Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Physical Sciences and Mathematics

Torward Real-World Cross-View Image Geo-Localization, Sijie Zhu Dec 2022

Torward Real-World Cross-View Image Geo-Localization, Sijie Zhu

Electronic Theses and Dissertations, 2020-2023

Cross-view image geo-localization aims to determine the locations of street-view query images by searching in a GPS-tagged reference image database from aerial view. One fundamental challenge is the dramatic view-point/domain difference between the street-view query images and aerial-view reference images. Recent works have made great progress on bridging the domain gap with advanced deep learning techniques and geometric prior knowledge, i.e. the query is aligned at the center of one aerial-view reference image (spatial alignment) and the orientation relationship between the two views is known (orientation alignment). However, such prior knowledge of the geometry correspondence of the two views is …


Low-Resource Machine Learning Techniques For The Analysis Of Online Social Media Textual Data, Toktam Amanzadeh Oghaz Dec 2022

Low-Resource Machine Learning Techniques For The Analysis Of Online Social Media Textual Data, Toktam Amanzadeh Oghaz

Electronic Theses and Dissertations, 2020-2023

Low-resource and label-efficient machine learning methods can be described as the family of statistical and machine learning techniques that can achieve high performance without needing a substantial amount of labeled data. These methods include both unsupervised learning techniques, such as LDA, and supervised methods, such as active learning, each providing different benefits. Thus, this dissertation is devoted to the design and analysis of unsupervised and supervised techniques to provide solutions for the following problems: Unsupervised narrative summary extraction for social media content, Social media text classification with Active Learning (AL), Investigating restrictions and benefits of using Curriculum Learning (CL) for …


Advanced Deep Learning Methodologies For Deepfake Detection, Aminollah Khormali Dec 2022

Advanced Deep Learning Methodologies For Deepfake Detection, Aminollah Khormali

Electronic Theses and Dissertations, 2020-2023

The recent advances in the field of Artificial Intelligence (AI), particularly Generative Adversarial Networks (GANs) and an abundance of training samples along with robust computational resources have significantly propelled the field of AI-generated fake information in all kinds, e.g., deepfakes. Deepfakes are among the most sinister types of misinformation, posing large-scale and severe security and privacy risks targeting critical governmental institutions and ordinary people across the world. The fact that deepfakes are AI-generated digital content and not actual events captured by a camera implies that they still can be detected using advanced AI models. Although the deepfake detection task has …


Human-Machine Communication: Complete Volume 4 Apr 2022

Human-Machine Communication: Complete Volume 4

Human-Machine Communication

This is the complete volume of HMC Volume 4.


Embracing Ai-Based Education: Perceived Social Presence Of Human Teachers And Expectations About Machine Teachers In Online Education, Jihyun Kim, Kelly Merrill Jr., Kun Xu, Deanna D. Sellnow Apr 2022

Embracing Ai-Based Education: Perceived Social Presence Of Human Teachers And Expectations About Machine Teachers In Online Education, Jihyun Kim, Kelly Merrill Jr., Kun Xu, Deanna D. Sellnow

Human-Machine Communication

Technological advancements in education have turned the idea of machines as teachers into a reality. To better understand this phenomenon, the present study explores how college students develop expectations (or anticipations) about a machine teacher, particularly an AI teaching assistant. Specifically, the study examines whether students’ previous experiences with online courses taught by a human teacher would influence their expectations about AI teaching assistants in future online courses. An online survey was conducted to collect data from college students in the United States. Findings indicate that positively experienced social presence of a human teacher helps develop positive expectations about an …


Sex With Robots And Human-Machine Sexualities: Encounters Between Human-Machine Communication And Sexuality Studies, Marco Dehnert Apr 2022

Sex With Robots And Human-Machine Sexualities: Encounters Between Human-Machine Communication And Sexuality Studies, Marco Dehnert

Human-Machine Communication

Sex robots are a controversial topic. Understood as artificial-intelligence enhanced humanoid robots designed for use in partnered and solo sex, sex robots offer ample opportunities for theorizing from a Human-Machine Communication (HMC) perspective. This comparative literature review conjoins the seemingly disconnected literatures of HMC and sexuality studies (SeS) to explore questions surrounding intimacy, love, desire, sex, and sexuality among humans and machines. In particular, I argue for understanding human-machine sexualities as communicative sexuotechnical-assemblages, extending previous efforts in both HMC and SeS for more-than-human, ecological, and more fluid approaches to humans and machines, as well as to sex and sexuality. This …


I Get By With A Little Help From My Bots: Implications Of Machine Agents In The Context Of Social Support, Austin Beattie, Andrew C. High Apr 2022

