Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Feature extraction (2)
- Machine learning (2)
- Active learning algorithm (1)
- Algorithms (1)
- Autism (1)
-
- Automatic music generation (1)
- Cameras (1)
- Computer forensics (1)
- Coverage quality maps (1)
- Emotive response (1)
- Fan-out (1)
- Field programmable gate arrays (1)
- Geodesic (1)
- Human-robot interaction (1)
- Image matching (1)
- Image matting (1)
- Interactive segmentation (1)
- Internet telephony (1)
- Invasive software (1)
- Latent Document Semantics (1)
- Malware (1)
- Modeling packages (1)
- Multi-operator supervisory control (1)
- NP-Hard problem (1)
- OCR (1)
- Parameterless method (1)
- Peer-to-peer computing (1)
- Phylogenetic analysis (1)
- Physically based modeling (1)
- Robotics (1)
Articles 1 - 18 of 18
Full-Text Articles in Physical Sciences and Mathematics
Beyond Robot Fan-Out: Towards Multi-Operator Supervisory Control, Michael A. Goodrich, Yisong Guo, Jonathan M. Whetten
Beyond Robot Fan-Out: Towards Multi-Operator Supervisory Control, Michael A. Goodrich, Yisong Guo, Jonathan M. Whetten
Faculty Publications
This paper explores multi-operator supervisory control (MOSC) of multiple independent robots using two complementary approaches: a human factors experiment and an agent-based simulation. The experiment identifies two task and environment limitations on MOSC: task saturation and task diffusion. It also identifies the correlation between task specialization and performance, and the possible existence of untapped spare capacity that emerges when multiple operators coordinate. The presence of untapped spare capacity is explored using agent-based simulation, resulting in evidence which suggests that operators may be more effective when they operate at less than maximum capacity.
Electronic Image Stabilization Using Optical Flow With Inertial Fusion, Michael J. Smith, Alexander J. Boxerbaum, Gilbert L. Peterson, Roger D. Quinn
Electronic Image Stabilization Using Optical Flow With Inertial Fusion, Michael J. Smith, Alexander J. Boxerbaum, Gilbert L. Peterson, Roger D. Quinn
Faculty Publications
When a camera is affixed on a dynamic mobile robot, image stabilization is the first step towards more complex analysis on the video feed. This paper presents a novel electronic image stabilization (EIS) algorithm for highly dynamic mobile robotic platforms. The algorithm combines optical flow motion parameter estimation with angular rate data provided by a strapdown inertial measurement unit (IMU). A discrete Kalman filter in feedforward configuration is used for optimal fusion of the two data sources. Performance evaluations are conducted using a simulated video truth model (capturing the effects of image translation, rotation, blurring, and moving objects), and live …
Detailed Requirements For Robots In Autism Therapy, Alan Atherton, Bonnie Brinton, Mark Colton, Nicole Giullian, Michael A. Goodrich, Daniel Ricks
Detailed Requirements For Robots In Autism Therapy, Alan Atherton, Bonnie Brinton, Mark Colton, Nicole Giullian, Michael A. Goodrich, Daniel Ricks
Faculty Publications
Robot-based autism therapy is a rapidly developing area of research, with a wide variety of robots being developed for use in clinical settings. Specific, detailed requirements for robots and user interfaces are needed to provide guidelines for the creation of robots that more effectively assist therapists in autism therapy. This paper enumerates a set of requirements for a clinical humanoid robot and the associated human interface. The design of two humanoid robots and an intuitive and flexible user interface for use by therapists in the treatment of children with autism are described.
