Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1591 - 1620 of 8518

Full-Text Articles in Physical Sciences and Mathematics

Personalized Tweet Recommendation Using Users’ Image Preferences, Shashwat Avinash Kadam Jan 2023

Personalized Tweet Recommendation Using Users’ Image Preferences, Shashwat Avinash Kadam

Master's Projects

In the era of information explosion, the vast amount of data on social media platforms can overwhelm users. Not only does this information explosion contain irrelevant content, but also intentionally fabricated articles and images. As a result, personalized recommendation systems have become increasingly important to help users navigate and make sense of this data. We propose a novel technique to use users’ image preferences to recommend tweets. We extract vital information by analyzing images liked by users and use it to recommend tweets from Twitter. As many images online have no descriptive metadata associated with them, in this framework, we …


Explainable Ai For Android Malware Detection, Maithili Kulkarni Jan 2023

Explainable Ai For Android Malware Detection, Maithili Kulkarni

Master's Projects

Android malware detection based on machine learning (ML) is widely used by the mobile device security community. Machine learning models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such models make decisions. As a result, popular malware detection strategies remain black box models, which may result in a lack of accountability and trust in the decisions made. The field of explainable artificial intelligence (XAI) attempts to shed light on such black box models. In this research, we apply XAI techniques to ML-based Android malware detection systems. We train classic ML models …


Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao Jan 2023

Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao

Master's Projects

Textbooks are written and organized in a way that facilitates learning and understanding. Sections like glossary terms at the end of a textbook provide guidance on the topic of interest. However, it takes manual effort to create the index terms in the glossary that highlight the key referenced terminologies and related terms. Knowledge graphs, which have been used to represent and even reason over data and knowledge, can potentially capture textbook’s important terms, concepts, and their relations. Popular since the initial introduction by Google Knowledge Graphs (KGs), they combine graph and data to capture and model enormous amounts of relational …


Base Station Load Prediction In 5g-V2x Handover, Madhujita Ranjit Ambaskar Jan 2023

Base Station Load Prediction In 5g-V2x Handover, Madhujita Ranjit Ambaskar

Master's Projects

5G V2X networks transmit large amounts of data with low latency, allowing for real-time communication between vehicles and other infrastructure. In 5G V2X networks, handover is a process that allows a connected vehicle to transfer its con- nection from one base station to another as it moves through the network coverage area. Handover is critical to maintaining the quality of service (QoS) and ensuring uninterrupted communication. The base station load is a critical factor in ensuring reliable and efficient 5G V2X connectivity. Prediction of traffic load on base stations ensure resource optimization and smooth connectivity during handovers. This research predicts …


Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale Jan 2023

Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale

Master's Projects

Machine translation presents its root in the domain of textual processing that focuses on the usage of computer software for the purpose of translation of sentences. Neural machine translation follows the same idea and integrates machine learning with the help of neural networks.Various techniques are being explored by researchers and are famously used by Google Translate, Bing Microsoft Translator, Deep Translator, etc. However, these neural machine translation techniques do not incorporate the context of the sentences and are only determined by the phrasesor sentence structure. This report explores the neural machine translation technique dedicated to context-aware translations. It also provides …


Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi Jan 2023

Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi

Master's Projects

With the advances in technology, image classification has become one of the core areas of interest for researchers in the field of computer vision. We, humans, experience great levels of visuals in our day-to-day lives. The human eye is a powerful tool that not only lets us capture images around us but also aids in remembering, distinguishing, and interpreting these visuals. Comprehending the images that the user perceives is an important application in the fields of artificial intelligence, smart security systems, and areas of virtual reality. Recent advances in machine learning and neural networks have led to more precise and …


Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati Jan 2023

Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati

Master's Projects

Conventional ride-sharing services, such as Lyft and Uber, routinely match drivers with riders based on their proximity to each other, using GPS coordinates and mapping technology. The application then calculates the cost of the ride based on factors such as distance traveled and time spent in the car. The concept of six degrees of separation suggests that a maximum of 6 steps or relationships can connect any two individuals in the world. This idea could be applied to a ride-share service to provide a more personalized and efficient experience for users. Instead of just matching riders with drivers based on …


Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia Jan 2023

Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia

Master's Projects

Text-to-Speech (TTS) normalization is an essential component of natural language processing (NLP) that plays a crucial role in the production of natural-sounding synthesized speech. However, there are limitations to the TTS normalization procedure. Lengthy input sequences and variations in spoken language can present difficulties. The motivation behind this research is to address the challenges associated with TTS normalization by evaluating and comparing the performance of various models. The aim is to determine their effectiveness in handling language variations. The models include LSTM-GRU, Transformer, GCN-Transformer, GCNN-Transformer, Reformer, and a BERT language model that has been pre-trained. The research evaluates the performance …


Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen Jan 2023

Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen

Master's Projects

Machine translation (MT) aims to translate texts with minimal human involvement, and the utilization of machine learning methods is pivotal to its success. Sentence-level and paragraph-level translations were well-explored in the past decade, such as the Transformer and its variations, but less research was done on the document level. From reading a piece of news in a different language to trying to understand foreign research, document-level translation can be helpful.

