Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

2018

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 296

Full-Text Articles in Computer Sciences

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan Dec 2018

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan

LSU Master's Theses

The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …


Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch Dec 2018

Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch

University of New Orleans Theses and Dissertations

This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It …


Virtual Robot Climbing Using Reinforcement Learning, Ujjawal Garg Dec 2018

Virtual Robot Climbing Using Reinforcement Learning, Ujjawal Garg

Master's Projects

Reinforcement Learning (RL) is a field of Artificial Intelligence that has gained a lot of attention in recent years. In this project, RL research was used to design and train an agent to climb and navigate through an environment with slopes. We compared and evaluated the performance of two state-of-the-art reinforcement learning algorithms for locomotion related tasks, Deep Deterministic Policy Gradients (DDPG) and Trust Region Policy Optimisation (TRPO). We observed that, on an average, training with TRPO was three times faster than DDPG, and also much more stable for the locomotion control tasks that we experimented. We conducted experiments and …


Deep Visual Recommendation System, Raksha Sunil Dec 2018

Deep Visual Recommendation System, Raksha Sunil

Master's Projects

Recommendation system is a filtering system that predicts ratings or preferences that a user might have. Recommendation system is an evolved form of our trivial information retrieval systems. In this paper, we present a technique to solve new item cold start problem. New item cold start problem occurs when a new item is added to a shopping website like Amazon.com. There is no metadata for this item, no ratings and no reviews because it’s a new item in the system. Absence of data results in no recommendation or bad recommendations. Our approach to solve new item cold start problem requires …


Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub Dec 2018

Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub

Arkansas Law Review

No abstract provided.


On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher Dec 2018

On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher

Articles

This article revisits the question of ‘la bêtise’ or stupidity in the era of Artificial Intelligence driven by Big Data, it extends on the questions posed by Gille Deleuze and more recently by Bernard Stiegler. However, the framework for revisiting the question of la bêtise will be through the lens of contemporary computer science, in particular the development of data science as a mode of analysis, sometimes, misinterpreted as a mode of intelligence. In particular, this article will argue that with the advent of forms of hype (sometimes referred to as the hype cycle) in relation to big data and …


Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss Dec 2018

Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to develop a tool that uses machine learning techniques to make predictions about whether or not a given vulnerability will be exploited. Such a tool could help organizations such as electric utilities to prioritize their security patching operations. Three different models, based on a deep neural network, a random forest, and a support vector machine respectively, are designed and implemented. Training data for these models is compiled from a variety of sources, including the National Vulnerability Database published by NIST and the Exploit Database published by Offensive Security. Extensive experiments are conducted, including testing …


Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham Dec 2018

Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham

MITB Thought Leadership Series

BIKE-SHARING programmes face many of the issues encountered by their counterparts in the carsharing world. But in Singapore, there are a number of factors that have a unique impact on the industry. These include the regulatory structure and the significant fines for those companies who do not abide by these regulations. When this is combined with the competitive nature of the industry in one of the world's most dynamic cities, it becomes clear that first movers who leverage machine learning and prediction will come to dominate the industry


Credit Assignment For Collective Multiagent Rl With Global Rewards, Duc Thien Nguyen, Akshat Kumar, Hoong Chuin Lau Dec 2018

Credit Assignment For Collective Multiagent Rl With Global Rewards, Duc Thien Nguyen, Akshat Kumar, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Scaling decision theoretic planning to large multiagent systems is challenging due to uncertainty and partial observability in the environment. We focus on a multiagent planning model subclass, relevant to urban settings, where agent interactions are dependent on their collective influence'' on each other, rather than their identities. Unlike previous work, we address a general setting where system reward is not decomposable among agents. We develop collective actor-critic RL approaches for this setting, and address the problem of multiagent credit assignment, and computing low variance policy gradient estimates that result in faster convergence to high quality solutions. We also develop difference …


Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong Dec 2018

Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong

Research Collection School Of Computing and Information Systems

This study reports the use of a physical robot and robot simulator in an introductory programming course in a university and measures students' programming background conceptual learning gain and learning experience. One group used physical robots in their lessons to complete programming assignments, while the other group used robot simulators. We are interested in finding out if there is any difference in the learning gain and experiences between those that use physical robots as compared to robot simulators. Our results suggest that there is no significant difference in terms of students' learning between the two approaches. However, the control group …


Data Center Holistic Demand Response Algorithm To Smooth Microgrid Tie-Line Power Fluctuation, Ting Yang, Yingjie Zhao, Haibo Pen, Zhaoxia Wang Dec 2018

Data Center Holistic Demand Response Algorithm To Smooth Microgrid Tie-Line Power Fluctuation, Ting Yang, Yingjie Zhao, Haibo Pen, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

