Open Access. Powered by Scholars. Published by Universities.®
Artificial Intelligence and Robotics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Graphics and Human Computer Interfaces (8)
- Engineering (7)
- Software Engineering (7)
- Computer Engineering (6)
- Theory and Algorithms (5)
-
- Information Security (4)
- Other Computer Sciences (3)
- Programming Languages and Compilers (3)
- Data Storage Systems (2)
- Digital Communications and Networking (2)
- Medicine and Health Sciences (2)
- Numerical Analysis and Scientific Computing (2)
- Robotics (2)
- Service Learning (2)
- Social and Behavioral Sciences (2)
- Sociology (2)
- Bioimaging and Biomedical Optics (1)
- Biomedical Engineering and Bioengineering (1)
- Computational Neuroscience (1)
- Computer and Systems Architecture (1)
- Controls and Control Theory (1)
- Data Science (1)
- Databases and Information Systems (1)
- Electrical and Computer Engineering (1)
- Life Sciences (1)
- Medical Specialties (1)
- Neuroscience and Neurobiology (1)
- Keyword
-
- Artificial intelligence (2)
- Computer vision (2)
- Deep learning (2)
- Game design (2)
- Machine learning (2)
-
- Natural Language Processing (2)
- Service Learning (2)
- 2D materials (1)
- AGC (1)
- Abusive Language (1)
- Address Space Layout Randomization (ASLR) (1)
- Allocation/Deallocation (1)
- Anomaly Detection (1)
- Audition (1)
- Auditory science (1)
- Automatic Generation Control (1)
- BERT (1)
- Bioinformatics (1)
- Computer (1)
- Contrastive learning (1)
- Convolution Neural Networks (1)
- Deep neural network (1)
- Distributed intelligence (1)
- Ed Munson algorithm (1)
- Electric power (1)
- Estimation (1)
- Exploit (1)
- Federated learning (1)
- Flake detection (1)
- Flake hunting (1)
Articles 1 - 22 of 22
Full-Text Articles in Artificial Intelligence and Robotics
Characterization Of 2d Quantum Materials Using Ai And Large-Scale Quantum Data Collection, Apoorva Bisht
Characterization Of 2d Quantum Materials Using Ai And Large-Scale Quantum Data Collection, Apoorva Bisht
Computer Science and Computer Engineering Undergraduate Honors Theses
2D materials like hexagonal boron nitride, graphene, and tungsten diselenide are widely utilized for studying their unique mechanical and opto-electronic properties to exploit them to make transistors and fabricating a variety of other devices. All these applications require that the 2D materials used be of specific uniform thickness. Until very recently, this process has been largely manual and tedious. However, few applications exploit the characteristic color-to-thickness correspondence of these near-transparent materials. To continue this effort, in this work we create a large-scale dataset for three different materials (hBN, graphene, and WSe$_2$) to train and test an image segmentation model along …
Analysis Of A Federated Learning Framework For Heterogeneous Medical Image Data: Privacy And Performance Perspective, Julia Brixey
Analysis Of A Federated Learning Framework For Heterogeneous Medical Image Data: Privacy And Performance Perspective, Julia Brixey
Computer Science and Computer Engineering Undergraduate Honors Theses
The massive amount of data available in our modern world and the increase of computational efficiency and power have allowed for great advancements in several fields such as computer vision, image processing, and natural languages. At the center of these advancements lies a data-centric learning approach termed deep learning. However, in the medical field, the application of deep learning comes with many challenges. Some of the fundamental challenges are the lack of massive training datasets, unbalanced and heterogenous data between health applications and health centers, security and privacy concerns, and the high cost of wrong inference and prediction. One of …
Chicken Keypoint Estimation, Rohit Kala
Chicken Keypoint Estimation, Rohit Kala
Computer Science and Computer Engineering Undergraduate Honors Theses
Poultry is an important food source across the world. To facilitate the growth of the global population, we must also improve methods to oversee poultry with new and emerging technologies to improve the efficiency of poultry farms as well as the welfare of the birds. The technology we explore is Deep Learning methods and Computer Vision to help automate chicken monitoring using technologies such as Mask R-CNN to detect the posture of the chicken from an RGB camera. We use Meta Research's Detectron 2 to implement the Mask R-CNN model to train on our dataset created on videos of chickens …
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Computer Science and Computer Engineering Undergraduate Honors Theses
The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler
Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler
Computer Science and Computer Engineering Undergraduate Honors Theses
Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …
Semi-Supervised Spatial-Temporal Feature Learning On Anomaly-Based Network Intrusion Detection, Huy Mai
Semi-Supervised Spatial-Temporal Feature Learning On Anomaly-Based Network Intrusion Detection, Huy Mai
Computer Science and Computer Engineering Undergraduate Honors Theses
Due to a rapid increase in network traffic, it is growing more imperative to have systems that detect attacks that are both known and unknown to networks. Anomaly-based detection methods utilize deep learning techniques, including semi-supervised learning, in order to effectively detect these attacks. Semi-supervision is advantageous as it doesn't fully depend on the labelling of network traffic data points, which may be a daunting task especially considering the amount of traffic data collected. Even though deep learning models such as the convolutional neural network have been integrated into a number of proposed network intrusion detection systems in recent years, …