This project utilizes a hierarchical attention (HAN) mechanism to abstract context information making document-level translation possible. It further utilizes the Big Bird attention mask in the hope of reducing memory …


Malware Classification Using Graph Neural Networks, Manasa Mananjaya Jan 2023

Malware Classification Using Graph Neural Networks, Manasa Mananjaya

Master's Projects

Word embeddings are widely recognized as important in natural language pro- cessing for capturing semantic relationships between words. In this study, we conduct experiments to explore the effectiveness of word embedding techniques in classifying malware. Specifically, we evaluate the performance of Graph Neural Network (GNN) applied to knowledge graphs constructed from opcode sequences of malware files. In the first set of experiments, Graph Convolution Network (GCN) is applied to knowledge graphs built with different word embedding techniques such as Bag-of-words, TF-IDF, and Word2Vec. Our results indicate that Word2Vec produces the most effective word embeddings, serving as a baseline for comparison …


Spam Comments Detection In Youtube Videos, Priyusha Kotta Jan 2023

Spam Comments Detection In Youtube Videos, Priyusha Kotta

Master's Projects

This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …


Codeval, Aditi Agrawal Jan 2023

Codeval, Aditi Agrawal

Master's Projects

Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …


Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham Jan 2023

Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham

Master's Projects

The volume of air traffic is increasing exponentially every day. The Air Traffic Control (ATC) at the airport has to handle aircraft runway assignments for landing and takeoff and airspace maintenance by directing passing aircraft through the airspace safely. If any aircraft is facing a technical issue or problem and is in a state of emergency, it requires expedited landing to respond to that emergency. The ATC gives this aircraft priority to landing and assistance. This process is very strenuous as the ATC has to deal with multiple aspects along with the emergency aircraft. It is the duty of the …


A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi Jan 2023

A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi

Master's Projects

The use of face masks due to the covid-19 pandemic has made surveillance of people very difficult. Since a mask covers most of the facial components, security cameras are rendered of little to no use in the identification of criminals. In order to realize what a face looks like behind a mask, we have to construct the facial features in the masked region. On a higher level, this falls under the field of image inpainting, i.e. filling missing regions of images or correcting irregularities in images. Current research on image inpainting shows promising results on images that have missing/incorrect patches …


Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir Jan 2023

Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir

Master's Projects

Information retrieval and data interpretation on the web, for the purpose of gaining knowledgeable insights, has been a widely researched topic from the onset of the world wide web or what is today popularly known as the internet. Web tables are structured tabular data present amidst unstructured, heterogenous data on the web. This makes web tables a rich source of information for a variety of tasks like data analysis, data interpretation, and information retrieval pertaining to extracting knowledge from information present on the web. Wikipedia tables which are a subset of web tables hold a huge amount of useful data, …


Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia Jan 2023

Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia

Master's Projects

Yelp is a popular social media platform that has gained much traction over the last few years. The critical feature of Yelp is it has information about any small or large-scale business, as well as reviews received from customers. The reviews have both a 1 to 5 star rating, as well as text. For a particular business, any user can view the reviews, but the stars are what most users check because it is an easy and fast way to decide. Therefore, the star rating is a good metric to measure a particular business’s value. However, there are other attributes …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli Jan 2023

Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli

Master's Projects

Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.

To recognize attacks and common occurrences, machine learning techniques such as …


Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal Jan 2023

Patch-Wise Training With Convolutional Neural Networks To Synthetically Upscale Cfd Simulations, John P. Romano, Alec C. Brodeur, Oktay Baysal

Mechanical & Aerospace Engineering Faculty Publications

This paper expands the authors’ prior work[1], which focuses on developing a convolutional neural network (CNN) model capable of mapping time-averaged, unsteady Reynold’s-averaged Navier-Stokes (URANS) simulations to higher resolution results informed by time-averaged detached eddy simulations (DES). The authors present improvements over the prior CNN autoencoder model that result from hyperparameter optimization, increased data set augmentation through the adoption of a patch-wise training approach, and the predictions of primitive variables rather than vorticity magnitude. The training of the CNN model developed in this study uses the same URANS and DES simulations of a transonic flow around several NACA 4-digit airfoils …


A Review Of Piezoelectric Footwear Energy Harvesters: Principles, Methods, And Applications, Bingqi Zhao, Feng Qian, Alexander Hatfield, Lei Zuo, Tian-Bing Xu Jan 2023

