Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

3,731 Full-Text Articles 5,596 Authors 1,396,724 Downloads 209 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

3,731 full-text articles. Page 1 of 167.

Multiparametric Magnetic Resonance Imaging Artificial Intelligence Pipeline For Oropharyngeal Cancer Radiotherapy Treatment Guidance, Kareem Wahid 2023 The Texas Medical Center Library

Multiparametric Magnetic Resonance Imaging Artificial Intelligence Pipeline For Oropharyngeal Cancer Radiotherapy Treatment Guidance, Kareem Wahid

The University of Texas MD Anderson Cancer Center UTHealth Graduate School of Biomedical Sciences Dissertations and Theses (Open Access)

Oropharyngeal cancer (OPC) is a widespread disease and one of the few domestic cancers that is rising in incidence. Radiographic images are crucial for assessment of OPC and aid in radiotherapy (RT) treatment. However, RT planning with conventional imaging approaches requires operator-dependent tumor segmentation, which is the primary source of treatment error. Further, OPC expresses differential tumor/node mid-RT response (rapid response) rates, resulting in significant differences between planned and delivered RT dose. Finally, clinical outcomes for OPC patients can also be variable, which warrants the investigation of prognostic models. Multiparametric MRI (mpMRI) techniques that incorporate simultaneous anatomical and functional information …


Msrl-Net: A Multi-Level Semantic Relation-Enhanced Learning Network For Aspect-Based Sentiment Analysis, Zhenda HU, Zhaoxia WANG, Yinglin WANG, Ah-hwee TAN 2023 Singapore Management University

Msrl-Net: A Multi-Level Semantic Relation-Enhanced Learning Network For Aspect-Based Sentiment Analysis, Zhenda Hu, Zhaoxia Wang, Yinglin Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Aspect-based sentiment analysis (ABSA) aims to analyze the sentiment polarity of a given text towards several specific aspects. For implementing the ABSA, one way is to convert the original problem into a sentence semantic matching task, using pre-trained language models, such as BERT. However, for such a task, the intra- and inter-semantic relations among input sentence pairs are often not considered. Specifically, the semantic information and guidance of relations revealed in the labels, such as positive, negative and neutral, have not been completely exploited. To address this issue, we introduce a self-supervised sentence pair relation classification task and propose a …


Using Azure Automl To Analyze The Effect Of Attendance And Seat Choice On University Student Grades, Ac Hýbl 2023 Southern Adventist University

Using Azure Automl To Analyze The Effect Of Attendance And Seat Choice On University Student Grades, Ac Hýbl

Campus Research Day

Teachers often claim that class attendance and sitting at the front of a classroom improves student grades. This study employs machine learning on a private University's attendance data to analyze this claim. We perform a correlation analysis in Azure by training regression models. No correlation is found. Next we use the K-means clustering algorithm in Azure. At k=2 clusters, a cluster with perfect attendance shows a higher average grade than a cluster with a late attendance average. Seat choice within the classroom does not prove important to the clustering models.


Novel Paradigm For Ai-Driven Scientific Research: From Ai4s To Intelligent Science, Feiyue WANG, Qinghai MIAO 2023 The State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China

Novel Paradigm For Ai-Driven Scientific Research: From Ai4s To Intelligent Science, Feiyue Wang, Qinghai Miao

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu ZHUANG, Cheng ZHOU 2023 Department of Philosophy, Peking University, Beijing 100871, China; Peking University Third Hospital, Beijing 100191, China

From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan 2023 Old Dominion University

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng 2023 Old Dominion University

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


Rigorous Experimentation For Reinforcement Learning, 2023 University of Massachusetts Amherst

Rigorous Experimentation For Reinforcement Learning

Doctoral Dissertations

Scientific fields make advancements by leveraging the knowledge created by others to push the boundary of understanding. The primary tool in many fields for generating knowledge is empirical experimentation. Although common, generating accurate knowledge from empirical experiments is often challenging due to inherent randomness in execution and confounding variables that can obscure the correct interpretation of the results. As such, researchers must hold themselves and others to a high degree of rigor when designing experiments. Unfortunately, most reinforcement learning (RL) experiments lack this rigor, making the knowledge generated from experiments dubious. This dissertation proposes methods to address central issues in …


Learning From Sequential User Data: Models And Sample-Efficient Algorithms, 2023 University of Massachusetts Amherst

Learning From Sequential User Data: Models And Sample-Efficient Algorithms

Doctoral Dissertations

Recent advances in deep learning have made learning representation from ever-growing datasets possible in the domain of vision, natural language processing (NLP), and robotics, among others. However, deep networks are notoriously data-hungry; for example, training language models with attention mechanisms sometimes requires trillions of parameters and tokens. In contrast, we can often access a limited number of samples in many tasks. It is crucial to learn models from these `limited' datasets. Learning with limited datasets can take several forms. In this thesis, we study how to select data samples sequentially such that downstream task performance is maximized. Moreover, we study …


Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe 2023 Belmont University

Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe

Belmont University Research Symposium (BURS)

Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …


Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park 2023 University of Nebraska at Omaha

Attenuated Skeletal Muscle Metabolism Explains Blunted Reactive Hyperemia After Prolonged Sitting, Cody Anderson, Elizabeth Pekas, Michael Allen, Song-Young Park