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Computer Science and Computer Engineering Undergraduate Honors Theses
Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …
City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke
City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke
Computer Science and Computer Engineering Undergraduate Honors Theses
Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to create a …
Using Deep Learning To Analyze Materials In Medical Images, Carson Molder
Using Deep Learning To Analyze Materials In Medical Images, Carson Molder
Computer Science and Computer Engineering Undergraduate Honors Theses
Modern deep learning architectures have become increasingly popular in medicine, especially for analyzing medical images. In some medical applications, deep learning image analysis models have been more accurate at predicting medical conditions than experts. Deep learning has also been effective for material analysis on photographs. We aim to leverage deep learning to perform material analysis on medical images. Because material datasets for medicine are scarce, we first introduce a texture dataset generation algorithm that automatically samples desired textures from annotated or unannotated medical images. Second, we use a novel Siamese neural network called D-CNN to predict patch similarity and build …
A Capacitive Sensing Gym Mat For Exercise Classification & Tracking, Adam Goertz
A Capacitive Sensing Gym Mat For Exercise Classification & Tracking, Adam Goertz
Computer Science and Computer Engineering Undergraduate Honors Theses
Effective monitoring of adherence to at-home exercise programs as prescribed by physiotherapy protocols is essential to promoting effective rehabilitation and therapeutic interventions. Currently physical therapists and other health professionals have no reliable means of tracking patients' progress in or adherence to a prescribed regimen. This project aims to develop a low-cost, privacy-conserving means of monitoring at-home exercise activity using a gym mat equipped with an array of capacitive sensors. The ability of the mat to classify different types of exercises was evaluated using several machine learning models trained on an existing dataset of physiotherapy exercises.
Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown
Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown
Computer Science and Computer Engineering Undergraduate Honors Theses
The focus of this project was to shorten the time it takes to train reinforcement learning agents to perform better than humans in a sparse reward environment. Finding a general purpose solution to this problem is essential to creating agents in the future capable of managing large systems or performing a series of tasks before receiving feedback. The goal of this project was to create a transition function between an imitation learning algorithm (also referred to as a behavioral cloning algorithm) and a reinforcement learning algorithm. The goal of this approach was to allow an agent to first learn to …
Identifying Privacy Policy In Service Terms Using Natural Language Processing, Ange-Thierry Ishimwe
Identifying Privacy Policy In Service Terms Using Natural Language Processing, Ange-Thierry Ishimwe
Computer Science and Computer Engineering Undergraduate Honors Theses
Ever since technology (tech) companies realized that people's usage data from their activities on mobile applications to the internet could be sold to advertisers for a profit, it began the Big Data era where tech companies collect as much data as possible from users. One of the benefits of this new era is the creation of new types of jobs such as data scientists, Big Data engineers, etc. However, this new era has also raised one of the hottest topics, which is data privacy. A myriad number of complaints have been raised on data privacy, such as how much access …
Speech Processing In Computer Vision Applications, Nicholas Waterworth
Speech Processing In Computer Vision Applications, Nicholas Waterworth
Computer Science and Computer Engineering Undergraduate Honors Theses
Deep learning has been recently proven to be a viable asset in determining features in the field of Speech Analysis. Deep learning methods like Convolutional Neural Networks facilitate the expansion of specific feature information in waveforms, allowing networks to create more feature dense representations of data. Our work attempts to address the problem of re-creating a face given a speaker's voice and speaker identification using deep learning methods. In this work, we first review the fundamental background in speech processing and its related applications. Then we introduce novel deep learning-based methods to speech feature analysis. Finally, we will present our …
Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox
Incorporating Word Order Explicitly In Glove Word Embedding, Brandon Cox
Computer Science and Computer Engineering Undergraduate Honors Theses
