Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics Commons

Open Access. Powered by Scholars. Published by Universities.®

3,907 Full-Text Articles 6,014 Authors 1,468,972 Downloads 216 Institutions

All Articles in Artificial Intelligence and Robotics

Faceted Search

3,907 full-text articles. Page 1 of 175.

The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy 2023 American University in Cairo

The Use Of Artificial Intelligence In Higher Education: A Study On Faculty Perspectives In Universities In Egypt, Farah S. Sharawy

Theses and Dissertations

Artificial Intelligence (AI) is an emerging technology that is transforming various aspects of society, including higher education. This paper examines faculty perspectives from five different institutions; The American University in Cairo (AUC), The German University in Cairo (GUC), The Arab Academy for Science and Technology (AAST), Ain Shams University, and Cairo University, on the use of AI in higher education in teaching and learning in Egypt, with all its challenges and resources available to support it, and how it can be used to achieve equity and accessibility. This research was conducted through a qualitative study using semi-structured one- on-one interviews …


Cyber Creative Generative Adversarial Network For Novel Malicious Packets, John Pavlik, Nathaniel D. Bastian 2023 Army Cyber Institute, U.S. Military Academy

Cyber Creative Generative Adversarial Network For Novel Malicious Packets, John Pavlik, Nathaniel D. Bastian

ACI Journal Articles

Machine learning (ML) requires both quantity and variety of examples in order to learn generalizable patterns. In cybersecurity, labeling network packets is a tedious and difficult task. This leads to insufficient labeled datasets of network packets for training ML-based Network Intrusion Detection Systems (NIDS) to detect malicious intrusions. Furthermore, benign network traffic and malicious cyber attacks are always evolving and changing, meaning that the existing datasets quickly become obsolete. We investigate generative ML modeling for network packet synthetic data generation/augmentation to improve NIDS detection of novel, but similar, cyber attacks by generating well-labeled synthetic network traffic. We develop a Cyber …


Data-Efficient, Federated Learning For Raw Network Traffic Detection, Mikal Willeke, David A. Bierbrauer, Nathaniel D. Bastian 2023 Army Cyber Institute, United States Military Academy

Data-Efficient, Federated Learning For Raw Network Traffic Detection, Mikal Willeke, David A. Bierbrauer, Nathaniel D. Bastian

ACI Journal Articles

Traditional machine learning (ML) models used for enterprise network intrusion detection systems (NIDS) typically rely on vast amounts of centralized data with expertly engineered features. Previous work, however, has shown the feasibility of using deep learning (DL) to detect malicious activity on raw network traffic payloads rather than engineered features at the edge, which is necessary for tactical military environments. In the future Internet of Battlefield Things (IoBT), the military will find itself in multiple environments with disconnected networks spread across the battlefield. These resource-constrained, data-limited networks require distributed and collaborative ML/DL models for inference that are continually trained both …


Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation, Nick Littlefield 2023 University of Southern Maine

Utilizing Few-Shot Meta Learning Algorithms For Medical Image Segmentation, Nick Littlefield

Thinking Matters Symposium

Deep learning models can be difficult to train because they require large amounts of data, which we usually do not have or are too expensive to get or annotate. To overcome this problem, we can use few-shot meta-learning, which allows us to train deep learning models with little data. Using a few examples, meta-learning, or learning-to-learn, aims to use the experience learned during training to generalize to unknown tasks. Medical imaging is an industry where it is particularly useful, as there is limited publicly available data due to patient privacy concerns and annotating costs.

This project examines how meta-learning performs …


Adversary Aware Continual Learning, Muhammad Umer 2023 Rowan University

Adversary Aware Continual Learning, Muhammad Umer

Theses and Dissertations

Continual learning approaches are useful as they help the model to learn new information (classes) sequentially, while also retaining the previously acquired information (classes). However, these approaches are adversary agnostic, i.e., they do not consider the possibility of malicious attacks. In this dissertation, we have demonstrated that continual learning approaches are extremely vulnerable to the adversarial backdoor attacks, where an intelligent adversary can introduce small amount of misinformation to the model in the form of imperceptible backdoor pattern during training to cause deliberate forgetting of a specific class at test time. We then propose a novel defensive framework to counter …


Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers, Joshua Ortiz Baco, Benjamin Charles Germain Lee, Jim Casey, Sarah H. Salter 2023 University of Tennesse, Knoxville

Towards An Experimental Bibliography Of Hemispheric Reconstruction Newspapers, Joshua Ortiz Baco, Benjamin Charles Germain Lee, Jim Casey, Sarah H. Salter

Criticism

Digital collections of newspapers have drawn broader attention to the fragmented and scattered print histories of minoritized communities. Attempts to survey these histories through bibliography, however, quickly meet with a fundamental problem: the practice of bibliographic description calls for creating a static record of social affiliations. Given the overwhelming scholarly consensus that categories such as race, ethnicity, and language are socially constructed, this article introduces an experimental bibliographic method for mapping the vast landscape of historical newspapers. This method extends the machine learning affordances of a recent project called Newspaper Navigator to enumerate the newspapers in Chronicling America according to …


