Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Deep learning (15)
- Machine learning (12)
- Artificial intelligence (10)
- Open course material (8)
- Big data (4)
-
- Security (4)
- AI (3)
- Internet of things (3)
- Neural networks (3)
- Adversarial machine learning (2)
- Affective computing (2)
- Artificial neural networks (2)
- Authentication (2)
- Computational modeling (2)
- Computer vision (2)
- Computing methodologies (2)
- Convolutional neural networks (2)
- Data analysis (2)
- GAN (2)
- NER (2)
- NLP (2)
- Nuclear physics (2)
- Signal processing (2)
- Solid modeling (2)
- 6G (1)
- ADHD (1)
- AI monitoring (1)
- ARIMA (1)
- Adaptation models (1)
- Agent participation (1)
- Publication
-
- Computer Science Faculty Publications (9)
- Developing Technology Foresight: Case Study of AI in InsurTech (8)
- Electrical & Computer Engineering Faculty Publications (8)
- Cybersecurity Undergraduate Research Showcase (5)
- Engineering Technology Faculty Publications (4)
-
- College of Sciences Posters (3)
- Computer Science Theses & Dissertations (3)
- Electrical & Computer Engineering Theses & Dissertations (3)
- VMASC Publications (3)
- Mechanical & Aerospace Engineering Theses & Dissertations (2)
- Undergraduate Research Symposium (2)
- Civil & Environmental Engineering Theses & Dissertations (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Mathematics & Statistics Faculty Publications (1)
- Mechanical & Aerospace Engineering Faculty Publications (1)
- University Administration Publications (1)
- Publication Type
Articles 1 - 30 of 58
Full-Text Articles in Physical Sciences and Mathematics
Federated Learning And Applications In Cybersecurity, Ani Sreekumar
Federated Learning And Applications In Cybersecurity, Ani Sreekumar
Cybersecurity Undergraduate Research Showcase
Machine learning is a subfield of artificial intelligence that focuses on making predictions about some outcome based on information from a dataset. In cybersecurity, machine learning is often used to improve intrusion detection systems and identify trends in data that could indicate an oncoming cyber attack. Data privacy is an extremely important aspect of cybersecurity, and there are many industries that have more demanding laws to ensure the security of user data. Due to these regulations, machine learning algorithms can not be widely utilized in these industries to improve outcomes and accuracy of predictions. However, federated learning is a recent …
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
Cybersecurity Undergraduate Research Showcase
While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Engineering Management & Systems Engineering Theses & Dissertations
The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …
Towards Privacy And Security Concerns Of Adversarial Examples In Deep Hashing Image Retrieval, Yanru Xiao
Towards Privacy And Security Concerns Of Adversarial Examples In Deep Hashing Image Retrieval, Yanru Xiao
Computer Science Theses & Dissertations
With the explosive growth of images on the internet, image retrieval based on deep hashing attracts spotlights from both research and industry communities. Empowered by deep neural networks (DNNs), deep hashing enables fast and accurate image retrieval on large-scale data. However, inheriting from deep learning, deep hashing remains vulnerable to specifically designed input, called adversarial examples. By adding imperceptible perturbations on inputs, adversarial examples fool DNNs to make wrong decisions. The existence of adversarial examples not only raises security concerns for real-world deep learning applications, but also provides us with a technique to confront malicious applications.
