The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?,
2023
nQube Data Science Inc.
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran
International Conference on Gambling & Risk Taking
Abstract
It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …
Algorithmic Bias: Causes And Effects On Marginalized Communities,
2023
University of San Diego
Algorithmic Bias: Causes And Effects On Marginalized Communities, Katrina M. Baha
Undergraduate Honors Theses
Individuals from marginalized backgrounds face different healthcare outcomes due to algorithmic bias in the technological healthcare industry. Algorithmic biases, which are the biases that arise from the set of steps used to solve or analyze a problem, are evident when people from marginalized communities use healthcare technology. For example, many pulse oximeters, which are the medical devices used to measure oxygen saturation in the blood, are not able to accurately read people who have darker skin tones. Thus, people with darker skin tones are not able to receive proper health care due to their pulse oximetry data being inaccurate. This …
Feature Selection From Clinical Surveys Using Semantic Textual Similarity,
2023
Washington University in St. Louis
Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner
McKelvey School of Engineering Theses & Dissertations
Survey data collected from human subjects can contain a high number of features while having a comparatively low quantity of examples. Machine learning models that attempt to predict outcomes from survey data under these conditions can overfit and result in poor generalizability. One remedy to this issue is feature selection, which attempts to select an optimal subset of features to learn upon. A relatively unexplored source of information in the feature selection process is the usage of textual names of features, which may be semantically indicative of which features are relevant to a target outcome. The relationships between feature names …
Visualized Algorithm Engineering On Two Graph Partitioning Problems,
2023
Southern Methodist University
Visualized Algorithm Engineering On Two Graph Partitioning Problems, Zizhen Chen
Computer Science and Engineering Theses and Dissertations
Concepts of graph theory are frequently used by computer scientists as abstractions when modeling a problem. Partitioning a graph (or a network) into smaller parts is one of the fundamental algorithmic operations that plays a key role in classifying and clustering. Since the early 1970s, graph partitioning rapidly expanded for applications in wide areas. It applies in both engineering applications, as well as research. Current technology generates massive data (“Big Data”) from business interactions and social exchanges, so high-performance algorithms of partitioning graphs are a critical need.
This dissertation presents engineering models for two graph partitioning problems arising from completely …
Eddy Current Defect Response Analysis Using Sum Of Gaussian Methods,
2023
Mississippi State University
Eddy Current Defect Response Analysis Using Sum Of Gaussian Methods, James William Earnest
Theses and Dissertations
This dissertation is a study of methods to automatedly detect and produce approximations of eddy current differential coil defect signatures in terms of a summed collection of Gaussian functions (SoG). Datasets consisting of varying material, defect size, inspection frequency, and coil diameter were investigated. Dimensionally reduced representations of the defect responses were obtained utilizing common existing reduction methods and novel enhancements to them utilizing SoG Representations. Efficacy of the SoG enhanced representations were studied utilizing common Machine Learning (ML) interpretable classifier designs with the SoG representations indicating significant improvement of common analysis metrics.
Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction,
2023
University of Mississippi
Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev
Honors Theses
Research related to Biology often utilizes machine learning models that are ultimately uninterpretable by the researcher. It would be helpful if researchers could leverage the same computing power but instead gain specific insight into decision-making to gain a deeper understanding of their domain knowledge. This paper seeks to select features and derive rules from a machine learning classification problem in biochemistry. The specific point of interest is five species of Glycyrrhiza, or Licorice, and the ability to classify them using High-Performance Thin Layer Chromatography (HPTLC) images. These images were taken using HPTLC methods under varying conditions to provide eight …
Partitions Of R^N With Maximal Seclusion And Their Applications To Reproducible Computation,
2023
University of Nebraska-Lincoln
Partitions Of R^N With Maximal Seclusion And Their Applications To Reproducible Computation, Jason Vander Woude
Dissertations, Theses, and Student Research Papers in Mathematics
We introduce and investigate a natural problem regarding unit cube tilings/partitions of Euclidean space and also consider broad generalizations of this problem. The problem fits well within a historical context of similar problems and also has applications to the study of reproducibility in randomized computation.