I Get By With A Little Help From My Bots: Implications Of Machine Agents In The Context Of Social Support, Austin Beattie, Andrew C. High

Human-Machine Communication

In this manuscript we discuss the increasing use of machine agents as potential sources of support for humans. Continued examination of the use of machine agents, particularly chatbots (or “bots”) for support is crucial as more supportive interactions occur with these technologies. Building off extant research on supportive communication, this manuscript reviews research that has implications for bots as support providers. At the culmination of the literature review, several propositions regarding how factors of technological efficacy, problem severity, perceived stigma, and humanness affect the process of support are proposed. By reviewing relevant studies, we integrate research on human-machine and supportive …


Human, Hybrid, Or Machine? Exploring The Trustworthiness Of Voice-Based Assistants, Lisa Weidmüller Apr 2022

Human, Hybrid, Or Machine? Exploring The Trustworthiness Of Voice-Based Assistants, Lisa Weidmüller

Human-Machine Communication

This study investigates how people assess the trustworthiness of perceptually hybrid communicative technologies such as voice-based assistants (VBAs). VBAs are often perceived as hybrids between human and machine, which challenges previously distinct definitions of human and machine trustworthiness. Thus, this study explores how the two trustworthiness models can be combined in a hybrid trustworthiness model, which model (human, hybrid, or machine) is most applicable to examine VBA trustworthiness, and whether this differs between respondents with different levels of prior experience with VBAs. Results from two surveys revealed that, overall, the human model exhibited the best model fit; however, the hybrid …


Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu Apr 2022

Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu

Human-Machine Communication

The proliferation and integration of social technologies has occurred quickly, and the specific technologies with which we engage are ever-changing. The dynamic nature of the development and use of social technologies is often acknowledged by researchers as a limitation. In this manuscript, however, we present a discussion on the implications of our modern technological context by focusing on processes of socialization and communication that are fundamentally different from their interpersonal corollary. These are presented and discussed with the goal of providing theoretical building blocks toward a more robust understanding of phenomena of human-computer interaction, human-robot interaction, human-machine communication, and interpersonal …


The Symptom Of Ethics: Rethinking Ethics In The Face Of The Machine, David J. Gunkel Apr 2022

The Symptom Of Ethics: Rethinking Ethics In The Face Of The Machine, David J. Gunkel

Human-Machine Communication

This essay argues that it is the machine that constitutes the symptom of ethics— “symptom” understood as that excluded “part that has no part” in the system of moral consideration. Ethics, which has been historically organized around a human or at least biological subject, needs the machine to define the proper limits of the moral community even if it simultaneously excludes such mechanisms from any serious claim on moral consideration. The argument will proceed in five steps or movements. The first part will define and characterize “the symptom” as it has been operationalized in the work of Slovenian philosopher Slavoj …


Methodology Of Augmented Reality Chinese Language Articulatory Pronunciation Practice: Game And Study Design, Daria Sinyagovskaya Jan 2022

Methodology Of Augmented Reality Chinese Language Articulatory Pronunciation Practice: Game And Study Design, Daria Sinyagovskaya

Electronic Theses and Dissertations, 2020-2023

Learning a language can be hard. Learning a language that contains tones to convey meaning is even harder. This dissertation presents a novel methodology for creating a language practice using augmented reality that has never been used before. The design of a new app in AR and non-AR versions can evaluate the same practice methodology. This methodology was applied to new software and was examined in regard to the importance of this software. Although the study results are inconclusive, progress has been made in answering research questions on the effectiveness of AR versus non-AR and the reliability of peer assessment. …


Studying The Robustness Of Machine Learning-Based Malware Detection Models: Analysis, Design, And Implementation, Ahmed Abusnaina Jan 2022

Studying The Robustness Of Machine Learning-Based Malware Detection Models: Analysis, Design, And Implementation, Ahmed Abusnaina

Electronic Theses and Dissertations, 2020-2023

With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifiers are susceptible to adversarial examples and concept drifting, where a small modification in the input space may result in misclassification. The ever-evolving nature of the data, the behavioral and pattern shifting over time not only lessened the trust in the machine learning output but also created a barrier for its usage in critical applications. This dissertation builds toward analyzing machine learning-based malware detection systems, including the detection and mitigation of adversarial malware examples. In particular, we first introduce two black-box adversarial attacks on …


Towards More Efficient Collaborative Distributed Data Analysis And Learning, Zixia Liu Jan 2022

Towards More Efficient Collaborative Distributed Data Analysis And Learning, Zixia Liu

