Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Anticipating Widespread Augmented Reality: Insights From The 2018 Ar Visioning Workshop, Gregory F. Welch, Gerd Bruder, Peter Squire, Ryan Schubert Aug 2019

Anticipating Widespread Augmented Reality: Insights From The 2018 Ar Visioning Workshop, Gregory F. Welch, Gerd Bruder, Peter Squire, Ryan Schubert

Faculty Scholarship and Creative Works

In August of 2018 a group of academic, government, and industry experts in the field of Augmented Reality gathered for four days to consider potential technological and societal issues and opportunities that could accompany a future where AR is pervasive in location and duration of use. This report is intended to summarize some of the most novel and potentially impactful insights and opportunities identified by the group.

Our target audience includes AR researchers, government leaders, and thought leaders in general. It is our intent to share some compelling technological and societal questions that we believe are unique to AR, and …


Synergistic Visualization And Quantitative Analysis Of Volumetric Medical Images, Neslisah Torosdagli May 2019

Synergistic Visualization And Quantitative Analysis Of Volumetric Medical Images, Neslisah Torosdagli

Electronic Theses and Dissertations

The medical diagnosis process starts with an interview with the patient, and continues with the physical exam. In practice, the medical professional may require additional screenings to precisely diagnose. Medical imaging is one of the most frequently used non-invasive screening methods to acquire insight of human body. Medical imaging is not only essential for accurate diagnosis, but also it can enable early prevention. Medical data visualization refers to projecting the medical data into a human understandable format at mediums such as 2D or head-mounted displays without causing any interpretation which may lead to clinical intervention. In contrast to the medical …


Student Community Detection And Recommendation Of Customized Paths To Reinforce Academic Success, Yuan Shao May 2019

Student Community Detection And Recommendation Of Customized Paths To Reinforce Academic Success, Yuan Shao

Electronic Theses and Dissertations

Educational Data Mining (EDM) is a research area that analyzes educational data and extracts interesting and unique information to address education issues. EDM implements computational methods to explore data for the purpose of studying questions related to educational achievements. A common task in an educational environment is the grouping of students and the identification of communities that have common features. Then, these communities of students may be studied by a course developer to build a personalized learning system, promote effective group learning, provide adaptive contents, etc. The objective of this thesis is to find an approach to detect student communities …


Describing Images By Semantic Modeling Using Attributes And Tags, Mahdi Mahmoudkalayeh May 2019

Describing Images By Semantic Modeling Using Attributes And Tags, Mahdi Mahmoudkalayeh

Electronic Theses and Dissertations

This dissertation addresses the problem of describing images using visual attributes and textual tags, a fundamental task that narrows down the semantic gap between the visual reasoning of humans and machines. Automatic image annotation assigns relevant textual tags to the images. In this dissertation, we propose a query-specific formulation based on Weighted Multi-view Non-negative Matrix Factorization to perform automatic image annotation. Our proposed technique seamlessly adapt to the changes in training data, naturally solves the problem of feature fusion and handles the challenge of the rare tags. Unlike tags, attributes are category-agnostic, hence their combination models an exponential number of …


Framework For Modeling Attacker Capabilities With Deception, Sharif Hassan May 2019

Framework For Modeling Attacker Capabilities With Deception, Sharif Hassan

Electronic Theses and Dissertations

In this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second zone acts as a point of presence for attackers. The third zone is for administration and monitoring. Using the range, both a control and participant-based …


Mediated Physicality: Inducing Illusory Physicality Of Virtual Humans Via Their Interactions With Physical Objects, Myungho Lee May 2019

Mediated Physicality: Inducing Illusory Physicality Of Virtual Humans Via Their Interactions With Physical Objects, Myungho Lee

Electronic Theses and Dissertations

The term virtual human (VH) generally refers to a human-like entity comprised of computer graphics and/or physical body. In the associated research literature, a VH can be further classified as an avatar - a human-controlled VH, or an agent - a computer-controlled VH. Because of the resemblance with humans, people naturally distinguish them from non-human objects, and often treat them in ways similar to real humans. Sometimes people develop a sense of co-presence or social presence with the VH - a phenomenon that is often exploited for training simulations where the VH assumes the role of a human. Prior research …


