Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

2,672 Full-Text Articles 3,703 Authors 915,529 Downloads 179 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

2,672 full-text articles. Page 1 of 111.

Splash: Learnable Activation Functions For Improving Accuracy And Adversarial Robustness, Mohammadamin Tavakoli, Forest Agostinelli, Pierre Baldi 2021 University of California, Irvine

Splash: Learnable Activation Functions For Improving Accuracy And Adversarial Robustness, Mohammadamin Tavakoli, Forest Agostinelli, Pierre Baldi

Publications

We introduce SPLASH units, a class of learnable activation functions shown to simultaneously improve the accuracy of deep neural networks while also improving their robustness to adversarial attacks. SPLASH units have both a simple parameterization and maintain the ability to approximate a wide range of non-linear functions. SPLASH units are: (1) continuous; (2) grounded (f(0)=0"); (3) use symmetric hinges; and (4) their hinges are placed at fixed locations which are derived from the data (i.e. no learning required). Compared to nine other learned and fixed activation functions, including ReLU and its variants, SPLASH units show superior performance ...


Algebraic Graph-Assisted Bidirectional Transformers For Molecular Property Prediction, Dong Chen, Kaifu Gao, Duc Duy Nguyen, Xin Chen, Yi Jiang, Guo-Wei Wei, Feng Pan 2021 Peking University, China

Algebraic Graph-Assisted Bidirectional Transformers For Molecular Property Prediction, Dong Chen, Kaifu Gao, Duc Duy Nguyen, Xin Chen, Yi Jiang, Guo-Wei Wei, Feng Pan

Mathematics Faculty Publications

The ability of molecular property prediction is of great significance to drug discovery, human health, and environmental protection. Despite considerable efforts, quantitative prediction of various molecular properties remains a challenge. Although some machine learning models, such as bidirectional encoder from transformer, can incorporate massive unlabeled molecular data into molecular representations via a self-supervised learning strategy, it neglects three-dimensional (3D) stereochemical information. Algebraic graph, specifically, element-specific multiscale weighted colored algebraic graph, embeds complementary 3D molecular information into graph invariants. We propose an algebraic graph-assisted bidirectional transformer (AGBT) framework by fusing representations generated by algebraic graph and bidirectional transformer, as well as ...


Learn Biologically Meaningful Representation With Transfer Learning, Di He 2021 City University of New York (CUNY)

Learn Biologically Meaningful Representation With Transfer Learning, Di He

Dissertations, Theses, and Capstone Projects

Machine learning has made significant contributions to bioinformatics and computational biol­ogy. In particular, supervised learning approaches have been widely used in solving problems such as bio­marker identification, drug response prediction, and so on. However, because of the limited availability of comprehensively labeled and clean data, constructing predictive models in super­ vised settings is not always desirable or possible, especially when using data­hunger, red­hot learning paradigms such as deep learning methods. Hence, there are urgent needs to develop new approaches that could leverage more readily available unlabeled data in driving successful machine learning ap­ plications in this ...


Grand-Vision: An Intelligent System For Optimized Deployment Scheduling Of Law Enforcement Agents, Jonathan CHASE, Tran PHONG, Kang LONG, Tony LE, Hoong Chuin LAU 2021 Singapore Management University

Grand-Vision: An Intelligent System For Optimized Deployment Scheduling Of Law Enforcement Agents, Jonathan Chase, Tran Phong, Kang Long, Tony Le, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Law enforcement agencies in dense urban environments, faced with a wide range of incidents to handle and limited manpower, are turning to data-driven AI to inform their policing strategy. In this paper we present a patrol scheduling system called GRAND-VISION: Ground Response Allocation and Deployment - Visualization, Simulation, and Optimization. The system employs deep learning to generate incident sets that are used to train a patrol schedule that can accommodate varying manpower, break times, manual pre-allocations, and a variety of spatio-temporal demand features. The complexity of the scenario results in a system with real world applicability, which we demonstrate through simulation ...


Fine-Grained Detection Of Hate Speech Using Bertoxic, Yakoob Khan 2021 Dartmouth College

Fine-Grained Detection Of Hate Speech Using Bertoxic, Yakoob Khan

Dartmouth College Undergraduate Theses

This thesis describes our approach towards the fine-grained detection of hate speech using deep learning. We leverage the transformer encoder architecture to propose BERToxic, a system that fine-tunes a pre-trained BERT model to locate toxic text spans in a given text and utilizes additional post-processing steps to refine the prediction boundaries. The post-processing steps involve (1) labeling character offsets between consecutive toxic tokens as toxic and (2) assigning a toxic label to words that have at least one token labeled as toxic. Through experiments, we show that these two post-processing steps improve the performance of our model by 4.16 ...


