository (4)
- Masters Theses (4)
- USF Tampa Graduate Theses and Dissertations (4)
- All Dissertations (3)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (3)
- CSE Conference and Workshop Papers (3)
- Department of Information Systems & Computer Science Faculty Publications (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Michigan Tech Publications (3)
- Theses and Dissertations--Computer Science (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (2)
- Dissertations and Theses Collection (Open Access) (2)
- Publication Type
- File Type
Articles 31 - 60 of 358
Full-Text Articles in Physical Sciences and Mathematics
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Network Intrusion Detection With Two-Phased Hybrid Ensemble Learning And Automatic Feature Selection, Asanka Kavinda Mananayaka, Sunnie S. Chung
Electrical and Computer Engineering Faculty Publications
The use of network connected devices has grown exponentially in recent years revolutionizing our daily lives. However, it has also attracted the attention of cybercriminals making the attacks targeted towards these devices increase not only in numbers but also in sophistication. To detect such attacks, a Network Intrusion Detection System (NIDS) has become a vital component in network applications. However, network devices produce large scale high-dimensional data which makes it difficult to accurately detect various known and unknown attacks. Moreover, the complex nature of network data makes the feature selection process of a NIDS a challenging task. In this study, …
Multi-Domain Adaptation For Image Classification, Depth Estimation, And Semantic Segmentation, Yu Zhang
Multi-Domain Adaptation For Image Classification, Depth Estimation, And Semantic Segmentation, Yu Zhang
Theses and Dissertations--Computer Science
The appearance of scenes may change for many reasons, including the viewpoint, the time of day, the weather, and the seasons. Traditionally, deep neural networks are trained and evaluated using images from the same scene and domain to avoid the domain gap. Recent advances in domain adaptation have led to a new type of method that bridges such domain gaps and learns from multiple domains.
This dissertation proposes methods for multi-domain adaptation for various computer vision tasks, including image classification, depth estimation, and semantic segmentation. The first work focuses on semi-supervised domain adaptation. I address this semi-supervised setting and propose …
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
Facial Expression Recognition Using Lightweight Deep Learning Modeling, Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad
All Works
Facial expression is a type of communication and is useful in many areas of computer vision, including intelligent visual surveillance, human-robot interaction and human behavior analysis. A deep learning approach is presented to classify happy, sad, angry, fearful, contemptuous, surprised and disgusted expressions. Accurate detection and classification of human facial expression is a critical task in image processing due to the inconsistencies amid the complexity, including change in illumination, occlusion, noise and the over-fitting problem. A stacked sparse auto-encoder for facial expression recognition (SSAE-FER) is used for unsupervised pre-training and supervised fine-tuning. SSAE-FER automatically extracts features from input images, and …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu
Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu
Turkish Journal of Electrical Engineering and Computer Sciences
This study performed a deep learning-based classification of chaotic systems over their phase portraits. To the best of the authors' knowledge, such classification studies over phase portraits have not been conducted in the literature. To that end, a dataset consisting of the phase portraits of the most known two chaotic systems, namely Lorenz and Chen, is generated for different values of the parameters, initial conditions, step size, and time length. Then, a classification with high accuracy is carried out employing transfer learning methods. The transfer learning methods used in the study are SqueezeNet, VGG-19, AlexNet, ResNet50, ResNet101, DenseNet201, ShuffleNet, and …
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
All Graduate Theses, Dissertations, and Other Capstone Projects
With the surge in information management technology reliance and the looming presence of cyber threats, user authentication has become paramount in computer security. Traditional static or one-time authentication has its limitations, prompting the emergence of continuous authentication as a frontline approach for enhanced security. Continuous authentication taps into behavior-based metrics for ongoing user identity validation, predominantly utilizing machine learning techniques to continually model user behaviors. This study elucidates the potential of mouse movement dynamics as a key metric for continuous authentication. By examining mouse movement patterns across two contrasting gaming scenarios - the high-intensity "Team Fortress" and the low-intensity strategic …
An Explainable Deep Learning Prediction Model For Severity Of Alzheimer's Disease From Brain Images, Godwin O. Ekuma