With the rapid development of cloud computing, artificial intelligence technologies and big data applications, data centers have become widely deployed. High density IT equipment in data centers consumes a lot of electrical power, and makes data center a hungry monster of energy consumption. To solve this problem, renewable energy is increasingly integrated into data center power provisioning systems. Compared to the traditional power supply methods, renewable energy has its unique characteristics, such as intermittency and randomness. When renewable energy supplies power to the data center industrial park, this kind of power supply not only has negative effects on the normal …


An Adaptive Memory-Based Reinforcement Learning Controller, Keith August Cissell Dec 2018

An Adaptive Memory-Based Reinforcement Learning Controller, Keith August Cissell

MSU Graduate Theses

Recently, the use of autonomous robots for exploration has drastically expanded--largely due to innovations in both hardware technology and the development of new artificial intelligence methods. The wide variety of robotic agents and operating environments has led to the creation of many unique control strategies that cater to each specific agent and their goal within an environment. Most control strategies are single purpose, meaning they are built from the ground up for each given operation. Here we present a single, reinforcement learning control solution for autonomous exploration intended to work across multiple agent types, goals, and environments. The solution presented …


Improving Ultra-Wideband Localization By Detecting Radio Misclassification, Cory A. Mayer Dec 2018

Improving Ultra-Wideband Localization By Detecting Radio Misclassification, Cory A. Mayer

Master's Theses

The Global Positioning System (GPS) and other satellite-based positioning systems are often a key component in applications requiring localization. However, accurate positioning in areas with poor GPS coverage, such as inside buildings and in dense cities, is in increasing demand for many modern applications. Fortunately, recent developments in ultra-wideband (UWB) radio technology have enabled precise positioning in places where it was not previously possible by utilizing multipath-resistant wide band pulses.

Although ultra-wideband signals are less prone to multipath interference, it is still a bottleneck as increasingly ambitious projects continue to demand higher precision. Some UWB radios include on-board detection of …


Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai Dec 2018

Sensor-Based Human Activity Recognition Using Bidirectional Lstm For Closely Related Activities, Arumugam Thendramil Pavai

Electronic Theses, Projects, and Dissertations

Recognizing human activities using deep learning methods has significance in many fields such as sports, motion tracking, surveillance, healthcare and robotics. Inertial sensors comprising of accelerometers and gyroscopes are commonly used for sensor based HAR. In this study, a Bidirectional Long Short-Term Memory (BLSTM) approach is explored for human activity recognition and classification for closely related activities on a body worn inertial sensor data that is provided by the UTD-MHAD dataset. The BLSTM model of this study could achieve an overall accuracy of 98.05% for 15 different activities and 90.87% for 27 different activities performed by 8 persons with 4 …


Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie Nov 2018

Automatic Identification Of Animals In The Wild: A Comparative Study Between C-Capsule Networks And Deep Convolutional Neural Networks., Joel Kamdem Teto, Ying Xie

Master of Science in Computer Science Theses

The evolution of machine learning and computer vision in technology has driven a lot of

improvements and innovation into several domains. We see it being applied for credit decisions, insurance quotes, malware detection, fraud detection, email composition, and any other area having enough information to allow the machine to learn patterns. Over the years the number of sensors, cameras, and cognitive pieces of equipment placed in the wilderness has been growing exponentially. However, the resources (human) to leverage these data into something meaningful are not improving at the same rate. For instance, a team of scientist volunteers took 8.4 years, …


Sequence Pattern Mining With Variables, James S. Okolica, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila Nov 2018

Sequence Pattern Mining With Variables, James S. Okolica, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila

Faculty Publications

Sequence pattern mining (SPM) seeks to find multiple items that commonly occur together in a specific order. One common assumption is that all of the relevant differences between items are captured through creating distinct items, e.g., if color matters then the same item in two different colors would have two items created, one for each color. In some domains, that is unrealistic. This paper makes two contributions. The first extends SPM algorithms to allow item differentiation through attribute variables for domains with large numbers of items, e.g, by having one item with a variable with a color attribute rather than …


Multi-Resolution Analysis Of Large Molecular Structures And Interactions, Kasra Manavi Nov 2018

Multi-Resolution Analysis Of Large Molecular Structures And Interactions, Kasra Manavi

Computer Science ETDs

Simulation of large molecular structures and their interactions has become a major component of modern biomolecular research. Methods to simulate these type of molecules span a wide array of resolutions, from all atom molecular dynamics to model interaction energetics to systems of linear equations to evaluate population kinetics. In recent years, there has been an acceleration of molecular structural information production, primarily from x-ray crystallography and electron microscopy. This data has provided modelers the ability to produce better representations of these molecular structures. The purpose of this research is to take advantage of this information to develop multi-resolution models for …


Validation Study Of Image Recognition Algorithms, Jacob Miller, Jeremy Evert Nov 2018

Validation Study Of Image Recognition Algorithms, Jacob Miller, Jeremy Evert

Student Research

Developments in machine learning in recent years have created opportunities that previously never existed. One such field with an explosion of opportunity is image recognition, also known as computer vision; the process in which a machine analyzes a digital image.

