Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Series

Machine learning

Institution
Publication Year
Publication

Articles 31 - 60 of 485

Full-Text Articles in Physical Sciences and Mathematics

A Technical Perspective On Integrating Artificial Intelligence To Solid-State Welding, Sambath Yaknesh, Natarajan Rajamurugu, Prakash K. Babu, Saravanakumar Subramaniyan, Sher A. Khan, C. Ahamed Saleel, Mohammad Nur-E-Alam, Manzoore E. M. Soudagar Jan 2024

A Technical Perspective On Integrating Artificial Intelligence To Solid-State Welding, Sambath Yaknesh, Natarajan Rajamurugu, Prakash K. Babu, Saravanakumar Subramaniyan, Sher A. Khan, C. Ahamed Saleel, Mohammad Nur-E-Alam, Manzoore E. M. Soudagar

Research outputs 2022 to 2026

The implementation of artificial intelligence (AI) techniques in industrial applications, especially solid-state welding (SSW), has transformed modeling, optimization, forecasting, and controlling sophisticated systems. SSW is a better method for joining due to the least melting of material thus maintaining Nugget region integrity. This study investigates thoroughly how AI-based predictions have impacted SSW by looking at methods like Artificial Neural Networks (ANN), Fuzzy Logic (FL), Machine Learning (ML), Meta-Heuristic Algorithms, and Hybrid Methods (HM) as applied to Friction Stir Welding (FSW), Ultrasonic Welding (UW), and Diffusion Bonding (DB). Studies on Diffusion Bonding reveal that ANN and Generic Algorithms can predict outcomes …


D-Hacking, Emily Black, Talia B. Gillis, Zara Hall Jan 2024

D-Hacking, Emily Black, Talia B. Gillis, Zara Hall

Faculty Scholarship

Recent regulatory efforts, including Executive Order 14110 and the AI Bill of Rights, have focused on mitigating discrimination in AI systems through novel and traditional application of anti-discrimination laws. While these initiatives rightly emphasize fairness testing and mitigation, we argue that they pay insufficient attention to robust bias measurement and mitigation — and that without doing so, the frameworks cannot effectively achieve the goal of reducing discrimination in deployed AI models. This oversight is particularly concerning given the instability and brittleness of current algorithmic bias mitigation and fairness optimization methods, as highlighted by growing evidence in the algorithmic fairness literature. …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Algorithm Selection Using Edge Ml And Case-Based Reasoning, Rahman Ali, Muhammad Sadiq Hassan Zada, Asad Masood Khatak, Jamil Hussain Dec 2023

Algorithm Selection Using Edge Ml And Case-Based Reasoning, Rahman Ali, Muhammad Sadiq Hassan Zada, Asad Masood Khatak, Jamil Hussain

All Works

In practical data mining, a wide range of classification algorithms is employed for prediction tasks. However, selecting the best algorithm poses a challenging task for machine learning practitioners and experts, primarily due to the inherent variability in the characteristics of classification problems, referred to as datasets, and the unpredictable performance of these algorithms. Dataset characteristics are quantified in terms of meta-features, while classifier performance is evaluated using various performance metrics. The assessment of classifiers through empirical methods across multiple classification datasets, while considering multiple performance metrics, presents a computationally expensive and time-consuming obstacle in the pursuit of selecting the optimal …


Development Of An Explainable Artificial Intelligence Model For Asian Vascular Wound Images, Zhiwen Joseph Lo, Malcolm Han Wen Mak, Shanying Liang, Yam Meng Chan, Cheng Cheng Goh, Tina Peiting Lai, Audrey Hui Min Tan, Patrick Thng, Patrick Thng, Tillman Weyde, Sylvia Smit Dec 2023

Development Of An Explainable Artificial Intelligence Model For Asian Vascular Wound Images, Zhiwen Joseph Lo, Malcolm Han Wen Mak, Shanying Liang, Yam Meng Chan, Cheng Cheng Goh, Tina Peiting Lai, Audrey Hui Min Tan, Patrick Thng, Patrick Thng, Tillman Weyde, Sylvia Smit

