Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, 2024 The University of Texas MD Anderson Cancer Center UTHealth Graduate School of Biomedical Sciences
Evaluation Of An End-To-End Radiotherapy Treatment Planning Pipeline For Prostate Cancer, Mohammad Daniel El Basha, Court Laurence, Carlos Eduardo Cardenas, Julianne Pollard-Larkin, Steven Frank, David T. Fuentes, Falk Poenisch, Zhiqian H. Yu
Dissertations & Theses (Open Access)
Radiation treatment planning is a crucial and time-intensive process in radiation therapy. This planning involves carefully designing a treatment regimen tailored to a patient’s specific condition, including the type, location, and size of the tumor with reference to surrounding healthy tissues. For prostate cancer, this tumor may be either local, locally advanced with extracapsular involvement, or extend into the pelvic lymph node chain. Automating essential parts of this process would allow for the rapid development of effective treatment plans and better plan optimization to enhance tumor control for better outcomes.
The first objective of this work, to automate the treatment …
Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, 2024 Singapore Management University
Learning Adversarial Semantic Embeddings For Zero-Shot Recognition In Open Worlds, Tianqi Li, Guansong Pang, Xiao Bai, Jin Zheng, Lei Zhou, Xin Ning
Research Collection School Of Computing and Information Systems
Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes with only their side semantic information presented during training. It cannot handle real-life, open-world scenarios where there are test samples of unknown classes for which neither samples (e.g., images) nor their side semantic information is known during training. Open-Set Recognition (OSR) is dedicated to addressing the unknown class issue, but existing OSR methods are not designed to model the semantic information of the unseen classes. To tackle this combined ZSL and OSR problem, we consider the case of “Zero-Shot Open-Set Recognition” (ZS-OSR), where a model is trained under the ZSL …
Diffusion-Based Negative Sampling On Graphs For Link Prediction, 2024 Singapore Management University
Diffusion-Based Negative Sampling On Graphs For Link Prediction, Yuan Fang, Yuan Fang
Research Collection School Of Computing and Information Systems
Link prediction is a fundamental task for graph analysis with important applications on the Web, such as social network analysis and recommendation systems, etc. Modern graph link prediction methods often employ a contrastive approach to learn robust node representations, where negative sampling is pivotal. Typical negative sampling methods aim to retrieve hard examples based on either predefined heuristics or automatic adversarial approaches, which might be inflexible or difficult to control. Furthermore, in the context of link prediction, most previous methods sample negative nodes from existing substructures of the graph, missing out on potentially more optimal samples in the latent space. …
On The Feasibility Of Simple Transformer For Dynamic Graph Modeling, 2024 Singapore Management University
On The Feasibility Of Simple Transformer For Dynamic Graph Modeling, Yuxia Wu, Yuan Fang, Lizi Liao
Research Collection School Of Computing and Information Systems
Dynamic graph modeling is crucial for understanding complex structures in web graphs, spanning applications in social networks, recommender systems, and more. Most existing methods primarily emphasize structural dependencies and their temporal changes. However, these approaches often overlook detailed temporal aspects or struggle with long-term dependencies. Furthermore, many solutions overly complicate the process by emphasizing intricate module designs to capture dynamic evolutions. In this work, we harness the strength of the Transformer’s self-attention mechanism, known for adeptly handling long-range dependencies in sequence modeling. Our approach offers a simple Transformer model, called SimpleDyG, tailored for dynamic graph modeling without complex modifications. We …
Evaluating Introductory Computer Science Labs In The Presence Of Ai Tools, 2024 University of Southern Maine
Evaluating Introductory Computer Science Labs In The Presence Of Ai Tools, Nicholas Snow, Devin Chaimberlain, Abigail Pitcairn, Benjamin Sweeney
Thinking Matters Symposium
This study explores the resistance of introductory computer science lab assignments to “shortcutting” by generative AI tools, such as ChatGPT. By analyzing the work of three distinct student personas on these assignments, we identified key characteristics of language and structure that influence an assignment's vulnerability to AI abuse. Based on these insights, we propose strategies for educators to adapt labs to both counteract AI shortcutting and encourage productive uses of AI.
Optimization Of Memory Management Using Machine Learning, 2024 Southern Adventist University
Optimization Of Memory Management Using Machine Learning, Luke Bartholomew
Campus Research Day
This paper is a proposed solution to the problem of memory safety using machine learning. Memory overload and corruption cause undesirable behaviors in a system that are addressed by memory safety implementations. This project uses machine learning models to classify different states of system memory from a dataset collected from a Raspberry Pi System. These models can then be used to classify real run time memory data and increase memory safety overall in a system.