A Review Of Piezoelectric Footwear Energy Harvesters: Principles, Methods, And Applications, Bingqi Zhao, Feng Qian, Alexander Hatfield, Lei Zuo, Tian-Bing Xu

Mechanical & Aerospace Engineering Faculty Publications

Over the last couple of decades, numerous piezoelectric footwear energy harvesters (PFEHs) have been reported in the literature. This paper reviews the principles, methods, and applications of PFEH technologies. First, the popular piezoelectric materials used and their properties for PEEHs are summarized. Then, the force interaction with the ground and dynamic energy distribution on the footprint as well as accelerations are analyzed and summarized to provide the baseline, constraints, potential, and limitations for PFEH design. Furthermore, the energy flow from human walking to the usable energy by the PFEHs and the methods to improve the energy conversion efficiency are presented. …


Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur Jan 2023

Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur

Mechanical & Aerospace Engineering Faculty Publications

The present paper culminates several investigations into the use of convolutional neural networks (CNNs) as a post-processing step to improve the accuracy of unsteady Reynolds-averaged Navier–Stokes (URANS) simulations for subsonic flows over airfoils at low angles of attack. Time-averaged detached eddy simulation (DES)-generated flow fields serve as the target data for creating and training CNN models. CNN post-processing generates flow-field data comparable to DES resolution, but after using only URANS-level resources and properly training CNN models. This document outlines the underlying theory and progress toward the goal of improving URANS simulations by looking at flow predictions for a class of …


Embok 5.0 - Industry 4.0/5.0 Manifest And Latent Dimensions Mapping To The Asem Embok, T. Steven Cotter Jan 2023

Embok 5.0 - Industry 4.0/5.0 Manifest And Latent Dimensions Mapping To The Asem Embok, T. Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

Industry 3.0 automation emerged replacing human labor with high volume processes and robotics. Industry 4.0, cyber-physical systems, and Industry 5.0, mass customization and cognitive systems, are in the early stages of emergence. Research into the impact of Industry 4.0 and 5.0 is focused at the strategic or organizational levels or on the technological challenges. Research into the impact of Industry 4.0 and 5.0 on engineering management has been limited to their impact on project management. This leaves open the question of the directions in which ASEM should evolve the Engineering Management Body of Knowledge (EMBOK) under the emergence of Industry …


Health Care Equity Through Intelligent Edge Computing And Augmented Reality/Virtual Reality: A Systematic Review, Vishal Lakshminarayanan, Aswathy Ravikumar, Harini Sriraman, Sujatha Alla, Vijay Kumar Chattu Jan 2023

Health Care Equity Through Intelligent Edge Computing And Augmented Reality/Virtual Reality: A Systematic Review, Vishal Lakshminarayanan, Aswathy Ravikumar, Harini Sriraman, Sujatha Alla, Vijay Kumar Chattu

Engineering Management & Systems Engineering Faculty Publications

Intellectual capital is a scarce resource in the healthcare industry. Making the most of this resource is the first step toward achieving a completely intelligent healthcare system. However, most existing centralized and deep learning-based systems are unable to adapt to the growing volume of global health records and face application issues. To balance the scarcity of healthcare resources, the emerging trend of IoMT (Internet of Medical Things) and edge computing will be very practical and cost-effective. A full examination of the transformational role of intelligent edge computing in the IoMT era to attain health care equity is offered in this …


Establishing The Legal Framework To Regulate Quantum Computing Technology, Kaya Derose Jan 2023

Establishing The Legal Framework To Regulate Quantum Computing Technology, Kaya Derose

Catholic University Journal of Law and Technology

No abstract provided.


Augmenting Fake Content Detection In Online Platforms: A Domain Adaptive Transfer Learning Via Adversarial Training Approach, Ka Chung Ng, Ping Fan Ke, Mike K. P. So, Kar Yan Tam Jan 2023

Augmenting Fake Content Detection In Online Platforms: A Domain Adaptive Transfer Learning Via Adversarial Training Approach, Ka Chung Ng, Ping Fan Ke, Mike K. P. So, Kar Yan Tam

Research Collection School Of Computing and Information Systems

Online platforms are experimenting with interventions such as content screening to moderate the effects of fake, biased, and incensing content. Yet, online platforms face an operational challenge in implementing machine learning algorithms for managing online content due to the labeling problem, where labeled data used for model training are limited and costly to obtain. To address this issue, we propose a domain adaptive transfer learning via adversarial training approach to augment fake content detection with collective human intelligence. We first start with a source domain dataset containing deceptive and trustworthy general news constructed from a large collection of labeled news …


Human-Centred Artificial Intelligence In The Banking Sector, Krishnaraj Arul Obuchettiar, Alan @ Ali Madjelisi Megargel Jan 2023

