Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2024

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1031

Full-Text Articles in Entire DC Network

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif Dec 2024

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif

All Works

In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …


Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda Dec 2024

Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda

All Works

Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …


Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker Dec 2024

Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker

Research outputs 2022 to 2026

COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recovered, many experience negative health effects, particularly influenced by demographic factors such as gender and age, as well as physiological and neurological factors like sleep patterns, emotional states, anxiety, and memory. This research aims to explore various health factors affecting different demographic profiles and establish significant correlations among physiological and neurological factors in the post-COVID-19 state. To achieve these objectives, we have identified the post-COVID-19 health factors and …


Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan Dec 2024

Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan

Research outputs 2022 to 2026

Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the …


Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan Oct 2024

Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Multi-agent deep reinforcement learning (MADRL) has shown remarkable advancements in the past decade. However, most current MADRL models focus on task-specific short-horizon problems involving a small number of agents, limiting their applicability to long-horizon planning in complex environments. Hierarchical multi-agent models offer a promising solution by organizing agents into different levels, effectively addressing tasks with varying planning horizons. However, these models often face constraints related to the number of agents or levels of hierarchies. This paper introduces HiSOMA, a novel hierarchical multi-agent model designed to handle long-horizon, multi-agent, multi-task decision-making problems. The top-level controller, FALCON, is modeled as a class …


Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu Sep 2024

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu

Research Collection School Of Computing and Information Systems

This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …


Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott Aug 2024

Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott

Electronic Theses and Dissertations

The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …


Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef Aug 2024

Data Collector Selection Ranking-Based Method For Collaborative Multi-Tasks In Ubiquitous Environments, Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, S. E. Abu-Youssef

Al-Azhar Bulletin of Science

In Ubiquitous Computing and the Internet of Things, the sensing and control of objects involve numerous devices collecting and transmitting data. However, connecting these devices without fostering collaboration leads to suboptimal system performance. As the number of connected sensing devices in Internet of Things increases, efficient task accomplishment through collaboration becomes imperative. This paper proposes a Data Collector Selection Method for Collaborative Multi-Tasks to address this challenge, considering task preferences and uncertainty in data collectors' contributions. The proposed method incorporates three key aspects: (1) Using Fuzzy Analytical Hierarchy Process to determine optimal weights for task preferences; (2) Ranking data collectors …


Anopas: Practical Anonymous Transit Pass From Group Signatures With Time-Bound Keys, Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Hwee Hwa Pang, Robert H. Deng Aug 2024

Anopas: Practical Anonymous Transit Pass From Group Signatures With Time-Bound Keys, Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

An anonymous transit pass system allows passengers to access transport services within fixed time periods, with their privileges automatically deactivating upon time expiration. Although existing transit pass systems are deployable on powerful devices like PCs, their adaptation to more user-friendly devices, such as mobile phones with smart cards, is inefficient due to their reliance on heavy-weight operations like bilinear maps. In this paper, we introduce an innovative anonymous transit pass system, dubbed Anopas, optimized for deployment on mobile phones with smart cards, where the smart card is responsible for crucial lightweight operations and the mobile phone handles key-independent and time-consuming …


Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota Aug 2024

Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota

All Graduate Theses and Dissertations, Fall 2023 to Present

Understanding and predicting streamflow along river basins is vital for planning future developments and ensuring safety, especially with climate change challenges. Our study focused on forecasting streamflow at Lees Ferry, a key location along the Colorado River in the Upper Colorado River Basin. We employed four machine learning models - Random Forest Regression, Long short-term memory, Gated Recurrent Unit, and Seasonal Auto-Regressive Integrated Moving Average; and combined historical streamflow data with meteorological factors such as snow water equivalent, temperature, and precipitation. Our analysis spanned 30 years of data from 1991 to 2020.

Our findings revealed that the Random Forest Regression …


Creating A Virtual Hierarchy From A Relational Database, Yucong Mo Aug 2024

Creating A Virtual Hierarchy From A Relational Database, Yucong Mo

All Graduate Theses and Dissertations, Fall 2023 to Present

In data management and modeling, the value of the hierarchical model is that it does not require expensive JOIN operations at runtime; once the hierarchy is built, the relationships among data are embedded in the tree-like hierarchical structure, and thus querying data could be much faster than using a relational database. Today most data is stored in relational databases, but if the data were stored in hierarchies, what would these hierarchies look like? And more importantly, would this transition lead to a more efficient database? This thesis explores these questions by introducing a set of algorithms to convert a relational …


Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He Jul 2024

Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …


Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang Jul 2024

Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang

Research Collection School Of Computing and Information Systems

In the age of rapid internet expansion, social media platforms like Twitter have become crucial for sharing information, expressing emotions, and revealing intentions during crisis situations. They offer crisis responders a means to assess public sentiment, attitudes, intentions, and emotional shifts by monitoring crisis-related tweets. To enhance sentiment and emotion classification, we adopt a transformer-based multi-task learning (MTL) approach with attention mechanism, enabling simultaneous handling of both tasks, and capitalizing on task interdependencies. Incorporating attention mechanism allows the model to concentrate on important words that strongly convey sentiment and emotion. We compare three baseline models, and our findings show that …


Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz Jul 2024

Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz

Dartmouth Scholarship

A key feature of smart home devices is monitoring the environment and recording data. These devices provide security via motion-detection video alerts, cost-savings via thermostat usage history, and peace of mind via functions like auto-locking doors or water leak detectors. At the same time, the sharing of this information in interpersonal relationships---though necessary---is currently accomplished on an all-or-nothing basis. This can easily lead to oversharing in a multi-user environment. Although prior work has studied people's perceptions of information sharing with vendors or ISPs, the sharing of household data among users who interact personally is less well understood. Interpersonal situations make …


The Confluence, Volume3, Issue 2, Full Issue Jun 2024

The Confluence, Volume3, Issue 2, Full Issue

The Confluence

No abstract provided.


Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih Jun 2024

Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

Journal of Soft Computing and Computer Applications

Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been challenging for researchers to choose the optimal algorithms for solving their problems. This paper examines recently developed MOO-based algorithms. MOO is introduced along with Pareto optimality and trade-off analysis. In real-world case studies, MOO algorithms address complicated decision-making challenges. This paper examines algorithmic methods, applications, trends, and issues in …


Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer Jun 2024

Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer

Journal of Soft Computing and Computer Applications

The Bidirectional Long Short-Term Memory (Bi-LSTM) network structure enables data analysis, enhances decision-making processes, and optimizes resource allocation in cloud computing systems. However, achieving peak network performance relies heavily on choosing the hyperparameters for configuring the network. Enhancing resource allocation improves the Service Level Agreement (SLA) by ensuring efficient utilization and allocation of computational resources based on dynamic workload demands. This paper proposes an approach that integrates a Multi-Objective Evolutionary Algorithm (MOEA) with deep learning techniques to address this challenge. This approach combines the optimization capabilities of MOEA with the learning predictive models to establish a framework for resource allocation …


Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif Jun 2024

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif

Journal of Soft Computing and Computer Applications

The coronavirus disease 2019 outbreak caused widespread disruption. The World Health Organization has recommended wearing face masks, along with other public health measures, such as social distancing, following medical guidelines, and thermal scanning, to reduce transmission, reduce the burden on healthcare systems, and protect population groups. However, wearing a mask, which acts as a barrier or shield to reduce transmission of infection from infected individuals, hides most facial features, such as the nose, mouth, and chin, on which face detection systems depend, which leads to the weakness of these systems. This paper aims to provide essential insights for researchers and …


Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali Jun 2024

Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali

Journal of Soft Computing and Computer Applications

Video anomaly detection is one of the trickiest issues in intelligent video surveillance because of the complexity of real data and the hazy definition of anomalies. Since abnormal occurrences typically seem different from normal events and move differently. The global optical flow was determined with the maximum accuracy and speed using the Farneback approach for calculating the magnitudes. Two approaches have been used in this study to detect strangeness in the video. These approaches are Deep Learning (DL) and manuality. The first method uses the activity map's development of entropy to detect the oddity in the video using a particular …


A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy Jun 2024

A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy

Journal of Soft Computing and Computer Applications

The primary elements of Intelligent Transportation Systems (ITSs) have become Vehicular Ad-hoc NETworks (VANETs), allowing communication between the infrastructure environment and vehicles. The large amount of data gathered by connected vehicles has simplified how Deep Learning (DL) techniques are applied in VANETs. DL is a subfield of artificial intelligence that provides improved learning algorithms able to analyzing and process complex and heterogeneous data. This study explains the power of DL in VANETs, considering applications like decision-making, vehicle localization, anomaly detection, traffic prediction and intelligent routing, various types of DL, including Recurrent Neural Networks (RNNs), and Convolutional Neural Networks (CNNs) are …


A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi Jun 2024

A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

Journal of Soft Computing and Computer Applications

In lightweight cryptography, the absence of an S-Box in some algorithms like speck, Tiny Encryption Algorithm, or the presence of a fixed S-Box in others like Advanced Encryption Standard can make them more vulnerable to attacks. This study introduces an innovative method for creating a dynamic 6-bit S-Box (8×8) in octal format. The generating process of S-Box passes through two phases. The first is the number initialization phase. This phase involves generating sequence numbers 1, sequence numbers 2, and sequence numbers 3 depending on Xi, Yi, and Zi values generated using the 3D Hindmarsh …