In order for a machine to ‘see’ as a human does, it must break down the image in a process called image segmentation. The way the machine goes about doing this is important, and many algorithms exist to determine just how a machine will decide to group the pixels in an image.

This research is a validation study of related …


Exploring Online Novelty Detection Using First Story Detection Models, Fei Wang, Robert J. Ross, John D. Kelleher Nov 2018

Exploring Online Novelty Detection Using First Story Detection Models, Fei Wang, Robert J. Ross, John D. Kelleher

Conference papers

Online novelty detection is an important technology in understanding and exploiting streaming data. One application of online novelty detection is First Story Detection (FSD) which attempts to find the very first story about a new topic, e.g. the first news report discussing the “Beast from the East” hitting Ireland. Although hundreds of FSD models have been developed, the vast majority of these only aim at improving the performance of the detection for some specific dataset, and very few focus on the insight of novelty itself. We believe that online novelty detection, framed as an unsupervised learning problem, always requires a …


A Model-Based Ai-Driven Test Generation System, Dionny Santiago Nov 2018

A Model-Based Ai-Driven Test Generation System, Dionny Santiago

FIU Electronic Theses and Dissertations

Achieving high software quality today involves manual analysis, test planning, documentation of testing strategy and test cases, and development of automated test scripts to support regression testing. This thesis is motivated by the opportunity to bridge the gap between current test automation and true test automation by investigating learning-based solutions to software testing. We present an approach that combines a trainable web component classifier, a test case description language, and a trainable test generation and execution system that can learn to generate new test cases. Training data was collected and hand-labeled across 7 systems, 95 web pages, and 17,360 elements. …


A Multi-Task Approach To Incremental Dialogue State Tracking, Anh Duong Trinh, Robert J. Ross, John D. Kelleher Nov 2018

A Multi-Task Approach To Incremental Dialogue State Tracking, Anh Duong Trinh, Robert J. Ross, John D. Kelleher

Conference papers

Incrementality is a fundamental feature of language in real world use. To this point, however, the vast majority of work in automated dialogue processing has focused on language as turn based. In this paper we explore the challenge of incremental dialogue state tracking through the development and analysis of a multi-task approach to incremental dialogue state tracking. We present the design of our incremental dialogue state tracker in detail and provide evaluation against the well known Dialogue State Tracking Challenge 2 (DSTC2) dataset. In addition to a standard evaluation of the tracker, we also provide an analysis of the Incrementality …


Performance Of The Parallelized Monte-Carlo Tree Search Approach For Dots And Boxes, Pranay Agrawal, Uta Ziegler Nov 2018

Performance Of The Parallelized Monte-Carlo Tree Search Approach For Dots And Boxes, Pranay Agrawal, Uta Ziegler

Posters-at-the-Capitol

The Monte-Carlo tree search (MCTS) is a method designed to solve difficult learning problems. MCTS performs random simulations from the current situation and stores the results in order to distinguish decisions based on their past success. MCTS will then select the best decision and finally repeat the process. Parallelizing the MCTS means to divide the learning process among independent learners. Then, after a fixed number of simulations, the data is shared and combined. Past research has shown that this approach is faster than non-parallelized approaches. Therefore, we anticipated that the time reduced from dividing the learning outweighs the potential costs …


End-To-End Deep Learning Systems For Scene Understanding, Path Planning And Navigation In Fire Fighter Teams, Manish Bhattarai Nov 2018

End-To-End Deep Learning Systems For Scene Understanding, Path Planning And Navigation In Fire Fighter Teams, Manish Bhattarai

Shared Knowledge Conference

Firefighting is a dynamic activity with many operations occurring simultaneously. Maintaining situational awareness, defined as knowledge of current conditions and activities at the scene, are critical to accurate decision making. Firefighters often carry various sensors in their personal equipment, namely thermal cameras, gas sensors, and microphones. Improved data processing techniques can mine this data more effectively and be used to improve situational awareness at all times thereby improving real-time decision making and minimizing errors in judgment induced by environmental conditions and anxiety levels. This objective of this research employs state of the art Machine Learning (ML) techniques to create an …


Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li Nov 2018

Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li

Doctoral Dissertations

In the past decades, the computing capability has shown an exponential growth trend, which is observed as Moore’s law. However, this growth speed is slowing down in recent years mostly because the down-scaled size of transistors is approaching their physical limit. On the other hand, recent advances in software, especially in big data analysis and artificial intelligence, call for a break-through in computing hardware. The memristor, or the resistive switching device, is believed to be a potential building block of the future generation of integrated circuits. The underlying mechanism of this device is different from that of complementary metal-oxide-semiconductor (CMOS) …


