Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Artificial Intelligence and Robotics

Institution
Keyword
Publication
Publication Type

Articles 1 - 27 of 27

Full-Text Articles in Computer Engineering

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


An Unmanned Aerial System For Prescribed Fires, Evan M. Beachly Dec 2017

An Unmanned Aerial System For Prescribed Fires, Evan M. Beachly

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Prescribed fires can lessen wildfire severity and control invasive species, but some terrains may be difficult, dangerous, or costly to burn with existing tools. This thesis presents the design of an unmanned aerial system that can ignite prescribed fires from the air, with less cost and risk than with aerial ignition from a manned aircraft. The prototype was evaluated in-lab and successfully used to ignite interior areas of two prescribed fires. Additionally, we introduce an approach that integrates a lightweight fire simulation to autonomously plan safe flight trajectories and suggest effective fire lines. Both components are unique in that they …


Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu Nov 2017

Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu

Doctoral Dissertations

Cyber-physical systems frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant. Most of the time the physical plant is in a state that allows for a lower level of fault-tolerance. Avoiding the continuous deployment of massive fault-tolerance will greatly reduce the workload of CPSs. In this dissertation, we demonstrate a software simulation framework (AdaFT) that can automatically generate the sub-spaces within which our adaptive fault-tolerance can be applied. We also show the theoretical benefits of AdaFT, and …


Intent Detection Through Text Mining And Analysis, Samantha Akulick, El Sayed Mahmoud Nov 2017

Intent Detection Through Text Mining And Analysis, Samantha Akulick, El Sayed Mahmoud

Publications and Scholarship

The article is about the work investigated using n-grams, parts-Of-Speech and Support Vector machines for detecting the customer intents in the user generated contents. The work demonstrated a system of categorization of customer intents that is concise and useful for business purposes. We examined possible sources of text posts to be analyzed using three text mining algorithms. We presented the three algorithms and the results of testing them in detecting different six intents. This work established that intent detection can be performed on text posts with approximately 61% accuracy.


Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Oct 2017

Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract— A key challenge in the automatic verification of robot mission software, especially critical mission software, is to be able to effectively model the performance of a human operator and factor that into the formal performance guarantees for the mission. We present a novel approach to modelling the skill level of the operator and integrating it into automatic verification using a linear Gaussians model parameterized by experimental calibration. Our approach allows us to model different skill levels directly in terms of the behavior of the lumped, robot plus operator, system.

Using MissionLab and VIPARS (a behavior-based robot mission verification …


Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank Sep 2017

Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank

Computer Science Faculty Research and Scholarship

This paper describes and tests a developmental architecture that enables a robot to explore its world, to find and remember interesting states, to associate these states with grounded goal representations, and to generate action sequences so that it can re-visit these states of interest. The model is composed of feed-forward neural networks that learn to make predictions at two levels through a dual mechanism of motor babbling for discovering the interesting goal states and instant replay learning for developing the grounded goal representations. We compare the performance of the model with grounded goal representations versus random goal representations, and find …


Comparing And Improving Facial Recognition Method, Brandon Luis Sierra Sep 2017

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra

Electronic Theses, Projects, and Dissertations

Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …


The Future Is Coming : Research On Maritime Communication Technology For Realization Of Intelligent Ship And Its Impacts On Future Maritime Management, Jiacheng Ke Aug 2017

The Future Is Coming : Research On Maritime Communication Technology For Realization Of Intelligent Ship And Its Impacts On Future Maritime Management, Jiacheng Ke

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang Aug 2017

Ancr—An Adaptive Network Coding Routing Scheme For Wsns With Different-Success-Rate Links †, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, Dingyi Fang

Department of Computer Science Faculty Scholarship and Creative Works

As the underlying infrastructure of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many applications. Network coding is a technique in WSNs to combine multiple channels of data in one transmission, wherever possible, to save node’s energy as well as increase the network throughput. So far most works on network coding are based on two assumptions to determine coding opportunities: (1) All the links in the network have the same transmission success rate; (2) Each link is bidirectional, and has the same transmission success rate on both ways. However, these assumptions may not be …


Effects Of Anthropomorphism On Trust In Human-Robot Interaction, Keith R. Macarthur, William T. Shugars, Tracy L. Sanders, Peter A. Hancock Aug 2017

Effects Of Anthropomorphism On Trust In Human-Robot Interaction, Keith R. Macarthur, William T. Shugars, Tracy L. Sanders, Peter A. Hancock

