Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Wright State University

2021

Department of Computer Science and Engineering

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta Jan 2021

Complex Interactions Between Multiple Goal Operations In Agent Goal Management, Sravya Kondrakunta

Browse all Theses and Dissertations

A significant issue in cognitive systems research is to make an agent formulate and manage its own goals. Some cognitive scientists have implemented several goal operations to support this issue, but no one has implemented more than a couple of goal operations within a single agent. One of the reasons for this limitation is the lack of knowledge about how various goals operations interact with one another. This thesis addresses this knowledge gap by implementing multiple-goal operations, including goal formulation, goal change, goal selection, and designing an algorithm to manage any positive or negative interaction between them. These are integrated …


Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti Jan 2021

Leveraging Sequential Nature Of Conversations For Intent Classification, Shree Gotteti

Browse all Theses and Dissertations

Conversations are more than just a sequence of text, it is where two or more participants interact in order to achieve their goals. Conversation Understanding (CU) requires all participants to understand each others intent. In the past decade, CU has been extended from automated human-human text processing to build automated conversational agents for human-machine interactions. Despite their popularity, these automated conversational agents (like Siri, Alexa, etc) can't handle more than one or two utterances, and they don't recognize conversations as intents. The development of approaches that extract intents behind an utterance is essential for the advancements of Question Answering (QA) …


Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger Jan 2021

Texture-Driven Image Clustering In Laser Powder Bed Fusion, Alexander H. Groeger

Browse all Theses and Dissertations

The additive manufacturing (AM) field is striving to identify anomalies in laser powder bed fusion (LPBF) using multi-sensor in-process monitoring paired with machine learning (ML). In-process monitoring can reveal the presence of anomalies but creating a ML classifier requires labeled data. The present work approaches this problem by printing hundreds of Inconel-718 coupons with different processing parameters to capture a wide range of process monitoring imagery with multiple sensor types. Afterwards, the process monitoring images are encoded into feature vectors and clustered to isolate groups in each sensor modality. Four texture representations were learned by training two convolutional neural network …


Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta Jan 2021

Evaluating The Performance Of Using Speaker Diarization For Speech Separation Of In-Person Role-Play Dialogues, Raveendra Medaramitta

Browse all Theses and Dissertations

Development of professional communication skills, such as motivational interviewing, often requires experiential learning through expert instructor-guided role-plays between the trainee and a standard patient/actor. Due to the growing demand for such skills in practices, e.g., for health care providers in the management of mental health challenges, chronic conditions, substance misuse disorders, etc., there is an urgent need to improve the efficacy and scalability of such role-play based experiential learning, which are often bottlenecked by the time-consuming performance assessment process. WSU is developing ReadMI (Real-time Assessment of Dialogue in Motivational Interviewing) to address this challenge, a mobile AI solution aiming to …


Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni Jan 2021

Goal Management In Multi-Agent Systems, Venkatsampath Raja Gogineni

Browse all Theses and Dissertations

Autonomous agents in a multi-agent system coordinate to achieve their goals. However, in a partially observable world, current multi-agent systems are often less effective in achieving their goals. In much part, this limitation is due to an agent's lack of reasoning about other agents and their mental states. Another factor is the agent's inability to share required knowledge with other agents and the lack of explanations in justifying the reasons behind the goal. This research addresses these problems by presenting a general approach for agent goal management in unexpected situations. In this approach, an agent applies three main concepts: goal …


Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia Jan 2021

Mathematical Formula Recognition And Automatic Detection And Translation Of Algorithmic Components Into Stochastic Petri Nets In Scientific Documents, Elisavet Elli Kostalia

Browse all Theses and Dissertations

A great percentage of documents in scientific and engineering disciplines include mathematical formulas and/or algorithms. Exploring the mathematical formulas in the technical documents, we focused on the mathematical operations associations, their syntactical correctness, and the association of these components into attributed graphs and Stochastic Petri Nets (SPN). We also introduce a formal language to generate mathematical formulas and evaluate their syntactical correctness. The main contribution of this work focuses on the automatic segmentation of mathematical documents for the parsing and analysis of detected algorithmic components. To achieve this, we present a synergy of methods, such as string parsing according to …


Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani Jan 2021

Content Adaption And Design In Mobile Learning Of Wind Instruments, Neha Priyadarshani

Browse all Theses and Dissertations

People in today's world seek things that are simple to use. Learning is one of the most crucial aspects of the ongoing digital transformation. Everything is now accessible with a single click on mobile devices, making access to instructional materials faster, easier, and more comfortable. It takes time and effort to build abilities and become an expert in the fields of learning, training, and teaching; and music learning demands a great deal of both practice and mentoring. Initially, music teachers and band directors must maintain a steady attention and devote a significant amount of time to manually teaching materials. This …


A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou Jan 2021

A Deep Understanding Of Structural And Functional Behavior Of Tabular And Graphical Modules In Technical Documents, Michail Alexiou

Browse all Theses and Dissertations

The rapid increase of published research papers in recent years has escalated the need for automated ways to process and understand them. The successful recognition of the information that is contained in technical documents, depends on the understanding of the document’s individual modalities. These modalities include tables, graphics, diagrams and etc. as defined in Bourbakis’ pioneering work. However, the depth of understanding is correlated to the efficiency of detection and recognition. In this work, a novel methodology is proposed for automatic processing of and understanding of tables and graphics images in technical document. Previous attempts on tables and graphics understanding …


Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang Jan 2021

Detecting Server-Side Web Applications With Unrestricted File Upload Vulnerabilities, Jin Huang

Browse all Theses and Dissertations

Vulnerable web applications fundamentally undermine website security as they often expose critical infrastructures and sensitive information behind them to potential risks and threats. Web applications with unrestricted file upload vulnerabilities allow attackers to upload a file with malicious code, which can be later executed on the server by attackers to enable various attacks such as information exfiltration, spamming, phishing, and spreading malware. This dissertation presents our research in building two novel frameworks to detect server-side applications vulnerable to unrestricted file uploading attacks. We design the innovative model that holistically characterizes both data and control flows using a graphbased data structure. …