Browsing by Subject "Machine Learning"
Now showing items 1-20 of 52
-
Analyzing Large Scale Wi-Fi Data Using Supervised and Unsupervised Learning Techniques
(2017-01-06)With the increasing number of Wi-Fi enabled portable devices, and the ubiquitous Wi-Fi networks, analyzing multiple aspects of a population is becoming more insightful, inexpensive and non-intrusive. Network packets ... -
Application of machine learning algorithm on binary classification model for stroke treatment eligibility
(2023-04-17)In Canada, stroke is the leading cause of adult disability and the third leading cause of death. Ischemic stroke is the most common type, making up approximately 85% of all stroke patients. Endovascular treatment (EVT) is ... -
APPLICATION OF SUPPORT VECTOR MACHINES TO LONGITUDINAL FUNCTIONAL NEUROIMAGING DATA
(2016-12-15)The principal objective of this thesis was to test a novel adaptation of the support vector machine (SVM), called a longitudinal support vector machine(LSVM), on longitudinal functional neuroimaging data. LSVM performance ... -
Applying Speech Recognition and Language Processing Methods to Transcribe and Structure Physicians’ Audio Notes to a Standardized Clinical Report Format
(2020-03-10)Clinical documentation is an audio recording of the clinical encounter by the specialist which is subsequently manually transcribed to be added to the patient’s medical record. The current clinical documentation process ... -
Classification and Analysis of a Large MEG Dataset using Convolutional Neural Networks
(2019-08-16)Convolutional neural networks were used to classify and analyse a large magnetoencephalography (MEG) dataset. Networks were trained to classify between active and baseline intervals recorded during cued button pressing. ... -
Common N-Gram Method: A Promising Approach to Detecting Mental Health Disorders on Social Media
(2023-04-13)This paper addresses the mental health challenges posed by the COVID-19 pandemic and the lack of reliable and accessible diagnostic tools for mental health conditions. The dataset used in this research consists of over 2 ... -
Compromised Tweet Detection Using weighted sub-word embeddings
(2019-08-07)Extracting features and writing styles from short text messages for compromised tweet detection is always a challenge. Short messages, such as tweets, do not have enough data to perform statistical authorship attribution. ... -
Data Science Strategies for Modelling Total Knee Arthroplasty Patient Variability
(2021-03-30)Knee osteoarthritis (OA) can present through self-reported patient symptoms and joint-level manifestations, impairing mobility and function. Symptom relief and functional restoration of end-stage OA is typically treated ... -
A DEEP IMAGE CLASSIFICATION APPROACH FOR FISHING ACTIVITY DETECTION FROM AIS DATA
(2019-12-12)Maritime transport and vessel activities on the ocean have a significant impact on marine life, which consequently affects human life. Therefore analyzing and monitoring the fishing activities using the vast amount of ... -
Deep Neural Network (DNN) Design: The Utilization of Approximate Computing and Practical Considerations for Accuracy Evaluation
(2021-08-04)Approximate computing is emerging as a viable way to achieve significant performance enhancement in terms of power, speed, and area for system on chip (SoC) designs. Utilizing approximate computing in the design of deep ... -
Design and Optimization of Adhesively Bonded Joints Mating Novel 3D-Fiber Metal Laminates Subjected to Static and Dynamic In-plane and Out-of-plane Loadings
(2023-04-13)The automotive and aerospace industries are rapidly growing sectors of the global economy. The global commercial vehicle market is projected to grow from $955 billion in 2020 to $1.7 trillion in 2029. According to Boeing’s ... -
Detecting malicious DNS tunnels via network flow entropy
(2021-12-17)The thesis proposes the concept of "entropy of a flow" to augment flow statistical features for DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely Argus, ... -
Developing computational models to understand aging
(2021-12-17)Aging in biological organisms is a complex process, involving changes at all levels of functioning. No single pathway or mechanism is responsible for aging, leading to the current understanding that aging is due to a number ... -
Document Clustering with Dual Supervision
(2012-07-06)Nowadays, academic researchers maintain a personal library of papers, which they would like to organize based on their needs, e.g., research, projects, or courseware. Clustering techniques are often employed to achieve ... -
AN E-PRESCRIPTION SYSTEM FRAMEWORK TO LOWER PRESCRIBING AND MEDICATION DISPENSING ERRORS USING BLOCKCHAIN, MACHINE LEARNING, AND NEAR FIELD COMMUNICATION (NFC)
(2021-08-26)Medication errors are among the most significant risks facing the pharmaceutical industry. These errors can result from various issues such as a heavy workload, the misinterpretation of a prescriber’s handwriting, or ... -
Early prediction of skin toxicities during radiotherapy using optical and infrared imaging
(2022-08-31)Approximately 90% of breast cancer radiation therapy patients experience skin toxicities that are difficult to predict. The objectives of this study are to evaluate correlation between the skin toxicity occurrences and ... -
ELECTRONIC GAMING MACHINE PLAYSTYLE DETECTION AND RAPID PLAYSTYLE CLASSIFICATION USING MULTIVARIATE CONVOLUTIONAL LSTM NEURAL NETWORK ARCHITECTURE
(2021-09-01)Electronic Gaming Machines (EGM) are common, anonymous, stateless gambling machines operated by a region’s lottery and situated in licensed venues. Previous work have shown that problem gambling detection is possible ... -
An Ensemble Regression Approach For OCR Error Correction
(2017-04-11)This thesis deals with the problem of error correction for Optical Character Recognation (OCR) generated text, or OCR-postprocessing: how to detect error words in a text generated from OCR process and to suggest the most ... -
Exploration of NLP-Based Feature Extraction Techniques for Security Analysis and Anomaly Detection of Service Logs
(2023-04-28)The goal of this research is to provide security and machine learning (ML) practitioners with deeper insight when selecting features and algorithms for unsupervised log analysis. This thesis explores the effect of traditional ... -
Exploring Phishing Detection Using Search Engine Optimization and Uniform Resource Locator based Information
(2021-04-29)Phishing attacks are the work of social engineering. They are used to trick users to obtain their sensitive/private information using malicious links, websites, and electronic messages. In this thesis, phishing attack ...