Machine Learning From Casual Conversation, Awrad Mohammed Ali May 2019

Machine Learning From Casual Conversation, Awrad Mohammed Ali

Electronic Theses and Dissertations

Human social learning is an effective process that has inspired many existing machine learning techniques, such as learning from observation and learning by demonstration. In this dissertation, we introduce another form of social learning, Learning from a Casual Conversation (LCC). LCC is an open-ended machine learning system in which an artificially intelligent agent learns from an extended dialog with a human. Our system enables the agent to incorporate changes into its knowledge base, based on the human's conversational text input. This system emulates how humans learn from each other through a dialog. LCC closes the gap in the current research …


Quality Diversity: Harnessing Evolution To Generate A Diversity Of High-Performing Solutions, Justin Pugh May 2019

Quality Diversity: Harnessing Evolution To Generate A Diversity Of High-Performing Solutions, Justin Pugh

Electronic Theses and Dissertations

Evolution in nature has designed countless solutions to innumerable interconnected problems, giving birth to the impressive array of complex modern life observed today. Inspired by this success, the practice of evolutionary computation (EC) abstracts evolution artificially as a search operator to find solutions to problems of interest primarily through the adaptive mechanism of survival of the fittest, where stronger candidates are pursued at the expense of weaker ones until a solution of satisfying quality emerges. At the same time, research in open-ended evolution (OEE) draws different lessons from nature, seeking to identify and recreate processes that lead to the type …


A Deep Learning Approach To Diagnosing Schizophrenia, Justin Barry May 2019

A Deep Learning Approach To Diagnosing Schizophrenia, Justin Barry

Electronic Theses and Dissertations

In this article, the investigators present a new method using a deep learning approach to diagnose schizophrenia. In the experiment presented, the investigators have used a secondary dataset provided by National Institutes of Health. The aforementioned experimentation involves analyzing this dataset for existence of schizophrenia using traditional machine learning approaches such as logistic regression, support vector machine, and random forest. This is followed by application of deep learning techniques using three hidden layers in the model. The results obtained indicate that deep learning provides state-of-the-art accuracy in diagnosing schizophrenia. Based on these observations, there is a possibility that deep learning …


Realtime Editing In Virtual Reality For Room Scale Scans, Charles Greenwood May 2019

Realtime Editing In Virtual Reality For Room Scale Scans, Charles Greenwood

Electronic Theses and Dissertations

This work presents a system for the design and implementation of tools that support the editing of room-scale scans within a virtual reality environment, in real time. The moniker REVRRSS ("reverse") thus stands for Real-time Editing (in) Virtual Reality (of) Room Scale Scans. The tools were evaluated for usefulness based upon whether they meet the criterion of real time usability. Users evaluated the editing experience with traditional keyboard-video-mouse compared to a head mounted display and hand-held controllers for Virtual Reality. Results show that users prefer the VR approach. The quality of the finished product when using VR is comparable to …


Transparency And Communication Patterns In Human-Robot Teaming, Shan Lakhmani May 2019

Transparency And Communication Patterns In Human-Robot Teaming, Shan Lakhmani

Electronic Theses and Dissertations

In anticipation of the complex, dynamic battlefields of the future, military operations are increasingly demanding robots with increased autonomous capabilities to support soldiers. Effective communication is necessary to establish a common ground on which human-robot teamwork can be established across the continuum of military operations. However, the types and format of communication for mixed-initiative collaboration is still not fully understood. This study explores two approaches to communication in human-robot interaction, transparency and communication pattern, and examines how manipulating these elements with a robot teammate affects its human counterpart in a collaborative exercise. Participants were coupled with a computer-simulated robot to …


Efficient String Graph Construction Algorithm, S.M. Iqbal Morshed May 2019

Efficient String Graph Construction Algorithm, S.M. Iqbal Morshed

Electronic Theses and Dissertations

In the field of genome assembly research where assemblers are dominated by de Bruijn graph-based approaches, string graph-based assembly approach is getting more attention because of its ability to losslessly retain information from sequence data. Despite the advantages provided by a string graph in repeat detection and in maintaining read coherence, the high computational cost for constructing a string graph hinders its usability for genome assembly. Even though different algorithms have been proposed over the last decade for string graph construction, efficiency is still a challenge due to the demand for processing a large amount of sequence data generated by …