Given $k\in\mathbb{N}$ and $\epsilon\in(0,\infty)$, we define a $(k,\epsilon)$-secluded unit cube partition of $\mathbb{R}^{d}$ to be a unit cube partition of $\mathbb{R}^{d}$ such that for every point $\vec{p}\in\R^d$, the closed $\ell_{\infty}$ $\epsilon$-ball around $\vec{p}$ intersects at most $k$ cubes. The problem is to construct such partitions for each dimension $d$ with the primary goal of minimizing …
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System,
2023
Clemson University
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin
All Dissertations
Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …
Hidden Stratagem - Microtargeting: The Future Of Conflict,
2023
United States Military Academy
Hidden Stratagem - Microtargeting: The Future Of Conflict, Jessica Dawson
ACI Books & Book Chapters
In September 2020, General Paul Nakasone, NSA Director and Commander of U.S. Cyber Command, called foreign influence operations “the next great disruptor.”[1] Nearly every intelligence agency in the United States government has been sounding the alarm over targeted influence operations enabled by social media companies since at least 2016, even though some of these operations started earlier. What often goes unstated and even less understood is the digital surveillance economy underlying these platforms and how this economic structure of trading free access for data collection about individuals’ lives poses a national security threat. Harvard sociologist Shoshana Zuboff calls this phenomenon …
Universal Computation Using Self-Assembling, Crisscross Dna Slats,
2023
University of Arkansas, Fayetteville
Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard
Computer Science and Computer Engineering Undergraduate Honors Theses
I first give a brief introduction to formal models of computation. I then present three different approaches for computation in the aTAM. I later detail generating systems of crisscross slats given an arbitrary algorithm encoded in the form of a Turing machine. Crisscross slats show potential due to their high levels of cooperativity, so it is hoped that implementations utilizing slats are more robust to various growth errors compared to the aTAM. Finally, my software converts arbitrary crisscross slat systems into various physical representations that assist in analyzing their potential to be realized in experiments.
Immersive Learning Environments For Computer Science Education,
2023
East Tennessee State University
Immersive Learning Environments For Computer Science Education, Dillon Buchanan
Electronic Theses and Dissertations
This master's thesis explores the effectiveness of an educational intervention using an interactive notebook to support and supplement instruction in a foundational-level programming course. A quantitative, quasi-experimental group comparison method was employed, where students were placed into either a control or a treatment group. Data was collected from assignment and final grades, as well as self-reported time spent using the notebook. Independent t-tests and correlation were used for data analysis. Results were inconclusive but did indicate that the intervention had a possible effect. Further studies may explore better efficacy, implementation, and satisfaction of interactive notebooks across a larger population and …
Analysis Of Honeypots In Detecting Tactics, Techniques, And Procedure (Ttp) Changes In Threat Actors Based On Source Ip Address,
2023
Kennesaw State University
Analysis Of Honeypots In Detecting Tactics, Techniques, And Procedure (Ttp) Changes In Threat Actors Based On Source Ip Address, Carson Reynolds, Andy Green
Symposium of Student Scholars
The financial and national security impacts of cybercrime globally are well documented. According to the 2020 FBI Internet Crime Report, financially motivated threat actors committed 86% of reported breaches, resulting in a total loss of approximately $4.1 billion in the United States alone. In order to combat this, our research seeks to determine if threat actors change their tactics, techniques, and procedures (TTPs) based on the geolocation of their target’s IP address. We will construct a honeypot network distributed across multiple continents to collect attack data from geographically separate locations concurrently to answer this research question. We will configure the …
Using Azure Automl To Analyze The Effect Of Attendance And Seat Choice On University Student Grades,
2023
Southern Adventist University
Using Azure Automl To Analyze The Effect Of Attendance And Seat Choice On University Student Grades, Ac Hýbl
Campus Research Day
Teachers often claim that class attendance and sitting at the front of a classroom improves student grades. This study employs machine learning on a private University's attendance data to analyze this claim. We perform a correlation analysis in Azure by training regression models. No correlation is found. Next we use the K-means clustering algorithm in Azure. At k=2 clusters, a cluster with perfect attendance shows a higher average grade than a cluster with a late attendance average. Seat choice within the classroom does not prove important to the clustering models.
