Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Artificial Intelligence and Robotics

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 19 of 19

Full-Text Articles in Programming Languages and Compilers

Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson Jun 2023

Deep Learning Recommendations For The Acl2 Interactive Theorem Prover, Robert K. Thompson, Robert K. Thompson

Master's Theses

Due to the difficulty of obtaining formal proofs, there is increasing interest in partially or completely automating proof search in interactive theorem provers. Despite being a theorem prover with an active community and plentiful corpus of 170,000+ theorems, no deep learning system currently exists to help automate theorem proving in ACL2. We have developed a machine learning system that generates recommendations to automatically complete proofs. We show that our system benefits from the copy mechanism introduced in the context of program repair. We make our system directly accessible from within ACL2 and use this interface to evaluate our system in …


Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes Jan 2023

Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes

UNF Graduate Theses and Dissertations

Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.

One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …


Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy Nov 2022

Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy

Dissertations and Theses Collection (Open Access)

In this thesis, we study new variants of routing and scheduling problems motivated by real-world problems from the urban logistics and law enforcement domains. In particular, we focus on two key aspects: dynamic and multi-agent. While routing problems such as the Vehicle Routing Problem (VRP) is well-studied in the Operations Research (OR) community, we know that in real-world route planning today, initially-planned route plans and schedules may be disrupted by dynamically-occurring events. In addition, routing and scheduling plans cannot be done in silos due to the presence of other agents which may be independent and self-interested. These requirements create …


Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James May 2022

Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James

Computer Science and Computer Engineering Undergraduate Honors Theses

The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …


Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger May 2022

Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger

Computer Science and Computer Engineering Undergraduate Honors Theses

Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …


Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack May 2022

Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack

Honors College Theses

Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as …


The Impact Of Programming Language’S Type On Probabilistic Machine Learning Models, Sherif Elsaid Dec 2021

The Impact Of Programming Language’S Type On Probabilistic Machine Learning Models, Sherif Elsaid

Master's Projects

Software development is an expensive and difficult process. Mistakes can be easily made, and without extensive review process, those mistakes can make it to the production code and may have unintended disastrous consequences.

This is why various automated code review services have arisen in the recent years. From AWS’s CodeGuro and Microsoft’s Code Analysis to more integrated code assistants, like IntelliCode and auto completion tools. All of which are designed to help and assist the developers with their work and help catch overlooked bugs.

Thanks to recent advances in machine learning, these services have grown tremen- dously in sophistication to …


Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba May 2021

Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba

Theses and Dissertations

Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.

Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …


City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke May 2021

City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke

Computer Science and Computer Engineering Undergraduate Honors Theses

Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to create a …


Source Code Comment Classification Artificial Intelligence, Cole Sutyak Jan 2021

Source Code Comment Classification Artificial Intelligence, Cole Sutyak

Williams Honors College, Honors Research Projects

Source code comment classification is an important problem for future machine learning solutions. In particular, supervised machine learning solutions that have largely subjective data labels but are difficult to obtain the labels for. Machine learning problems are problems largely because of a lack of data. In machine learning solutions, it is better to have a large amount of mediocre data than it is to have a small amount of good data. While the mediocre data might not produce the best accuracy, it produces the best results because there is much more to learn from the problem.

In this project, data …


A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah May 2020

A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah

Electrical Engineering Theses

An increase in the number of working parents has led to a higher demand for remotely monitoring activities of babies through baby monitors. The baby monitors vary from simple audio and video monitoring frameworks to advance applications where we can integrate sensors for tracking vital signs such as heart rate, respiratory rate monitoring. The Internet of Things (IoT) is a network of devices where each device can is recognizable in the network. The IoT node is a sensor or device, which primarily functions as a data acquisition unit. The data acquired through the IoT nodes are wirelessly transmitted to the …


A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii May 2020

A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii

Masters Theses, 2020-current

Code stylometry is applying analysis techniques to a collection of source code or binaries to determine variations in style. The variations extracted are often used to identify the author of the text or to differentiate one piece from another.

