Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Experiences Of Using Intelligent Virtual Assistants By Visually Impaired Students In Online Higher Education, Michele R. Forbes Oct 2019

Experiences Of Using Intelligent Virtual Assistants By Visually Impaired Students In Online Higher Education, Michele R. Forbes

USF Tampa Graduate Theses and Dissertations

In today’s world, the attainment of higher education impacts the acquisition of competitive employment and, thus, quality of life. As a group, persons with disabilities continually fall behind others in such academic progress, requiring new efforts to support their earning of advanced credentials. Though highly beneficial for these individuals, obtaining a degree comes with elevated levels of stress. As enrollment of students with disabilities grows in all formats of higher education, those involved must understand the stress endured by these students and how to diminish it. Theories speculate that technology, such as intelligent virtual assistants, may be a viable tool …


Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson Oct 2019

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson

Electrical & Computer Engineering Theses & Dissertations

Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …


Success Factors Impacting Artificial Intelligence Adoption --- Perspective From The Telecom Industry In China, Hong Chen Jul 2019

Success Factors Impacting Artificial Intelligence Adoption --- Perspective From The Telecom Industry In China, Hong Chen

Theses and Dissertations in Business Administration

As the core driving force of the new round of informatization development and the industrial revolution, the disruptive achievements of artificial intelligence (AI) are rapidly and comprehensively infiltrating into various fields of human activities. Although technologies and applications of AI have been widely studied, and factors that affect AI adoption are identified in existing literature, the impact of success factors on AI adoption remains unknown. Accordingly, the main study of this paper proposes a framework to explore the effects of success factors on AI adoption by integrating the technology, organization, and environment (TOE) framework and diffusion of innovation (DOI) theory. …


Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji Jun 2019

Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji

Honors Theses

Soft robotics is an emerging field of research due to its potential to explore and operate in unstructured, rugged, and dynamic environments. However, the properties that make soft robots compelling also make them difficult to robustly control. Here at Union, we developed the world’s first wireless soft tensegrity robot. The goal of my thesis is to explore effective and efficient methods to explore the diverse behavior our tensegrity robot. We will achieve that by applying state-of-art machine learning technique and a novelty search algorithm.


Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi May 2019

Every Data Point Counts: Political Elections In The Age Of Digital Analytics, Julian Kehle, Samir Naimi

Honors Thesis

Synthesizing the investigative research and cautionary messages from experts in the fields of technology, political science, and behavioral science, this project explores the ways in which digital analytics has begun to influence the American political arena. Historically, political parties have constructed systems to target voters and win elections. However, rapid changes in the field of technology (such as big data, artificial intelligence, and the prevalence of social media) threaten to undermine the integrity of elections themselves. Future political campaigns will utilize profiling to micro-target individuals in order to manipulate and persuade them with hyper-personalized political content. Most dangerously, the average …


Using Data Science To Detect Fake News, Eliza Shoemaker May 2019

Using Data Science To Detect Fake News, Eliza Shoemaker

Senior Honors Projects, 2010-2019

The purpose of this thesis is to assist in automating the detection of Fake News by identifying which features are more useful for different classifiers. The effectiveness of different extracted features for Fake News detection are going to be examined. When classifying text with machine learning algorithms features have to be extracted from the articles for the classifiers to be trained on. In this thesis, several different features are extracted: word counts, ngram counts, term frequency-inverse document frequency, sentiment analysis, lemmatization, and named entity recognition to train the classifiers. Two classifiers are used, a Random Forest classifier and a Naïve …


Designing A General Education Course On The Societal Impacts Of Artificial Intelligence, Vincent Rollins May 2019

Designing A General Education Course On The Societal Impacts Of Artificial Intelligence, Vincent Rollins

Honors Theses

Most colleges, including UTC, already offer an artificial intelligence course (CPSC 4440) as part of their computer science curricula. Such courses are meant to explain the technology behind these elaborate systems, but these courses often neglect extensive coverage of the real-world impacts of the technology itself. UTC also offers a course entitled “Ethical and Social Issues in Computing” that does convey the importance behind the advances of computer technology and its impacts, but this course is practically available only to computer science majors. There is no generalized and widely available course that covers the technological, economic, cultural, philosophical/theological, and ethical …


Imitating Human Responses Via A Dual-Process Model Approach, Matthew A. Grimm Mar 2019

