Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

2024

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 156

Full-Text Articles in Computer Sciences

Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen Dec 2024

Harnessing Collective Structure Knowledge In Data Augmentation For Graph Neural Networks, Rongrong Ma, Guansong Pang, Ling Chen

Research Collection School Of Computing and Information Systems

Graph neural networks (GNNs) have achieved state-of-the-art performance in graph representation learning. Message passing neural networks, which learn representations through recursively aggregating information from each node and its neighbors, are among the most commonly-used GNNs. However, a wealth of structural information of individual nodes and full graphs is often ignored in such process, which restricts the expressive power of GNNs. Various graph data augmentation methods that enable the message passing with richer structure knowledge have been introduced as one main way to tackle this issue, but they are often focused on individual structure features and difficult to scale up with …


Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal Nov 2024

Development Of A Web-Based Information System For Student Leave Permission At Dar Al-Raudhah Islamic Boarding School: Iso Quality Standards Analysis, Bonita Destiana, Priyanto Priyanto, Rahmatul Irfan, Muhammad Gus Khamim, Muhammad Yusuf Ridlo, Muhammad Iqbal

Elinvo (Electronics, Informatics, and Vocational Education)

Dar Al-Raudhah Entrepreneur, Islamic Boarding School, has adopted digital technology by upgrading hardware and software also investing in reliable internet infrastructure. However, this school still faces issues with students’ leave permission process due to reliance on manual bookkeeping and Excel, which leads to potential errors. Based on those problems, this research aims to create a web-based student leave permission system called SIPERSAN. The SIPERSAN system was developed with a Waterfall development model, which includes requirements analysis, design, implementation, testing, and deployment. The database is managed with MySQL, and the system is developed using PHP with the Laravel framework. Based on …


Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu Oct 2024

Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu

Research Collection School Of Computing and Information Systems

Despite efforts to mitigate aggressive financial reporting, earnings management remains challenging to parties interested in inhibiting its dysfunctional effects. Using linguistic algorithms to assess CEO agreeableness personality from their unscripted texts in conference calls, we find that it is a determinant that mitigates a firm's real earnings management. Furthermore, such an effect is more pronounced when firms confront intensive market competition and financial distress and have weaker managerial entrenchment or when CEOs face stronger internal governance. Our findings persist even after we utilize several alternative real earnings management metrics and control other confounding personalities in prior earnings management studies. The …


D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra Oct 2024

D2sr: Decentralized Detection, De-Synchronization, And Recovery Of Lidar Interference, Darshana Rathnayake, Hemanth Sabbella, Meera Radhakrishnan, Archan Misra

Research Collection School Of Computing and Information Systems

We address the challenge of multi-LiDAR interference, an issue of growing importance as LiDAR sensors are embedded in a growing set of pervasive devices. We introduce a novel approach named D2SR, enabling decentralized interference detection, mitigation, and recovery without explicit coordination among nearby LiDAR devices. D2SR comprises three stages: (a) Detection, which identifies interfered frames, (b) Mitigation, which performs time-shifting of a LiDAR’s active period to reduce interference, and (c) Recovery, which corrects or reconstructs the depth values in interfered regions of a depth frame. Key contributions include a lightweight interference detection algorithm achieving an F1-score of 92%, a simple …


Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa Oct 2024

Retrofitting A Legacy Cutlery Washing Machine Using Computer Vision, Hua Leong Fwa

Research Collection School Of Computing and Information Systems

Industry 4.0, the digitalization of manufacturing promises to lead to lowered cost, efficient processes and even discovery of new business models. However, many of the enterprises have huge investments in legacy machines which are not 'smart'. In this study, we thus designed a cost-efficient solution to retrofit a legacy conveyor belt-based cutlery washing machine with a commodity web camera. We then applied computer vision (using both traditional image processing and deep learning techniques) to infer the speed and utilization of the machine. We detailed the algorithms that we designed for computing both speed andutilization. With the existing operational constraints of …