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Sql Querie Recommendations: A Query Fragment-Based Approach, Jayad Akbarnejad, Magdalini Eirinaki, Suju Koshy, Duc On, Neoklis Polyzotis
Faculty Publications
Relational database systems are becoming increasingly popular in the scientific community to support the interactive exploration of large volumes of data. In this scenario, users employ a query interface (typically, a web-based client) to issue a series of SQL queries that aim to analyze the data and mine it for interesting information. First-time users, however, may not have the necessary knowledge to know where to start their exploration. Other times, users may simply overlook queries that retrieve important information. In this work we describe a framework to assist non-expert users by providing personalized query recommendations. The querying behavior of the …
Personal Vs. Social, Magdalini Eirinaki
Personal Vs. Social, Magdalini Eirinaki
Faculty Publications
The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …
Malware Type Recognition And Cyber Situational Awareness, Thomas Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers
Malware Type Recognition And Cyber Situational Awareness, Thomas Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers
Faculty Publications
Current technologies for computer network and host defense do not provide suitable information to support strategic and tactical decision making processes. Although pattern-based malware detection is an active research area, the additional context of the type of malware can improve cyber situational awareness. This additional context is an indicator of threat capability thus allowing organizations to assess information losses and focus response actions appropriately. Malware Type Recognition (MaTR) is a research initiative extending detection technologies to provide the additional context of malware types using only static heuristics. Test results with MaTR demonstrate over a 99% accurate detection rate and 59% …
Supporting Wilderness Search And Rescue With Integrated Intelligence: Autonomy And Information At The Right Time And The Right Place, Michael A. Goodrich, Lanny Lin, Bryan S. Morse, Michael Roscheck
Supporting Wilderness Search And Rescue With Integrated Intelligence: Autonomy And Information At The Right Time And The Right Place, Michael A. Goodrich, Lanny Lin, Bryan S. Morse, Michael Roscheck
Faculty Publications
Current practice in Wilderness Search and Rescue (WiSAR) is analogous to an intelligent system designed to gather and analyze information to find missing persons in remote areas. The system consists of multiple parts — various tools for information management (maps, GPS, etc) distributed across personnel with different skills and responsibilities. Introducing a camera-equipped mini-UAV into this task requires autonomy and information technology that itself is an integrated intelligent system to be used by a sub-team that must be integrated into the overall intelligent system. In this paper, we identify key elements of the integration challenges along two dimensions: (a) attributes …
Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection, Dustyn A. Dodge, Barry E. Mullins, Gilbert L. Peterson, James S. Okolica
Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection, Dustyn A. Dodge, Barry E. Mullins, Gilbert L. Peterson, James S. Okolica
Faculty Publications
Static memory analysis has been proven a valuable technique for digital forensics. However, the memory capture technique halts the system causing the loss of important dynamic system data. As a result, live analysis techniques have emerged to complement static analysis. In this paper, a compiled memory analysis tool for virtualization (CMAT-V) is presented as a virtual machine introspection (VMI) utility to conduct live analysis during simulated cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live system state awareness. CMAT-V parses an arbitrary memory dump from a simulated guest operating system (OS) to extract user information, network usage, …
On The Use Of Cartographic Projections In Visualizing Phylogenetic Treespace, Mark J. Clement, Quinn O. Snell, Kenneth Sundberg
On The Use Of Cartographic Projections In Visualizing Phylogenetic Treespace, Mark J. Clement, Quinn O. Snell, Kenneth Sundberg
Faculty Publications
Phylogenetic analysis is becoming an increasingly important tool for biological research. Applications include epidemiological studies, drug development, and evolutionary analysis. Phylogenetic search is a known NP-Hard problem. The size of the data sets which can be analyzed is limited by the exponential growth in the number of trees that must be considered as the problem size increases. A better understanding of the problem space could lead to better methods, which in turn could lead to the feasible analysis of more data sets. We present a definition of phylogenetic tree space and a visualization of this space that shows significant exploitable …
Parallel Active Learning: Eliminating Wait Time With Minimal Staleness, Paul Felt, Robbie Haertel, Eric K. Ringger, Kevin Seppi
Parallel Active Learning: Eliminating Wait Time With Minimal Staleness, Paul Felt, Robbie Haertel, Eric K. Ringger, Kevin Seppi
Faculty Publications
A practical concern for Active Learning (AL) is the amount of time human experts must wait for the next instance to label. We propose a method for eliminating this wait time independent of specific learning and scoring algorithms by making scores always available for all instances, using old (stale) scores when necessary. The time during which the expert is annotating is used to train models and score instances–in parallel–to maximize the recency of the scores. Our method can be seen as a parameterless, dynamic batch AL algorithm. We analyze the amount of staleness introduced by various AL schemes and then …
Geodesic Graph Cut For Interactive Image Segmentation, Bryan S. Morse, Brian L. Price, Scott Cohen
Geodesic Graph Cut For Interactive Image Segmentation, Bryan S. Morse, Brian L. Price, Scott Cohen
Faculty Publications