UNO Student Research and Creative Activity Fair

Introduction: Although reduced post-occlusive reactive hyperemia (PORH) after prolonged sitting (PS) has been reported as impaired microvascular function, no specific mechanism(s) have been elucidated. One potential mechanism, independent of microvascular function, is that an altered muscle metabolic rate (MMR) may change the magnitude of PORH by modifying the oxygen deficit achieved during cuff-induced arterial occlusions. We speculated that if MMR changes during PS, this may invalidate current inferences about microvascular function during PS. Objective: Therefore, the objective of this study was to examine if peripheral leg MMR changes during PS and to ascertain whether the change in the oxygen deficit …


Fraud Pattern Detection For Nft Markets, Andrew Leppla, Jorge Olmos, Jaideep Lamba 2023 Southern Methodist University

Fraud Pattern Detection For Nft Markets, Andrew Leppla, Jorge Olmos, Jaideep Lamba

SMU Data Science Review

Non-Fungible Tokens (NFTs) enable ownership and transfer of digital assets using blockchain technology. As a relatively new financial asset class, NFTs lack robust oversight and regulations. These conditions create an environment that is susceptible to fraudulent activity and market manipulation schemes. This study examines the buyer-seller network transactional data from some of the most popular NFT marketplaces (e.g., AtomicHub, OpenSea) to identify and predict fraudulent activity. To accomplish this goal multiple features such as price, volume, and network metrics were extracted from NFT transactional data. These were fed into a Multiple-Scale Convolutional Neural Network that predicts suspected fraudulent activity based …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn 2023 Southern Methodist University

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Impacts Of Cutting-Edge Artificial Intelligence On Economic Research Paradigm, Yongmiao HONG, Shouyang WANG 2023 Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China School of Economics and Management, University of Chinese Academy of Sciences, Beijing 100190, China MOE Social Science Laboratory of Digital Economic Forecasts and Policy Simulation, University of Chinese Academy of Sciences, Beijing 100190, China

Impacts Of Cutting-Edge Artificial Intelligence On Economic Research Paradigm, Yongmiao Hong, Shouyang Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Source-Free Domain Adaptation For Sleep Stage Classification, Yasmin Niknam 2023 The University of Western Ontario

Source-Free Domain Adaptation For Sleep Stage Classification, Yasmin Niknam

Electronic Thesis and Dissertation Repository

The popularity of machine learning algorithms has increased in recent years as data volumes have risen, algorithms have advanced, and computational power and storage have improved. EEG-based sleep staging has become one of the most active research areas over the last decade. Labeling each sleep stage manually is a labor-intensive and time-consuming process that requires expertise, making it susceptible to human error. In the meantime, training models on an unseen dataset remains challenging due to physiological differences between subjects and electrode sensor configurations. Unsupervised domain adaptation approaches may provide a solution to this problem by borrowing knowledge from a labeled …


Ai Applications On Planetary Rovers, Alexis David Pascual 2023 The University of Western Ontario

Ai Applications On Planetary Rovers, Alexis David Pascual

Electronic Thesis and Dissertation Repository

The rise in the number of robotic missions to space is paving the way for the use of artificial intelligence and machine learning in the autonomy and augmentation of rover operations. For one, more rovers mean more images, and more images mean more data bandwidth required for downlinking as well as more mental bandwidth for analyzing the images. On the other hand, light-weight, low-powered microrover platforms are being developed to accommodate the drive for planetary exploration. As a result of the mass and power constraints, these microrover platforms will not carry typical navigational instruments like a stereocamera or a laser …


Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer 2023 University of Minnesota, Morris

Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.


Reducing Negative Transfer Of Random Data In Source-Free Unsupervised Domain Adaptation, Anthony Wong 2023 The University of Western Ontario

Reducing Negative Transfer Of Random Data In Source-Free Unsupervised Domain Adaptation, Anthony Wong

Electronic Thesis and Dissertation Repository

In domain adaptation, a model trained on one dataset (source domain) is applied to a different but related dataset (target domain). The most cutting-edge method is unsupervised source-free domain adaptation (SFDA), in which source data, source labels, and target labels are not available during adaptation. This thesis explores a realistic scenario where the target dataset includes some images that are unrelated to the adaptation process. This scenario can occur from errors in data collection or processing. We provide experiments and analysis to show that current state-of-the-art (SOTA) SFDA methods suffer significant performance drops under a specific domain adaptation setup when …


Deep Vulman: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework, Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian 2023 Army Cyber Institute, U.S. Military Academy

Deep Vulman: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework, Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian

ACI Journal Articles

Cyber vulnerability management is a critical function of a cybersecurity operations center (CSOC) that helps protect organizations against cyber-attacks on their computer and network systems. Adversaries hold an asymmetric advantage over the CSOC, as the number of deficiencies in these systems is increasing at a significantly higher rate compared to the expansion rate of the security teams to mitigate them. The current approaches in cyber vulnerability management are deterministic and one-time decision-making methods, which do not consider future uncertainties when prioritizing and selecting vulnerabilities for mitigation. These approaches are also constrained by the sub-optimal distribution of resources, providing no flexibility …


Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He 2023 University of Denver

Reference Frames In Human Sensory, Motor, And Cognitive Processing, Dongcheng He

Electronic Theses and Dissertations

Reference-frames, or coordinate systems, are used to express properties and relationships of objects in the environment. While the use of reference-frames is well understood in physical sciences, how the brain uses reference-frames remains a fundamental question. The goal of this dissertation is to reach a better understanding of reference-frames in human perceptual, motor, and cognitive processing. In the first project, we study reference-frames in perception and develop a model to explain the transition from egocentric (based on the observer) to exocentric (based outside the observer) reference-frames to account for the perception of relative motion. In a second project, we focus …


Digital Commons powered by bepress