Open Access. Powered by Scholars. Published by Universities.®
Programming Languages and Compilers Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (3)
- University of Arkansas, Fayetteville (3)
- California Polytechnic State University, San Luis Obispo (2)
- Singapore Management University (2)
- The University of Akron (2)
-
- American University in Cairo (1)
- California State University, San Bernardino (1)
- Embry-Riddle Aeronautical University (1)
- James Madison University (1)
- Munster Technological University (1)
- Murray State University (1)
- Nova Southeastern University (1)
- Ouachita Baptist University (1)
- San Jose State University (1)
- Southeastern University (1)
- St. Cloud State University (1)
- University of New Orleans (1)
- University of North Florida (1)
- University of Texas at Tyler (1)
- William & Mary (1)
- Keyword
-
- Artificial intelligence (3)
- Machine Learning (3)
- Artificial Intelligence (2)
- Natural Language Processing (2)
- ACL2 (1)
-
- AI (1)
- ALGOL computer language (1)
- Abusive Language (1)
- Affective framework (1)
- Alan Turing (1)
- Algorithms (1)
- Automated evaluation (1)
- Autonomous flight (1)
- BERT (1)
- Code analysis (1)
- Code2vec (1)
- Comment Classification (1)
- Communication (1)
- Computer Science (1)
- Computer crime (1)
- Computer generalized music (1)
- Computer hacking (1)
- Computer vision (1)
- Computers (1)
- Computers and Music (1)
- Computers and information (1)
- Conversational Agent (1)
- Count Data (1)
- Countermeasures (1)
- Cyber espionage (1)
- Publication Year
- Publication
-
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
- Dissertations and Theses Collection (Open Access) (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Master's Theses (2)
- Williams Honors College, Honors Research Projects (2)
-
- CCE Theses and Dissertations (1)
- Computer Science Theses & Dissertations (1)
- Culminating Projects in English (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical Engineering Theses (1)
- Electronic Theses, Projects, and Dissertations (1)
- Honors College Theses (1)
- Honors Theses (1)
- Master's Projects (1)
- Masters Theses, 2020-current (1)
- Selected Honors Theses (1)
- Theses (1)
- Theses and Dissertations (1)
- UNF Graduate Theses and Dissertations (1)
- Undergraduate Honors Theses (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 27 of 27
Full-Text Articles in Programming Languages and Compilers
Who Wrote The Scientific News? Improving The Discernibility Of Llms To Human-Written Scientific News, Dominik Soós
Who Wrote The Scientific News? Improving The Discernibility Of Llms To Human-Written Scientific News, Dominik Soós
Computer Science Theses & Dissertations
Large Language Models (LLMs) have rapidly advanced the field of Natural Language Processing and become powerful tools for generating and evaluating scientific text. Although LLMs have demonstrated promising as evaluators for certain text generation tasks, there is still a gap until they are used as reliable text evaluators for general purposes. In this thesis project, I attempted to fill this gap by examining the discernibility of LLMs from human-written and LLM-generated scientific news. This research demonstrated that although it was relatively straightforward for humans to discern scientific news written by humans from scientific news generated by GPT-3.5 using basic prompts, …
Towards Faster Inference Of Transformers: Strategies For Accelerating Decoding Processes, Cunxiao Du
Towards Faster Inference Of Transformers: Strategies For Accelerating Decoding Processes, Cunxiao Du
Dissertations and Theses Collection (Open Access)
This thesis delves into the acceleration and optimization of Transformer inference, a subject of increasing importance with the emergence of Large Language Models (LLMs). The study primarily addresses the challenges posed by two inherent properties of Transformers during inference: the quadratic complexity of the attention mechanism and the sequential nature of autoregressive inference. The research is structured into three main parts. The first part enhances the learning capabilities of non-autoregressive Transformers, achieving a remarkable 15.0x acceleration on machine translation tasks. The following section focuses on lossless acceleration through speculative decoding, where the proposed algorithm, Glide with CAPE, is shown to …
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
University of New Orleans Theses and Dissertations
This study compares the performance of deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Transformer, in predicting stock prices across five companies (AAPL, CSCO, META, MSFT, and TSLA) from July 2019 to July 2023. Key findings reveal that GRU models generally exhibit the lowest Mean Absolute Error (MAE), indicating higher precision, particularly notable for CSCO with a remarkably low MAE. While LSTM models often show slightly higher MAE values, they outperform Transformer models in capturing broader trends and variance in stock prices, as evidenced by higher R-squared (R2) values. Transformer models generally exhibit higher MAE …