Institutional Data Repositories Are Vital, Jen Darragh, Mikala R. Narlock, Halle Burns, Peter A. Cerda, Wind Cowles, Leslie M. Delserone, Seth Erickson, Joel Herndon, Heidi Imker, Lisa R. Johnston, Sherry Lake, Michael Lenard, Alicia Hofelich Mohr, Jennifer Moore, Jonathan Petters, Brandie Pullen, Shawna Taylor, Briana Wham Sep 2024

Institutional Data Repositories Are Vital, Jen Darragh, Mikala R. Narlock, Halle Burns, Peter A. Cerda, Wind Cowles, Leslie M. Delserone, Seth Erickson, Joel Herndon, Heidi Imker, Lisa R. Johnston, Sherry Lake, Michael Lenard, Alicia Hofelich Mohr, Jennifer Moore, Jonathan Petters, Brandie Pullen, Shawna Taylor, Briana Wham

UNL Libraries: Faculty Publications

As funding agencies and publishers reiterate research data sharing expectations (1), many higher-education institutions have demonstrated their commitment to the long-term stewardship of research data by connecting researchers to local infrastructure, with dedicated staffing, that eases the burden of data sharing. Institutional repositories are an example of this investment (2). They provide support for researchers in sharing data that might otherwise be lost: data without a disciplinary repository, data from projects with limited funding, or data that are too large to sustainably store elsewhere. The staffing and technical infrastructure provided by institutional repositories ensures responsible access to information while considering …


Unraveling The Dynamics Of Stable And Curious Audiences In Web Systems, Rodrigo Alves, Antoine Ledent, Renato Assunção, Pedro Vaz-De-Melo, Marius Kloft Sep 2024

Unraveling The Dynamics Of Stable And Curious Audiences In Web Systems, Rodrigo Alves, Antoine Ledent, Renato Assunção, Pedro Vaz-De-Melo, Marius Kloft

Research Collection School Of Computing and Information Systems

We propose the Burst-Induced Poisson Process (BPoP), a model designed to analyze time series data such as feeds or search queries. BPoP can distinguish between the slowly-varying regular activity of a stable audience and the bursty activity of a curious audience, often seen in viral threads. Our model consists of two hidden, interacting processes: a self-feeding process (SFP) that generates bursty behavior related to viral threads, and a non-homogeneous Poisson process (NHPP) with step function intensity that is influenced by the bursts from the SFP. The NHPP models the normal background behavior, driven solely by the overall popularity of the …


Certified Quantization Strategy Synthesis For Neural Networks, Yedi Zhang, Guangke Chen, Jun Sun, Jun Sun Sep 2024

Certified Quantization Strategy Synthesis For Neural Networks, Yedi Zhang, Guangke Chen, Jun Sun, Jun Sun

Research Collection School Of Computing and Information Systems

Quantization plays an important role in deploying neural networks on embedded, real-time systems with limited computing and storage resources (e.g., edge devices). It significantly reduces the model storage cost and improves inference efficiency by using fewer bits to represent the parameters. However, it was recently shown that critical properties may be broken after quantization, such as robustness and backdoor-freeness. In this work, we introduce the first method for synthesizing quantization strategies that verifiably maintain desired properties after quantization, leveraging a key insight that quantization leads to a data distribution shift in each layer. We propose to compute the preimage for …


Open-Source Forensics Tools Are Great Tools For Critical Used Machines, Erik Herrera Aug 2024

Open-Source Forensics Tools Are Great Tools For Critical Used Machines, Erik Herrera

Electronic Theses and Dissertations

Open-Source software exists on everything from operating systems to daily productivity applications. In digital forensics, a very popular tool that is used to learn on and expand is Autopsy. Autopsy is known in the digital world due to its potential and wide usage. It is in many built packages of software inside the open-source world of applications. It is built into premade operating systems that are involved in Digital Forensics and Penetration Testing. Prebuilt OS includes Kali Linux and Computer Aided Investigative Environment (CAINE).