Interactive segmentation is useful for selecting objects of interest in images and continues to be a topic of much study. Methods that grow regions from foreground/background seeds, such as the recent geodesic segmentation approach, avoid the boundary-length bias of graph-cut methods but have their own bias towards minimizing paths to the seeds, resulting in increased sensitivity to seed placement. The lack of edge modeling in geodesic or similar approaches limits their ability to precisely localize object boundaries, something at which graph-cut methods generally excel. This paper presents a method for combining geodesicdistance information with edge information in a graphcut optimization …
Simultaneous Foreground, Background, And Alpha Estimation For Image Matting, Bryan S. Morse, Brian L. Price, Scott Cohen
Simultaneous Foreground, Background, And Alpha Estimation For Image Matting, Bryan S. Morse, Brian L. Price, Scott Cohen
Faculty Publications
Image matting is the process of extracting a soft segmentation of an object in an image as defined by the matting equation. Most current techniques focus largely on computing the alpha values of unknown pixels and treat computation of the foreground and background colors as an afterthought, if at all. However, for many applications, such as compositing an object into a new scene or deleting an object from the scene, the foreground and background colors are vital for an acceptable answer. We propose a method of solving for the foreground, background, and alpha of an unknown region in an image …
Developing Cyberspace Data Understanding Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila
Developing Cyberspace Data Understanding Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila
Faculty Publications
Current intrusion detection systems (IDS) generate a large number of specific alerts, but typically do not provide actionable information. Compounding this problem is the fact that many alerts are false positive alerts. This paper applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding of a host environment under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of host-based forensic data collectors. Through knowledge discovery, features are selected to project human understanding of the attack process into the IDS model. By discovering relationships between the data collected and …
Uav Video Coverage Quality Maps And Prioritized Indexing For Wilderness Search And Rescue, Cameron Engh, Michael A. Goodrich, Bryan S. Morse
Uav Video Coverage Quality Maps And Prioritized Indexing For Wilderness Search And Rescue, Cameron Engh, Michael A. Goodrich, Bryan S. Morse
Faculty Publications
Video-equipped mini unmanned aerial vehicles (mini-UAVs) are becoming increasingly popular for surveillance, remote sensing, law enforcement, and search and rescue operations, all of which rely on thorough coverage of a target observation area. However, coverage is not simply a matter of seeing the area (visibility) but of seeing it well enough to allow detection of targets of interest, a quality we here call “see-ability”. Video flashlights, mosaics, or other geospatial compositions of the video may help place the video in context and convey that an area was observed, but not necessarily how well or how often. This paper presents a …
Evaluating Models Of Latent Document Semantics In The Presence Of Ocr Errors, Daniel D. Walker, William B. Lund, Eric K. Ringger
Evaluating Models Of Latent Document Semantics In The Presence Of Ocr Errors, Daniel D. Walker, William B. Lund, Eric K. Ringger
Faculty Publications
Models of latent document semantics such as the mixture of multinomials model and Latent Dirichlet Allocation have received substantial attention for their ability to discover topical semantics in large collections of text. In an effort to apply such models to noisy optical character recognition (OCR) text output, we endeavor to understand the effect that character-level noise can have on unsupervised topic modeling. We show the effects both with document-level topic analysis (document clustering) and with word-level topic analysis (LDA) on both synthetic and real-world OCR data. As expected, experimental results show that performance declines as word error rates increase. Common …
Automatic Generation Of Music For Inducing Emotive Response, Tony R. Martinez, Kristine Monteith, Dan A. Ventura
Automatic Generation Of Music For Inducing Emotive Response, Tony R. Martinez, Kristine Monteith, Dan A. Ventura
Faculty Publications
We present a system that generates original music designed to match a target emotion. It creates n-gram models, Hidden Markov Models, and other statistical distributions based on musical selections from a corpus representing a given emotion and uses these models to probabilistically generate new musical selections with similar emotional content. This system produces unique and often remarkably musical selections that tend to match a target emotion, performing this task at a level that approaches human competency for the same task.
An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills
An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills
Faculty Publications
This paper presents a Field Programmable Gate Array (FPGA)-based tool designed to process file transfers using the BitTorrent Peer-to-Peer (P2P) protocol and VoIP phone calls made using the Session Initiation Protocol (SIP). The tool searches selected control messages in real time and compares the unique identifier of the shared file or phone number against a list of known contraband files or phone numbers. Results show the FPGA tool processes P2P packets of interest 92% faster than a software-only configuration and is 97.6% accurate at capturing and processing messages at a traffic load of 89.6 Mbps.
Directable Weathering Of Concave Rock Using Curvature Estimation, Matthew Beardall, Joseph Butler, Mckay Farley, Michael D. Jones
Directable Weathering Of Concave Rock Using Curvature Estimation, Matthew Beardall, Joseph Butler, Mckay Farley, Michael D. Jones
Faculty Publications
We address the problem of directable weathering of exposed concave rock for use in computer-generated animation or games. Previous weathering models that admit concave surfaces are computationally inefficient and difficult to control. In nature, the spheroidal and cavernous weathering rates depend on the surface curvature. Spheroidal weathering is fastest in areas with large positive mean curvature and cavernous weathering is fastest in areas with large negative mean curvature. We simulate both processes using an approximation of mean curvature on a voxel grid. Both weathering rates are also influenced by rock durability. The user controls rock durability by editing a durability …