An Explainable Deep Learning Prediction Model For Severity Of Alzheimer's Disease From Brain Images, Godwin O. Ekuma
MSU Graduate Theses
Deep Convolutional Neural Networks (CNNs) have become the go-to method for medical imaging classification on various imaging modalities for binary and multiclass problems. Deep CNNs extract spatial features from image data hierarchically, with deeper layers learning more relevant features for the classification application. The effectiveness of deep learning models are hampered by limited data sets, skewed class distributions, and the undesirable "black box" of neural networks, which decreases their understandability and usability in precision medicine applications. This thesis addresses the challenge of building an explainable deep learning model for a clinical application: predicting the severity of Alzheimer's disease (AD). AD …
Online Sexual Predator Detection, Muhammad Khalid
Online Sexual Predator Detection, Muhammad Khalid
Electronic Theses and Dissertations
Online sexual abuse is a concerning yet severely overlooked vice of modern society. With more children being on the Internet and with the ever-increasing advent of web-applications such as online chatrooms and multiplayer games, preying on vulnerable users has become more accessible for predators. In recent years, there has been work on detecting online sexual predators using Machine Learning and deep learning techniques. Such work has trained on severely imbalanced datasets, and imbalance is handled via manual trimming of over-represented labels. In this work, we propose an approach that first tackles the problem of imbalance and then improves the effectiveness …
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh
Browse all Theses and Dissertations
The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams
Browse all Theses and Dissertations
Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …
Prediction Of Sumoylation Sites In Proteins From Language Model Representations, Evgenii Sidorov
Prediction Of Sumoylation Sites In Proteins From Language Model Representations, Evgenii Sidorov
Dissertations, Master's Theses and Master's Reports
Sumoylation is an essential post-translational modification intimately involved in a diverse range of eukaryotic cellular mechanisms and plays a significant role in DNA repair. Some researchers hypothesize that a high level of SUMOylation events in cancer cells improves cells' chances for survival under stress conditions by regulating tumor-related proteins.
This study belongs to a booming field of harnessing computational power to the domain of life. Prediction of protein structure, its molecular function, and the design of new drugs are just a few examples of the applications within this exciting area of research. By leveraging computational power, researchers can analyze vast …
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner
Electrical & Computer Engineering Faculty Publications
This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Conference papers
Child sexual abuse inflicts lifelong devastating consequences for victims and is a growing social concern. In most countries, child sexual abuse material (CSAM) distribution is illegal. As a result, there are many research papers in the literature which proposed technologies to detect and investigate CSAM. In this survey, a comprehensive search of the peer reviewed journal and conference paper databases (including preprints) is conducted to identify high-quality literature. We use the PRISMA methodology to refine our search space to 2,761 papers published by Springer, Elsevier, IEEE and ACM. After iterative reviews of title, abstract and full text for relevance to …
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Tutorial: Neuro-Symbolic Ai For Mental Healthcare, Kaushik Roy, Usha Lokala, Manas Gaur, Amit Sheth
Publications
Artificial Intelligence (AI) systems for mental healthcare (MHCare) have been ever-growing after realizing the importance of early interventions for patients with chronic mental health (MH) conditions. Social media (SocMedia) emerged as the go-to platform for supporting patients seeking MHCare. The creation of peer-support groups without social stigma has resulted in patients transitioning from clinical settings to SocMedia supported interactions for quick help. Researchers started exploring SocMedia content in search of cues that showcase correlation or causation between different MH conditions to design better interventional strategies. User-level Classification-based AI systems were designed to leverage diverse SocMedia data from various MH conditions, …
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
Cov-Inception: Covid-19 Detection Tool Using Chest X-Ray, Aswini Thota, Ololade Awodipe, Rashmi Patel
SMU Data Science Review
Since the pandemic started, researchers have been trying to find a way to detect COVID-19 which is a cost-effective, fast, and reliable way to keep the economy viable and running. This research details how chest X-ray radiography can be utilized to detect the infection. This can be for implementation in Airports, Schools, and places of business. Currently, Chest imaging is not a first-line test for COVID-19 due to low diagnostic accuracy and confounding with other viral pneumonia. Different pre-trained algorithms were fine-tuned and applied to the images to train the model and the best model obtained was fine-tuned InceptionV3 model …
