Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

1638 Full-Text Articles 1524 Authors 310922 Downloads 93 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

1638 full-text articles. Page 1 of 55.

Exploring Algorithms To Recognize Similar Board States In Arimaa, Malik Khaleeque Ahmed 2017 Rowan University

Exploring Algorithms To Recognize Similar Board States In Arimaa, Malik Khaleeque Ahmed

Theses and Dissertations

The game of Arimaa was invented as a challenge to the field of game-playing artificial intelligence, which had grown somewhat haughty after IBM's supercomputer Deep Blue trounced world champion Kasparov at chess. Although Arimaa is simple enough for a child to learn and can be played with an ordinary chess set, existing game-playing algorithms and techniques have had a difficult time rising up to the challenge of defeating the world's best human Arimaa players, mainly due to the game's impressive branching factor. This thesis introduces and analyzes new algorithms and techniques that attempt to recognize similar board ...


Malware Detection Using The Index Of Coincidence, Bhavna Gurnani 2017 San Jose State University

Malware Detection Using The Index Of Coincidence, Bhavna Gurnani

Master's Projects

In this research, we apply the Index of Coincidence (IC) to problems in malware analysis. The IC, which is often used in cryptanalysis of classic ciphers, is a technique for measuring the repeat rate in a string of symbols. A score based on the IC is applied to a variety of challenging malware families. We nd that this relatively simple IC score performs surprisingly well, with superior results in comparison to various machine learning based scores, at least in some cases.


Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee 2017 Walden University

Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee

Walden Dissertations and Doctoral Studies

In recent years, numerous high tech companies have developed and used technology roadmaps when making their investment decisions. Jay Paap has proposed the Customer Focused Technology Planning (CFTP) framework to draw future technology roadmaps. However, the CFTP framework does not include risk assessment as a critical factor in decision making. The problem addressed in this quantitative study was that high tech companies are either losing money or getting a much smaller than expected return on investment when making technology investment decisions. The purpose of this research was to determine the relationship between returns on investment before and after adding risk ...


On Relation Between Constraint Answer Set Programming And Satisfiability Modulo Theories, Yuliya Lierler, Benjamin Susman 2016 University of Nebraska at Omaha

On Relation Between Constraint Answer Set Programming And Satisfiability Modulo Theories, Yuliya Lierler, Benjamin Susman

Yuliya Lierler

Constraint answer set programming is a promising research direction that integrates answer set programming with constraint processing. It is often informally related to the field of Satisfiability Modulo Theories. Yet, the exact formal link is obscured as the terminology and concepts used in these two research areas differ. In this paper, by connecting these two areas, we begin the cross-fertilization of not only of the theoretical foundations of both areas but also of the existing solving technologies.


Constraint Answer Set Solver Ezcsp And Why Integration Schemas Matter, 2016 Selected Works

Constraint Answer Set Solver Ezcsp And Why Integration Schemas Matter

Yuliya Lierler

Researchers in answer set programming and constraint programming have spent significant efforts in the development of hybrid languages and solving algorithms combining the strengths of these traditionally separate fields. These efforts resulted in a new research area: constraint answer set programming. Constraint answer set programming languages and systems proved to be successful at providing declarative, yet efficient solutions to problems involving hybrid reasoning tasks. One of the main contributions of this paper is the first comprehensive account of the constraint answer set language and solver EZCSP, a mainstream representative of this research area that has been used in various successful ...


Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. LoMeo 2016 CUNY Hunter College

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo

School of Arts & Sciences Theses

A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.


Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers 2016 Air Force Institute of Technology

Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers

Military Cyber Affairs

Today’s defensive cyber sensors are dominated by signature-based analytical methods that require continuous maintenance and lack the ability to detect unknown threats. Anomaly detection offers the ability to detect unknown threats, but despite over 15 years of active research, the operationalization of anomaly detection and machine learning for Defensive Cyber Operations (DCO) is lagging. This article provides an introduction to machine learning concepts with a focus on the unique challenges to using machine learning for DCO. Traditional machine learning evaluation methods are challenged in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and sensitivity threshold ...