Lexical Complexity Prediction With Assembly Models, Aadil Islam 2021 Dartmouth College

Lexical Complexity Prediction With Assembly Models, Aadil Islam

Dartmouth College Undergraduate Theses

Tuning the complexity of one's writing is essential to presenting ideas in a logical, intuitive manner to audiences. This paper describes a system submitted by team BigGreen to LCP 2021 for predicting the lexical complexity of English words in a given context. We assemble a feature engineering-based model and a deep neural network model with an underlying Transformer architecture based on BERT. While BERT itself performs competitively, our feature engineering-based model helps in extreme cases, eg. separating instances of easy and neutral difficulty. Our handcrafted features comprise a breadth of lexical, semantic, syntactic, and novel phonetic measures. Visualizations of ...


Teaching Law And Artificial Intelligence, Brendan Johnson, Francis Shen 2021 University of Minnesota Law School

Teaching Law And Artificial Intelligence, Brendan Johnson, Francis Shen

Minnesota Journal of Law, Science & Technology

No abstract provided.


Malware Classification With Bert, Joel Lawrence Alvares 2021 San Jose State University

Malware Classification With Bert, Joel Lawrence Alvares

Master's Projects

Malware Classification is used to distinguish unique types of malware from each other.

This project aims to carry out malware classification using word embeddings which are used in Natural Language Processing (NLP) to identify and evaluate the relationship between words of a sentence. Word embeddings generated by BERT and Word2Vec for malware samples to carry out multi-class classification. BERT is a transformer based pre- trained natural language processing (NLP) model which can be used for a wide range of tasks such as question answering, paraphrase generation and next sentence prediction. However, the attention mechanism of a pre-trained BERT model can ...


Fake Malware Classification With Cnn Via Image Conversion: A Game Theory Approach, Yash Sahasrabuddhe 2021 San Jose State University

Fake Malware Classification With Cnn Via Image Conversion: A Game Theory Approach, Yash Sahasrabuddhe

Master's Projects

Improvements in malware detection techniques have grown significantly over the past decade. These improvements have resulted in better security for systems from various forms of malware attacks. However, it is also the reason for continuous evolution of malware which makes it harder for current security mechanisms to detect them. Hence, there is a need to understand different malwares and study classification techniques using the ever-evolving field of machine learning. The goal of this research project is to identify similarities between malware families and to improve on classification of malwares within different malware families by implementing Convolutional Neural Networks (CNNs) on ...


Presentation Attack Detection In Facial Biometric Authentication, Hardik Kumar 2021 San Jose State University

Presentation Attack Detection In Facial Biometric Authentication, Hardik Kumar

Master's Projects

Biometric systems are referred to those structures that enable recognizing an individual, or specifically a characteristic, using biometric data and mathematical algorithms. These are known to be widely employed in various organizations and companies, mostly as authentication systems. Biometric authentic systems are usually much more secure than a classic one, however they also have some loopholes. Presentation attacks indicate those attacks which spoof the biometric systems or sensors. The presentation attacks covered in this project are: photo attacks and deepfake attacks. In the case of photo attacks, it is observed that interactive action check like Eye Blinking proves efficient in ...


Classifying Illegal Advertisements On The Darknet Using Nlp, Karan Shashin Shah 2021 San Jose State University

Classifying Illegal Advertisements On The Darknet Using Nlp, Karan Shashin Shah

Master's Projects

The Darknet has become a place to conduct various illegal activities like child labor, contract murder, drug selling while staying anonymous. Traditionally, international and government agencies try to control these activities, but most of those actions are manual and time-consuming. Recently, various researchers developed Machine Learning (ML) approaches trying to aid in the process of detecting illegal activities. The above problem can benefit by using different Natural Language Processing (NLP) techniques. More specifically, researchers have used various classical topic modeling techniques like bag of words, N-grams, Term Frequency, Term Frequency Inverse Document Frequency (TF-IDF) to represent features and train machine ...


Translating Natural Language Queries To Sparql, Shreya Satish Bhajikhaye 2021 San Jose State University

Translating Natural Language Queries To Sparql, Shreya Satish Bhajikhaye

Master's Projects

The Semantic Web is an extensive knowledge base that contains facts in the form of RDF
triples. These facts are not easily accessible to the average user because to use them requires
an understanding of ontologies and a query language like SPARQL. Question answering systems
form a layer of abstraction on linked data to overcome these issues. These systems allow the
user to input a question in a natural language and receive the equivalent SPARQL query. The
user can then execute the query on the database to fetch the desired results. The standard
techniques involved in translating natural language questions ...


A Hybrid Gaze Pointer With Voice Control, Indhuja Ravi 2021 San Jose State University

A Hybrid Gaze Pointer With Voice Control, Indhuja Ravi

Master's Projects

Accessibility in technology has been a challenge since the beginning of the 1800s. Starting with building typewriters for the blind by Pellegrino Turri to the on-screen keyboard built by Microsoft, there have been several advancements towards assistive technologies. The basic tools necessary for anyone to operate a computer are to be able to navigate the device, input information, and perceive the output. All these three categories have been undergoing tremendous advancements over the years. Especially, with the internet boom, it has now become a necessity to point onto a computer screen. This has somewhat attracted research into this particular area ...