Sarcasm Detection In English And Arabic Tweets Using Transformer Models, Rishik Lad 2023 Dartmouth College

Sarcasm Detection In English And Arabic Tweets Using Transformer Models, Rishik Lad

Computer Science Senior Theses

This thesis describes our approach toward the detection of sarcasm and its various types in English and Arabic Tweets through methods in deep learning. There are five problems we attempted: (1) detection of sarcasm in English Tweets, (2) detection of sarcasm in Arabic Tweets, (3) determining the type of sarcastic speech subcategory for English Tweets, (4) determining which of two semantically equivalent English Tweets is sarcastic, and (5) determining which of two semantically equivalent Arabic Tweets is sarcastic. All tasks were framed as classification problems, and our contributions are threefold: (a) we developed an English binary classifier system with RoBERTa, …


Does A Neural Model Understand The De Re / De Dicto Distinction?, Gaurav Kamath, Laurestine Bradford 2023 McGill University

Does A Neural Model Understand The De Re / De Dicto Distinction?, Gaurav Kamath, Laurestine Bradford

Proceedings of the Society for Computation in Linguistics

Neural network language models (NNLMs) are often casually said to "understand" language, but what linguistic structures do they really learn? We pose this question in the context of de re / de dicto ambiguities. Nouns and determiner phrases in intensional contexts, such as belief, desire, and modality, are subject to referential ambiguities. The phrase "Lilo believes an alien is on the loose,'' for example, has two interpretations: one ("de re") in which she believes a specific entity which happens to be an alien is on the loose, and another ("de dicto") in which she believes …


Differentiable Tree Operations Promote Compositional Generalization, Paul Soulos, Edward Hu, Kate McCurdy, Yunmo Chen, Roland Fernandez, Paul Smolensky, Jianfeng Gao 2023 Johns Hopkins University

Differentiable Tree Operations Promote Compositional Generalization, Paul Soulos, Edward Hu, Kate Mccurdy, Yunmo Chen, Roland Fernandez, Paul Smolensky, Jianfeng Gao

Proceedings of the Society for Computation in Linguistics

No abstract provided.


Evaluating Neural Networks As Cognitive Models For Learning Quasi-Regularities In Language, Xiaomeng Ma 2023 The Graduate Center, City University of New York

Evaluating Neural Networks As Cognitive Models For Learning Quasi-Regularities In Language, Xiaomeng Ma

Dissertations, Theses, and Capstone Projects

Many aspects of language can be categorized as quasi-regular: the relationship between the inputs and outputs is systematic but allows many exceptions. Common domains that contain quasi-regularity include morphological inflection and grapheme-phoneme mapping. How humans process quasi-regularity has been debated for decades. This thesis implemented modern neural network models, transformer models, on two tasks: English past tense inflection and Chinese character naming, to investigate how transformer models perform quasi-regularity tasks. This thesis focuses on investigating to what extent the models' performances can represent human behavior. The results show that the transformers' performance is very similar to human behavior in many …


Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris, Steven M. MILLER 2023 Singapore Management University

Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris, Steven M. Miller

Research Collection School Of Computing and Information Systems

This working paper is entirely comprised of a timeline table that begins in 2002 and runs through mid-2023. Across these two decades, this timeline traces the evolutionary development of the following:

  • The early Singapore R&D efforts to apply software-based image analysis algorithms and methods to analyse eye retina images for diabetic retinopathy and other eye diseases. This was based on a collaboration between the Singapore Eye Research Institute (SERI) and its parent organization, the Singapore National Eye Centre (SNEC), with faculty from the School of Computing at National University of Singapore.
  • The establishment and operation of the Singapore Integrated Diabetic …


Generative Ai Tools In Art Education: Exploring Prompt Engineering And Iterative Processes For Enhanced Creativity, James Hutson, Peter Cotroneo 2023 Lindenwood University

Generative Ai Tools In Art Education: Exploring Prompt Engineering And Iterative Processes For Enhanced Creativity, James Hutson, Peter Cotroneo

Faculty Scholarship

The rapid development and adoption of generative artificial intelligence (AI) tools in the art and design education landscape have introduced both opportunities and challenges. This timely study addresses the need to effectively integrate these tools into the classroom while considering ethical implications and the importance of prompt engineering. By examining the iterative process of refining original ideas through multiple iterations, verbal expansion, and the use of OpenAI’s DALL E2 for generating diverse visual outcomes, researchers gain insights into the potential benefits and pitfalls of these tools in an educational context. Students in the digital at case study were taught prompt …


Life, Death, And Ai: Exploring Digital Necromancy In Popular Culture—Ethical Considerations, Technological Limitations, And The Pet Cemetery Conundrum, James Hutson, Jeremiah Ratican 2023 Lindenwood University

Life, Death, And Ai: Exploring Digital Necromancy In Popular Culture—Ethical Considerations, Technological Limitations, And The Pet Cemetery Conundrum, James Hutson, Jeremiah Ratican