Analysis Of Patch And Sample Size Effects For 2d-3d Cnn Models Using Multiplatform Dataset: Hyperspectral Image Classification Of Rosis And Jilin-1 Gp01 Imagery, Taşkin Kavzoğlu, Eli̇f Özlem Yilmaz
Analysis Of Patch And Sample Size Effects For 2d-3d Cnn Models Using Multiplatform Dataset: Hyperspectral Image Classification Of Rosis And Jilin-1 Gp01 Imagery, Taşkin Kavzoğlu, Eli̇f Özlem Yilmaz
Turkish Journal of Electrical Engineering and Computer Sciences
Modern hyperspectral sensors provide a huge volume of data at spectral and spatial domains with high redundancy, which requires robust methods for analysis. In this study, 2D and 3D CNN models were applied to hyperspectral image datasets (ROSIS and Jilin-1 GP01) using varying patch and sample sizes to determine their combined impacts on the performance of deep learning models. Differences in classification performances in relation to particle and sample sizes were statistically analysed using McNemar?s test. According to the findings, raising the patch and sample size enhances the performance of the 2D/3D CNN model and produces more accurate results in …
A Gpu-Based Machine Learning Approach For Detection Of Botnet Attacks, Michal Motylinski, Áine Macdermott, Farkhund Iqbal, Babar Shah
A Gpu-Based Machine Learning Approach For Detection Of Botnet Attacks, Michal Motylinski, Áine Macdermott, Farkhund Iqbal, Babar Shah
All Works
Rapid development and adaptation of the Internet of Things (IoT) has created new problems for securing these interconnected devices and networks. There are hundreds of thousands of IoT devices with underlying security vulnerabilities, such as insufficient device authentication/authorisation making them vulnerable to malware infection. IoT botnets are designed to grow and compete with one another over unsecure devices and networks. Once infected, the device will monitor a Command-and-Control (C&C) server indicating the target of an attack via Distributed Denial of Service (DDoS) attack. These security issues, coupled with the continued growth of IoT, presents a much larger attack surface for …
Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi
Sel-Covidnet: An Intelligent Application For The Diagnosis Of Covid-19 From Chest X-Rays And Ct-Scans, Ahmad Al Smadi, Ahed Abugabah, Ahmad Mohammad Al-Smadi, Sultan Almotairi
All Works
COVID-19 detection from medical imaging is a difficult challenge that has piqued the interest of experts worldwide. Chest X-rays and computed tomography (CT) scanning are the essential imaging modalities for diagnosing COVID-19. All researchers focus their efforts on developing viable methods and rapid treatment procedures for this pandemic. Fast and accurate automated detection approaches have been devised to alleviate the need for medical professionals. Deep Learning (DL) technologies have successfully recognized COVID-19 situations. This paper proposes a developed set of nine deep learning models for diagnosing COVID-19 based on transfer learning and implementation in a novel architecture (SEL-COVIDNET). In which …
Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian
Quertci: A Tool Integrating Github Issue Querying With Comment Classification, Ye Paing, Tatiana Castro Vélez, Raffi T. Khatchadourian
Publications and Research
Empirical Software Engineering (ESE) researchers study (open-source) project issues and the comments and threads within to discover—among others—challenges developers face when incorporating new technologies, platforms, and programming language constructs. However, such threads accumulate, becoming unwieldy and hindering any insight researchers may gain. While existing approaches alleviate this burden by classifying issue thread comments, there is a gap between searching popular open-source software repositories (e.g., those on GitHub) for issues containing particular keywords and feeding the results into a classification model. This paper demonstrates a research infrastructure tool called QuerTCI that bridges this gap by integrating the GitHub issue comment search …
Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed
Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed
Theses
Recent years have seen a rapid development in the field of educational data mining (EDM), enhancing the ability to trace student knowledge. Data from intelligent tutoring systems (ITS) have been analyzed and interpreted by multiple researchers seeking to measure students’ knowledge as it evolves. Human nature, as well as other factors, makes it difficult to determine whether or not students are knowledgeable. This thesis sets out to examine the level of students’ knowledge by predicting their current and future academic performance based on records of their historical interactions. By restructuring data and considering a student perspective, we can gain insight …
A Few-Shot Learning Model Based On A Triplet Network For The Prediction Of Energy Coincident Peak Days, Jinxiang Liu, Laura Brown
A Few-Shot Learning Model Based On A Triplet Network For The Prediction Of Energy Coincident Peak Days, Jinxiang Liu, Laura Brown
Michigan Tech Publications