Jsper (Just Stablediffusion Plus Easy Retraining), 2024 Arkansas Tech University
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
ATU Research Symposium
JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …
Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, 2024 Arkansas Tech University
Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, Sijan Panday, Zurab Sabakhtarishvili, Clayton Jensen
ATU Research Symposium
The advent of large language models (LLMs) such as Chat-GPT and Bard marks a significant milestone in knowledge acquisition, offering a streamlined alternative to the traditionally labor-intensive process of navigating through multiple checkpoints on the web. This emerging trend in LLMs renders the prevalent rule-based chatbots, commonly utilized by universities, increasingly outdated and subpar. This research project proposes integrating LLM technology into university websites, specifically targeting the needs of students seeking information about their institutions by introducing PUAA (Personal University AI Assistant). Our approach involves using the Retrieval-Augmented Generation (RAG) framework, leveraging the capabilities of the LlamaIndex in conjunction with …
Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, 2024 Arkansas Tech University
Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan
ATU Research Symposium
This research explores the growing issue of fake accounts in Online Social Networks [OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax authentication measures have attracted many scammers and cybercriminals. Fake profiles conduct malicious activities, such as phishing, spreading misinformation, and inciting social discord. The consequences range from cyberbullying to deceptive commercial practices. Detecting fake profiles manually is often challenging and causes considerable stress and trust issues for the users. Typically, a social media user scrutinizes various elements like the profile picture, bio, and shared posts to identify fake profiles. These evaluations sometimes lead users to conclude …
Anomaly Detection With Spiking Neural Networks (Snn), 2024 Arkansas Tech University
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
ATU Research Symposium
Abstract:
Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …
Innovating Inventory And Alert Systems With Object Tracking, 2024 Southern Adventist University
Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden
Campus Research Day
Security system users require safeguarding inventory from potential theft while reducing manual tracking of physical objects. Our contribution harnesses the power of artificial intelligence and computer vision with YOLO to automate the process of tracking inventory items. The system sends alerts to the inventory manager when it detects particular events. Our approach was evaluated with KernProf profiling, interference, and orientation tests. The results were overall positive in these testing areas.
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, 2024 William & Mary
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
Cybersecurity Undergraduate Research Showcase
The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …
Comprehensive Question And Answer Generation With Llama 2, 2024 Southern Adventist University
Comprehensive Question And Answer Generation With Llama 2, Matous Hybl
MS in Computer Science Theses
Since the introduction of transformers, large language models have proven capable in many natural language processing fields. However, existing systems still face challenges in generating high-quality extractive questions. Base models and public chatbots fall short if the question source or quantity are critical. Our contribution is a question and answer generator for generating comprehensive, extractive questions and answers. This approach includes fine-tuning a LLaMA 2 base model for answer extraction (AE) and question generation (QG). We evaluate the resulting system using common automated metrics and a manual evaluation. We find that our system is comparable to the latest research and …
Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, 2024 Southern Adventist University
Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler
MS in Computer Science Project Reports
In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …
High-Resolution And Quality Settings With Latent Consistency Models, 2024 Old Dominion University
High-Resolution And Quality Settings With Latent Consistency Models, Steven Chen, Junrui Zhang, Rui Ning
Cybersecurity Undergraduate Research Showcase
Diffusion Models have become powerful generative models which is capable of synthesizing high-quality images across various domains. This paper explores Stable Diffusion and mostly focuses on Latent Diffusion Models. Latent Consistency Models can enhance the inference with minimal iterations. It demonstrates the performance in image in-painting and class-conditional synthesis tasks. Throughout the experiment different datasets and parameter configurations, the paper highlights the image quality, processing time, and parameter. It also discussed the future directions including adding trigger-based implementation and emotional-based themes to replace the prompt.
The Security Of Deep Neural Networks, 2024 Norfolk State University
The Security Of Deep Neural Networks, Jalaya Allen
Cybersecurity Undergraduate Research Showcase
Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …
Artificial Sociality, 2024 University of Turin, Italy
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Artificial Intelligence Could Probably Write This Essay Better Than Me, 2024 Augustana College, Rock Island Illinois
Artificial Intelligence Could Probably Write This Essay Better Than Me, Claire Martino
Augustana Center for the Study of Ethics Essay Contest
No abstract provided.
Cardiogpt: An Ecg Interpretation Generation Model, 2024 Tongji University
Cardiogpt: An Ecg Interpretation Generation Model, Guohua Fu, Jianwei Zheng, Islam Abudayyeh, Chizobam Ani, Cyril Rakovski, Louis Ehwerhemuepha, Hongxia Lu, Yongjuan Guo, Shenglin Liu, Huimin Chu, Bing Yang
Mathematics, Physics, and Computer Science Faculty Articles and Research
Numerous supervised learning models aimed at classifying 12-lead electrocardiograms into different groups have shown impressive performance by utilizing deep learning algorithms. However, few studies are dedicated to applying the Generative Pre-trained Transformer (GPT) model in interpreting electrocardiogram (ECG) using natural language. Thus, we are pioneering the exploration of this uncharted territory by employing the CardioGPT model to tackle this challenge. We used a dataset of ECGs (standard 10s, 12-channel format) from adult patients, with 60 distinct rhythms or conduction abnormalities annotated by board-certified, actively practicing cardiologists. The ECGs were collected from The First Affiliated Hospital of Ningbo University and Shanghai …
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, 2024 Singapore Management University
Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen
Research Collection School Of Computing and Information Systems
Code review is an essential activity for ensuring the quality and maintainability of software projects. However, it is a time-consuming and often error-prone task that can significantly impact the development process. Recently, ChatGPT, a cutting-edge language model, has demonstrated impressive performance in various natural language processing tasks, suggesting its potential to automate code review processes. However, it is still unclear how well ChatGPT performs in code review tasks. To fill this gap, in this paper, we conduct the first empirical study to understand the capabilities of ChatGPT in code review tasks, specifically focusing on automated code refinement based on given …