In this dissertation, we …
Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen
Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen
University Administration Publications
Hydrological drought forecasting is essential for effective water resource management planning. Innovations in computer science and artificial intelligence (AI) have been incorporated into Earth science research domains to improve predictive performance for water resource planning and disaster management. Forecasting of future hydrological drought can assist with mitigation strategies for various stakeholders. This study uses the transformer deep learning model to forecast hydrological drought, with a benchmark comparison with the long short-term memory (LSTM) model. These models were applied to the Apalachicola River, Florida, with two gauging stations located at Chattahoochee and Blountstown. Daily stage-height data from the period 1928–2022 were …
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Computational Modeling & Simulation Engineering Theses & Dissertations
Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …
Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray
Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray
Electrical & Computer Engineering Theses & Dissertations
Affective computing is an exciting and transformative field that is gaining in popularity among psychologists, statisticians, and computer scientists. The ability of a machine to infer human emotion and mood, i.e. affective states, has the potential to greatly improve human-machine interaction in our increasingly digital world. In this work, an ensemble model methodology for detecting human emotions across multiple subjects is outlined. The Continuously Annotated Signals of Emotion (CASE) dataset, which is a dataset of physiological signals labeled with discrete emotions from video stimuli as well as subject-reported continuous emotions, arousal and valence, from the circumplex model, is used for …
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Computer Science Theses & Dissertations
In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …
Using Ensemble Learning Techniques To Solve The Blind Drift Calibration Problem, Devin Scott Drake
Using Ensemble Learning Techniques To Solve The Blind Drift Calibration Problem, Devin Scott Drake
Computer Science Theses & Dissertations
Large sets of sensors deployed in nearly every practical environment are prone to drifting out of calibration. This drift can be sensor-based, with one or several sensors falling out of calibration, or system-wide, with changes to the physical system causing sensor-reading issues. Recalibrating sensors in either case can be both time and cost prohibitive. Ideally, some technique could be employed between the sensors and the final reading that recovers the drift-free sensor readings. This paper covers the employment of two ensemble learning techniques — stacking and bootstrap aggregation (or bagging) — to recover drift-free sensor readings from a suite of …
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Electrical & Computer Engineering Theses & Dissertations
Deep learning has proved to be successful for many computer vision and natural language processing applications. In this dissertation, three studies have been conducted to show the efficacy of deep learning models for computer vision and natural language processing. In the first study, an efficient deep learning model was proposed for seagrass scar detection in multispectral images which produced robust, accurate scars mappings. In the second study, an arithmetic deep learning model was developed to fuse multi-spectral images collected at different times with different resolutions to generate high-resolution images for downstream tasks including change detection, object detection, and land cover …
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny
Civil & Environmental Engineering Theses & Dissertations
Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …
Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci
Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci
Mechanical & Aerospace Engineering Theses & Dissertations
Current analysis of manufacturing defects in the production of rims and tires via x-ray inspection at an industry partner’s manufacturing plant requires that a quality control specialist visually inspect radiographic images for defects of varying sizes. For each sample, twelve radiographs are taken within 35 seconds. Some defects are very small in size and difficult to see (e.g., pinholes) whereas others are large and easily identifiable. Implementing this quality control practice across all products in its human-effort driven state is not feasible given the time constraint present for analysis.
This study aims to identify and develop an object detector capable …
Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli
Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli
Mechanical & Aerospace Engineering Theses & Dissertations
Autonomous underwater vehicles (AUVs) operating in deep sea and littoral environments have diverse applications including marine biology exploration, ocean environment monitoring, search for plane crash sites, inspection of ship-hulls and pipelines, underwater oil rig maintenance, border patrol, etc. Achieving autonomy in underwater vehicles relies on a tight integration between modules of sensing, navigation, decision-making, path-planning, trajectory tracking, and low-level control. This system integration task benefits from testing the related algorithms and techniques in a simulated environment before implementation in a physical test bed. This thesis reports on the development of a modeling and simulation platform that supports the design and …
Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw
Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw
Electrical & Computer Engineering Theses & Dissertations
Automatic classification of digitally modulated signals is a challenging problem that has traditionally been approached using signal processing tools such as log-likelihood algorithms for signal classification or cyclostationary signal analysis. These approaches are computationally intensive and cumbersome in general, and in recent years alternative approaches that use machine learning have been presented in the literature for automatic classification of digitally modulated signals. This thesis studies deep learning approaches for classifying digitally modulated signals that use deep artificial neural networks in conjunction with the canonical representation of digitally modulated signals in terms of in-phase and quadrature components. Specifically, capsule networks are …
Deep Learning: The Many Approaches Of Intrusion Detection System Can Be Implemented And Improved Upon, Trinity Taylor
Deep Learning: The Many Approaches Of Intrusion Detection System Can Be Implemented And Improved Upon, Trinity Taylor
Cybersecurity Undergraduate Research Showcase
For my research topic I decided to look at Deep learning. Deep learning can be used in many ways for example in web searching. Deep learning can also can improve new businesses and products. Deep learning could lead to amazing discoveries. Deep learning is making a neural network learn something. In my research I talk about Intrusion detection system, traditional approach for intrusion detection, existing intrusion detection, machine learning and deep learning based intrusion detection system, and future work.
