The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt,
2023
American University in Cairo
The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy
Theses and Dissertations
Artificial Intelligence (AI) is an emerging technology that is transforming various aspects of society, including higher education. This paper examines faculty perspectives from five different institutions; The American University in Cairo (AUC), The German University in Cairo (GUC), The Arab Academy for Science and Technology (AAST), Ain Shams University, and Cairo University, on the use of AI in higher education in teaching and learning in Egypt, with all its challenges and resources available to support it, and how it can be used to achieve equity and accessibility. This research was conducted through a qualitative study using semi-structured one- on-one interviews …
Cyber Creative Generative Adversarial Network For Novel Malicious Packets,
2023
Army Cyber Institute, U.S. Military Academy
Cyber Creative Generative Adversarial Network For Novel Malicious Packets, John Pavlik, Nathaniel D. Bastian
ACI Journal Articles
Machine learning (ML) requires both quantity and variety of examples in order to learn generalizable patterns. In cybersecurity, labeling network packets is a tedious and difficult task. This leads to insufficient labeled datasets of network packets for training ML-based Network Intrusion Detection Systems (NIDS) to detect malicious intrusions. Furthermore, benign network traffic and malicious cyber attacks are always evolving and changing, meaning that the existing datasets quickly become obsolete. We investigate generative ML modeling for network packet synthetic data generation/augmentation to improve NIDS detection of novel, but similar, cyber attacks by generating well-labeled synthetic network traffic. We develop a Cyber …
Data-Efficient, Federated Learning For Raw Network Traffic Detection,
2023
Army Cyber Institute, United States Military Academy
Data-Efficient, Federated Learning For Raw Network Traffic Detection, Mikal Willeke, David A. Bierbrauer, Nathaniel D. Bastian
ACI Journal Articles
Traditional machine learning (ML) models used for enterprise network intrusion detection systems (NIDS) typically rely on vast amounts of centralized data with expertly engineered features. Previous work, however, has shown the feasibility of using deep learning (DL) to detect malicious activity on raw network traffic payloads rather than engineered features at the edge, which is necessary for tactical military environments. In the future Internet of Battlefield Things (IoBT), the military will find itself in multiple environments with disconnected networks spread across the battlefield. These resource-constrained, data-limited networks require distributed and collaborative ML/DL models for inference that are continually trained both …
Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation,
2023
University of Southern Maine
Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation, Nick Littlefield
Thinking Matters Symposium
Deep learning models can be difficult to train because they require large amounts of data, which we usually do not have or are too expensive to get or annotate. To overcome this problem, we can use few-shot meta-learning, which allows us to train deep learning models with little data. Using a few examples, meta-learning, or learning-to-learn, aims to use the experience learned during training to generalize to unknown tasks. Medical imaging is an industry where it is particularly useful, as there is limited publicly available data due to patient privacy concerns and annotating costs.
This project examines how meta-learning performs …
Adversary Aware Continual Learning,
2023
Rowan University
Adversary Aware Continual Learning, Muhammad Umer
Theses and Dissertations
Continual learning approaches are useful as they help the model to learn new information (classes) sequentially, while also retaining the previously acquired information (classes). However, these approaches are adversary agnostic, i.e., they do not consider the possibility of malicious attacks. In this dissertation, we have demonstrated that continual learning approaches are extremely vulnerable to the adversarial backdoor attacks, where an intelligent adversary can introduce small amount of misinformation to the model in the form of imperceptible backdoor pattern during training to cause deliberate forgetting of a specific class at test time. We then propose a novel defensive framework to counter …
Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers,
2023
University of Tennesse, Knoxville
Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers, Joshua Ortiz Baco, Benjamin Charles Germain Lee, Jim Casey, Sarah H. Salter
Criticism
Digital collections of newspapers have drawn broader attention to the fragmented and scattered print histories of minoritized communities. Attempts to survey these histories through bibliography, however, quickly meet with a fundamental problem: the practice of bibliographic description calls for creating a static record of social affiliations. Given the overwhelming scholarly consensus that categories such as race, ethnicity, and language are socially constructed, this article introduces an experimental bibliographic method for mapping the vast landscape of historical newspapers. This method extends the machine learning affordances of a recent project called Newspaper Navigator to enumerate the newspapers in Chronicling America according to …
Sarcasm Detection In English And Arabic Tweets Using Transformer Models,
2023
Dartmouth College
