Search
Now showing items 11-20 of 31
Biologically Informed Feature Selection in Large Scale Genomics
(2019-12-18)
Predictive genetics is a promising field of research, particularly in medical science where the ability to identify disease or treatment response could provide novel methods of mitigating their negative effects. Machine ...
Authorship Attribution using Written and Read Documents
(2019-08-07)
In Authorship Attribution (AA), a task of identifying the author on an unseen document, it is often hard to obtain large amounts of training text written by an author. In our research, we analyze the influence of the size ...
A MOBILE SENSING APP FOR MENTAL HEALTH TO SUPPORT FEDERATED LEARNING
(2020-12-18)
Smartphones are used by half of the world population. More than 10,000 applications are targeted at Mental health. Available apps are limited in four major ways: One, most apps are designed for the Android platform, 80% ...
Applying Machine Learning Techniques to Lithium-ion Cell Research
(2021-03-08)
Progress in lithium-ion cells research is largely a matter of determining which aspect of the cell’s design and operation will lead to longer life, higher energy-density, and lower costs. These attributes can easily be ...
PREDICTING THE OUTCOME OF KIDNEY TRANSPLANTS USING MACHINE LEARNING METHODS
(2020-04-20)
The prediction of the survival of kidney grafts is based on the procedure of matching kidney donors and recipients. Machine learning can be effectively used to analyze the appropriate donor-recipient attributes from a ...
Providing Real-Valued Actions for Tangled Program Graphs Under the CartPole Benchmark
(2020-08-20)
The Tangled Program Graph framework (TPG) is a genetic programming approach to reinforcement learning. Canonical TPG is limited to performing discrete actions. This thesis investigates mechanisms by which TPG might perform ...
Urschleim in Silicon: Return-Oriented Program Evolution with ROPER
(2018-04-20)
Return-orientated programming (ROP) identifies pieces of a process’s executable memory ending in a return instruction (gadgets), and enlists them as an instruction set in which a new, “parasitic” program can be written, ...
Author Style Analysis in Text Documents Based on Character and Word N-Grams
(2017-04-27)
We describe our research on text analytics methods for detecting differences and
similarities in the style of authors of text documents. Automatic methods for analyzing
the written style of authors have applications in ...
Machine Learning based Framework for User-Centered Insider Threat Detection
(2021-08-25)
Insider threat represents a major cyber-security challenge to companies, organizations, and government agencies. Harmful actions in insider threats are performed by authorized users in organizations. Due to the fact that ...
Exploring data leakage via supervised learning
(2020-04-20)
Data security includes but not limited to, data encryption, tokenization, and key management practices that protect data across all applications and platforms. In this thesis, I aim to explore whether any data leakage takes ...