Electronic Theses and Dissertations, 2020-2023

Modern information era gives rise to the persistent generation of large amounts of data with rapid speed and broad geographical distribution. Obtaining knowledge and understanding via analysis and learning from such data have invaluable worth. Features of such data analytical tasks commonly include: data can be large scale and geographically distributed; computing capability demand can be enormous; tasks can be time-critical; some data can be private; participants can have heterogeneous capabilities and non-IID data; and multiple simultaneously submitted data analytical tasks can be possible. These bring challenges to contemporary computing infrastructure and learning models. In view of this, we develop …


Applications For Machine Learning On Readily Available Data From Virtual Reality Training Experiences, Alec Moore Jan 2022

Applications For Machine Learning On Readily Available Data From Virtual Reality Training Experiences, Alec Moore

Electronic Theses and Dissertations, 2020-2023

The purpose of the research presented in this dissertation is to improve virtual reality (VR) training systems by enhancing their understanding of users. While the field of intelligent tutoring systems (ITS) has seen value in this approach, much research into making use of biometrics to improve user understanding and subsequently training, relies on specialized hardware. Through the presented research, I show that with machine learning (ML), the VR system itself can serve as that specialized hardware for VR training systems. I begin by discussing my explorations into using an ecologically valid, specialized training simulation as a testbed to predict knowledge …


Addressing Human-Centered Artificial Intelligence: Fair Data Generation And Classification And Analyzing Algorithmic Curation In Social Media, Amirarsalan Rajabi Jan 2022

Addressing Human-Centered Artificial Intelligence: Fair Data Generation And Classification And Analyzing Algorithmic Curation In Social Media, Amirarsalan Rajabi

Electronic Theses and Dissertations, 2020-2023

With the growing impact of artificial intelligence, the topic of fairness in AI has received increasing attention. Artificial intelligence is observed to have caused unanticipated negative consequences. In this dissertation, we address two critical aspects regarding human-centered artificial intelligence (HCAI), a new paradigm for developing artificial intelligence that is ethical, fair, and helps to improve the human condition. In the first part of this dissertation, we investigate the effect that AI curation of contents by social media platforms has on an online discussions, by studying a polarized discussion in the Twitter network. We then develop a network communication model that …


Authoring Tools For Augmented Reality Scenario Based Training Experiences, Andres Vargas Gonzalez Jan 2022

Authoring Tools For Augmented Reality Scenario Based Training Experiences, Andres Vargas Gonzalez

Electronic Theses and Dissertations, 2020-2023

Augmented Reality's (AR) scope and capabilities have grown considerably in the last few years. AR applications can be run across devices such as phones, wearables, and head-mounted displays (HMDs). The increasing research and commercial efforts in HMDs capabilities allow end users to map a 3D environment and interact with virtual objects that can respond to the physical aspects of the scene. Within this context, AR is an ideal format for in-situ training scenarios. However, building such AR scenarios requires proficiency in game engine development environments and programming expertise. These difficulties can make it challenging for domain experts to create training …


Quantum Graph Parameters, Parisa Darbari Kozekanan Jan 2022

Quantum Graph Parameters, Parisa Darbari Kozekanan

Electronic Theses and Dissertations, 2020-2023

This dissertation considers some of the advantages, and limits, of applying quantum computing to solve two important graph problems. The first is estimating a graph's quantum chromatic number. The quantum chromatic number is the minimum number of colors necessary in a two-player game where the players cannot communicate but share an entangled state and must convince a referee with probability one that they have a proper vertex coloring. We establish several spectral lower bounds for the quantum chromatic number. These lower bounds extend the well-known Hoffman lower bound for the classical chromatic number. The second is the Pattern Matching on …


How Adolescents In The Child Welfare System Seek Support For Their Sexual Risk Experiences Online, Taylor L. Moraguez Jan 2022

How Adolescents In The Child Welfare System Seek Support For Their Sexual Risk Experiences Online, Taylor L. Moraguez

Honors Undergraduate Theses

Youth in the foster care system experience unique and challenging situations online, such as higher risks of inappropriate messaging (e.g., sexting) and unwanted solicitations from strangers. As a vulnerable group of adolescents, foster youth often use online platforms as a resource to express themselves and seek support over their sexual experiences online. This thesis analyzes how foster youth seek support online for their sexual risk experiences, including sexual abuse, sexting, and sexuality. To understand how adolescents (ages 13-17) in the child welfare system seek support for these experiences, we conducted a thematic analysis of 541 individual posts made by 121 …


Exploring The Privacy Dimension Of Wearables Through Machine Learning-Enabled Inference, Ulku Meteriz Yildiran Jan 2022

Exploring The Privacy Dimension Of Wearables Through Machine Learning-Enabled Inference, Ulku Meteriz Yildiran