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method,
2023
Old Dominion University
Enhancing Pedestrian-Autonomous Vehicle Safety In Low Visibility Scenarios: A Comprehensive Simulation Method, Zizheng Yan, Yang Liu, Hong Yang
Modeling, Simulation and Visualization Student Capstone Conference
Self-driving cars raise safety concerns, particularly regarding pedestrian interactions. Current research lacks a systematic understanding of these interactions in diverse scenarios. Autonomous Vehicle (AV) performance can vary due to perception accuracy, algorithm reliability, and environmental dynamics. This study examines AV-pedestrian safety issues, focusing on low visibility conditions, using a co-simulation framework combining virtual reality and an autonomous driving simulator. 40 experiments were conducted, extracting surrogate safety measures (SSMs) from AV and pedestrian trajectories. The results indicate that low visibility can impair AV performance, increasing conflict risks for pedestrians. AV algorithms may require further enhancements and validations for consistent safety performance …
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery,
2023
Old Dominion University
U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa
Modeling, Simulation and Visualization Student Capstone Conference
Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.
An Algorithm For Finding Data Dependencies In An Event Graph,
2023
Old Dominion University
An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen
Modeling, Simulation and Visualization Student Capstone Conference
This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.
Loss Scaling And Step Size In Deep Learning Optimizatio,
2023
University of Missouri-St. Louis
Loss Scaling And Step Size In Deep Learning Optimizatio, Nora Alosily
Dissertations
Deep learning training consumes ever-increasing time and resources, and that is
due to the complexity of the model, the number of updates taken to reach good
results, and both the amount and dimensionality of the data. In this dissertation,
we will focus on making the process of training more efficient by focusing on the
step size to reduce the number of computations for parameters in each update.
We achieved our objective in two new ways: we use loss scaling as a proxy for
the learning rate, and we use learnable layer-wise optimizers. Although our work
is perhaps not the first …
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects,
2023
Belmont University
Investigating The Use Of Recurrent Neural Networks In Modeling Guitar Distortion Effects, Caleb Koch, Scott Hawley, Andrew Fyfe
Belmont University Research Symposium (BURS)
Guitar players have been modifying their guitar tone with audio effects ever since the mid-20th century. Traditionally, these effects have been achieved by passing a guitar signal through a series of electronic circuits which modify the signal to produce the desired audio effect. With advances in computer technology, audio “plugins” have been created to produce audio effects digitally through programming algorithms. More recently, machine learning researchers have been exploring the use of neural networks to replicate and produce audio effects initially created by analog and digital effects units. Recurrent Neural Networks have proven to be exceptional at modeling audio effects …
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents,
2023
University of Nebraska at Omaha
Time Evolution Is A Source Of Bias In The Wolf Algorithm For Largest Lyapunov Exponents, Kolby Brink, Tyler Wiles, Nicholas Stergiou, Aaron Likens
UNO Student Research and Creative Activity Fair
Human movement is inherently variable by nature. One of the most common analytical tools for assessing movement variability is the largest Lyapunov exponent (LyE) which quantifies the rate of trajectory divergence or convergence in an n-dimensional state space. One popular method for assessing LyE is the Wolf algorithm. Many studies have investigated how Wolf’s calculation of the LyE changes due to sampling frequency, filtering, data normalization, and stride normalization. However, a surprisingly understudied parameter needed for LyE computation is evolution time. The purpose of this study is to investigate how the LyE changes as a function of evolution time …
Toward A Simulation Model Complexity Measure,
2023
Air Force Research Laboratory
Toward A Simulation Model Complexity Measure, J. Scott Thompson, Douglas D. Hodson, Michael R. Grimaila, Nicholas Hanlon, Richard Dill
Faculty Publications
Is it possible to develop a meaningful measure for the complexity of a simulation model? Algorithmic information theory provides concepts that have been applied in other areas of research for the practical measurement of object complexity. This article offers an overview of the complexity from a variety of perspectives and provides a body of knowledge with respect to the complexity of simulation models. The key terms model detail, resolution, and scope are defined. An important concept from algorithmic information theory, Kolmogorov complexity, and an application of this concept, normalized compression distance, are used to indicate the possibility of measuring changes …