Analysis Literatures Of Machine Learning And Neural Networks For Real Time Scheduling, Phong Nguyenho, Mark Nguyen May 2019

Analysis Literatures Of Machine Learning And Neural Networks For Real Time Scheduling, Phong Nguyenho, Mark Nguyen

Recent Advances in Real-Time Systems

Real time scheduling problems are present in every aspect of software development. An optimized real time scheduling scheme would determine the performance of an operating system. There are many different approaches that real time scheduling researchers developed to tackle scheduling problems in many computer systems that have great important roles in keeping our modern society running smoothly. Neural-network real time scheduling is one of those approaches that can solve many computer scheduling problems. As computing technology advanced, more and more real time scheduling problems arise that need new solutions to keep up with the demand of faster computer systems. In …


Leaning Robust Sequence Features Via Dynamic Temporal Pattern Discovery, Hao Hu May 2019

Leaning Robust Sequence Features Via Dynamic Temporal Pattern Discovery, Hao Hu

Electronic Theses and Dissertations

As a major type of data, time series possess invaluable latent knowledge for describing the real world and human society. In order to improve the ability of intelligent systems for understanding the world and people, it is critical to design sophisticated machine learning algorithms for extracting robust time series features from such latent knowledge. Motivated by the successful applications of deep learning in computer vision, more and more machine learning researchers put their attentions on the topic of applying deep learning techniques to time series data. However, directly employing current deep models in most time series domains could be problematic. …


Decision-Making For Vehicle Path Planning, Jun Xu May 2019

Decision-Making For Vehicle Path Planning, Jun Xu

Electronic Theses and Dissertations

This dissertation presents novel algorithms for vehicle path planning in scenarios where the environment changes. In these dynamic scenarios the path of the vehicle needs to adapt to changes in the real world. In these scenarios, higher performance paths can be achieved if we are able to predict the future state of the world, by learning the way it evolves from historical data. We are relying on recent advances in the field of deep learning and reinforcement learning to learn appropriate world models and path planning behaviors. There are many different practical applications that map to this model. In this …


Predicting Students' Academic Performance With Decision Tree And Neural Network, Junshuai Feng May 2019

Predicting Students' Academic Performance With Decision Tree And Neural Network, Junshuai Feng

Electronic Theses and Dissertations

Educational Data Mining (EDM) is a developing research field that involves many techniques to explore data relating to educational background. EDM can analyze and resolve educational data with computational methods to address educational questions. Similar to EDM, neural networks have been utilized in widespread and successful data mining applications. In this paper, synthetic datasets are employed since this paper aims to explore the methodologies such as decision tree classifiers and neural networks to predict student performance in the context of EDM. Firstly, it introduces EDM and some relative works that have been accomplished previously in this field along with their …


Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell May 2019

Federal, State And Local Law Enforcement Agency Interoperability Capabilities And Cyber Vulnerabilities, Tyrone Trapnell

Electronic Theses and Dissertations

The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state …


Automated Synthesis Of Memristor Crossbar Networks, Dwaipayan Chakraborty Jan 2019

Automated Synthesis Of Memristor Crossbar Networks, Dwaipayan Chakraborty

Electronic Theses and Dissertations

The advancement of semiconductor device technology over the past decades has enabled the design of increasingly complex electrical and computational machines. Electronic design automation (EDA) has played a significant role in the design and implementation of transistor-based machines. However, as transistors move closer toward their physical limits, the speed-up provided by Moore's law will grind to a halt. Once again, we find ourselves on the verge of a paradigm shift in the computational sciences as newer devices pave the way for novel approaches to computing. One of such devices is the memristor -- a resistor with non-volatile memory. Memristors can …


Detecting Anomalies From Big Data System Logs, Siyang Lu Jan 2019

Detecting Anomalies From Big Data System Logs, Siyang Lu

Electronic Theses and Dissertations

Nowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for offering effective data solutions, such as manufacturing, healthcare, education, and media. A common problem about big data systems is called anomaly, e.g., a status deviated from normal execution, which decreases the performance of computation or kills running programs. It is becoming a necessity to detect anomalies and analyze their causes. An effective and economical approach is to analyze system logs. Big data systems produce numerous unstructured logs that contain buried valuable information. However manually detecting anomalies from system logs is a tedious and daunting …


