Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

3,122 Full-Text Articles 4,482 Authors 1,202,868 Downloads 201 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

3,122 full-text articles. Page 1 of 138.

A Mean-Field Markov Decision Process Model For Spatial Temporal Subsidies In Ride-Sourcing Markets, Zheng ZHU, Jintao KE, Hai WANG 2022 Singapore Management University

A Mean-Field Markov Decision Process Model For Spatial Temporal Subsidies In Ride-Sourcing Markets, Zheng Zhu, Jintao Ke, Hai Wang

Research Collection School Of Computing and Information Systems

Ride-sourcing services are increasingly popular because of their ability to accommodate on-demand travel needs. A critical issue faced by ride-sourcing platforms is the supply-demand imbalance, as a result of which drivers may spend substantial time on idle cruising and picking up remote passengers. Some platforms attempt to mitigate the imbalance by providing relocation guidance for idle drivers who may have their own self-relocation strategies and decline to follow the suggestions. Platforms then seek to induce drivers to system-desirable locations by offering them subsidies. This paper proposes a mean-field Markov decision process (MF-MDP) model to depict the dynamics in ride-sourcing markets ...


Are You Really Muted?: A Privacy Analysis Of Mute Buttons In Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz 2022 University of Wisconsin - Madison

Are You Really Muted?: A Privacy Analysis Of Mute Buttons In Video Conferencing Apps, Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz

Computer Science: Faculty Publications and Other Works

In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. And for the most part, users have accepted these apps in their personal space, without much thought about the permission models that govern the use of their personal data during meetings. While access to a device’s video camera is carefully controlled, little has been done to ensure the same level of privacy for accessing the microphone. In this work, we ask the question: what happens to the microphone data when a user clicks the mute ...


Single-Pass Inline Pipeline 3d Reconstruction Using Depth Camera Array, Zhexiong Shang, Zhigang Shen 2022 University of Nebraska-Lincoln

Single-Pass Inline Pipeline 3d Reconstruction Using Depth Camera Array, Zhexiong Shang, Zhigang Shen

Faculty Publications in Construction Engineering & Management

A novel inline inspection (ILI) approach using depth cameras array (DCA) is introduced to create high-fidelity, dense 3D pipeline models. A new camera calibration method is introduced to register the color and the depth information of the cameras into a unified pipe model. By incorporating the calibration outcomes into a robust camera motion estimation approach, dense and complete 3D pipe surface reconstruction is achieved by using only the inline image data collected by a self-powered ILI rover in a single pass through a straight pipeline. The outcomes of the laboratory experiments demonstrate one-millimeter geometrical accuracy and 0.1-pixel photometric accuracy ...


Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja 2022 CUNY Graduate Center

Challenges In Migrating Imperative Deep Learning Programs To Graph Execution: An Empirical Study, Tatiana Castro Vélez, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Anita Raja

Publications and Research

Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code that supports symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development tends to produce DL code that is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, less error-prone imperative DL frameworks encouraging eager execution have emerged at the expense of run-time performance. While hybrid approaches aim for the "best of both worlds," the challenges in applying them in the real world are largely unknown. We conduct a data-driven analysis of challenges ...


Hierarchical Value Decomposition For Effective On-Demand Ride Pooling, Hao JIANG, Pradeep VARAKANTHAM 2022 Singapore Management University

Hierarchical Value Decomposition For Effective On-Demand Ride Pooling, Hao Jiang, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

On-demand ride-pooling (e.g., UberPool, GrabShare) services focus on serving multiple different customer requests using each vehicle, i.e., an empty or partially filled vehicle can be assigned requests from different passengers with different origins and destinations. On the other hand, in Taxi on Demand (ToD) services (e.g., UberX), one vehicle is assigned to only one request at a time. On-demand ride pooling is not only beneficial to customers (lower cost), drivers (higher revenue per trip) and aggregation companies (higher revenue), but is also of crucial importance to the environment as it reduces the number of vehicles required on ...


A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz 2022 East Tennessee State University

A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz

Electronic Theses and Dissertations

Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version.

In this work, we develop an ...


Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover 2022 University of Arkansas, Fayetteville

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked ...


Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa 2022 California State University, San Bernardino

Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa

Electronic Theses, Projects, and Dissertations

Non-intrusive sensor-based human activity recognition is utilized in a spectrum of applications including fitness tracking devices, gaming, health care monitoring, and smartphone applications. Deep learning models such as convolutional neural networks (CNNs) and long short-term memory (LSTMs) recurrent neural networks provide a way to achieve human activity recognition accurately and effectively. This project designed and explored a variety of multi-layer hybrid deep learning architectures which aimed to improve human activity recognition performance by integrating local features and was scale invariant with dependencies of activities. We achieved a 94.7% activity recognition rate on the University of California, Irvine public domain ...


Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack 2022 Murray State University

Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack

Honors College Theses

Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as ...


Developing Critical Thinking Military Officers, Thor Martinsen 2022 Naval Postgraduate School

Developing Critical Thinking Military Officers, Thor Martinsen

Mathematica Militaris

Critical thinking is frequently identified as an important trait for military officers. This paper examines critical thinking from a historical, pedagogical, and warfighting perspective. The author uses his experience teaching mathematical reasoning at the Naval Postgraduate School to provide helpful advice for educators charged with teaching deductive and inductive reasoning. The paper argues that critical thinking should be taught early in an officer's career. It emphasizes a systematic and Socratic instructional approach along with the importance of equipping students with the necessary tools to evaluate problem-solving techniques and critique their associated solutions. Finally, the paper discusses Augmented Intelligence and ...