Real-Time Online Chinese Character Recognition, Wenlong Zhang 2016 San Jose State University

Real-Time Online Chinese Character Recognition, Wenlong Zhang

Master's Projects

In this project, I built a web application for handwritten Chinese characters recognition in real time. This system determines a Chinese character while a user is drawing/writing it. The techniques and steps I use to build the recognition system include data preparation, preprocessing, features extraction, and classification. To increase the accuracy, two different types of neural networks ared used in the system: a multi-layer neural network and a convolutional neural network.


Artificially Intelligent Robots Modelled After Ants, Haley L. Fletcher 2016 Loyola Marymount University

Artificially Intelligent Robots Modelled After Ants, Haley L. Fletcher

Research & Exhibition

In the field of computer science I propose to create three artificially intelligent robots that are able to find food in the same way that ants do. I want the robots to have the capability to communicate with each other, to recognize food, and to be able to find food from solely communication with the other robots.


On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson 2016 University of Nebraska - Lincoln

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson

Computer Science and Engineering: Theses, Dissertations, and Student Research

Constraint satisfaction problems (CSPs) provide a flexible and powerful framework for modeling and solving many decision problems of practical importance. Consistency properties and the algorithms for enforcing them on a problem instance are at the heart of Constraint Processing and best distinguish this area from other areas concerned with the same combinatorial problems. In this thesis, we study path consistency (PC) and investigate several algorithms for enforcing it on binary finite CSPs. We also study algorithms for enforcing consistency properties that are related to PC but are stronger or weaker than PC.

We identify and correct errors in the literature ...


Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal 2016 University of Nebraska-Lincoln

Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal

Computer Science and Engineering: Theses, Dissertations, and Student Research

Online reviews increase consumer visits, increase the time spent on the website, and create a sense of community among the frequent shoppers. Because of the importance of online reviews, online retailers such as Amazon.com and eOpinions provide detailed guidelines for writing reviews. However, though these guidelines provide instructions on how to write reviews, reviewers are not provided instructions for writing product-specific reviews. As a result, poorly-written reviews are abound and a customer may need to scroll through a large number of reviews, which could be up to 6000 pixels down from the top of the page, in order to ...


Investigating High Speed Localization Microscopy Through Experimental Methods, Data Processing Methods, And Applications Of Localization Microscopy To Biological Questions, Andrew J. Nelson 2016 University of Maine

Investigating High Speed Localization Microscopy Through Experimental Methods, Data Processing Methods, And Applications Of Localization Microscopy To Biological Questions, Andrew J. Nelson

Electronic Theses and Dissertations

Fluorescence Photoactivation Localization Microscopy(FPALM) and other super resolution localization microscopy techniques can resolve structures with nanoscale resolution. Unlike techniques of electron microscopy, they are also compatible with live cell and live animal studies, making FPALM and related techniques ideal for answering questions about the dynamic nature of molecular biology in living systems. Many processes in biology occur on rapid sub second time scales requiring the imaging technique to be capable of resolving these processes not just with a high enough spatial resolution, but with an appropriate temporal resolution. To that end, this Dissertation in part investigates high speed FPALM ...


Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou 2016 Washington University in St. Louis

Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou

Engineering and Applied Science Theses & Dissertations

Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned ...


Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy GUNAWAN, Hoong Chuin LAU, Pieter VANSTEENWEGEN 2016 Singapore Management University

Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy Gunawan, Hoong Chuin Lau, Pieter Vansteenwegen

Research Collection School Of Information Systems

The Orienteering Problem (OP) has received a lot of attention in the past few decades. The OP is a routing problem in which the goal is to determine a subset of nodes to visit, and in which order, so that the total collected score is maximized and a given time budget is not exceeded. A number of typical variants has been studied, such as the Team OP, the (Team) OP with Time Windows and the Time Dependent OP. Recently, a number of new variants of the OP was introduced, such as the Stochastic OP, the Generalized OP, the Arc OP ...


Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou (DENG Dehao) TENG, Shih-Fen CHENG, Nghia TRUONG TRONG, Hoong Chuin LAU 2016 Singapore Management University

Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou (Deng Dehao) Teng, Shih-Fen Cheng, Nghia Truong Trong, Hoong Chuin Lau

Research Collection School Of Information Systems

In a large indoor environment such as a sports arena or convention center, smooth egress of crowd after an event can be seriously affected if infrastructure such as elevators and escalators break down. In this paper, we propose a novel crowd simulator known as SIM-DISRUPT for simulating egress scenarios in non-emergency situations. To surface the impact of disrupted infrastructure on the egress of crowd, SIM-DISRUPT includes features that allow users to specify selective disruptions as well as strategies for controlling the distribution and egress choices of crowd. Using SIM-DISRUPT, we investigate effects of crowd distribution, egress choices and infrastructure disruptions ...