In an electricity system, a coincident peak (CP) is defined as the highest daily power demand in a year, which plays an important role in keeping the balance between power supply and its demand. Advanced information about the time of coincident peaks would be helpful for both utility companies and their customers. This work addresses the prediction of the five coincident peak days (5CP) in a year. We present a few-shot learning model to classify a day as a 5CP day or a non-5CP day 24-hours ahead. A triplet network is implemented for the 2-way-5-shot classifications on six different historical …
Studying The Role Of Cerebrovascular Changes In Different Compartments In Human Brains In Hypertension Prediction, Heba Kandil, Ahmed Soliman, Nada Elsaid, Ahmed Saied, Norah Saleh Alghamdi, Ali Mahmoud, Fatma Taher, Ayman El-Baz
Studying The Role Of Cerebrovascular Changes In Different Compartments In Human Brains In Hypertension Prediction, Heba Kandil, Ahmed Soliman, Nada Elsaid, Ahmed Saied, Norah Saleh Alghamdi, Ali Mahmoud, Fatma Taher, Ayman El-Baz
All Works
Hypertension is a major cause of mortality of millions of people worldwide. Cerebral vascular changes are clinically observed to precede the onset of hypertension. The early detection and quantification of these cerebral changes would help greatly in the early prediction of the disease. Hence, preparing appropriate medical plans to avoid the disease and mitigate any adverse events. This study aims to investigate whether studying the cerebral changes in specific regions of human brains (specifically, the anterior, and the posterior compartments) separately, would increase the accuracy of hypertension prediction compared to studying the vascular changes occurring over the entire brain’s vasculature. …
Identifying Functional And Non-Functional Software Requirements From User App Reviews And Requirements Artifacts, Dev Jayant Dave
Identifying Functional And Non-Functional Software Requirements From User App Reviews And Requirements Artifacts, Dev Jayant Dave
Theses, Dissertations and Culminating Projects
This thesis proposes and evaluates Machine Learning (ML) based data models to identify and isolate software requirements from datasets containing user app review statements. The ML models classify user app review statements into Functional Requirements (FRs), Non-Functional Requirements (NFRs), and Non-Requirements (NRs). This proposed approach consisted of creating a novel hybrid dataset that contains software requirements from Software Requirements Specification (SRS) documents and user app reviews. The Support Vector Machine (SVM), Stochastic Gradient Descent (SGD), and Random Forest (RF) ML algorithms combined with the term frequency-inverse document frequency (TF-IDF) natural language processing (NLP) technique were implemented on the hybrid dataset. …
Classification And Phenological Staging Of Crops From In Situ Image Sequences By Deep Learning, Uluğ Bayazit, Deni̇z Turgay Altilar, Ni̇lgün Güler Bayazit
Classification And Phenological Staging Of Crops From In Situ Image Sequences By Deep Learning, Uluğ Bayazit, Deni̇z Turgay Altilar, Ni̇lgün Güler Bayazit
Turkish Journal of Electrical Engineering and Computer Sciences
Accurate knowledge of crop type information is not only valuable for verifying the declaration of farmers to obtain subsidy or insurance for the grown crop, but also for generating crop type maps that serve a variety of purposes in land monitoring and policy. On the other hand, accurate knowledge of crop phenological stage can help farm personnel apply fertilization and irrigation regimes on a timely basis. Although deep learning based networks have been applied in the past to classify the type and predict the phenological stage of crops from in situ images of fields, more advanced deep learning based networks, …
Afnd: Arabic Fake News Dataset For The Detection And Classification Of Articles Credibility, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, Manar Jaradat
Afnd: Arabic Fake News Dataset For The Detection And Classification Of Articles Credibility, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, Manar Jaradat
All Works
The news credibility detection task has started to gain more attention recently due to the rapid increase of news on different social media platforms. This article provides a large, labeled, and diverse Arabic Fake News Dataset (AFND) that is collected from public Arabic news websites. This dataset enables the research community to use supervised and unsupervised machine learning algorithms to classify the credibility of Arabic news articles. AFND consists of 606912 public news articles that were scraped from 134 public news websites of 19 different Arab countries over a 6-month period using Python scripts. The Arabic fact-check platform, Misbar, is …
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
A Machine Learning Framework For Identifying Molecular Biomarkers From Transcriptomic Cancer Data, Md Abdullah Al Mamun
FIU Electronic Theses and Dissertations
Cancer is a complex molecular process due to abnormal changes in the genome, such as mutation and copy number variation, and epigenetic aberrations such as dysregulations of long non-coding RNA (lncRNA). These abnormal changes are reflected in transcriptome by turning oncogenes on and tumor suppressor genes off, which are considered cancer biomarkers.