Code For Care: Hypertension Prediction In Women Aged 18-39 Years, Kruti Sheth
Code For Care: Hypertension Prediction In Women Aged 18-39 Years, Kruti Sheth
Electronic Theses, Projects, and Dissertations
The longstanding prevalence of hypertension, often undiagnosed, poses significant risks of severe chronic and cardiovascular complications if left untreated. This study investigated the causes and underlying risks of hypertension in females aged between 18-39 years. The research questions were: (Q1.) What factors affect the occurrence of hypertension in females aged 18-39 years? (Q2.) What machine learning algorithms are suited for effectively predicting hypertension? (Q3.) How can SHAP values be leveraged to analyze the factors from model outputs? The findings are: (Q1.) Performing Feature selection using binary classification Logistic regression algorithm reveals an array of 30 most influential factors at an …
Code Syntax Understanding In Large Language Models, Cole Granger
Code Syntax Understanding In Large Language Models, Cole Granger
Undergraduate Honors Theses
In recent years, tasks for automated software engineering have been achieved using Large Language Models trained on source code, such as Seq2Seq, LSTM, GPT, T5, BART and BERT. The inherent textual nature of source code allows it to be represented as a sequence of sub-words (or tokens), drawing parallels to prior work in NLP. Although these models have shown promising results according to established metrics (e.g., BLEU, CODEBLEU), there remains a deeper question about the extent of syntax knowledge they truly grasp when trained and fine-tuned for specific tasks.
To address this question, this thesis introduces a taxonomy of syntax …
Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito
Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito
Doctoral Dissertations and Master's Theses
The increasing reliance on Global Positioning System (GPS) technology across various sectors has exposed vulnerabilities to malicious attacks, particularly GPS jamming and spoofing. This thesis presents an analysis into detection and mitigation strategies for enhancing the resilience of GPS receivers against jamming and spoofing attacks. The research entails the development of a simulated GPS signal and a receiver model to accurately decode and extract information from simulated GPS signals. The study implements the generation of jammed and spoofed signals to emulate potential threats faced by GPS receivers in practical settings. The core innovation lies in the integration of machine learning …
Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson
Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson
Master's Theses
Due to the difficulty of obtaining formal proofs, there is increasing interest in partially or completely automating proof search in interactive theorem provers. Despite being a theorem prover with an active community and plentiful corpus of 170,000+ theorems, no deep learning system currently exists to help automate theorem proving in ACL2. We have developed a machine learning system that generates recommendations to automatically complete proofs. We show that our system benefits from the copy mechanism introduced in the context of program repair. We make our system directly accessible from within ACL2 and use this interface to evaluate our system in …
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
UNF Graduate Theses and Dissertations
Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.
One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …
Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy
Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy
Dissertations and Theses Collection (Open Access)
In this thesis, we study new variants of routing and scheduling problems motivated by real-world problems from the urban logistics and law enforcement domains. In particular, we focus on two key aspects: dynamic and multi-agent. While routing problems such as the Vehicle Routing Problem (VRP) is well-studied in the Operations Research (OR) community, we know that in real-world route planning today, initially-planned route plans and schedules may be disrupted by dynamically-occurring events. In addition, routing and scheduling plans cannot be done in silos due to the presence of other agents which may be independent and self-interested. These requirements create …
Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack
Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack
Honors College Theses
Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Computer Science and Computer Engineering Undergraduate Honors Theses
The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …
The Impact Of Programming Language’S Type On Probabilistic Machine Learning Models, Sherif Elsaid
The Impact Of Programming Language’S Type On Probabilistic Machine Learning Models, Sherif Elsaid
Master's Projects
Software development is an expensive and difficult process. Mistakes can be easily made, and without extensive review process, those mistakes can make it to the production code and may have unintended disastrous consequences.