Research Collection School Of Computing and Information Systems

Chronic wounds contribute to significant healthcare and economic burden worldwide. Wound assessment remains challenging given its complex and dynamic nature. The use of artificial intelligence (AI) and machine learning methods in wound analysis is promising. Explainable modelling can help its integration and acceptance in healthcare systems. We aim to develop an explainable AI model for analysing vascular wound images among an Asian population. Two thousand nine hundred and fifty-seven wound images from a vascular wound image registry from a tertiary institution in Singapore were utilized. The dataset was split into training, validation and test sets. Wound images were classified into …


Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl Dec 2023

Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …


Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms, Murad Al-Rajab, Samia Loucif, Yazan Al Risheh Dec 2023

Predicting New Crescent Moon Visibility Applying Machine Learning Algorithms, Murad Al-Rajab, Samia Loucif, Yazan Al Risheh

All Works

The world's population is projected to grow 32% in the coming years, and the number of Muslims is expected to grow by 70%—from 1.8 billion in 2015 to about 3 billion in 2060. Hijri is the Islamic calendar, also known as the lunar Hijri calendar, which consists of 12 lunar months, and it is tied to the Moon phases where a new crescent Moon marks the beginning of each month. Muslims use the Hijri calendar to determine important dates and religious events such as Ramadan, Haj, Muharram, etc. Till today, there is no consensus on deciding on the beginning of …


Designing An Overseas Experiential Course In Data Science, Hua Leong Fwa, Graham Ng Dec 2023

Designing An Overseas Experiential Course In Data Science, Hua Leong Fwa, Graham Ng

Research Collection School Of Computing and Information Systems

Unprecedented demand for data science professionals in the industry has led to many educational institutions launching new data science courses. It is however imperative that students of data science programmes learn through execution of real-world, authentic projects on top of acquiring foundational knowledge on the basics of data science. In the process of working on authentic, real-world projects, students not only create new knowledge but also learn to solve open, sophisticated, and ill-structured problems in an inter-disciplinary fashion. In this paper, we detailed our approach to design a data science curriculum premised on learners solving authentic data science problems sourced …


Offenseval 2023: Offensive Language Identification In The Age Of Large Language Models, Marcos Zampieri, Sara Rosenthal, Preslav Nakov, Alphaeus Dmonte, Tharindu Ranasinghe Nov 2023

Offenseval 2023: Offensive Language Identification In The Age Of Large Language Models, Marcos Zampieri, Sara Rosenthal, Preslav Nakov, Alphaeus Dmonte, Tharindu Ranasinghe

Natural Language Processing Faculty Publications

The OffensEval shared tasks organized as part of SemEval-2019-2020 were very popular, attracting over 1300 participating teams. The two editions of the shared task helped advance the state of the art in offensive language identification by providing the community with benchmark datasets in Arabic, Danish, English, Greek, and Turkish. The datasets were annotated using the OLID hierarchical taxonomy, which since then has become the de facto standard in general offensive language identification research and was widely used beyond OffensEval. We present a survey of OffensEval and related competitions, and we discuss the main lessons learned. We further evaluate the performance …


Evaluating The Efficacy Of Chatgpt In Navigating The Spanish Medical Residency Entrance Examination (Mir): Promising Horizons For Ai In Clinical Medicine., Francisco Guillen-Grima, Sara Guillen-Aguinaga, Laura Guillen-Aguinaga, Rosa Alas-Brun, Luc Onambele, Wilfrido Ortega, Rocio Montejo, Enrique Aguinaga-Ontoso, Paul Barach, Ines Aguinaga-Ontoso Nov 2023