In this research, we were able to create a multi-input deep learning model that could accurately categorize and group code from multiple projects. The deep learning model took as input word-based tokenization for code comments, character-based tokenization for the source code text, and the metadata features described by A. Caliskan-Islam et al. Using these three inputs, we were able to achieve …


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Artificial Intelligence: An Analysis Of Alan Turing’S Role In The Conception And Development Of Intelligent Machinery, Erika L. Furtado Apr 2018

Artificial Intelligence: An Analysis Of Alan Turing’S Role In The Conception And Development Of Intelligent Machinery, Erika L. Furtado

Selected Honors Theses

The purpose of this thesis is to follow the thread of Alan Turing’s ideas throughout his decades of research and analyze how his predictions have come to fruition over the years. Turing’s Computing Machinery and Intelligence is the paper in which the Turing Test is described as an alternative way to answer the question “can machines think?” (Turing 433). Since the development of Turing’s original paper, there has been a tremendous amount of advancement in the field of artificial intelligence. The field has made its way into art classification as well as the medical industry. The main concept researched in …


Elephant 2000: A Programming Language For Remembering The Past And Building On It, Kerry J. Holmes Jan 2018

Elephant 2000: A Programming Language For Remembering The Past And Building On It, Kerry J. Holmes

Williams Honors College, Honors Research Projects

Elephant 2000 is a programming language to specify programs that accept user speech as text inputs and outputs speech text. The inputs and outputs are based on Dialogue Act theory which describes several forms of speech outputs, such as requests, questions, and answers. The language also relies on Named Entity Recognition to determine what types of objects a user references. These entities include persons, locations, times and so on. Using these attributes of user speech, a program is able to perform simple rule matching and pattern recognition to respond to input. The result is a programming language with English like …


Alternative Approaches To Correction Of Malapropisms In Aiml Based Conversational Agents, Walter A. Brock Nov 2014

Alternative Approaches To Correction Of Malapropisms In Aiml Based Conversational Agents, Walter A. Brock

CCE Theses and Dissertations

The use of Conversational Agents (CAs) utilizing Artificial Intelligence Markup Language (AIML) has been studied in a number of disciplines. Previous research has shown a great deal of promise. It has also documented significant limitations in the abilities of these CAs. Many of these limitations are related specifically to the method employed by AIML to resolve ambiguities in the meaning and context of words. While methods exist to detect and correct common errors in spelling and grammar of sentences and queries submitted by a user, one class of input error that is particularly difficult to detect and correct is the …


Functional Reactive Musical Performers, Justin M. Phillips Dec 2010

Functional Reactive Musical Performers, Justin M. Phillips

Master's Theses

Computers have been assisting in recording, sound synthesis and other fields of music production for quite some time. The actual performance of music continues to be an area in which human players are chosen over computer performers. Musical performance is an area in which personalization is more important than consistency. Human players play with each other, reacting to phrases and ideas created by the players that they are playing with. Computer performers lack the ability to react to the changes in the performance that humans perceive naturally, giving the human players an advantage over the computer performers.

This thesis creates …


An Investigation Into The Concepts And Applicability Of Agent Technologies, Anne White Jan 2002

An Investigation Into The Concepts And Applicability Of Agent Technologies, Anne White

Theses

The software world is one of great richness and diversity

Even though the concept of software agents date back to the days of AI (Artificial Intelligence) work (1970’s) the word “Agent” is currently in vogue in the computing press and computer science communities.

This thesis presents a review of the ongoing evolution of software agents, places agents in context within today’s software domain, and takes a closer look at the ongoing debate of what really constitutes an '"Agenf\ The numerous dimensions of classification are studied and an opinion of the attributes that an agent should encompass is put forward. Leading …


Masterpiece: Computer-Generated Music Through Fractals And Genetic Theory, Amanda Broyles Jan 2000

Masterpiece: Computer-Generated Music Through Fractals And Genetic Theory, Amanda Broyles

Honors Theses

A wide variety of computer-generated music exists. I have writ.ten a program which will generate music by using genetic theory and fractals. The genetic theory is used to mold input pieces into a musical motif. The motif is then elaborated by the fractal formula into a composition. A brief introduction to the world of genetic theory and fractals is given. Analysis of a musical work produced in this manner shows coherent patterns and also emotion.