A Machine Learning Approach To Denoising Particle Detector Observations In Nuclear Physics, Polykarpos Thomadakis, Angelos Angelopoulos, Gagik Gavalian, Nikos Chrisochoides
A Machine Learning Approach To Denoising Particle Detector Observations In Nuclear Physics, Polykarpos Thomadakis, Angelos Angelopoulos, Gagik Gavalian, Nikos Chrisochoides
College of Sciences Posters
With the evolution in detector technologies and electronic components used in the Nuclear Physics field, experimental setups become larger and more complex. Faster electronics enable particle accelerator experiments to run with higher beam intensity, providing more interactions per time and more particles per interaction. However, the increased beam intensities present a challenge to particle detectors because of the higher amount of noise and uncorrelated signals. Higher noise levels lead to a more challenging particle reconstruction process by increasing the number of combinatorics to analyze and background signals to eliminate. On the other hand, increasing the beam intensity can provide physics …
Lattice Optics Optimization For Recirculatory Energy Recovery Linacs With Multi-Objective Optimization, Isurumali Neththikumara, Todd Satogata, Alex Bogacz, Ryan Bodenstein, Arthur Vandenhoeke
Lattice Optics Optimization For Recirculatory Energy Recovery Linacs With Multi-Objective Optimization, Isurumali Neththikumara, Todd Satogata, Alex Bogacz, Ryan Bodenstein, Arthur Vandenhoeke
College of Sciences Posters
Beamline optics design for recirculatory linear accelerators requires special attention to suppress beam instabilities arising due to collective effects. The impact of these collective effects becomes more pronounced with the addition of energy recovery (ER) capability. Jefferson Lab’s multi-pass, multi-GeV ER proposal for the CEBAF accelerator, ER@CEBAF, is a 10- pass ER demonstration with low beam current. Tighter control of the beam parameters at lower energies is necessary to avoid beam break-up (BBU) instabilities, even with a small beam current. Optics optimizations require balancing both beta excursions at high-energy passes and overfocusing at low-energy passes. Here, we discuss an optics …
Physics-Informed Neural Networks (Pinns) For Dvcs Cross Sections, Manal Almaeen, Jake Grigsby, Joshua Hoskins, Brandon Kriesten, Yaohang Li, Huey-Wen Lin, Simonetta Liuti, Sorawich Maichum
Physics-Informed Neural Networks (Pinns) For Dvcs Cross Sections, Manal Almaeen, Jake Grigsby, Joshua Hoskins, Brandon Kriesten, Yaohang Li, Huey-Wen Lin, Simonetta Liuti, Sorawich Maichum
College of Sciences Posters
We present a physics informed deep learning technique for Deeply Virtual Compton Scattering (DVCS) cross sections from an unpolarized proton target using both an unpolarized and polarized electron beam. Training a deep learning model typically requires a large size of data that might not always be available or possible to obtain. Alternatively, a deep learning model can be trained using additional knowledge gained by enforcing some physics constraints such as angular symmetries for better accuracy and generalization. By incorporating physics knowledge to our deep learning model, our framework shows precise predictions on the DVCS cross sections and better extrapolation on …
Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai
Understanding The Mechanism Of Deep Learning Frameworks In Lesion Detection For Pathological Images With Breast Cancer, Wei-Wen Hsu, Chung-Hao Chen, Chang Hao, Yu-Ling Hou, Xiang Gao, Yun Shao, Xueli Zhang, Jingjing Wang, Tao He, Yanhong Tai
Electrical & Computer Engineering Faculty Publications
With the advances of scanning sensors and deep learning algorithms, computational pathology has drawn much attention in recent years and started to play an important role in the clinical workflow. Computer-aided detection (CADe) systems have been developed to assist pathologists in slide assessment, increasing diagnosis efficiency and reducing misdetections. In this study, we conducted four experiments to demonstrate that the features learned by deep learning models are interpretable from a pathological perspective. In addition, classifiers such as the support vector machine (SVM) and random forests (RF) were used in experiments to replace the fully connected layers and decompose the end-to-end …
Two-Stage Transfer Learning For Facial Expression Classification In Children, Gregory Hubbard, Megan Witherow, Khan Iftekharuddin
Two-Stage Transfer Learning For Facial Expression Classification In Children, Gregory Hubbard, Megan Witherow, Khan Iftekharuddin
Undergraduate Research Symposium
Studying facial expressions can provide insight into the development of social skills in children and provide support to individuals with developmental disorders. In afflicted individuals, such as children with Autism Spectrum Disorder (ASD), atypical interpretations of facial expressions are well-documented. In computer vision, many popular and state-of-the-art deep learning architectures (VGG16, EfficientNet, ResNet, etc.) are readily available with pre-trained weights for general object recognition. Transfer learning utilizes these pre-trained models to improve generalization on a new task. In this project, transfer learning is implemented to leverage the pretrained model (general object recognition) on facial expression classification. Though this method, the …
Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna
Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna
Undergraduate Research Symposium
Human-autonomy teaming (HAT) has become an important area of research due to the autonomous systems being developed for different applications, such as remotely controlled aircraft. Many remotely controlled vehicles will be controlled by automated systems, with a human monitor that may be monitoring multiple vehicles simultaneously. The attention and working memory capacity of operators of remote-controlled vehicles must be maintained at appropriate levels during operation. However, there is currently no direct method of determining working memory capacity, which is important because it is a measure for how memory is being stored for a short term and interacting with long term …
Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues
Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues
VMASC Publications
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their healthcare experts (i.e., doctors) and allows secure transmission of healthcare data over an insecure channel (e.g., the Internet). Since Artificial Intelligence (AI) has a great impact on the performance and usability of an information system, it is important to include its modules in a healthcare information system, which will be …
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 3: Technology Foresight And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 3 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Insurtech And Distribution, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Questions regarding InsurTech and distribution.
Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang
Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang
Cybersecurity Undergraduate Research Showcase
As artificial intelligence continues to evolve rapidly with emerging innovations, mass-scale digitization could be disrupted due to unfair algorithms with historically biased data. With the rising concerns of algorithmic bias, detecting biases is essential in mitigating and implementing an algorithm that promotes inclusive representation. The spread of ubiquitous artificial intelligence means that improving modeling robustness is at its most crucial point. This paper examines the omnipotence of artificial intelligence and its resulting bias, examples of AI bias in different groups, and a potential framework and mitigation strategies to improve AI fairness and remove AI bias from modeling techniques.
Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices For Iot-Enabled Ai Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
VMASC Publications
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) applications, …
Healthcare 5.0 Security Framework: Applications, Issues And Future Research Directions, Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park
Healthcare 5.0 Security Framework: Applications, Issues And Future Research Directions, Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park
VMASC Publications
Healthcare 5.0 is a system that can be deployed to provide various healthcare services. It does these services by utilising a new generation of information technologies, such as Internet of Things (IoT), Artificial Intelligence (AI), Big data analytics, blockchain and cloud computing. Due to the introduction of healthcare 5.0, the paradigm has been now changed. It is disease-centered to patient-centered care where it provides healthcare services and supports to the people. However, there are several security issues and challenges in healthcare 5.0 which may cause the leakage or alteration of sensitive healthcare data. This demands that we need a robust …
Multi-User Eye-Tracking, Bhanuka Mahanama
Multi-User Eye-Tracking, Bhanuka Mahanama
Computer Science Faculty Publications
The human gaze characteristics provide informative cues on human behavior during various activities. Using traditional eye trackers, assessing gaze characteristics in the wild requires a dedicated device per participant and therefore is not feasible for large-scale experiments. In this study, we propose a commodity hardware-based multi-user eye-tracking system. We leverage the recent advancements in Deep Neural Networks and large-scale datasets for implementing our system. Our preliminary studies provide promising results for multi-user eye-tracking on commodity hardware, providing a cost-effective solution for large-scale studies.
Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 1: Introduction To Technology Foresight, Risk Management, And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 1 for course, Developing Technology Foresight: Case Study of AI in InsurTech.
Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Module 2: Case Studies Of Ai And Insurtech, Michael Mcshane, C. Ariel Pinto, Hesamoddin Tahami, Hengameh Fakhravar
Developing Technology Foresight: Case Study of AI in InsurTech
Instructional Module 2 for course, Developing Technology Foresight: Case Study of AI in InsurTech.