In the application to defend Open-Source software being just as good as closed-source software, I will …


Enhancing Cybersecurity For Unmanned Systems: A Comprehensive Literature Review, Jonathan Gabriel Mardoyan Aug 2024

Enhancing Cybersecurity For Unmanned Systems: A Comprehensive Literature Review, Jonathan Gabriel Mardoyan

Electronic Theses, Projects, and Dissertations

This culminating experience project addresses the pressing cybersecurity challenges encountered by unmanned autonomous vehicles. The research provides a comprehensive literature review on how hybrid encryption techniques can improve the security of its communication systems. The chosen research questions guiding this study are: (Q1) How can we enhance cybersecurity measures to safeguard the communication and transmission of sensitive data from unmanned systems, thereby preventing unauthorized access by malicious actors? (Q2) How can we ensure the confidentiality and integrity of messages exchanged with unmanned systems to a command-and-control center operating on the tactical edge? (Q3) How can hybrid encryption tackle the consumption …


Materials Data Science Ontology (Mds-Onto): Unifying Domain Knowledge In Materials And Applied Data Science, Van D. Tran, Jonathan E. Gordon, Alexander Harding Bradley, Balashanmuga Priyan Rajamohan, Quynh D. Tran, Gabriel Ponón, Yinghui Wu, Laura S. Bruckman, Erika I. Barcelos, Roger H. French Aug 2024

Materials Data Science Ontology (Mds-Onto): Unifying Domain Knowledge In Materials And Applied Data Science, Van D. Tran, Jonathan E. Gordon, Alexander Harding Bradley, Balashanmuga Priyan Rajamohan, Quynh D. Tran, Gabriel Ponón, Yinghui Wu, Laura S. Bruckman, Erika I. Barcelos, Roger H. French

Student Scholarship

Ontologies have gained popularity in the scientific community as a means of standardizing concepts and terminology used in metadata across different institutions to facilitate data comprehension, sharing, and reuse. Despite the existence of frameworks and guidelines for building ontologies, the processes and standards used to develop ontologies still differ significantly, particularly in Materials Science. Our goal with the MDS-Onto Framework is to provide a unified and automated system for ontology development in the Materials and Data Sciences. This framework offers recommendations on where to publish ontologies online, how to best integrate them within the semantic web, and which formats to …


Self-Chats From Large Language Models Make Small Emotional Support Chatbot Better, Zhonghua Zheng, Lizi Liao, Yang Deng, Libo Qin, Liqiang Nie Aug 2024

Self-Chats From Large Language Models Make Small Emotional Support Chatbot Better, Zhonghua Zheng, Lizi Liao, Yang Deng, Libo Qin, Liqiang Nie

Research Collection School Of Computing and Information Systems

Large Language Models (LLMs) have shown strong generalization abilities to excel in various tasks, including emotion support conversations. However, deploying such LLMs like GPT-3 (175B parameters) is resource-intensive and challenging at scale. In this study, we utilize LLMs as “Counseling Teacher” to enhance smaller models’ emotion support response abilities, significantly reducing the necessity of scaling up model size. To this end, we first introduce an iterative expansion framework, aiming to prompt the large teacher model to curate an expansive emotion support dialogue dataset. This curated dataset, termed ExTES, encompasses a broad spectrum of scenarios and is crafted with meticulous strategies …


Style: Improving Domain Transferability Of Asking Clarification Questions In Large Language Model Powered Conversational Agents, Yue Chen, Chen Huang, Yang Deng, Wenqiang Lei, Dingnan Jin, Jia Liu, Tat-Seng Chua Aug 2024