This is why various automated code review services have arisen in the recent years. From AWS’s CodeGuro and Microsoft’s Code Analysis to more integrated code assistants, like IntelliCode and auto completion tools. All of which are designed to help and assist the developers with their work and help catch overlooked bugs.
Thanks to recent advances in machine learning, these services have grown tremen- dously in sophistication to …
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Theses and Dissertations
Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.
Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …
City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke
City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke
Computer Science and Computer Engineering Undergraduate Honors Theses
Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to create a …
Source Code Comment Classification Artificial Intelligence, Cole Sutyak
Source Code Comment Classification Artificial Intelligence, Cole Sutyak
Williams Honors College, Honors Research Projects
Source code comment classification is an important problem for future machine learning solutions. In particular, supervised machine learning solutions that have largely subjective data labels but are difficult to obtain the labels for. Machine learning problems are problems largely because of a lack of data. In machine learning solutions, it is better to have a large amount of mediocre data than it is to have a small amount of good data. While the mediocre data might not produce the best accuracy, it produces the best results because there is much more to learn from the problem.
In this project, data …
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
Electrical Engineering Theses
An increase in the number of working parents has led to a higher demand for remotely monitoring activities of babies through baby monitors. The baby monitors vary from simple audio and video monitoring frameworks to advance applications where we can integrate sensors for tracking vital signs such as heart rate, respiratory rate monitoring. The Internet of Things (IoT) is a network of devices where each device can is recognizable in the network. The IoT node is a sensor or device, which primarily functions as a data acquisition unit. The data acquired through the IoT nodes are wirelessly transmitted to the …
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
Masters Theses, 2020-current
Code stylometry is applying analysis techniques to a collection of source code or binaries to determine variations in style. The variations extracted are often used to identify the author of the text or to differentiate one piece from another.
In this research, we were able to create a multi-input deep learning model that could accurately categorize and group code from multiple projects. The deep learning model took as input word-based tokenization for code comments, character-based tokenization for the source code text, and the metadata features described by A. Caliskan-Islam et al. Using these three inputs, we were able to achieve …
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …
Artificial Intelligence: An Analysis Of Alan Turing’S Role In The Conception And Development Of Intelligent Machinery, Erika L. Furtado
Artificial Intelligence: An Analysis Of Alan Turing’S Role In The Conception And Development Of Intelligent Machinery, Erika L. Furtado
Selected Honors Theses
The purpose of this thesis is to follow the thread of Alan Turing’s ideas throughout his decades of research and analyze how his predictions have come to fruition over the years. Turing’s Computing Machinery and Intelligence is the paper in which the Turing Test is described as an alternative way to answer the question “can machines think?” (Turing 433). Since the development of Turing’s original paper, there has been a tremendous amount of advancement in the field of artificial intelligence. The field has made its way into art classification as well as the medical industry. The main concept researched in …
Elephant 2000: A Programming Language For Remembering The Past And Building On It, Kerry J. Holmes
Elephant 2000: A Programming Language For Remembering The Past And Building On It, Kerry J. Holmes
Williams Honors College, Honors Research Projects
Elephant 2000 is a programming language to specify programs that accept user speech as text inputs and outputs speech text. The inputs and outputs are based on Dialogue Act theory which describes several forms of speech outputs, such as requests, questions, and answers. The language also relies on Named Entity Recognition to determine what types of objects a user references. These entities include persons, locations, times and so on. Using these attributes of user speech, a program is able to perform simple rule matching and pattern recognition to respond to input. The result is a programming language with English like …