However, transcriptomic data is high dimensional, and finding the best subset of genes (features) related to causing cancer is computationally challenging and expensive. Thus, developing a feature selection framework to discover molecular biomarkers for cancer is critical.
Traditional approaches for biomarker discovery calculate the fold change for each …
Split Classification Model For Complex Clustered Data, Katherine Gerot
Split Classification Model For Complex Clustered Data, Katherine Gerot
Honors Theses
Classification in high-dimensional data has generated tremendous interest in a multitude of fields. Data in higher dimensions often tend to reside in non-Euclidean metric space. This prevents Euclidean-based classification methodologies, such as regression, from reliably modeling the data. Many proposed models rely on computationally-complex embedding to convert the data to a more usable format. Others, namely the Support Vector Machine, rely on kernel manipulation to implicitly describe the "feature space" to arrive at a non-linear decision boundary. The proposed methodology in this paper seeks to classify complex data in a relatively computationally-simple and explainable manner.
Efficient Search Of Live-Coding Screencasts From Online Videos, Chengran Yang, Ferdian Thung, David Lo
Efficient Search Of Live-Coding Screencasts From Online Videos, Chengran Yang, Ferdian Thung, David Lo
Research Collection School Of Computing and Information Systems
Programming videos on the Internet are valuable resources for learning programming skills. To find relevant videos, developers typically search online video platforms (e.g., YouTube) with keywords on topics they wish to learn. Developers often look for live-coding screencasts, in which the videos’ authors perform live coding. Yet, not all programming videos are livecoding screencasts. In this work, we develop a tool named PSFinder to identify live-coding screencasts. PSFinder leverages a classifier to identify whether a video frame contains an IDE window. It uses a sampling strategy to pick a number of frames from an input video, runs the classifer on …
The Analysis And Optimization Of Cnn Hyperparameters With Fuzzy Tree Modelfor Image Classification, Kübra Uyar, Şaki̇r Taşdemi̇r, İlker Ali̇ Özkan
The Analysis And Optimization Of Cnn Hyperparameters With Fuzzy Tree Modelfor Image Classification, Kübra Uyar, Şaki̇r Taşdemi̇r, İlker Ali̇ Özkan
Turkish Journal of Electrical Engineering and Computer Sciences
The meaningful performance of convolutional neural network (CNN) has enabled the solution of various state-of-the-art problems. Although CNNs achieve satisfactory results in computer-vision problems, they still have some difficulties. As the designed CNN models are deepened to achieve much better accuracy, computational cost and complexity increase. It is significant to train CNNs with suitable topology and training hyperparameters that include initial learning rate, minibatch size, epoch number, filter size, number of filters, etc. because the initialization of hyperparameters affects classification results. On the other hand, it is not possible to make a definite inference for the hyperparameter initialization and there …
Measuring Semantic Similarity Of Documents By Using Named Entity Recognition Methods, David Efraín Muñoz Morales
Measuring Semantic Similarity Of Documents By Using Named Entity Recognition Methods, David Efraín Muñoz Morales
Masters
The work presented in this thesis was born from the desire to map documents with similar semantic concepts between them. We decided to address this problem as a named entity recognition task, where we have identified key concepts in the texts we use, and we have categorized them. So, we can apply named entity recognition techniques and automatically recognize these key concepts inside other documents. However, we propose the use of a classification method based on the recognition of named entities or key phrases, where the method can detect similarities between key concepts of the texts to be analyzed, and …