Style: Improving Domain Transferability Of Asking Clarification Questions In Large Language Model Powered Conversational Agents, Yue Chen, Chen Huang, Yang Deng, Wenqiang Lei, Dingnan Jin, Jia Liu, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Equipping a conversational search engine with strategies regarding when to ask clarification questions is becoming increasingly important across various domains. Attributing to the context understanding capability of LLMs and their access to domain-specific sources of knowledge, LLM-based clarification strategies feature rapid transfer to various domains in a posthoc manner. However, they still struggle to deliver promising performance on unseen domains, struggling to achieve effective domain transferability. We take the first step to investigate this issue and existing methods tend to produce one-size-fits-all strategies across diverse domains, limiting their search effectiveness. In response, we introduce a novel method, called STYLE, to …


Chain-Of-Exemplar: Enhancing Distractor Generation For Multimodal Educational Question Generation, Haohao Luo, Yang Deng, Ying Shen, See-Kiong Ng, Tat-Seng Chua Aug 2024

Chain-Of-Exemplar: Enhancing Distractor Generation For Multimodal Educational Question Generation, Haohao Luo, Yang Deng, Ying Shen, See-Kiong Ng, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Multiple-choice questions (MCQs) are important in enhancing concept learning and student engagement for educational purposes. Despite the multimodal nature of educational content, current methods focus mainly on text-based inputs and often neglect the integration of visual information. In this work, we study the problem of multimodal educational question generation, which aims at generating subject-specific educational questions with plausible yet incorrect distractors based on multimodal educational content. To tackle this problem, we introduce a novel framework, named Chain-of-Exemplar (CoE), which utilizes multimodal large language models (MLLMs) with Chain-of-Thought reasoning to improve the generation of challenging distractors. Furthermore, CoE leverages three-stage contextualized …


On The Multi-Turn Instruction Following For Conversational Web Agents, Yang Deng, Xuan Zhang, Wenxuan Zhang, Yifei Yuan, See-Kiong Ng, Tat-Seng Chua Aug 2024

On The Multi-Turn Instruction Following For Conversational Web Agents, Yang Deng, Xuan Zhang, Wenxuan Zhang, Yifei Yuan, See-Kiong Ng, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Web agents powered by Large Language Models (LLMs) have demonstrated remarkable abilities in planning and executing multi-step interactions within complex web-based environments, fulfilling a wide range of web navigation tasks. Despite these advancements, the potential for LLM-powered agents to effectively engage with sequential user instructions in real-world scenarios has not been fully explored. In this work, we introduce a new task of Conversational Web Navigation, which necessitates sophisticated interactions that span multiple turns with both the users and the environment, supported by a specially developed dataset named Multi-Turn Mind2Web (MT-Mind2Web). To tackle the limited context length of LLMs and the …


Watme: Towards Lossless Watermarking Through Lexical Redundancy, Liang Chen, Yatao Bian, Yang Deng, Deng Cai, Shuaiyi Li, Peilin Zhao, Kam-Fai Wong Aug 2024

Watme: Towards Lossless Watermarking Through Lexical Redundancy, Liang Chen, Yatao Bian, Yang Deng, Deng Cai, Shuaiyi Li, Peilin Zhao, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Text watermarking has emerged as a pivotal technique for identifying machine-generated text. However, existing methods often rely on arbitrary vocabulary partitioning during decoding to embed watermarks, which compromises the availability of suitable tokens and significantly degrades the quality of responses. This study assesses the impact of watermarking on different capabilities of large language models (LLMs) from a cognitive science lens. Our finding highlights a significant disparity; knowledge recall and logical reasoning are more adversely affected than language generation. These results suggest a more profound effect of watermarking on LLMs than previously understood. To address these challenges, we introduce Watermarking with …


Interpretable Tensor Fusion, Saurabh Varshneya, Antoine Ledent, Philipp Liznerski, Andriy Balinskyy, Purvanshi Mehta, Waleed Mustafa, Marius Kloft Aug 2024

Interpretable Tensor Fusion, Saurabh Varshneya, Antoine Ledent, Philipp Liznerski, Andriy Balinskyy, Purvanshi Mehta, Waleed Mustafa, Marius Kloft

