Search
Now showing items 1-10 of 62
Document Clustering with Dual Supervision
(2012-07-06)
Nowadays, academic researchers maintain a personal library of papers, which they would like
to organize based on their needs, e.g., research, projects, or courseware. Clustering techniques
are often employed to achieve ...
A Symbiotic Bid-Based Framework for Problem Decomposition using Genetic Programming
(2011-03-08)
This thesis investigates the use of symbiosis as an evolutionary
metaphor for problem decomposition using Genetic Programming. It
begins by drawing a connection between lateral problem decomposition,
in which peers with ...
An Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniques
(2010-09-09)
The importance of knowing what type of traffic is flowing through a network is
paramount to its success. Traffic shaping, Quality of Service, identifying critical
business applications, Intrusion Detection Systems, as ...
A PRELIMINARY STUDY FOR IDENTIFYING NAT TRAFFIC USING MACHINE LEARNING
(2014-04-07)
It is shown in the literature that the NAT devices have become a convenient way to hide the identity of malicious behaviors. In this thesis, the aim is to identify the presence of the NAT devices in the network traffic and ...
A MACHINE LEARNING APPROACH FOR ALERT BEHAVIOR RESPONSE MODELING TO MITIGATE ALERT FATIGUE IN HEALTH INFORMATION SYSTEMS
(2019-04-23)
This research investigates novel approaches to reduce the burden of alert fatigue faced by primary care physicians using Clinical Decision Support Systems (CDSS) within EMR systems. CDSS issue a range of alerts to assist ...
Classification and Analysis of a Large MEG Dataset using Convolutional Neural Networks
(2019-08-16)
Convolutional neural networks were used to classify and analyse a large magnetoencephalography (MEG) dataset. Networks were trained to classify between active and baseline intervals recorded during cued button pressing. ...
A DEEP IMAGE CLASSIFICATION APPROACH FOR FISHING ACTIVITY DETECTION FROM AIS DATA
(2019-12-12)
Maritime transport and vessel activities on the ocean have a significant impact on marine
life, which consequently affects human life. Therefore analyzing and monitoring the fishing
activities using the vast amount of ...
Compromised Tweet Detection Using weighted sub-word embeddings
(2019-08-07)
Extracting features and writing styles from short text messages for compromised tweet detection is always a challenge. Short messages, such as tweets, do not have enough data to perform statistical authorship attribution. ...
Novel Approaches to Marker Gene Representation Learning Using Trained Tokenizers and Jointly Trained Transformer Models
(2021-08-19)
Next-generation DNA sequencing technologies have made marker-gene DNA sequence data widely available. Analysis of microbiome data has many challenges, including sparsity, high cardinality, and intra-study dependencies ...
Exploring Phishing Detection Using Search Engine Optimization and Uniform Resource Locator based Information
(2021-04-29)
Phishing attacks are the work of social engineering. They are used to trick users to obtain their sensitive/private information using malicious links, websites, and electronic messages. In this thesis, phishing attack ...