Using Machine Learning To Recognize Chronic Rhinosinusitis, Irene Liu '23 2022 Illinois Mathematics and Science Academy

Using Machine Learning To Recognize Chronic Rhinosinusitis, Irene Liu '23

Student Publications & Research

Chronic Rhinosinusitis (CRS) is a nasal disease characterized by the inflammation of the mucosa and paranasal sinuses with a duration of at least 12 consecutive weeks. So, to diagnose CRS, one needs to keep a record of their symptoms for ~12 weeks before they are recommended to get a tomography which will allow physicians to classify them as a patient with CRS or without. This is a timely and costly process; thus, machine learning should be used to speed the process up. Since patients with CRS have more obstructed noses, the sound produced should be different than an individual without ...


Predicting And Modifying Memorability Of Images, Mohammad Younesi 2022 The University of Western Ontario

Predicting And Modifying Memorability Of Images, Mohammad Younesi

Electronic Thesis and Dissertation Repository

Everyday, we are bombarded with many photographs of faces, whether on social media, television, or smartphones. From an evolutionary perspective, faces are intended to be remembered, mainly due to survival and personal relevance. However, all these faces do not have the equal opportunity to stick in our minds. It has been shown that memorability is an intrinsic feature of an image but yet, it is largely unknown what attributes make an image more memorable. In this work, we first proposed new models for predicting memorability of face and object images. Subsequently, we proposed a fast approach to modify and control ...


A Unified Representation And Deep Learning Architecture For Persuasive Essays In English, Muhammad Tawsif Sazid 2022 The University of Western Ontario

A Unified Representation And Deep Learning Architecture For Persuasive Essays In English, Muhammad Tawsif Sazid

Electronic Thesis and Dissertation Repository

We develop a novel unified representation for the argumentation mining task facilitating the extracting from text and the labelling of the non-argumentative units and argumentation components—premises, claims, and major claims—and the argumentative relations—premise to claim or premise in a support or attack relation, and claim to major claim in a for or against relation—in an end-to-end machine learning pipeline. This tightly integrated representation combines the
component and relation identification sub-problems and enables a unitary solution for detecting argumentation structures. This new representation together with a new deep learning architecture composed of a mixed embedding method, a ...


Designing A Digital Interactive Emotion Measure (Diem) For Digital Media: Theoretical Foundations And Validation Protocols, Celeste Sangiorgio, Cassandra Berbary, Cory Crane, Caroline Easton 2022 Rochester Institute of Technology

Designing A Digital Interactive Emotion Measure (Diem) For Digital Media: Theoretical Foundations And Validation Protocols, Celeste Sangiorgio, Cassandra Berbary, Cory Crane, Caroline Easton

Frameless

Awareness of emotions is often a treatment target in psychotherapy, but it is difficult to assess emotions due to ambiguity in measurement or scale design. Lack of clarity in scale design may increase risk that participant interpretations of scale items may not align with emotion constructs those scales were designed to capture. Furthermore, emphasis on verbal or written cues leads to low scientific representation of patients who cannot read emotion scales (e.g., low literacy). Touch-screen applications provide a unique opportunity to create a visual emotion measure which has low barriers but can be used to assess a high level ...


Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi 2022 Circle Optics

Novel 360-Degree Camera, Ian Gauger, Andrew Kurtz, Zakariya Niazi

Frameless

Circle Optics is developing novel technology for low-parallax, real time, panoramic image capture using an integrated array of multiple adjacent polygonal-edged cameras. This technology can be optimized and deployed for a variety of markets, including cinematic VR. Circle Optics’ existing prototype, Hydra Alpha, will be demonstrated.


Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink 2022 Vuzix Corporation

Warehouse And Logistics: Smart Picking With Vuzix Smart Glasses, Elise Hemink

Frameless

Vuzix is an industry leader in augmented reality (AR) technology. We provide innovative products to an array of industries, a few being defense, security, enterprise, and consumers. Our AR technology provides a perfect balance of engagement in the digital and real worlds thanks to their innovative optics, AI apps and 5G capability.


Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson 2022 Rochester Institute of Technology

Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson

Frameless

In the summer of 2018, RIT Professors Susan Lakin and Frank Deese discussed with the principal officers of the Society for the Protection and Care of Children (SPCC) in Rochester how the new technology of Virtual Reality might be used to not only impart information to viewers, but generate empathy for those receiving services from the organization as well as those performing those services. Their ultimate goal was to create an experience that could be viewed with VR headsets at fundraising events and on a website using low-cost Google Cardboard.


Can We Walk In Our Patients’ Shoes? Immersive Virtual Reality As An Empathy Training Tool For Medical Students, Riham Alieldin, Raffaella Borasi, Anne Nofziger, Karen DeAngelis, Sarah Peyre 2022 University of Rochester

Can We Walk In Our Patients’ Shoes? Immersive Virtual Reality As An Empathy Training Tool For Medical Students, Riham Alieldin, Raffaella Borasi, Anne Nofziger, Karen Deangelis, Sarah Peyre

Frameless

Empathy is arguably the “backbone” of the patient-physician relationship. It has been shown to have numerous positive clinical outcomes especially in a patient-centered careservice. Nevertheless, studies have shown a disintegration of empathy and compassion in physicians during medical school and residency training due to the lack of standardization of empathy training in medical education.


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in ...


Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero 2022 Kennesaw State University

Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by ...


Digital Commons powered by bepress