Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell Dec 2013

Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell

Australian Digital Forensics Conference

Digital forensics plays an increasingly important role within society as the approach to the identification of criminal and cybercriminal activities. It is however widely known that a combination of the time taken to undertake a forensic investigation, the volume of data to be analysed and the number of cases to be processed are all significantly increasing resulting in an ever growing backlog of investigations and mounting costs. Automation approaches have already been widely adopted within digital forensic processes to speed up the identification of relevant evidence – hashing for notable files, file signature analysis and data carving to name a …


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Nov 2013

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Research Collection School Of Computing and Information Systems

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


Machines And The Moral Community, Erica L. Neely Jun 2013

Machines And The Moral Community, Erica L. Neely

Philosophy and Religion Faculty Scholarship

A key distinction in ethics is between members and nonmembers of the moral community. Over time, our notion of this community has expanded as we have moved from a rationality criterion to a sentience criterion for membership. I argue that a sentience criterion is insufficient to accommodate all members of the moral community; the true underlying criterion can be understood in terms of whether a being has interests. This may be extended to conscious, self-aware machines, as well as to any autonomous intelligent machines. Such machines exhibit an ability to formulate desires for the course of their own existence; this …


Iterative Statistical Verification Of Probabilistic Plans, Colin M. Potts May 2013

Iterative Statistical Verification Of Probabilistic Plans, Colin M. Potts

Lawrence University Honors Projects

Artificial intelligence seeks to create intelligent agents. An agent can be anything: an autopilot, a self-driving car, a robot, a person, or even an anti-virus system. While the current state-of-the-art may not achieve intelligence (a rather dubious thing to quantify) it certainly achieves a sense of autonomy. A key aspect of an autonomous system is its ability to maintain and guarantee safety—defined as avoiding some set of undesired outcomes. The piece of software responsible for this is called a planner, which is essentially an automated problem solver. An advantage computer planners have over humans is their ability to consider and …


Practical Tractability Of Csps By Higher Level Consistency And Tree Decomposition, Shant Karakashian May 2013

Practical Tractability Of Csps By Higher Level Consistency And Tree Decomposition, Shant Karakashian

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Constraint Satisfaction is a flexible paradigm for modeling many decision problems in Engineering, Computer Science, and Management. Constraint Satisfaction Problems (CSPs) are in general NP-complete and are usually solved with search. Research has identified various islands of tractability, which enable solving certain CSPs with backtrack-free search. For example, one sufficient condition for tractability relates the consistency level of a CSP to treewidth of the CSP's constraint network. However, enforcing higher levels of consistency on a CSP may require the addition of constraints, thus altering the topology of the constraint network and increasing its treewidth. This thesis addresses the following question: …


Exploiting Domain Structure In Multiagent Decision-Theoretic Planning And Reasoning, Akshat Kumar May 2013

Exploiting Domain Structure In Multiagent Decision-Theoretic Planning And Reasoning, Akshat Kumar

Open Access Dissertations

This thesis focuses on decision-theoretic reasoning and planning problems that arise when a group of collaborative agents are tasked to achieve a goal that requires collective effort. The main contribution of this thesis is the development of effective, scalable and quality-bounded computational approaches for multiagent planning and coordination under uncertainty. This is achieved by a synthesis of techniques from multiple areas of artificial intelligence, machine learning and operations research. Empirically, each algorithmic contribution has been tested rigorously on common benchmark problems and, in many cases, real-world applications from machine learning and operations research literature.

The first part of the thesis …


A Hybrid Recommendation System Based On Association Rules, Ahmed Alsalama May 2013

A Hybrid Recommendation System Based On Association Rules, Ahmed Alsalama

Masters Theses & Specialist Projects

Recommendation systems are widely used in e-commerce applications. The
engine of a current recommendation system recommends items to a particular user based on user preferences and previous high ratings. Various recommendation schemes such as collaborative filtering and content-based approaches are used to build a recommendation system. Most of current recommendation systems were developed to fit a certain domain such as books, articles, and movies. We propose a hybrid framework recommendation system to be applied on two dimensional spaces (User × Item) with a large number of users and a small number of items. Moreover, our proposed framework makes use of …


Actual Entities: A Control Method For Unmanned Aerial Vehicles, Erica Absetz Apr 2013

Actual Entities: A Control Method For Unmanned Aerial Vehicles, Erica Absetz

Theses and Dissertations

The focus of this thesis is on Actual Entities, a concept created by the philosopher Alfred North Whitehead, and how the concept can be applied to Unmanned Aerial Vehicles as a behavioral control method. Actual Entities are vector based, atomic units that use a method called prehension to observe their environment and react with various actions. When combining multiple Actual Entities a Colony of Prehending Entities is created; when observing their prehensions an intelligent behavior emerges. By applying the characteristics of Actual Entities to Unmanned Aerial Vehicles, specifically in a situation where they are searching for targets, this emergent, intelligent …


Coupling Numerical Simulation And Pattern Recognition To Model Production And Evaluate Carbon Dioxide Injection In Shale Gas Reservoir, Amirmasoud Kalantari-Dahaghi Jan 2013

Coupling Numerical Simulation And Pattern Recognition To Model Production And Evaluate Carbon Dioxide Injection In Shale Gas Reservoir, Amirmasoud Kalantari-Dahaghi

Graduate Theses, Dissertations, and Problem Reports

Massive multi-cluster, multi-stage hydraulic fractures have significantly increased the complexity of the flow behavior in shale. This has translated into multiple challenges in the modeling of production from shale wells.

Most commonly used numerical techniques for modeling production from shale wells are Explicit Hydraulic Fracture (EHF) and Stimulated Reservoir Volume (SRV). Model setup for the EHF technique is long and laborious and its implementation is computationally expensive, such that it becomes impractical to model beyond a single pad. On the other hand, identifying the extent and conductivity of SRV is a challenging proposition. SRV technique is commonly used to simplify …