Word embedding is the process of representing words from a corpus of text as real number vectors. These vectors are often derived from frequency statistics from the source corpus. In the GloVe model as proposed by Pennington et al., these vectors are generated using a word-word cooccurrence matrix. However, the GloVe model fails to explicitly take into account the order in which words appear within the contexts of other words. In this paper, multiple methods of incorporating word order in GloVe word embeddings are proposed. The most successful method involves directly concatenating several word vector matrices for each position in …
Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss
Learning-Based Analysis On The Exploitability Of Security Vulnerabilities, Adam Bliss
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this thesis is to develop a tool that uses machine learning techniques to make predictions about whether or not a given vulnerability will be exploited. Such a tool could help organizations such as electric utilities to prioritize their security patching operations. Three different models, based on a deep neural network, a random forest, and a support vector machine respectively, are designed and implemented. Training data for these models is compiled from a variety of sources, including the National Vulnerability Database published by NIST and the Exploit Database published by Offensive Security. Extensive experiments are conducted, including testing …
Music Feature Matching Using Computer Vision Algorithms, Mason Hollis
Music Feature Matching Using Computer Vision Algorithms, Mason Hollis
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper seeks to establish the validity and potential benefits of using existing computer vision techniques on audio samples rather than traditional images in order to consistently and accurately identify a song of origin from a short audio clip of potentially noisy sound. To do this, the audio sample is first converted to a spectrogram image, which is used to generate SURF features. These features are compared against a database of features, which have been previously generated in a similar fashion, in order to find the best match. This algorithm has been implemented in a system that can run as …
Inferring Intrinsic Beliefs Of Digital Images Using A Deep Autoencoder, Seok H. Lee
Inferring Intrinsic Beliefs Of Digital Images Using A Deep Autoencoder, Seok H. Lee
Computer Science and Computer Engineering Undergraduate Honors Theses
Training a system of artificial neural networks on digital images is a big challenge. Often times digital images contain a large amount of information and values for artificial neural networks to understand. In this work, the inference model is proposed in order to absolve this problem. The inference model is composed of a parameterized autoencoder that endures the loss of information caused by the rescaling of images and transition model that predicts the effect of an action on the observation. To test the inference model, the images of a moving robotic arm were given as the data set. The inference …
Improving Electroencephalography-Based Imagined Speech Recognition With A Simultaneous Video Data Stream, Sarah J. Stolze
Improving Electroencephalography-Based Imagined Speech Recognition With A Simultaneous Video Data Stream, Sarah J. Stolze
Computer Science and Computer Engineering Undergraduate Honors Theses
Electroencephalography (EEG) devices offer a non-invasive mechanism for implementing imagined speech recognition, the process of estimating words or commands that a person expresses only in thought. However, existing methods can only achieve limited predictive accuracy with very small vocabularies; and therefore are not yet sufficient to enable fluid communication between humans and machines. This project proposes a new method for improving the ability of a classifying algorithm to recognize imagined speech recognition, by collecting and analyzing a large dataset of simultaneous EEG and video data streams. The results from this project suggest confirmation that complementing high-dimensional EEG data with similarly …
Ant Colony Optimization For Continuous Spaces, Rachel Findley
Ant Colony Optimization For Continuous Spaces, Rachel Findley
Computer Science and Computer Engineering Undergraduate Honors Theses
Ant Colony Optimization (ACO) is an optimization algorithm designed to find semi-optimal solutions to Combinatorial Optimization Problems. The challenge of modifying this algorithm to effectively optimize over a continuous domain is one that has been tackled by several researchers. In this paper, ACO has been modified to use several variations of the algorithm for continuous spaces. An aspect of ACO which is crucial to its success when optimizing over a continuous space is choosing the appropriate object (solution component) out of an infinite set to add to the ant's path. This step is highly important in shaping good solutions. Important …
Using Genetic Learning In Weight-Based Game Ai, Dylan Anthony Kordsmeier
Using Genetic Learning In Weight-Based Game Ai, Dylan Anthony Kordsmeier
Computer Science and Computer Engineering Undergraduate Honors Theses
Human beings have been playing games for centuries, and over time, mankind has learned how to excel at these fun competitions. With the ever-growing interest in the field of Machine Learning and Artificial Intelligence (AI), developers have been finding ways to let the game compete against the player much like another human would. While there are many approaches to humanlike learning in machines, this article will focus on using Evolutionary Optimization as a method to develop different levels of pseudo-thinking inan AI used for ato effectively play the Connect Four game.