Electronic Theses and Dissertations, 2020-2023

Today's hyper-connected consumers demand convenient ways to tune into information without switching between devices, which led the industry leaders to the wearables. Wearables such as smartwatches, fitness trackers, and augmented reality (AR) glasses can be comfortably worn on the body. In addition, they offer limitless features, including activity tracking, authentication, navigation, and entertainment. Wearables that provide digestible information stimulate even higher consumer demand. However, to keep up with the ever-growing user expectations, developers keep adding new features and interaction methods to augment the use cases without considering their privacy impacts. In this dissertation, we explore the privacy dimension of wearables …


Computational Methods To Analyze Next-Generation Sequencing Data In Genomics And Metagenomics, Saidi Wang Jan 2022

Computational Methods To Analyze Next-Generation Sequencing Data In Genomics And Metagenomics, Saidi Wang

Electronic Theses and Dissertations, 2020-2023

This thesis focuses on two important computational problems in genomics and metagenomics with the public available next-generation sequencing data. One is about gene regulation, for which we explore how distal regulatory elements may interact with the proximal regulatory elements. The other is about metagenomics, in which we study how to reconstruct bacterial strain genomes from shotgun reads. Studying gene regulation, especially distal gene regulation, is important because regulatory elements, including those in distal regulatory regions, orchestrate when, where and how much a gene is activated under every experimental condition. Their dysfunction results in various types of diseases. Moreover, the current …


Identifying Challenges And Opportunities For Designing Social Media Nudges For Adolescents, Oluwatomisin Obajemu Jan 2022

Identifying Challenges And Opportunities For Designing Social Media Nudges For Adolescents, Oluwatomisin Obajemu

Electronic Theses and Dissertations, 2020-2023

With the prevalence of online risks encountered by youth online, strength-based approaches such as nudges have been recommended as a potential solution to subtly guide teens toward safer decisions. However, most nudging interventions to date have not been designed to cater to teens’ unique needs and online safety concerns. To address this gap, this study aimed to better understand adolescents’ perceptions and feedback on online safety nudges to inform the design of more effective online safety interventions. We conducted 12 semi-structured interviews and 3 focus group sessions with 21 teens (13 – 17 years old) to get their feedback on …


Algorithms For The Detection Of Resolved And Unresolved Targets In The Infrared Bands, Bruce Mcintosh Jan 2022

Algorithms For The Detection Of Resolved And Unresolved Targets In The Infrared Bands, Bruce Mcintosh

Electronic Theses and Dissertations, 2020-2023

This dissertation proposes algorithms for the detection of both resolved and unresolved targets in the infrared bands. Recent breakthroughs in deep learning have spurred major advancements in computer vision, but most of the attention and progress has been focused on RGB imagery from the visual band. The infrared bands such as Long Wave Infrared (LWIR), Medium Wave Infrared (MWIR), Short Wave Infrared (SWIR) and Near Infrared (NIR) each respond differently to physical phenomena, providing information that can be used to better understand the environment. The first task addressed is that of detecting vehicles in heavy clutter in MWIR imagery. A …


Visual Question Answering: Exploring Trade-Offs Between Task Accuracy And Explainability, Aisha Urooj Jan 2022

Visual Question Answering: Exploring Trade-Offs Between Task Accuracy And Explainability, Aisha Urooj

Electronic Theses and Dissertations, 2020-2023

Given visual input and a natural language question about it, the visual question answering (VQA) task is to answer the question correctly. To improve a system's reliability and trustworthiness, it is imperative that it links the text (question and answer) to specific visual regions. This dissertation first explores the VQA task in a multi-modal setting where questions are based on video as well as subtitles. An algorithm is introduced to process each modality and their features are fused to solve the task. Additionally, to understand the model's emphasis on visual data, this study collects a diagnostic set of questions which …


Leveraging Human-Centered Insights And Vision Transformers To Understand And Detect Online Risks In Teens' Private Social Media Conversations On Instagram, Joshua Gracie Jan 2022

Leveraging Human-Centered Insights And Vision Transformers To Understand And Detect Online Risks In Teens' Private Social Media Conversations On Instagram, Joshua Gracie

Electronic Theses and Dissertations, 2020-2023

With the growing ubiquity of the internet and internet enabled devices, the issue of online risk and the need for safety measures against such risks has grown paramount. Many researchers have analyzed the scope and characteristics of online risk, especially with respect to demographics, yet few have studied the risky media itself. This work sets out to move the conversation from surveys and interviews to content analysis and automation through a comprehensive thematic analysis of online multi-media risks (images and videos) sent to and from teens in private messages on Instagram. These messages, along with demographic information such as age …