Evaluating The Efficacy Of Chatgpt In Navigating The Spanish Medical Residency Entrance Examination (Mir): Promising Horizons For Ai In Clinical Medicine., Francisco Guillen-Grima, Sara Guillen-Aguinaga, Laura Guillen-Aguinaga, Rosa Alas-Brun, Luc Onambele, Wilfrido Ortega, Rocio Montejo, Enrique Aguinaga-Ontoso, Paul Barach, Ines Aguinaga-Ontoso

Department of Medicine Faculty Papers

UNLABELLED: The rapid progress in artificial intelligence, machine learning, and natural language processing has led to increasingly sophisticated large language models (LLMs) for use in healthcare. This study assesses the performance of two LLMs, the GPT-3.5 and GPT-4 models, in passing the MIR medical examination for access to medical specialist training in Spain. Our objectives included gauging the model's overall performance, analyzing discrepancies across different medical specialties, discerning between theoretical and practical questions, estimating error proportions, and assessing the hypothetical severity of errors committed by a physician.

MATERIAL AND METHODS: We studied the 2022 Spanish MIR examination results after excluding …


Migrating 120,000 Legacy Publications From Several Systems Into A Current Research Information System Using Advanced Data Wrangling Techniques, Yrjö Lappalainen, Matti Lassila, Tanja Heikkilä, Jani Nieminen, Tapani Lehtilä Nov 2023

Migrating 120,000 Legacy Publications From Several Systems Into A Current Research Information System Using Advanced Data Wrangling Techniques, Yrjö Lappalainen, Matti Lassila, Tanja Heikkilä, Jani Nieminen, Tapani Lehtilä

All Works

This article describes a complex CRIS (current research information system) implementation project involving the migration of around 120,000 legacy publication records from three different systems. The project, undertaken by Tampere University, encountered several challenges in data diversity, data quality, and resource allocation. To handle the extensive and heterogenous dataset, innovative approaches such as machine learning techniques and various data wrangling tools were used to process data, correct errors, and merge information from different sources. Despite significant delays and unforeseen obstacles, the project was ultimately successful in achieving its goals. The project served as a valuable learning experience, highlighting the importance …


A Review Of Cyber Attacks On Sensors And Perception Systems In Autonomous Vehicle, Taminul Islam, Md. Alif Sheakh, Anjuman Naher Jui, Omar Sharif, Md Zobaer Hasan Nov 2023

A Review Of Cyber Attacks On Sensors And Perception Systems In Autonomous Vehicle, Taminul Islam, Md. Alif Sheakh, Anjuman Naher Jui, Omar Sharif, Md Zobaer Hasan

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

Vehicle automation has been in the works for a long time now. Automatic brakes, cruise control, GPS satellite navigation, etc. are all common features seen in today's automobiles. Automation and artificial intelligence breakthroughs are likely to lead to an increase in the usage of automation technologies in cars. Because of this, mankind will be more reliant on computer-controlled equipment and car systems in our daily lives. All major corporations have begun investing in the development of self-driving cars because of the rapid advancement of advanced driver support technologies. However, the level of safety and trustworthiness is still questionable. Imagine what …


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Faire: Repairing Fairness Of Neural Networks Via Neuron Condition Synthesis, Tianlin Li, Xiaofei Xie, Jian Wang, Qing Guo, Aishan Liu, Lei Ma, Yang Liu Nov 2023

Faire: Repairing Fairness Of Neural Networks Via Neuron Condition Synthesis, Tianlin Li, Xiaofei Xie, Jian Wang, Qing Guo, Aishan Liu, Lei Ma, Yang Liu

Research Collection School Of Computing and Information Systems

Deep Neural Networks (DNNs) have achieved tremendous success in many applications, while it has been demonstrated that DNNs can exhibit some undesirable behaviors on concerns such as robustness, privacy, and other trustworthiness issues. Among them, fairness (i.e., non-discrimination) is one important property, especially when they are applied to some sensitive applications (e.g., finance and employment). However, DNNs easily learn spurious correlations between protected attributes (e.g., age, gender, race) and the classification task and develop discriminatory behaviors if the training data is imbalanced. Such discriminatory decisions in sensitive applications would introduce severe social impacts. To expose potential discrimination problems in DNNs …


Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi Oct 2023

Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi

Department of Biological Systems Engineering: Papers and Publications

High preweaning mortality (PWM) rates for piglets are a significant concern for the worldwide pork industries, causing economic loss and well-being issues. This study focused on identifying the factors affecting PWM, overlays, and predicting PWM using historical production data with statistical and machine learning models. Data were collected from 1,982 litters from the United States Meat Animal Research Center, Nebraska, over the years 2016 to 2021. Sows were housed in a farrowing building with three rooms, each with 20 farrowing crates, and taken care of by well-trained animal caretakers. A generalized linear model was used to analyze the various sow, …


Dtitd: An Intelligent Insider Threat Detection Framework Based On Digital Twin And Self-Attention Based Deep Learning Models, Zhi Qiang Wang, Abdulmotaleb El Saddik Oct 2023

Dtitd: An Intelligent Insider Threat Detection Framework Based On Digital Twin And Self-Attention Based Deep Learning Models, Zhi Qiang Wang, Abdulmotaleb El Saddik

Computer Vision Faculty Publications

Recent statistics and studies show that the loss generated by insider threats is much higher than that generated by external attacks. More and more organizations are investing in or purchasing insider threat detection systems to prevent insider risks. However, the accurate and timely detection of insider threats faces significant challenges. In this study, we proposed an intelligent insider threat detection framework based on Digital Twins and self-attentions based deep learning models. First, this paper introduces insider threats and the challenges in detecting them. Then this paper presents recent related works on solving insider threat detection problems and their limitations. Next, …


Contemporary Art Authentication With Large-Scale Classification, Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho, Zbigniew Ras Oct 2023

Contemporary Art Authentication With Large-Scale Classification, Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho, Zbigniew Ras

Computer Science Faculty and Staff Publications

Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniqueness of the artist’s style in contrast to the style of another artist. The significance of this contrast is proportional to the number of artists involved and the degree of uniqueness of an artist’s collection. This visual uniqueness of style can be captured in a mathematical model produced by a machine learning (ML) algorithm on painting images. Art authentication is not always possible …


Malfe—Malware Feature Engineering Generation Platform, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter Oct 2023

Malfe—Malware Feature Engineering Generation Platform, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter

All Works

The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to combat this surge in malware attacks and enhance detection and prevention methods, they often encounter limitations when it comes to sourcing malware binaries. This limitation places the burden on malware researchers to create context-specific datasets and detection mechanisms, a time-consuming and intricate process that involves a series of experiments. The lack of accessible analysis reports and a centralized platform for sharing and verifying findings has resulted …


A Survey Of Eeg And Machine Learning-Based Methods For Neural Rehabilitation, Jaiteg Singh, Farman Ali, Rupali Gill, Babar Shah, Daehan Kwak Oct 2023

A Survey Of Eeg And Machine Learning-Based Methods For Neural Rehabilitation, Jaiteg Singh, Farman Ali, Rupali Gill, Babar Shah, Daehan Kwak

All Works

One approach to therapy and training for the restoration of damaged muscles and motor systems is rehabilitation. EEG-assisted Brain-Computer Interface (BCI) may assist in restoring or enhancing ‘lost motor abilities in the brain. Assisted by brain activity, BCI offers simple-to-use technology aids and robotic prosthetics. This systematic literature review aims to explore the latest developments in BCI and motor control for rehabilitation. Additionally, we have explored typical EEG apparatuses that are available for BCI-driven rehabilitative purposes. Furthermore, a comparison of significant studies in rehabilitation assessment using machine learning techniques has been summarized. The results of this study may influence policymakers’ …


Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing, Fan. Zhang, Qianmei. Wu, Bohan. Xuan, Yuqi. Chen, Wei. Lin, Christopher M. Poskitt, Jun Sun, Binbin. Chen Oct 2023

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing, Fan. Zhang, Qianmei. Wu, Bohan. Xuan, Yuqi. Chen, Wei. Lin, Christopher M. Poskitt, Jun Sun, Binbin. Chen

Research Collection School Of Computing and Information Systems

Cyber-physical systems (CPSs) automating critical public infrastructure face a pervasive threat of attack, motivating research into different types of countermeasures. Assessing the effectiveness of these countermeasures is challenging, however, as benchmarks are difficult to construct manually, existing automated testing solutions often make unrealistic assumptions, and blindly fuzzing is ineffective at finding attacks due to the enormous search spaces and resource requirements. In this work, we propose active sensor fuzzing , a fully automated approach for building test suites without requiring any a prior knowledge about a CPS. Our approach employs active learning techniques. Applied to a real-world water treatment system, …


Machine Learning Techniques For The Identification Of Risk Factors Associated With Food Insecurity Among Adults In Arab Countries During The Covid-19 Pandemic, Radwan Qasrawi, Maha Hoteit, Reema Tayyem, Khlood Bookari, Haleama Al Sabbah, Iman Kamel, Somaia Dashti, Sabika Allehdan, Hiba Bawadi, Mostafa Waly, Mohammed O. Ibrahim, Stephanny Vicuna Polo, Diala Abu Al-Halawa Sep 2023

Machine Learning Techniques For The Identification Of Risk Factors Associated With Food Insecurity Among Adults In Arab Countries During The Covid-19 Pandemic, Radwan Qasrawi, Maha Hoteit, Reema Tayyem, Khlood Bookari, Haleama Al Sabbah, Iman Kamel, Somaia Dashti, Sabika Allehdan, Hiba Bawadi, Mostafa Waly, Mohammed O. Ibrahim, Stephanny Vicuna Polo, Diala Abu Al-Halawa

All Works

BACKGROUND: A direct consequence of global warming, and strongly correlated with poor physical and mental health, food insecurity is a rising global concern associated with low dietary intake. The Coronavirus pandemic has further aggravated food insecurity among vulnerable communities, and thus has sparked the global conversation of equal food access, food distribution, and improvement of food support programs. This research was designed to identify the key features associated with food insecurity during the COVID-19 pandemic using Machine learning techniques. Seven machine learning algorithms were used in the model, which used a dataset of 32 features. The model was designed to …


Disease Progression Modelling Of Alzheimer's Disease Using Probabilistic Principal Components Analysis, Martin Saint-Jalmes, Victor Fedyashov, Daniel Beck, Timothy Baldwin, Noel G. Faux, Pierrick Bourgeat, Jurgen Fripp, Colin L. Masters, Benjamin Goudey Sep 2023

Disease Progression Modelling Of Alzheimer's Disease Using Probabilistic Principal Components Analysis, Martin Saint-Jalmes, Victor Fedyashov, Daniel Beck, Timothy Baldwin, Noel G. Faux, Pierrick Bourgeat, Jurgen Fripp, Colin L. Masters, Benjamin Goudey

Natural Language Processing Faculty Publications

The recent biological redefinition of Alzheimer's Disease (AD) has spurred the development of statistical models that relate changes in biomarkers with neurodegeneration and worsening condition linked to AD. The ability to measure such changes may facilitate earlier diagnoses for affected individuals and help in monitoring the evolution of their condition. Amongst such statistical tools, disease progression models (DPMs) are quantitative, data-driven methods that specifically attempt to describe the temporal dynamics of biomarkers relevant to AD. Due to the heterogeneous nature of this disease, with patients of similar age experiencing different AD-related changes, a challenge facing longitudinal mixed-effects-based DPMs is the …


Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Naing Tun Yan, David Lo, Lingxiao Jiang, Christoph Bienert Sep 2023

Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Naing Tun Yan, David Lo, Lingxiao Jiang, Christoph Bienert

Research Collection School Of Computing and Information Systems

Android malware detection has been an active area of research. In the past decade, several machine learning-based approaches based on different types of features that may characterize Android malware behaviors have been proposed. The usually-analyzed features include API usages and sequences at various abstraction levels (e.g., class and package), extracted using static or dynamic analysis. Additionally, features that characterize permission uses, native API calls and reflection have also been analyzed. Initial works used conventional classifiers such as Random Forest to learn on those features. In recent years, deep learning-based classifiers such as Recurrent Neural Network have been explored. Considering various …


Sentence Embedding Approach Using Lstm Auto-Encoder For Discussion Threads Summarization, Abdul Wali Khan, Feras Al-Obeidat, Afsheen Khalid, Adnan Amin, Fernando Moreira Sep 2023

Sentence Embedding Approach Using Lstm Auto-Encoder For Discussion Threads Summarization, Abdul Wali Khan, Feras Al-Obeidat, Afsheen Khalid, Adnan Amin, Fernando Moreira

All Works

Online discussion forums are repositories of valuable information where users interact and articulate their ideas and opinions, and share experiences about numerous topics. These online discussion forums are internet-based online communities where users can ask for help and find the solution to a problem. A new user of online discussion forums becomes exhausted from reading the significant number of irrelevant replies in a discussion. An automated discussion thread summarizing system (DTS) is necessary to create a candid view of the entire discussion of a query. Most of the previous approaches for automated DTS use the continuous bag of words (CBOW) …


Perceptions And Barriers To Adopting Artificial Intelligence In K-12 Education: A Survey Of Educators In Fifty States, Karen Woodruff, James Hutson, Kathryn Arnone Sep 2023

Perceptions And Barriers To Adopting Artificial Intelligence In K-12 Education: A Survey Of Educators In Fifty States, Karen Woodruff, James Hutson, Kathryn Arnone

Faculty Scholarship

Artificial Intelligence (AI) is making significant strides in the field of education, offering new opportunities for personalized learning and access to education for a more diverse population. Despite this potential, the adoption of AI in K-12 education is limited, and educators’ express hesitancy towards its integration due to perceived technological barriers and misconceptions. The purpose of this study is to examine the perceptions of K-12 educators in all 50 states of the USA towards AI, policies, training, and resources related to technology and AI, their comfort with technology, willingness to adopt new technologies for classroom instruction, and needs assessment for …


On Predicting Esg Ratings Using Dynamic Company Networks, Gary Ang, Zhiling Guo, Ee-Peng Lim Sep 2023

On Predicting Esg Ratings Using Dynamic Company Networks, Gary Ang, Zhiling Guo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Environmental, social and governance (ESG) considerations play an increasingly important role due to the growing focus on sustainability globally. Entities, such as banks and investors, utilize ESG ratings of companies issued by specialized rating agencies to evaluate ESG risks of companies. The process of assigning ESG ratings by human analysts is however laborious and time intensive. Developing methods to predict ESG ratings could alleviate such challenges, allow ESG ratings to be generated in a more timely manner, cover more companies, and be more accessible. Most works study the effects of ESG ratings on target variables such as stock prices or …


Reconstructing 42 Years (1979–2020) Of Great Lakes Surface Temperature Through A Deep Learning Approach, Miraj Kayastha, Tao Liu, Daniel Titze, Timothy C. Havens, Chenfu Huang, Pengfei Xue Aug 2023

Reconstructing 42 Years (1979–2020) Of Great Lakes Surface Temperature Through A Deep Learning Approach, Miraj Kayastha, Tao Liu, Daniel Titze, Timothy C. Havens, Chenfu Huang, Pengfei Xue