The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana Jun 2024

The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana

Journal of Soft Computing and Computer Applications

Digital data such as images, audio, and video have become widely available since the invention of the Internet. Due to the ease of access to this multimedia, challenges such as content authentication, security, copyright protection, and ownership determination arose. In this paper, an explanation of watermark techniques, embedding, and extraction methods are provided. It further discusses the utilization of artificial intelligence methods and conversion of host media from the spatial domain to the frequency domain; these methods aim to improve the quality of watermarks. This paper also included a classification of the basic characteristics of the digital watermark and the …


Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal Jun 2024

Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

Journal of Soft Computing and Computer Applications

Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimum loss, improved model generalization, and interpretability. The performance of FOXANN is evaluated on three standard datasets: Iris Flower, Breast Cancer Wisconsin, and Wine. The results presented in this paper are derived from 100 epochs using 10-fold cross-validation, ensuring that all dataset …


Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy Jun 2024

Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy

Journal of Soft Computing and Computer Applications

Cyberattacks have become one of the most significant security threats that have emerged in the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various kinds of cyberattack datasets assists in constructing the precise intrusion detection models. This paper tries to analyze many of the available cyberattack datasets and compare them with many of the fields that are used to detect and predict cyberattack, like the Internet of Things (IoT) traffic-based, network traffic-based, cyber-physical system, and web traffic-based. In the present paper, an overview of each of them is provided, as well as the course of …


Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali Jun 2024

Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali

Journal of Nonprofit Innovation

No abstract provided.


An Empirical Study On Detecting And Explaining Global Structural Change In Evolving Graph Using Martingale, Tarun Teja Kairamkonda Jun 2024

An Empirical Study On Detecting And Explaining Global Structural Change In Evolving Graph Using Martingale, Tarun Teja Kairamkonda

Theses and Dissertations

There is a growing interest in practical applications involving networks of interacting entities such as sensor networks, social networks, urban traffic networks, and power grids, all of which can be represented using evolving graphs. Changes in these evolving graphs can signify shifts in the behavior of interacting entities or alterations in the patterns of their interactions. Identifying and detecting these changes is crucial for addressing potential challenges or opportunities in various domains. In this study, we propose an approach for detecting structure change in evolving graphs based on the martingale change detection framework on multiple graph features extracted over time. …


Reinforcement Learning For Robotic Tasks: Analyzing And Understanding The Learning Process Using Explainable Artificial Intelligence Methods, Brian J. Campana Jun 2024

Reinforcement Learning For Robotic Tasks: Analyzing And Understanding The Learning Process Using Explainable Artificial Intelligence Methods, Brian J. Campana

Theses and Dissertations

As deep reinforcement learning (RL) models gain traction across more industries, there is a growing need for reliable agent-explanation techniques to understand these models. Researchers have developed explainable artificial intelligence (XAI) methods to help understand these 'black boxes'. While these models have been tested on many supervised learning tasks, there is a lack of examination of how these well these methods can explain hard reinforcement learning problems like robotic control. The sequential nature of learning RL policies and testing episodes create fundamentally different policies over time compared to more traditional supervised learning models. In this thesis, two important questions are …


Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Jun 2024

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

Journal of Cybersecurity Education, Research and Practice

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multi-stakeholder and multi-role discipline. Therefore, the need to address formal education with an outcome-based philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet …


Scaling Expertise: A Note On Homophily In Online Discourse And Content Moderation, Dylan Weber Jun 2024

Scaling Expertise: A Note On Homophily In Online Discourse And Content Moderation, Dylan Weber

New England Journal of Public Policy

It is now empirically clear that the structure of online discourse tends toward homophily; users strongly prefer to interact with content and other users that are similar to them. I review the evidence for the ubiquity of homophily in discourse and highlight some of its worst effects including narrowed information landscape for users and increased spread of misinformation. I then discuss the current state of moderation frameworks at large social media platforms and how they are ill-equipped to deal with structural trends in discourse such as homophily. Finally, I sketch a moderation framework based on a principal of “scaling expertise” …


Henna Chatbot Capstone Review, Kobe Norcross Jun 2024

Henna Chatbot Capstone Review, Kobe Norcross

University Honors Theses

This thesis reviews the development of the Henna Chatbot, an AI-powered DEI consultant designed to provide personalized feedback to organizations. Sponsored by DEI consultant Arsh Haque, the project aims to address gaps in current DEI software, which often lacks team-specific feedback. The Henna Chatbot leverages GPT-3.5 Turbo to create an affordable SaaS platform where organizations can train Henna with their DEI values, and Henna will help organizations stay aligned with those values. The project spanned twenty weeks and was completed by a team of eight computer science students at Portland State University. The development process followed Agile methodologies, emphasizing effective …