Deep Learning Anomaly Detection Using Edge Ai, William Holdren Jan 2022

Deep Learning Anomaly Detection Using Edge Ai, William Holdren

Electronic Theses and Dissertations, 2020-2023

Deep learning anomaly detection is an evolving field with many real-world applications. As more and more devices continue to be added to the Internet of Things (IoT), there is an increasing desire to make use of the additional computational capacity to run demanding tasks. The increase in devices and amounts of data flooding in have led to a greater need for security and outlier detection. Motivated by those facts, this thesis studies the potential of creating a distributed anomaly detection framework. While there have been vast amounts of research into deep anomaly detection, there has been no research into building …


Multivariate Cognitive Walkthrough Of Qubitvr: An Educational Quantum Computing, Virtual Reality Application, Pauline Johnson Jan 2022

Multivariate Cognitive Walkthrough Of Qubitvr: An Educational Quantum Computing, Virtual Reality Application, Pauline Johnson

Electronic Theses and Dissertations, 2020-2023

Quantum computing is a promising field but understanding how it works can be challenging for a beginner. There are also not many educational resources to visualize and learn about quantum computing. To advance knowledge in this area, we have created QubitVR, which employs a Bloch sphere representation of a qubit, and supports trajectory visualizations and state equations in a virtual reality (VR) setting. We also conducted a multivariate cognitive walkthrough with subject matter experts (SMEs) on QubitVR to assess the effectiveness of trajectory visualizations and state equations in learning about quantum gates. The results were that trajectory visualizations aided users …


Towards Secure And Trustworthy Iot Systems, Lan Luo Jan 2022

Towards Secure And Trustworthy Iot Systems, Lan Luo

Electronic Theses and Dissertations, 2020-2023

The boom of the Internet of Things (IoT) brings great convenience to the society by connecting the physical world to the cyber world, but it also attracts mischievous hackers for benefits. Therefore, understanding potential attacks aiming at IoT systems and devising new protection mechanisms are of great significance to maintain the security and privacy of the IoT ecosystem. In this dissertation, we first demonstrate potential threats against IoT networks and their severe consequences via analyzing a real-world air quality monitoring system. By exploiting the discovered flaws, we can impersonate any victim sensor device and polluting its data with fabricated data. …


A Human-Centered Approach To Improving Adolescent Online Sexual Risk Detection Algorithms, Afsaneh Razi Jan 2022

A Human-Centered Approach To Improving Adolescent Online Sexual Risk Detection Algorithms, Afsaneh Razi

Electronic Theses and Dissertations, 2020-2023

Computational risk detection has the potential to protect especially vulnerable populations from online victimization. Conducting a comprehensive literature review on computational approaches for online sexual risk detection led to the identification that the majority of this work has focused on identifying sexual predators after-the-fact. Also, many studies rely on public datasets and third-party annotators to establish ground truth and train their algorithms, which do not accurately represent young social media users and their perspectives to prevent victimization. To address these gaps, this dissertation integrated human-centered approaches to both creating representative datasets and developing sexual risk detection machine learning models to …


Reverse Engineering Of Adversarial Samples By Leveraging Patterns Left By The Attacker, Rahul Ambati Jan 2022

Reverse Engineering Of Adversarial Samples By Leveraging Patterns Left By The Attacker, Rahul Ambati

Electronic Theses and Dissertations, 2020-2023

Intrinsic susceptibility of deep learning to adversarial examples has led to a plethora of attack techniques with a common broad objective of fooling deep models. However, we find slight compositional differences between the algorithms achieving this objective. These differences leave traces that provide important clues for attacker profiling in real-life scenarios. Inspired by this, we introduce a novel problem of 'Reverse Engineering of aDversarial attacks' (RED). Given an adversarial example, the objective of RED is to identify the attack used to generate it. Under this perspective, we can systematically group existing attacks into different families, leading to the sub-problem of …


Load Forecasting And Synthetic Data Generation For Smart Home Energy Management System, Mina Razghandi Jan 2022

Load Forecasting And Synthetic Data Generation For Smart Home Energy Management System, Mina Razghandi

Electronic Theses and Dissertations, 2020-2023

A number of recent trends, such as the increased power consumption in developed and developing countries, the dangers associated with greenhouse gases, the potential shortages of fossil fuels, and the increasing availability of solar and wind energy act as motivating factors for the development of more intelligent and efficient systems both on the power provider as well as the consumer side. One of the most important prerequisites for making efficient energy management decisions is the ability to predict energy production and consumption patterns. While long-term forecasting of average consumption had been extensively used to direct investments in the energy grid, …