Towards More Reliable Neural Network Learning Models, Navid Kardan Jan 2019

Towards More Reliable Neural Network Learning Models, Navid Kardan

Electronic Theses and Dissertations

Ideally, when a neural network makes a wrong decision or encounters an out-of-distribution example, its predictive confidence should be as low as possible. Three primary contributions in this dissertation address this challenge. The first two contributions are new approaches to mitigate overconfident predictions in modern neural networks. In the first (1), called competitive overcomplete output layer neural networks, several classifiers, as part of the same output layer, are trained simultaneously and later their consensus produces more reliable predictions. The second approach (2) reformulates the original classification problem into several new versions by combining classes together and training a classifier on …


Correctness And Progress Verification Of Non-Blocking Programs, Christina Peterson Jan 2019

Correctness And Progress Verification Of Non-Blocking Programs, Christina Peterson

Electronic Theses and Dissertations

The progression of multi-core processors has inspired the development of concurrency libraries that guarantee safety and liveness properties of multiprocessor applications. The difficulty of reasoning about safety and liveness properties in a concurrent environment has led to the development of tools to verify that a concurrent data structure meets a correctness condition or progress guarantee. However, these tools possess shortcomings regarding the ability to verify a composition of data structure operations. Additionally, verification techniques for transactional memory evaluate correctness based on low-level read/write histories, which is not applicable to transactional data structures that use a high-level semantic conflict detection. In …


Action Recognition, Temporal Localization And Detection In Trimmed And Untrimmed Video, Rui Hou Jan 2019

Action Recognition, Temporal Localization And Detection In Trimmed And Untrimmed Video, Rui Hou

Electronic Theses and Dissertations

Automatic understanding of videos is one of the most active areas of computer vision research. It has applications in video surveillance, human computer interaction, video sports analysis, virtual and augmented reality, video retrieval etc. In this dissertation, we address four important tasks in video understanding, namely action recognition, temporal action localization, spatial-temporal action detection and video object/action segmentation. This dissertation makes contributions to above tasks by proposing. First, for video action recognition, we propose a category level feature learning method. Our proposed method automatically identifies such pairs of categories using a criterion of mutual pairwise proximity in the (kernelized) feature …


Task Focused Robotic Imitation Learning, Pooya Abolghasemi Jan 2019

Task Focused Robotic Imitation Learning, Pooya Abolghasemi

Electronic Theses and Dissertations

For many years, successful applications of robotics were the domain of controlled environments, such as industrial assembly lines. Such environments are custom designed for the convenience of the robot and separated from human operators. In recent years, advances in artificial intelligence, in particular, deep learning and computer vision, allowed researchers to successfully demonstrate robots that operate in unstructured environments and directly interact with humans. One of the major applications of such robots is in assistive robotics. For instance, a wheelchair mounted robotic arm can help disabled users in the performance of activities of daily living (ADLs) such as feeding and …


Multi-Touch Detection And Semantic Response On Non-Parametric Rear-Projection Surfaces, Jason Hochreiter Jan 2019

Multi-Touch Detection And Semantic Response On Non-Parametric Rear-Projection Surfaces, Jason Hochreiter

Electronic Theses and Dissertations

The ability of human beings to physically touch our surroundings has had a profound impact on our daily lives. Young children learn to explore their world by touch; likewise, many simulation and training applications benefit from natural touch interactivity. As a result, modern interfaces supporting touch input are ubiquitous. Typically, such interfaces are implemented on integrated touch-display surfaces with simple geometry that can be mathematically parameterized, such as planar surfaces and spheres; for more complicated non-parametric surfaces, such parameterizations are not available. In this dissertation, we introduce a method for generalizable optical multi-touch detection and semantic response on uninstrumented non-parametric …


Reinforcement Learning For Optimal Control Of Network Epidemic Processes, Alec H. Kerrigan Jan 2019

Reinforcement Learning For Optimal Control Of Network Epidemic Processes, Alec H. Kerrigan