Sarcasm Detection In English And Arabic Tweets Using Transformer Models, Rishik Lad
Computer Science Senior Theses
This thesis describes our approach toward the detection of sarcasm and its various types in English and Arabic Tweets through methods in deep learning. There are five problems we attempted: (1) detection of sarcasm in English Tweets, (2) detection of sarcasm in Arabic Tweets, (3) determining the type of sarcastic speech subcategory for English Tweets, (4) determining which of two semantically equivalent English Tweets is sarcastic, and (5) determining which of two semantically equivalent Arabic Tweets is sarcastic. All tasks were framed as classification problems, and our contributions are threefold: (a) we developed an English binary classifier system with RoBERTa, …
Does A Neural Model Understand The De Re / De Dicto Distinction?,
2023
McGill University
Does A Neural Model Understand The De Re / De Dicto Distinction?, Gaurav Kamath, Laurestine Bradford
Proceedings of the Society for Computation in Linguistics
Neural network language models (NNLMs) are often casually said to "understand" language, but what linguistic structures do they really learn? We pose this question in the context of de re / de dicto ambiguities. Nouns and determiner phrases in intensional contexts, such as belief, desire, and modality, are subject to referential ambiguities. The phrase "Lilo believes an alien is on the loose,'' for example, has two interpretations: one ("de re") in which she believes a specific entity which happens to be an alien is on the loose, and another ("de dicto") in which she believes …
Differentiable Tree Operations Promote Compositional Generalization,
2023
Johns Hopkins University
Differentiable Tree Operations Promote Compositional Generalization, Paul Soulos, Edward Hu, Kate Mccurdy, Yunmo Chen, Roland Fernandez, Paul Smolensky, Jianfeng Gao
Proceedings of the Society for Computation in Linguistics
No abstract provided.
Evaluating Neural Networks As Cognitive Models For Learning Quasi-Regularities In Language,
2023
The Graduate Center, City University of New York
Evaluating Neural Networks As Cognitive Models For Learning Quasi-Regularities In Language, Xiaomeng Ma
Dissertations, Theses, and Capstone Projects
Many aspects of language can be categorized as quasi-regular: the relationship between the inputs and outputs is systematic but allows many exceptions. Common domains that contain quasi-regularity include morphological inflection and grapheme-phoneme mapping. How humans process quasi-regularity has been debated for decades. This thesis implemented modern neural network models, transformer models, on two tasks: English past tense inflection and Chinese character naming, to investigate how transformer models perform quasi-regularity tasks. This thesis focuses on investigating to what extent the models' performances can represent human behavior. The results show that the transformers' performance is very similar to human behavior in many …
Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris,
2023
Singapore Management University
Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris, Steven M. Miller
Research Collection School Of Computing and Information Systems
This working paper is entirely comprised of a timeline table that begins in 2002 and runs through mid-2023. Across these two decades, this timeline traces the evolutionary development of the following:
- The early Singapore R&D efforts to apply software-based image analysis algorithms and methods to analyse eye retina images for diabetic retinopathy and other eye diseases. This was based on a collaboration between the Singapore Eye Research Institute (SERI) and its parent organization, the Singapore National Eye Centre (SNEC), with faculty from the School of Computing at National University of Singapore.
- The establishment and operation of the Singapore Integrated Diabetic …
Generative Ai Tools In Art Education: Exploring Prompt Engineering And Iterative Processes For Enhanced Creativity,
2023
Lindenwood University
Generative Ai Tools In Art Education: Exploring Prompt Engineering And Iterative Processes For Enhanced Creativity, James Hutson, Peter Cotroneo
Faculty Scholarship
The rapid development and adoption of generative artificial intelligence (AI) tools in the art and design education landscape have introduced both opportunities and challenges. This timely study addresses the need to effectively integrate these tools into the classroom while considering ethical implications and the importance of prompt engineering. By examining the iterative process of refining original ideas through multiple iterations, verbal expansion, and the use of OpenAI’s DALL E2 for generating diverse visual outcomes, researchers gain insights into the potential benefits and pitfalls of these tools in an educational context. Students in the digital at case study were taught prompt …
Life, Death, And Ai: Exploring Digital Necromancy In Popular Culture—Ethical Considerations, Technological Limitations, And The Pet Cemetery Conundrum,
2023
Lindenwood University
Life, Death, And Ai: Exploring Digital Necromancy In Popular Culture—Ethical Considerations, Technological Limitations, And The Pet Cemetery Conundrum, James Hutson, Jeremiah Ratican
Faculty Scholarship