Human-Centred Artificial Intelligence In The Banking Sector, Krishnaraj Arul Obuchettiar, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Changes in technology have shaped how corporate and retail businesses have evolved, alongside the customers’ preferences. The advent of smart digital devices and social media has shaped how consumers interact and transact with their financial institutions over the past two decades. With the rapid evolution of new technologies and customers' growing preference for digital engagement with financial institutions, organizations need to adopt and align with emerging technologies that support speed, accuracy, efficiency, and security in a user-friendly manner. Today, consumers want hyper-personalized interactions that are more frequent and proactive. Moreover, financial institutions have a growing need to cater to consumers' …


Neighborhood Retail Amenities And Taxi Trip Behavior: A Natural Experiment In Singapore, Kwan Ok Lee, Shih-Fen Cheng Jan 2023

Neighborhood Retail Amenities And Taxi Trip Behavior: A Natural Experiment In Singapore, Kwan Ok Lee, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

While a small change in land use planning in existing neighborhoods may significantly reduce private vehicle trips, we do not have a great understanding of the magnitude of the project- and shock-based causal change in travel behaviors, especially for the retail purpose. We analyze the impact of newly developed malls on the retail trip behavior of nearby residents for shopping, dining or services. Using the difference-in-differences approach and big data from a major taxi company in Singapore, we find that households residing within 800 m from a new mall are significantly less likely to take taxis to other retail destinations …


Claimdistiller: Scientific Claim Extraction With Supervised Contrastive Learning, Xin Wei, Md Reshad Ul Hoque, Jian Wu, Jiang Li Jan 2023

Claimdistiller: Scientific Claim Extraction With Supervised Contrastive Learning, Xin Wei, Md Reshad Ul Hoque, Jian Wu, Jiang Li

Computer Science Faculty Publications

The growth of scientific papers in the past decades calls for effective claim extraction tools to automatically and accurately locate key claims from unstructured text. Such claims will benefit content-wise aggregated exploration of scientific knowledge beyond the metadata level. One challenge of building such a model is how to effectively use limited labeled training data. In this paper, we compared transfer learning and contrastive learning frameworks in terms of performance, time and training data size. We found contrastive learning has better performance at a lower cost of data across all models. Our contrastive-learning-based model ClaimDistiller has the highest performance, boosting …


An Approach To Developing Benchmark Datasets For Protein Secondary Structure Segmentation From Cryo-Em Density Maps, Thu Nguyen, Yongcheng Mu, Jiangwen Sun, Jing He Jan 2023

An Approach To Developing Benchmark Datasets For Protein Secondary Structure Segmentation From Cryo-Em Density Maps, Thu Nguyen, Yongcheng Mu, Jiangwen Sun, Jing He

Computer Science Faculty Publications

More and more deep learning approaches have been proposed to segment secondary structures from cryo-electron density maps at medium resolution range (5--10Å). Although the deep learning approaches show great potential, only a few small experimental data sets have been used to test the approaches. There is limited understanding about potential factors, in data, that affect the performance of segmentation. We propose an approach to generate data sets with desired specifications in three potential factors - the protein sequence identity, structural contents, and data quality. The approach was implemented and has generated a test set and various training sets to study …


Toward A Generative Modeling Analysis Of Clas Exclusive 2𝜋 Photoproduction, T. Alghamdi, Y. Alanazi, M. Battaglieri, Ł. Bibrzycki, A. V. Golda, A. N. Hiller Blin, E. L. Isupov, Y. Li, L. Marsicano, W. Melnitchouk, V. I. Mokeev, G. Montaña, A. Pilloni, N. Sato, A. P. Szczepaniak, T. Vittorini Jan 2023

Toward A Generative Modeling Analysis Of Clas Exclusive 2𝜋 Photoproduction, T. Alghamdi, Y. Alanazi, M. Battaglieri, Ł. Bibrzycki, A. V. Golda, A. N. Hiller Blin, E. L. Isupov, Y. Li, L. Marsicano, W. Melnitchouk, V. I. Mokeev, G. Montaña, A. Pilloni, N. Sato, A. P. Szczepaniak, T. Vittorini

Computer Science Faculty Publications

AI-supported algorithms, particularly generative models, have been successfully used in a variety of different contexts. This work employs a generative modeling approach to unfold detector effects specifically tailored for exclusive reactions that involve multiparticle final states. Our study demonstrates the preservation of correlations between kinematic variables in a multidimensional phase space. We perform a full closure test on two-pion photoproduction pseudodata generated with a realistic model in the kinematics of the Jefferson Lab CLAS g11 experiment. The overlap of different reaction mechanisms leading to the same final state associated with the CLAS detector’s nontrivial effects represents an ideal test case …