Research Collection School Of Computing and Information Systems

Conventional machine learning methods are predominantly designed to predict outcomes based on a single data type. However, practical applications may encompass data of diverse types, such as text, images, and audio. We introduce interpretable tensor fusion (InTense), a multimodal learning method training a neural network to simultaneously learn multiple data representations and their interpretable fusion. InTense can separately capture both linear combinations and multiplicative interactions of the data types, thereby disentangling higher-order interactions from the individual effects of each modality. InTense provides interpretability out of the box by assigning relevance scores to modalities and their associations, respectively. The approach is …


Exploring The Integration Of Blockchain In Iot Use Cases: Challenges And Opportunities, Ivannah George Aug 2024

Exploring The Integration Of Blockchain In Iot Use Cases: Challenges And Opportunities, Ivannah George

Electronic Theses, Projects, and Dissertations

Blockchain and The Internet of Things (IoT) is a significant paradigm which has gained traction in today’s digital age as two complimentary technologies. The combination of IoT's connectivity with blockchain's security creates new opportunities and solves problems associated with centralized systems. This culminating project aims to delve deeper into the integration of blockchain technology in IoT applications based on select use cases to uncover potential benefits and significant challenges of blockchain integration across different sectors. The research objectives to be addressed are: (RO1) How emerging vulnerabilities manifest in the implementation of blockchain within current IoT ecosystems. (RO2) How current opportunities …


Nonfactoid Question Answering As Query-Focused Summarization With Graph-Enhanced Multihop Inference, Yang Deng, Wenxuan Zhang, Weiwen Xu, Ying Shen, Wai Lam Aug 2024

Nonfactoid Question Answering As Query-Focused Summarization With Graph-Enhanced Multihop Inference, Yang Deng, Wenxuan Zhang, Weiwen Xu, Ying Shen, Wai Lam

Research Collection School Of Computing and Information Systems

Nonfactoid question answering (QA) is one of the most extensive yet challenging applications and research areas in natural language processing (NLP). Existing methods fall short of handling the long-distance and complex semantic relations between the question and the document sentences. In this work, we propose a novel query-focused summarization method, namely a graph-enhanced multihop query-focused summarizer (GMQS), to tackle the nonfactoid QA problem. Specifically, we leverage graph-enhanced reasoning techniques to elaborate the multihop inference process in nonfactoid QA. Three types of graphs with different semantic relations, namely semantic relevance, topical coherence, and coreference linking, are constructed for explicitly capturing the …


Causvsr: Causality Inspired Visual Sentiment Recognition, Xinyue Zhang, Zhaoxia Wang, Hailing Wang, Jing Xiang, Chunwei Wu, Guitao Cao Aug 2024

Causvsr: Causality Inspired Visual Sentiment Recognition, Xinyue Zhang, Zhaoxia Wang, Hailing Wang, Jing Xiang, Chunwei Wu, Guitao Cao

Research Collection School Of Computing and Information Systems

Visual Sentiment Recognition (VSR) is an evolving field that aims to detect emotional tendencieswithin visual content. Despite its growing significance, detecting emotions depicted in visual content,such as images, faces challenges, notably the emergence of misleading or spurious correlationsof the contextual information. In response to these challenges, we propose a causality inspired VSRapproach, called CausVSR. CausVSR is rooted in the fundamental principles of Emotional Causalitytheory, mimicking the human process from receiving emotional stimuli to deriving emotional states.CausVSR takes a deliberate stride toward conquering the VSR challenges. It harnesses the power of astructural causal model, intricately designed to encapsulate the dynamic causal …


Clamber: A Benchmark Of Identifying And Clarifying Ambiguous Information Needs In Large Language Models, Tong Zhang, Peixin Qin, Yang Deng, Chen Huang, Wenqiang Lei, Junhong Liu, Dingnan Jin, Hongru Liang, Tat-Seng Chua Aug 2024