Automating Text Encapsulation Using Deep Learning, Anket Sah 2021 San Jose State University

Automating Text Encapsulation Using Deep Learning, Anket Sah

Master's Projects

Data is an important aspect in any form be it communication, reviews, news articles, social media data, machine or real-time data. With the emergence of Covid-19, a pandemic seen like no other in recent times, information is being poured in from all directions on the internet. At times it is overwhelming to determine which data to read and follow. Another crucial aspect is separating factual data from distorted data that is being circulated widely. The title or short description of this data can play a key role. Many times, these descriptions can deceive a user with unwanted information. The user ...


Visual And Lingual Emotion Recognition Using Deep Learning Techniques, Akshay Kajale 2021 San Jose State University

Visual And Lingual Emotion Recognition Using Deep Learning Techniques, Akshay Kajale

Master's Projects

Emotion recognition has been an integral part of many applications like video games, cognitive computing, and human computer interaction. Emotion can be recognized by many sources including speech, facial expressions, hand gestures and textual attributes. We have developed a prototype emotion recognition system using computer vision and natural language processing techniques. Our goal hybrid system uses mobile camera frames and features abstracted from speech named Mel Frequency Cepstral Coefficient (MFCC) to recognize the emotion of a person. To acknowledge the emotions based on facial expressions, we have developed a Convolutional Neural Network (CNN) model, which has an accuracy of 68 ...


American Sign Language Assistant, Charulata Lodha 2021 San Jose State University

American Sign Language Assistant, Charulata Lodha

Master's Projects

Our implementation of a prototype computer vision system to help the deaf and mute
communicate in a shopping setting. Our system uses live video feeds to recognize American Sign Language (ASL) gestures and notify shop clerks of deaf and mute patrons’ intents. It generates a video dataset in the Unity Game Engine of 3D humanoid models in a shop setting performing ASL signs. Our system uses OpenPose to detect and recognize the bone points of the human body
from the live feed. The system then represents the motion sequences as high dimensional skeleton joint point trajectories followed by a time-warping ...


Machine Learning Using Serverless Computing, Vidish Naik 2021 San Jose State University

Machine Learning Using Serverless Computing, Vidish Naik

Master's Projects

Machine learning has been trending in the domain of computer science for quite some time. Newer and newer models and techniques are being developed every day. The adoption of cloud computing has only expedited the process of training machine learning. With its variety of services, cloud computing provides many options for training machine learning models. Leveraging these services is up to the user. Serverless computing is an important service offered by cloud service providers. It is useful for short tasks that are event-driven or periodic. Machine learning training can be divided into short tasks or batches to take advantage of ...


Detecting And Predicting Visual Affordance Of Objects In A Given Environment, Bhumika Kaur Matharu 2021 San Jose State University

Detecting And Predicting Visual Affordance Of Objects In A Given Environment, Bhumika Kaur Matharu

Master's Projects

The rapid growth of the development of autonomous robots is transforming the manufacturing and healthcare industry in many ways, but they still face many challenges. One of the challenges experienced by autonomous robots is their inability to manipulate an unknown object without human supervision. One way through which autonomous robots can manipulate an unknown object is affordance learning [1]. Affordance describes the action a user can perform on the object in given surroundings. This report describes our proposed model to detect and predict the affordance of an object from videos by leveraging the spatial-temporal feature extraction through ConvLSTM and Fully ...


Defending Vehicles Against Cyberthreats: Challenges And A Detection-Based Solution, Qilin Liu 2021 San Jose State University

Defending Vehicles Against Cyberthreats: Challenges And A Detection-Based Solution, Qilin Liu

Master's Projects

The lack of concern with security when vehicular network protocols were designed some thirty years ago is about to take its toll as vehicles become more connected and smart. Today as demands for more functionality and connectivity on vehicles continue to grow, a plethora of Electronic Control Units (ECUs) that are able to communicate to external networks are added to the automobile networks. The proliferation of ECU and the increasing autonomy level give drivers more control over their vehicles and make driving easier, but at the same time they expand the attack surface, bringing more vulnerabilities to vehicles that might ...


Human/Artificial Intelligence Coordination In Video Games, Michael Rodriguez 2021 San Jose State University

Human/Artificial Intelligence Coordination In Video Games, Michael Rodriguez

ART 108: Introduction to Games Studies

The emergence of video games has led to widespread inventions to enhance the reality of the experience. As a result, Artificial Intelligence (A.I.) was developed to create virtual experiences and attract a variety of players of video games. This paper will discuss video games in the context of Human-A.I. interaction and the importance of human coordination in video games. Unprecedented errors have been a common challenge in this relationship. An excellent example of these algorithms include population-based training and self-play, which have gained a lot of interest in video games. A.I. technology has surpassed human ability because ...


Digital Commons powered by bepress