Faculty Scholarship

This article explores the rise of generative AI, particularly ChatGPT, and the combination of large language models (LLM) with robotics, exemplified by Ameca the Robot. It addresses the need to study the ethical considerations and potential implications of digital necromancy, which involves using AI to reanimate deceased individuals for various purposes. Reasons for desiring to engage with a disembodied or bodied replica of a person include the preservation of memories, emotional closure, cultural heritage and historical preservation, interacting with idols or influential figures, educational and research purposes, and creative expression and artistic endeavors. As such, this article examines historical examples …


Human-Ai Collaboration For Smart Education: Reframing Applied Learning To Support Metacognition, James Hutson, Daniel Plate 2023 Lindenwood University

Human-Ai Collaboration For Smart Education: Reframing Applied Learning To Support Metacognition, James Hutson, Daniel Plate

Faculty Scholarship

This chapter investigates the profound influence of intelligent virtual assistants (IVAs) on the educational domain, specifically in the realm of individualized learning and the instruction of writing abilities and content creation. IVAs, incorporating generative AI technologies such as ChatGPT and Stable Diffusion, hold the potential to bring about a paradigm shift in educational programs, emphasizing the enhancement of advanced metacognitive capacities rather than the fundamentals of communication. The subsequent recommendations stress the need to cultivate enduring proficiencies and ascertain tailored learning approaches for each learner, which will be indispensable for success in the evolving job market. In this context, prompt …


What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall 2023 Old Dominion University

What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall

Cybersecurity Undergraduate Research Showcase

Large Language Models (LLMs) are artificial intelligence (AI) tools that can process, summarize, and translate texts and predict future words in a sentence, letting the LLM generate sentences similar to how humans talk and write. One concern that needs to be flagged is that, often, the content generated by different LLMs is inaccurate. LLMs are trained on code that can be used to detect data breaches, detect ransomware, and even pinpoint organizational vulnerabilities in advance of a cyberattack. LLMs are new but have unbelievable potential with their ability to generate code that brings awareness to cyber analysts and IT professionals. …


Data-Optimized Spatial Field Predictions For Robotic Adaptive Sampling: A Gaussian Process Approach, Zachary Nathan 2023 Dartmouth College

Data-Optimized Spatial Field Predictions For Robotic Adaptive Sampling: A Gaussian Process Approach, Zachary Nathan

Computer Science Senior Theses

We introduce a framework that combines Gaussian Process models, robotic sensor measurements, and sampling data to predict spatial fields. In this context, a spatial field refers to the distribution of a variable throughout a specific area, such as temperature or pH variations over the surface of a lake. Whereas existing methods tend to analyze only the particular field(s) of interest, our approach optimizes predictions through the effective use of all available data. We validated our framework on several datasets, showing that errors can decline by up to two-thirds through the inclusion of additional colocated measurements. In support of adaptive sampling, …


Constrained Optimization Based Adversarial Example Generation For Transfer Attacks In Network Intrusion Detection Systems, Marc Chale, Bruce Cox, Jeffery Weir, Nathaniel D. Bastian 2023 Army Cyber Institute, U.S. Military Academy

Constrained Optimization Based Adversarial Example Generation For Transfer Attacks In Network Intrusion Detection Systems, Marc Chale, Bruce Cox, Jeffery Weir, Nathaniel D. Bastian

ACI Journal Articles

Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering. Adversarial machine learning methods have been used to evade classifiers in the computer vision domain; however, existing methods do not translate well into the constrained cyber domain as they tend to produce non-functional network packets. This research views the payload of network packets as code with many functional units. A meta-heuristic based generative model is developed to maximize classification loss of packet payloads with respect to a surrogate model by repeatedly substituting units of code with functionally equivalent counterparts. The …


Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha 2023 University of San Diego

Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha

Undergraduate Honors Theses

Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …


Using Deep Neural Networks To Classify Astronomical Images, Andrew D. Macpherson 2023 Seattle Pacific University

Using Deep Neural Networks To Classify Astronomical Images, Andrew D. Macpherson

Honors Projects

As the quantity of astronomical data available continues to exceed the resources available for analysis, recent advances in artificial intelligence encourage the development of automated classification tools. This paper lays out a framework for constructing a deep neural network capable of classifying individual astronomical images by describing techniques to extract and label these objects from large images.


The Model 2.0 And Friends: An Interim Report, Garrison W. Cottrell, Martha Gahl, Shubham Kulkarni, Shashank Venkatramani, Yash Shah, Keyu Long, Xuzhe Zhi, Shivaank Agarwal, Cody Li, Jingyuan He, Thomas Fischer 2023 University of California, San Diego

The Model 2.0 And Friends: An Interim Report, Garrison W. Cottrell, Martha Gahl, Shubham Kulkarni, Shashank Venkatramani, Yash Shah, Keyu Long, Xuzhe Zhi, Shivaank Agarwal, Cody Li, Jingyuan He, Thomas Fischer

MODVIS Workshop

Last year, I reported on preliminary results of an anatomically-inspired deep learning model of the visual system and its role in explaining the face inversion effect. This year, I will report on new results and some variations on network architectures that we have explored, mainly as a way to generate discussion and get feedback. This is by no means a polished, final presentation!

We look forward to the group’s suggestions for these projects.


Digital Commons powered by bepress