This article explores the rise of generative AI, particularly ChatGPT, and the combination of large language models (LLM) with robotics, exemplified by Ameca the Robot. It addresses the need to study the ethical considerations and potential implications of digital necromancy, which involves using AI to reanimate deceased individuals for various purposes. Reasons for desiring to engage with a disembodied or bodied replica of a person include the preservation of memories, emotional closure, cultural heritage and historical preservation, interacting with idols or influential figures, educational and research purposes, and creative expression and artistic endeavors. As such, this article examines historical examples …
Human-Ai Collaboration For Smart Education: Reframing Applied Learning To Support Metacognition,
2023
Lindenwood University
Human-Ai Collaboration For Smart Education: Reframing Applied Learning To Support Metacognition, James Hutson, Daniel Plate
Faculty Scholarship
This chapter investigates the profound influence of intelligent virtual assistants (IVAs) on the educational domain, specifically in the realm of individualized learning and the instruction of writing abilities and content creation. IVAs, incorporating generative AI technologies such as ChatGPT and Stable Diffusion, hold the potential to bring about a paradigm shift in educational programs, emphasizing the enhancement of advanced metacognitive capacities rather than the fundamentals of communication. The subsequent recommendations stress the need to cultivate enduring proficiencies and ascertain tailored learning approaches for each learner, which will be indispensable for success in the evolving job market. In this context, prompt …
What Effects Do Large Language Models Have On Cybersecurity,
2023
Old Dominion University
What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall
Cybersecurity Undergraduate Research Showcase
Large Language Models (LLMs) are artificial intelligence (AI) tools that can process, summarize, and translate texts and predict future words in a sentence, letting the LLM generate sentences similar to how humans talk and write. One concern that needs to be flagged is that, often, the content generated by different LLMs is inaccurate. LLMs are trained on code that can be used to detect data breaches, detect ransomware, and even pinpoint organizational vulnerabilities in advance of a cyberattack. LLMs are new but have unbelievable potential with their ability to generate code that brings awareness to cyber analysts and IT professionals. …
Data-Optimized Spatial Field Predictions For Robotic Adaptive Sampling: A Gaussian Process Approach,
2023
Dartmouth College
Data-Optimized Spatial Field Predictions For Robotic Adaptive Sampling: A Gaussian Process Approach, Zachary Nathan
Computer Science Senior Theses
We introduce a framework that combines Gaussian Process models, robotic sensor measurements, and sampling data to predict spatial fields. In this context, a spatial field refers to the distribution of a variable throughout a specific area, such as temperature or pH variations over the surface of a lake. Whereas existing methods tend to analyze only the particular field(s) of interest, our approach optimizes predictions through the effective use of all available data. We validated our framework on several datasets, showing that errors can decline by up to two-thirds through the inclusion of additional colocated measurements. In support of adaptive sampling, …
Constrained Optimization Based Adversarial Example Generation For Transfer Attacks In Network Intrusion Detection Systems,
2023
Army Cyber Institute, U.S. Military Academy
Constrained Optimization Based Adversarial Example Generation For Transfer Attacks In Network Intrusion Detection Systems, Marc Chale, Bruce Cox, Jeffery Weir, Nathaniel D. Bastian
ACI Journal Articles
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering. Adversarial machine learning methods have been used to evade classifiers in the computer vision domain; however, existing methods do not translate well into the constrained cyber domain as they tend to produce non-functional network packets. This research views the payload of network packets as code with many functional units. A meta-heuristic based generative model is developed to maximize classification loss of packet payloads with respect to a surrogate model by repeatedly substituting units of code with functionally equivalent counterparts. The …
Algorithmic Bias: Causes And Effects On Marginalized Communities,
2023
University of San Diego
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Using Deep Neural Networks To Classify Astronomical Images,
2023
Seattle Pacific University
Using Deep Neural Networks To Classify Astronomical Images, Andrew D. Macpherson
Honors Projects
As the quantity of astronomical data available continues to exceed the resources available for analysis, recent advances in artificial intelligence encourage the development of automated classification tools. This paper lays out a framework for constructing a deep neural network capable of classifying individual astronomical images by describing techniques to extract and label these objects from large images.
The Model 2.0 And Friends: An Interim Report,
2023
University of California, San Diego
The Model 2.0 And Friends: An Interim Report, Garrison W. Cottrell, Martha Gahl, Shubham Kulkarni, Shashank Venkatramani, Yash Shah, Keyu Long, Xuzhe Zhi, Shivaank Agarwal, Cody Li, Jingyuan He, Thomas Fischer
MODVIS Workshop
Last year, I reported on preliminary results of an anatomically-inspired deep learning model of the visual system and its role in explaining the face inversion effect. This year, I will report on new results and some variations on network architectures that we have explored, mainly as a way to generate discussion and get feedback. This is by no means a polished, final presentation!
We look forward to the group’s suggestions for these projects.