Keith Reid MacArthur

Robots are being integrated into everyday use, making the evaluation of trust in human-robot interactions (HRI) important to ensure their acceptance and correct usage (Lee & See, 2004; Parasuraman & Riley, 1997). Goetz, Kiesler, and Powers (2003) found that participants preferred robots with an anthropomorphic appearance appropriate for the social context of the task. This preference for robots with human-like appearance may be indicative of increased levels of trust and therefore, the present research evaluates the effects of anthropomorphism on trust.
Eighteen participants (Mage = 34.22, SDage = 10.55, n = 8 male, n =10 female) with …


Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi Aug 2017

Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi

Electronic Theses and Dissertations

While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …


Mechanism Design For Strategic Project Scheduling, Pradeep Varakantham, Na Fu Aug 2017

Mechanism Design For Strategic Project Scheduling, Pradeep Varakantham, Na Fu

Research Collection School Of Computing and Information Systems

Organizing large scale projects (e.g., Conferences, IT Shows, F1 race) requires precise scheduling of multiple dependent tasks on common resources where multiple selfish entities are competing to execute the individual tasks. In this paper, we consider a well studied and rich scheduling model referred to as RCPSP (Resource Constrained Project Scheduling Problem). The key change to this model that we consider in this paper is the presence of selfish entities competing to perform individual tasks with the aim of maximizing their own utility. Due to the selfish entities in play, the goal of the scheduling problem is no longer only …


Improving Pattern Recognition And Neural Network Algorithms With Applications To Solar Panel Energy Optimization, Ernesto Zamora Ramos Aug 2017

Improving Pattern Recognition And Neural Network Algorithms With Applications To Solar Panel Energy Optimization, Ernesto Zamora Ramos

UNLV Theses, Dissertations, Professional Papers, and Capstones

Artificial Intelligence is a big part of automation and with today's technological advances, artificial intelligence has taken great strides towards positioning itself as the technology of the future to control, enhance and perfect automation. Computer vision includes pattern recognition and classification and machine learning. Computer vision is at the core of decision making and it is a vast and fruitful branch of artificial intelligence. In this work, we expose novel algorithms and techniques built upon existing technologies to improve pattern recognition and neural network training, initially motivated by a multidisciplinary effort to build a robot that helps maintain and optimize …


Proactive And Reactive Coordination Of Non-Dedicated Agent Teams Operating In Uncertain Environments, Pritee Agrawal, Pradeep Varakantham Aug 2017

Proactive And Reactive Coordination Of Non-Dedicated Agent Teams Operating In Uncertain Environments, Pritee Agrawal, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Domains such as disaster rescue, security patrolling etc. often feature dynamic environments where allocations of tasks to agents become ineffective due to unforeseen conditions that may require agents to leave the team. Agents leave the team either due to arrival of high priority tasks (e.g., emergency, accident or violation) or due to some damage to the agent. Existing research in task allocation has only considered fixed number of agents and in some instances arrival of new agents on the team. However, there is little or no literature that considers situations where agents leave the team after task allocation. To that …


Belief-Space Planning For Resourceful Manipulation And Mobility, Dirk Ruiken Jul 2017

Belief-Space Planning For Resourceful Manipulation And Mobility, Dirk Ruiken

Doctoral Dissertations

Robots are increasingly expected to work in partially observable and unstructured environments. They need to select actions that exploit perceptual and motor resourcefulness to manage uncertainty based on the demands of the task and environment. The research in this dissertation makes two primary contributions. First, it develops a new concept in resourceful robot platforms called the UMass uBot and introduces the sixth and seventh in the uBot series. uBot-6 introduces multiple postural configurations that enable different modes of mobility and manipulation to meet the needs of a wide variety of tasks and environmental constraints. uBot-7 extends this with the use …


Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee Jul 2017

Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee

Electrical & Computer Engineering Theses & Dissertations

Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford May 2017

Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford

Chancellor’s Honors Program Projects

No abstract provided.


Hexarray: A Novel Self-Reconfigurable Hardware System, Fady Hussein May 2017

Hexarray: A Novel Self-Reconfigurable Hardware System, Fady Hussein

Boise State University Theses and Dissertations

Evolvable hardware (EHW) is a powerful autonomous system for adapting and finding solutions within a changing environment. EHW consists of two main components: a reconfigurable hardware core and an evolutionary algorithm. The majority of prior research focuses on improving either the reconfigurable hardware or the evolutionary algorithm in place, but not both. Thus, current implementations suffer from being application oriented and having slow reconfiguration times, low efficiencies, and less routing flexibility. In this work, a novel evolvable hardware platform is proposed that combines a novel reconfigurable hardware core and a novel evolutionary algorithm.