Clamber: A Benchmark Of Identifying And Clarifying Ambiguous Information Needs In Large Language Models, Tong Zhang, Peixin Qin, Yang Deng, Chen Huang, Wenqiang Lei, Junhong Liu, Dingnan Jin, Hongru Liang, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Large language models (LLMs) are increasingly used to meet user information needs, but their effectiveness in dealing with user queries that contain various types of ambiguity remains unknown, ultimately risking user trust and satisfaction. To this end, we introduce CLAMBER, a benchmark for evaluating LLMs using a well-organized taxonomy. Building upon the taxonomy, we construct 12K high-quality data to assess the strengths, weaknesses, and potential risks of various off-the-shelf LLMs.Our findings indicate the limited practical utility of current LLMs in identifying and clarifying ambiguous user queries, even enhanced by chain-of-thought (CoT) and few-shot prompting. These techniques may result in overconfidence …


Prompt Tuning On Graph-Augmented Low-Resource Text Classification, Zhihao Wen, Yuan Fang Aug 2024

Prompt Tuning On Graph-Augmented Low-Resource Text Classification, Zhihao Wen, Yuan Fang

Research Collection School Of Computing and Information Systems

Text classification is a fundamental problem in information retrieval with many real-world applications, such as predicting the topics of online articles and the categories of e-commerce product descriptions. However, low-resource text classification, with no or few labeled samples, presents a serious concern for supervised learning. Meanwhile, many text data are inherently grounded on a network structure, such as a hyperlink/citation network for online articles, and a user-item purchase network for e-commerce products. These graph structures capture rich semantic relationships, which can potentially augment low-resource text classification. In this paper, we propose a novel model called Graph-Grounded Pre-training and Prompting (G2P2) …


Hierarchical Neural Constructive Solver For Real-World Tsp Scenarios, Yong Liang Goh, Zhiguang Cao, Yining Ma, Yanfei Dong, Mohammed Haroon Dupty, Wee Sun Lee Aug 2024

Hierarchical Neural Constructive Solver For Real-World Tsp Scenarios, Yong Liang Goh, Zhiguang Cao, Yining Ma, Yanfei Dong, Mohammed Haroon Dupty, Wee Sun Lee

Research Collection School Of Computing and Information Systems

Existing neural constructive solvers for routing problems have predominantly employed transformer architectures, conceptualizing the route construction as a set-to-sequence learning task. However, their efficacy has primarily been demonstrated on entirely random problem instances that inadequately capture real-world scenarios. In this paper, we introduce realistic Traveling Salesman Problem (TSP) scenarios relevant to industrial settings and derive the following insights: (1) The optimal next node (or city) to visit often lies within proximity to the current node, suggesting the potential benefits of biasing choices based on current locations. (2) Effectively solving the TSP requires robust tracking of unvisited nodes and warrants succinct …


Increasing The Robustness Of Machine Learning By Adversarial Attacks, Gourab Mukhopadhyay Jul 2024

Increasing The Robustness Of Machine Learning By Adversarial Attacks, Gourab Mukhopadhyay

Theses and Dissertations

By perturbation or physical attacks any machine can be fooled into predicting something else other than the intended output. There are training data based on which the model is trained to predict unknown things. The objective was to create noises and shades of different levels on the images and do experiments for measuring accuracy and making the model classify the traffic signs. When it comes to adding shades to the pictures, pixels were modified for three different layers of the pictures. The experiment also shows that with the shadows getting deeper, the accuracies drop significantly. Here, some changes in pixels …


Smart Airports: Artificial Intelligence–Enabled Internet Of Things Networks Using Blockchain Technology, Edwin Ongola Jul 2024

Smart Airports: Artificial Intelligence–Enabled Internet Of Things Networks Using Blockchain Technology, Edwin Ongola

Journal of Aviation Technology and Engineering

This article provides a perspective on how an internet of heterogeneous self-service airport terminal systems can be used for data collection, which is stored on a private or consortium blockchain depending on the ownership or operations of an airport or both. Such a setup would help to increase efficiency, reduce costs, and improve traveler experience at airport terminals. Moreover, it would allow airports to gather data directly from passengers as opposed to waiting to receive the same data from airlines. Subsequently, this data, now on a blockchain system, becomes a data source for other applications such as machine learning. In …