Alternative Approaches To Correction Of Malapropisms In Aiml Based Conversational Agents, Walter A. Brock
Alternative Approaches To Correction Of Malapropisms In Aiml Based Conversational Agents, Walter A. Brock
CCE Theses and Dissertations
The use of Conversational Agents (CAs) utilizing Artificial Intelligence Markup Language (AIML) has been studied in a number of disciplines. Previous research has shown a great deal of promise. It has also documented significant limitations in the abilities of these CAs. Many of these limitations are related specifically to the method employed by AIML to resolve ambiguities in the meaning and context of words. While methods exist to detect and correct common errors in spelling and grammar of sentences and queries submitted by a user, one class of input error that is particularly difficult to detect and correct is the …
Functional Reactive Musical Performers, Justin M. Phillips
Functional Reactive Musical Performers, Justin M. Phillips
Master's Theses
Computers have been assisting in recording, sound synthesis and other fields of music production for quite some time. The actual performance of music continues to be an area in which human players are chosen over computer performers. Musical performance is an area in which personalization is more important than consistency. Human players play with each other, reacting to phrases and ideas created by the players that they are playing with. Computer performers lack the ability to react to the changes in the performance that humans perceive naturally, giving the human players an advantage over the computer performers.
This thesis creates …
Rapid Prototyping For The Design Of Virtual Worlds, Prabhu V. Krishnan
Rapid Prototyping For The Design Of Virtual Worlds, Prabhu V. Krishnan
Electrical & Computer Engineering Theses & Dissertations
Development of Virtual Reality (VR) applications is challenging where application developers are required to have expertise in the target VR technologies along with the problem domain expertise. New VR technologies impose a significant learning curve to even the most experienced VR developer. The proposed solution relies on synthesis to automate the migration of a VR application to a new unfamiliar VR platform/technology. To solve the problem, the Common Scene Definition Framework (CSDF) was developed, that serves as a superset/model representation of the target virtual world. Input modules were developed to populate the framework with the capabilities of the virtual world …
An Investigation Into The Concepts And Applicability Of Agent Technologies, Anne White
An Investigation Into The Concepts And Applicability Of Agent Technologies, Anne White
Theses
The software world is one of great richness and diversity
Even though the concept of software agents date back to the days of AI (Artificial Intelligence) work (1970’s) the word “Agent” is currently in vogue in the computing press and computer science communities.
This thesis presents a review of the ongoing evolution of software agents, places agents in context within today’s software domain, and takes a closer look at the ongoing debate of what really constitutes an '"Agenf\ The numerous dimensions of classification are studied and an opinion of the attributes that an agent should encompass is put forward. Leading …
Masterpiece: Computer-Generated Music Through Fractals And Genetic Theory, Amanda Broyles
Masterpiece: Computer-Generated Music Through Fractals And Genetic Theory, Amanda Broyles
Honors Theses
A wide variety of computer-generated music exists. I have writ.ten a program which will generate music by using genetic theory and fractals. The genetic theory is used to mold input pieces into a musical motif. The motif is then elaborated by the fractal formula into a composition. A brief introduction to the world of genetic theory and fractals is given. Analysis of a musical work produced in this manner shows coherent patterns and also emotion.
Velocity Estimation Via A Neural Network Enhanced By Classical Detection Algorithms, Zeki Berk Hamşioğlu
Velocity Estimation Via A Neural Network Enhanced By Classical Detection Algorithms, Zeki Berk Hamşioğlu
Electrical & Computer Engineering Theses & Dissertations
The goal of this research is to show how to solve a velocity estimation problem using a neural network connected to an array of sensors. Motivated by biological studies involving insect vision, the neural network utilized is a member of a class of shunting neural networks. When an object moves across the face of the sensor array, the neural network's pulse response is first temporally located using classical M-ary detection techniques. Both the deterministic and stochastic cases are considered. Then the network's pulse response is post-processed via an existing velocity estimation algorithm based on a Volterra series model of the …