The proposed reconfigurable hardware core is a …


Music Feature Matching Using Computer Vision Algorithms, Mason Hollis May 2017

Music Feature Matching Using Computer Vision Algorithms, Mason Hollis

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper seeks to establish the validity and potential benefits of using existing computer vision techniques on audio samples rather than traditional images in order to consistently and accurately identify a song of origin from a short audio clip of potentially noisy sound. To do this, the audio sample is first converted to a spectrogram image, which is used to generate SURF features. These features are compared against a database of features, which have been previously generated in a similar fashion, in order to find the best match. This algorithm has been implemented in a system that can run as …


An Approach To Robust Homing With Stereovision, Fuqiang Fu, Damian Lyons Apr 2017

An Approach To Robust Homing With Stereovision, Fuqiang Fu, Damian Lyons

Faculty Publications

Visual Homing is a bioinspired approach to robot navigation which can be fast and uses few assumptions. However, visual homing in a cluttered and unstructured outdoor environment offers several challenges to homing methods that have been developed for primarily indoor environments. One issue is that any current image during homing may be tilted with respect to the home image. The second is that moving through a cluttered scene during homing may cause obstacles to interfere between the home scene and location and the current scene and location. In this paper, we introduce a robust method to improve a previous developed …


Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan Mar 2017

Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan

Masters Theses

Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.

State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to …


An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. Elyamany, Miriam Am Capretz, Girma T. Bitsuamlak Jan 2017

An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. Elyamany, Miriam Am Capretz, Girma T. Bitsuamlak

Electrical and Computer Engineering Publications

During building operation, a significant amount of energy is wasted due to equipment and human-related faults. To reduce waste, today's smart buildings monitor energy usage with the aim of identifying abnormal consumption behaviour and notifying the building manager to implement appropriate energy-saving procedures. To this end, this research proposes a new pattern-based anomaly classifier, the collective contextual anomaly detection using sliding window (CCAD-SW) framework. The CCAD-SW framework identifies anomalous consumption patterns using overlapping sliding windows. To enhance the anomaly detection capacity of the CCAD-SW, this research also proposes the ensemble anomaly detection (EAD) framework. The EAD is a generic framework …


Performance Verification For Robot Missions In Uncertain Environments, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Jan 2017

Performance Verification For Robot Missions In Uncertain Environments, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract—Certain robot missions need to perform predictably in a physical environment that may have significant uncertainty. One approach is to leverage automatic software verification techniques to establish a performance guarantee. The addition of an environment model and uncertainty in both program and environment, however, means the state-space of a model-checking solution to the problem can be prohibitively large. An approach based on behavior-based controllers in a process-algebra framework that avoids state-space combinatorics is presented here. In this approach, verification of the robot program in the uncertain environment is reduced to a filtering problem for a Bayesian Network. Validation results …


Establishing A-Priori Performance Guarantees For Robot Missions That Include Localization Software, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Jan 2017

Establishing A-Priori Performance Guarantees For Robot Missions That Include Localization Software, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

One approach to determining whether an automated system is performing correctly is to monitor its performance, signaling when the performance is not acceptable; another approach is to automatically analyze the possible behaviors of the system a-priori and determine performance guarantees. Thea authors have applied this second approach to automatically derive performance guarantees for behaviorbased, multi-robot critical mission software using an innovative approach to formal verification for robotic software. Localization and mapping algorithms can allow a robot to navigate well in an unknown environment. However, whether such algorithms enhance any specific robot mission is currently a matter for empirical validation. Several …


Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li Jan 2017

Deep Models For Engagement Assessment With Scarce Label Information, Feng Li, Guangfan Zhang, Wei Wang, Roger Xu, Tom Schnell, Jonathan Wen, Frederic Mckenzie, Jiang Li

Electrical & Computer Engineering Faculty Publications

Task engagement is defined as loadings on energetic arousal (affect), task motivation, and concentration (cognition) [1]. It is usually challenging and expensive to label cognitive state data, and traditional computational models trained with limited label information for engagement assessment do not perform well because of overfitting. In this paper, we proposed two deep models (i.e., a deep classifier and a deep autoencoder) for engagement assessment with scarce label information. We recruited 15 pilots to conduct a 4-h flight simulation from Seattle to Chicago and recorded their electroencephalograph (EEG) signals during the simulation. Experts carefully examined the EEG signals and labeled …


2d Vector Map And Database Design For Indoor Assisted Navigation, Luciano Caraciolo Albuquerque Jan 2017

2d Vector Map And Database Design For Indoor Assisted Navigation, Luciano Caraciolo Albuquerque

Dissertations and Theses

In this paper we implemented a 2D Vector Map, map editor and Database design intended to provide an efficient way to convert cad files from indoor environments to a set of vectors representing hallways, doors, exits, elevators, and other entities embedded in a floor plan, and save them in a database for use by other applications, such as assisted navigation for blind people.

A graphical application as developed in C++ to allow the user to input a CAD DXF file, process the file to automatically obtain nodes and edges, and save the nodes and edges to a database for posterior …