Review Classification, Balraj Aujla 2016 California Polytechnic State University, San Luis Obispo

Review Classification, Balraj Aujla

Computer Science

The goal of this project is to find a way to analyze reviews and determine the sentiment of a review. It uses various machine learning techniques in order to achieve its goals such as SVMs and Naive Bayes. Overall the purpose is to learn many different machine learning techniques, determine which ones would be useful for the project, then compare the results. Research is the foremost goal of the project, and it is able to determine the better algorithm for review classification, naive bayes or an SVM. In addition, an SVM which actually gave review’s scores rather than just ...


An Agent-Based Approach To Human Migration Movement, LIN JUNJIE, LARRY, Kathleen M. CARLEY, Shih-Fen CHENG 2016 Singapore Management University

An Agent-Based Approach To Human Migration Movement, Lin Junjie, Larry, Kathleen M. Carley, Shih-Fen Cheng

Research Collection School Of Information Systems

How are the populations of the world likely to shift? Which countries will be impacted by sea-level rise? This paper uses a country-level agent-based dynamic network model to examine shifts in population given network relations among countries, which influences overall population change. Some of the networks considered include: alliance networks, shared language networks, economic influence networks, and proximity networks. Validation of model is done for migration probabilities between countries, as well as for country populations and distributions. The proposed framework provides a way to explore the interaction between climate change and policy factors at a global scale.


What Is Answer Set Programming To Propositional Satisfiability, Yuliya Lierler 2016 University of Nebraska at Omaha

What Is Answer Set Programming To Propositional Satisfiability, Yuliya Lierler

Yuliya Lierler

Propositional satisfiability  (or satisfiability) and answer set programming are two closely related subareas of Artificial Intelligence that are used to model and solve difficult combinatorial search problems. Satisfiability solvers and answer set solvers  are the software systems that  find  satisfying interpretations and answer sets for given propositional formulas and logic programs, respectively. These systems are closely related in their common design patterns. In satisfiability, a propositional formula is used to encode problem specifications in a way that its satisfying interpretations correspond to the solutions of the problem. To find solutions to a problem it is then sufficient to use a ...


Computer Vision Based Object Detection And Tracking In Micro Aerial Vehicles, Richard F. Chapman, H. David Mathias 2016 Florida Southern College

Computer Vision Based Object Detection And Tracking In Micro Aerial Vehicles, Richard F. Chapman, H. David Mathias

Papers & Publications: Interdisciplinary Journal of Undergraduate Research

­­­­The ultimate goal of Computer Vision is to instruct a computer to understand and interpret visual signals and images in real time and to instruct a computer to react to the environment around them. In this work, we describe a system that allows a micro aerial vehicle (MAV), equipped with an onboard camera, to detect and track a moving target object. In an alternative implementation, the MAV instead searches the environment for the target object and flies to it. Due to the limited capability of the drone’s integrated processor, image processing is performed by a ground-based computer that also ...


Perceptions Of Planned Versus Unplanned Malfunctions: A Human-Robot Interaction Scenario, Theresa T. Kessler, Keith R. MacArthur, Manuel Trujillo-Silva, Thomas MacGillivray, Chris Ripa, Peter A. Hancock 2016 University of Central Florida

Perceptions Of Planned Versus Unplanned Malfunctions: A Human-Robot Interaction Scenario, Theresa T. Kessler, Keith R. Macarthur, Manuel Trujillo-Silva, Thomas Macgillivray, Chris Ripa, Peter A. Hancock

Keith Reid MacArthur

The present study investigated the effect of malfunctions on trust in a human-robot interaction scenario. Participants were exposed to either a planned or unplanned robot malfunction and then completed two different self-report trust measures. Resulting trust between planned and unplanned exposures was analyzed, showing that trust levels impacted by planned malfunctions did not significantly differ from those impacted by unplanned malfunctions. Therefore, it can be surmised that the methods used for the manipulation of the planned malfunctions were effective and are recommended for further study use.


Digital Commons powered by bepress