Imitating Human Responses Via A Dual-Process Model Approach, Matthew A. Grimm

Theses and Dissertations

Human-autonomous system teaming is becoming more prevalent in the Air Force and in society. Often, the concept of a shared mental model is discussed as a means to enhance collaborative work arrangements between a human and an autonomous system. The idea being that when the models are aligned, the team is more productive due to an increase in trust, predictability, and apparent understanding. This research presents the Dual-Process Model using multivariate normal probability density functions (DPM-MN), which is a cognitive architecture algorithm based on the psychological dual-process theory. The dual-process theory proposes a bipartite decision-making process in people. It labels …


The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon Jan 2019

The Benefits Of Artificial Intelligence In Cybersecurity, Ricardo Calderon

Economic Crime Forensics Capstones

Cyberthreats have increased extensively during the last decade. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection and Prevention Systems (IDPS), and botnets are almost invisible to current tools. Fortunately, the application of Artificial Intelligence (AI) may increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are able to mine data to detect botnets’ sources. However, the implementation of AI may bring other risks, and cybersecurity experts need to find a …


General Game Playing As A Bandit-Arms Problem: A Multiagent Monte-Carlo Solution Exploiting Nash Equilibria, Brandon Mathewe Banda Jan 2019

General Game Playing As A Bandit-Arms Problem: A Multiagent Monte-Carlo Solution Exploiting Nash Equilibria, Brandon Mathewe Banda

Honors Papers

This project approaches general game playing in a unique way by combining popular methods of stochastic tree searching with a Multiagent system and a unique algorithm that I call the Wise Explorer algorithm. The goal of the system is to explore the worst possible branches of the game first to rule them out, followed by an in-depth search on the most promising branches. The system constantly refers to the data it collects during its extensive search, and it outputs a strategic move for any given state of a game. In essence, if you’re ever in a bind during a game …


Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio Jan 2019

Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio

CCE Theses and Dissertations

Protecting computer networks from intrusions is more important than ever for our privacy, economy, and national security. Seemingly a month does not pass without news of a major data breach involving sensitive personal identity, financial, medical, trade secret, or national security data. Democratic processes can now be potentially compromised through breaches of electronic voting systems. As ever more devices, including medical machines, automobiles, and control systems for critical infrastructure are increasingly networked, human life is also more at risk from cyber-attacks. Research into Intrusion Detection Systems (IDSs) began several decades ago and IDSs are still a mainstay of computer and …


Application Of Retrograde Analysis To Fighting Games, Kristen Yu Jan 2019

Application Of Retrograde Analysis To Fighting Games, Kristen Yu

Electronic Theses and Dissertations

With the advent of the fighting game AI competition, there has been recent interest in two-player fighting games. Monte-Carlo Tree-Search approaches currently dominate the competition, but it is unclear if this is the best approach for all fighting games. In this thesis we study the design of two-player fighting games and the consequences of the game design on the types of AI that should be used for playing the game, as well as formally define the state space that fighting games are based on. Additionally, we also characterize how AI can solve the game given a simultaneous action game model, …


Optimizing The Performance Of Complex Engineering Systems Aided By Artificial Neural Networks, Khalil Qatu Jan 2019

Optimizing The Performance Of Complex Engineering Systems Aided By Artificial Neural Networks, Khalil Qatu

Electronic Theses and Dissertations

In the first problem Polyetherimide graphene nanoplatelets papers (PEIGNP) were tested with different graphene loadings varying from 0-97 weight percent (WT%). The resulting stress-strain curves were utilized to develop two ANN models. Stress-controlled and strain-controlled models. Both models shoan excellent correlation to the experimental. Several Mechanical properties were calculated from the predicted stress-strain curves namely; toughness maximum strength maximum strain and maximum tangent modulus. Both models captured the same overall behavior of the PEIGNP composite. However the strain-controlled model was found to predict lower stress than the stress-controlled model. Finally a Graphical User Interface (GUI) was developed to aid in …


Efficient Detection Of Diseases By Feature Engineering Approach From Chest Radiograph, Avishek Mukherjee Jan 2019

Efficient Detection Of Diseases By Feature Engineering Approach From Chest Radiograph, Avishek Mukherjee

Legacy Theses & Dissertations (2009 - 2024)

Deep Learning is the new state-of-the-art technology in Image Processing. We applied Deep Learning techniques for identification of diseases from Radiographs made publicly available by NIH. We applied some Feature Engineering approach to augment the data from Anterior-Posterior position to Posterior-Anterior position and vice-versa for all the diseases, at the same point we suppressed ‘No Finding’ radiographs which contributed to more than 50% (approximately 60,000) of the dataset to top 1000 images. We also prepared a model by adding a huge amount of noise to the augmented data, which if need be can be deployed at rural locations which lack …