Michigan Tech Publications, Part 2

Accurate estimates for the lake surface temperature (LST) of the Great Lakes are critical to understanding the regional climate. Dedicated lake models of various complexity have been used to simulate LST but they suffer from noticeable biases and can be computationally expensive. Additionally, the available historical LST datasets are limited by either short temporal coverage (<30 >years) or lower spatial resolution (0.25° × 0.25°). Therefore, in this study, we employed a deep learning model based on Long Short-Term Memory (LSTM) neural networks to produce a daily LST dataset for the Great Lakes that spans an unparalleled 42 years (1979–2020) at …


Machine Learning-Based Classification Of Chronic Traumatic Brain Injury Using Hybrid Diffusion Imaging, Jennifer Muller, Ruixuan Wang, Devon Middleton, Mahdi Alizadeh, Kichang Kang, Ryan Hryczyk, George Zabrecky, Chloe Hriso, Emily Navarreto, Nancy Wintering, Anthony J. Bazzan, Chengyuan Wu, Daniel A. Monti, Xun Jiao, Qianhong Wu, Andrew B. Newberg, Feroze Mohamed Aug 2023

Machine Learning-Based Classification Of Chronic Traumatic Brain Injury Using Hybrid Diffusion Imaging, Jennifer Muller, Ruixuan Wang, Devon Middleton, Mahdi Alizadeh, Kichang Kang, Ryan Hryczyk, George Zabrecky, Chloe Hriso, Emily Navarreto, Nancy Wintering, Anthony J. Bazzan, Chengyuan Wu, Daniel A. Monti, Xun Jiao, Qianhong Wu, Andrew B. Newberg, Feroze Mohamed

Marcus Institute of Integrative Health Faculty Papers

BACKGROUND AND PURPOSE: Traumatic brain injury (TBI) can cause progressive neuropathology that leads to chronic impairments, creating a need for biomarkers to detect and monitor this condition to improve outcomes. This study aimed to analyze the ability of data-driven analysis of diffusion tensor imaging (DTI) and neurite orientation dispersion imaging (NODDI) to develop biomarkers to infer symptom severity and determine whether they outperform conventional T1-weighted imaging.

MATERIALS AND METHODS: A machine learning-based model was developed using a dataset of hybrid diffusion imaging of patients with chronic traumatic brain injury. We first extracted the useful features from the hybrid diffusion imaging …


Verifying Empirical Predictive Modeling Of Societal Vulnerability To Hazardous Events: A Monte Carlo Experimental Approach, Yi Victor Wang, Seung Hee Kim, Menas C. Kafatos Aug 2023

Verifying Empirical Predictive Modeling Of Societal Vulnerability To Hazardous Events: A Monte Carlo Experimental Approach, Yi Victor Wang, Seung Hee Kim, Menas C. Kafatos

Institute for ECHO Articles and Research

With the emergence of large amounts of historical records on adverse impacts of hazardous events, empirical predictive modeling has been revived as a foundational paradigm for quantifying disaster vulnerability of societal systems. This paradigm models societal vulnerability to hazardous events as a vulnerability curve indicating an expected loss rate of a societal system with respect to a possible spectrum of intensity measure (IM) of an event. Although the empirical predictive models (EPMs) of societal vulnerability are calibrated on historical data, they should not be experimentally tested with data derived from field experiments on any societal system. Alternatively, in this paper, …


Multi-Granularity Detector For Vulnerability Fixes, Truong Giang Nguyen, Cong, Thanh Le, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, David Lo, David Lo Aug 2023

Multi-Granularity Detector For Vulnerability Fixes, Truong Giang Nguyen, Cong, Thanh Le, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, David Lo, David Lo

Research Collection School Of Computing and Information Systems

With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vulnerability-fixing commits. Prior works have proposed methods that can automatically identify such vulnerability-fixing commits. However, identifying such commits is highly challenging, as only a very small minority of commits are vulnerability fixing. Moreover, code changes can be noisy and difficult to analyze. We observe that noise can occur at different levels of detail, making it challenging to detect vulnerability fixes accurately. To address these challenges and …