Memetic Memory As Vital Conduits Of Troublemakers In Digital Culture, Alexander O. Smith, Jordan Loewen-Colón Jul 2024

Memetic Memory As Vital Conduits Of Troublemakers In Digital Culture, Alexander O. Smith, Jordan Loewen-Colón

School of Information Studies - Post-doc and Student Scholarship

Recent fears of data capitalism and colonialism often argue using implicit assumptions about cybernetic technology’s ability to automate data about culture. As such, the level of data granularity made possible by cybernetic engineering can be used to dominate society and culture. Here we unpack these implicit assumptions about the datafication of culture through memes, which both act as cultural data and cultural memory. Using Alexander Galloway’s critical method of protocological analysis and descriptions of media tactics, we respond to fears of cybernetic domination. Protocols – the source by which cybernetic technologies enable automated datafication – enables us to respond to …


Vysion Software, Isaias Hernandez-Dominguez Jr, Chander Luderman Miller Jul 2024

Vysion Software, Isaias Hernandez-Dominguez Jr, Chander Luderman Miller

2024 Symposium

Vision loss presents significant challenges in daily life. Existing solutions for blind and visually impaired individuals are often limited in functionality, expensive, or complex to use. Vysion Software addresses this gap by developing a user-friendly, all-in-one AI companion app that provides features including text summarization, real-time audio descriptions, and AI-enhanced navigation. This project details the development plan, initial functionalities, and future vision for Vysion Software.


Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang Jul 2024

Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang

Research Collection School Of Computing and Information Systems

In the age of rapid internet expansion, social media platforms like Twitter have become crucial for sharing information, expressing emotions, and revealing intentions during crisis situations. They offer crisis responders a means to assess public sentiment, attitudes, intentions, and emotional shifts by monitoring crisis-related tweets. To enhance sentiment and emotion classification, we adopt a transformer-based multi-task learning (MTL) approach with attention mechanism, enabling simultaneous handling of both tasks, and capitalizing on task interdependencies. Incorporating attention mechanism allows the model to concentrate on important words that strongly convey sentiment and emotion. We compare three baseline models, and our findings show that …


Comparative Analysis Of Hate Speech Detection: Traditional Vs. Deep Learning Approaches, Haibo Pen, Nicole Anne Huiying Teo, Zhaoxia Wang Jul 2024

Comparative Analysis Of Hate Speech Detection: Traditional Vs. Deep Learning Approaches, Haibo Pen, Nicole Anne Huiying Teo, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Detecting hate speech on social media poses a significant challenge, especially in distinguishing it from offensive language, as learning-based models often struggle due to nuanced differences between them, which leads to frequent misclassifications of hate speech instances, with most research focusing on refining hate speech detection methods. Thus, this paper seeks to know if traditional learning-based methods should still be used, considering the perceived advantages of deep learning in this domain. This is done by investigating advancements in hate speech detection. It involves the utilization of deep learning-based models for detailed hate speech detection tasks and compares the results with …


Performance Analysis Of Llama 2 Among Other Llms, Donghao Huang, Zhenda Hu, Zhaoxia Wang Jul 2024

Performance Analysis Of Llama 2 Among Other Llms, Donghao Huang, Zhenda Hu, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Llama 2, an open-source large language model developed by Meta, offers a versatile and high-performance solution for natural language processing, boasting a broad scale, competitive dialogue capabilities, and open accessibility for research and development, thus driving innovation in AI applications. Despite these advancements, there remains a limited understanding of the underlying principles and performance of Llama 2 compared with other LLMs. To address this gap, this paper presents a comprehensive evaluation of Llama 2, focusing on its application in in-context learning — an AI design pattern that harnesses pre-trained LLMs for processing confidential and sensitive data. Through a rigorous comparative …