Honors Undergraduate Theses

Our society is increasingly interconnected, making it easy for cascades/epidemic (diseases, disinformation etc). Current epidemic control efforts are based on approximate network epidemic models, which often ignore the unique complexity and rich information embedded in the complex interconnections of real-world networks/populations.Deep reinforcement learning (RL) is a powerful tool at learning policies for these nonlinear, complex processes in high-dimension. To control an epidemic outbreak on a Susceptible-Infected-Susceptible network epidemic model, we design a RL framework with a custom reward structure using the node2vec embedding technique. Results indicate deep RL is able to determine and converge on an optimal intervention policy in …


Utilizing Edge In Iot And Video Streaming Applications To Reduce Bottlenecks In Internet Traffic, Kutalmis Akpinar Jan 2019

Utilizing Edge In Iot And Video Streaming Applications To Reduce Bottlenecks In Internet Traffic, Kutalmis Akpinar

Electronic Theses and Dissertations

There is a large increase in the surge of data over Internet due to the increasing demand on multimedia content. It is estimated that 80% of Internet traffic will be video by 2022, according to a recent study. At the same time, IoT devices on Internet will double the human population. While infrastructure standards on IoT are still nonexistent, enterprise solutions tend to encourage cloud-based solutions, causing an additional surge of data over the Internet. This study proposes solutions to bring video traffic and IoT computation back to the edges of the network, so that costly Internet infrastructure upgrades are …


Learning Internal State Memory Representations From Observation, Josiah Wong Jan 2019

Learning Internal State Memory Representations From Observation, Josiah Wong

Electronic Theses and Dissertations

Learning from Observation (LfO) is a machine learning paradigm that mimics how people learn in daily life: learning how to do something simply by watching someone else do it. LfO has been used in various applications, from video game agent creation to driving a car, but it has always been limited by the inability of an observer to know what a performing entity chooses to remember as they act in an environment. Various methods have either ignored the effects of memory or otherwise made simplistic assumptions about its structure. In this dissertation, we propose a new method, Memory Composition Learning, …


Scalable Network Design And Management With Decentralized Software-Defined Networking, Kuldip Singh Atwal Jan 2019

Scalable Network Design And Management With Decentralized Software-Defined Networking, Kuldip Singh Atwal

Electronic Theses and Dissertations

Network softwarization is among the most significant innovations of computer networks in the last few decades. The lack of uniform and programmable interfaces for network management led to the design of OpenFlow protocol for the university campuses and enterprise networks. This breakthrough coupled with other similar efforts led to an emergence of two complementary but independent paradigms called software-defined networking (SDN) and network function virtualization (NFV). As of this writing, these paradigms are becoming the de-facto norms of wired and wireless networks alike. This dissertation mainly addresses the scalability aspect of SDN for multiple network types. Although centralized control and …


Approximate In-Memory Computing On Rerams, Salman Anwar Khokhar Jan 2019

Approximate In-Memory Computing On Rerams, Salman Anwar Khokhar

Electronic Theses and Dissertations

Computing systems have seen tremendous growth over the past few decades in their capabilities, efficiency, and deployment use cases. This growth has been driven by progress in lithography techniques, improvement in synthesis tools, architectures and power management. However, there is a growing disparity between computing power and the demands on modern computing systems. The standard Von-Neuman architecture has separate data storage and data processing locations. Therefore, it suffers from a memory-processor communication bottleneck, which is commonly referred to as the 'memory wall'. The relatively slower progress in memory technology compared with processing units has continued to exacerbate the memory wall …


Training Neural Networks Through The Integration Of Evolution And Gradient Descent, Gregory Morse Jan 2019

Training Neural Networks Through The Integration Of Evolution And Gradient Descent, Gregory Morse

Electronic Theses and Dissertations

Neural networks have achieved widespread adoption due to both their applicability to a wide range of problems and their success relative to other machine learning algorithms. The training of neural networks is achieved through any of several paradigms, most prominently gradient-based approaches (including deep learning), but also through up-and-coming approaches like neuroevolution. However, while both of these neural network training paradigms have seen major improvements over the past decade, little work has been invested in developing algorithms that incorporate the advances from both deep learning and neuroevolution. This dissertation introduces two new algorithms that are steps towards the integration of …