Multi-Robot Coordination And Scheduling For Deactivation & Decommissioning, Sebastian A. Zanlongo Nov 2018

Multi-Robot Coordination And Scheduling For Deactivation & Decommissioning, Sebastian A. Zanlongo

FIU Electronic Theses and Dissertations

Large quantities of high-level radioactive waste were generated during WWII. This waste is being stored in facilities such as double-shell tanks in Washington, and the Waste Isolation Pilot Plant in New Mexico. Due to the dangerous nature of radioactive waste, these facilities must undergo periodic inspections to ensure that leaks are detected quickly. In this work, we provide a set of methodologies to aid in the monitoring and inspection of these hazardous facilities. This allows inspection of dangerous regions without a human operator, and for the inspection of locations where a person would not be physically able to enter.

First, …


Automatic Extraction Of Narrative Structure From Long Form Text, Joshua Daniel Eisenberg Nov 2018

Automatic Extraction Of Narrative Structure From Long Form Text, Joshua Daniel Eisenberg

FIU Electronic Theses and Dissertations

Automatic understanding of stories is a long-time goal of artificial intelligence and natural language processing research communities. Stories literally explain the human experience. Understanding our stories promotes the understanding of both individuals and groups of people; various cultures, societies, families, organizations, governments, and corporations, to name a few. People use stories to share information. Stories are told –by narrators– in linguistic bundles of words called narratives.

My work has given computers awareness of narrative structure. Specifically, where are the boundaries of a narrative in a text. This is the task of determining where a narrative begins and ends, a …


Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais Nov 2018

Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais

Research Collection School Of Computing and Information Systems

Intelligent Tutoring Systems (ITS) are designed for providing personalized instructions to students with the needs of their skills. Assessment of student knowledge acquisition dynamically is nontrivial during her learning process with ITS. Knowledge tracing, a popular student modeling technique for student knowledge assessment in adaptive tutoring, which is used for tracing student's knowledge state and detecting student's knowledge acquisition by using decomposed individual skill or problems with a single skill per problem. Unfortunately, recent KT models fail to deal with practices of complex skill composition and variety of concepts included in a problem simultaneously. Our goal is to investigate a …


Comparing Elm With Svm In The Field Of Sentiment Classification Of Social Media Text Data, Zhihuan Chen, Zhaoxia Wang, Zhiping Lin, Ting Yang Nov 2018

Comparing Elm With Svm In The Field Of Sentiment Classification Of Social Media Text Data, Zhihuan Chen, Zhaoxia Wang, Zhiping Lin, Ting Yang

Research Collection School Of Computing and Information Systems

Machine learning has been used in various fields with thousands of applications. Extreme learning machine (ELM), which is the most recently developed machine learning algorithm, has become increasingly popular for its good generalization ability. However, it has been relatively less applied to the domain of social media. Support Vector Machine (SVM), another popular learning-based algorithm, has been applied for sentiment classification of social media text data and has obtained good results. This paper investigates and compares the capabilities of these two learning-based methods in the field of sentiment classification of social media. The results indicate that SVM can obtain good …


A Mathematical Framework On Machine Learning: Theory And Application, Bin Shi Nov 2018

A Mathematical Framework On Machine Learning: Theory And Application, Bin Shi

FIU Electronic Theses and Dissertations

The dissertation addresses the research topics of machine learning outlined below. We developed the theory about traditional first-order algorithms from convex opti- mization and provide new insights in nonconvex objective functions from machine learning. Based on the theory analysis, we designed and developed new algorithms to overcome the difficulty of nonconvex objective and to accelerate the speed to obtain the desired result. In this thesis, we answer the two questions: (1) How to design a step size for gradient descent with random initialization? (2) Can we accelerate the current convex optimization algorithms and improve them into nonconvex objective? For application, …


Gesture Recognition With Transparent Solar Cells, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, B. Mushfika Upama, Ashraf Uddin, Youseef, Moustafa Nov 2018

Gesture Recognition With Transparent Solar Cells, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, B. Mushfika Upama, Ashraf Uddin, Youseef, Moustafa

Research Collection School Of Computing and Information Systems

Transparent solar cell is an emerging solar energy harvesting technology that allows us to see through these cells. This revolutionary discovery is creating unique opportunities to turn any mobile device screen into solar energy harvester. In this paper, we consider the possibility of using such energy harvesting screens as a sensor to detect hand gestures. As different gestures impact the incident light on the screen in a different way, they are expected to create unique energy generation patterns for the transparent solar cell. Our goal is to recognize gestures by detecting these solar energy patterns. A key uncertainty we face …