Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- Singapore Management University (1081)
- Old Dominion University (334)
- San Jose State University (267)
- MBZUAI (233)
-
- Selected Works (225)
- Western University (160)
- Technological University Dublin (150)
- SelectedWorks (109)
- Air Force Institute of Technology (102)
- City University of New York (CUNY) (94)
- California Polytechnic State University, San Luis Obispo (86)
- Lindenwood University (64)
- University of Arkansas, Fayetteville (62)
- University of Kentucky (62)
- University of Nebraska - Lincoln (59)
- University of South Florida (50)
- Edith Cowan University (46)
- University of Tennessee, Knoxville (43)
- Purdue University (40)
- University of Nevada, Las Vegas (40)
- University of Denver (39)
- Clemson University (38)
- University of Central Florida (37)
- Chinese Academy of Sciences (35)
- Dartmouth College (35)
- New Jersey Institute of Technology (34)
- University of Windsor (33)
- Kennesaw State University (32)
- Portland State University (32)
- Keyword
-
- Machine learning (517)
- Artificial intelligence (467)
- Deep learning (336)
- Machine Learning (298)
- Artificial Intelligence (216)
-
- Deep Learning (173)
- Simulation (152)
- Computer vision (118)
- AI (115)
- Neural networks (113)
- Reinforcement learning (96)
- Robotics (86)
- Optimization (75)
- Natural language processing (68)
- Natural Language Processing (67)
- Classification (64)
- Virtual reality (60)
- Neural network (55)
- Computer Vision (53)
- Neural Networks (53)
- Reinforcement Learning (52)
- Computer Science (49)
- Genetic algorithm (48)
- Path planning (48)
- Modeling (47)
- Algorithms (45)
- ChatGPT (41)
- Numerical simulation (41)
- Scheduling (41)
- Visualization (40)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Research Collection School Of Computing and Information Systems (989)
- Master's Projects (246)
- Theses and Dissertations (145)
- Electronic Thesis and Dissertation Repository (132)
-
- Electronic Theses and Dissertations (115)
- Computer Vision Faculty Publications (98)
- Conference papers (88)
- Machine Learning Faculty Publications (86)
- Marcel Adam Just (78)
- Computer Science Faculty Publications (68)
- Faculty Scholarship (63)
- Master's Theses (60)
- Doctoral Dissertations (53)
- Jeremy Straub (52)
- Faculty Publications (50)
- Dissertations (48)
- Articles (47)
- Electrical & Computer Engineering Faculty Publications (46)
- Natural Language Processing Faculty Publications (46)
- Dissertations, Theses, and Capstone Projects (44)
- Theses and Dissertations--Computer Science (43)
- USF Tampa Graduate Theses and Dissertations (41)
- Publications and Research (36)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (35)
- Electrical & Computer Engineering Theses & Dissertations (32)
- Graduate Theses and Dissertations (31)
- Masters Theses (31)
- Rudolf Kaehr (31)
- Honors Theses (30)
- Publication Type
Articles 7141 - 7170 of 8513
Full-Text Articles in Physical Sciences and Mathematics
Regulating Religious Robots: Free Exercise And Rfra In The Time Of Superintelligent Artificial Intelligence, Ignatius Michael D. Ingles
Regulating Religious Robots: Free Exercise And Rfra In The Time Of Superintelligent Artificial Intelligence, Ignatius Michael D. Ingles
Ateneo School of Law Publications
No abstract provided.
K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler
K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler
Graduate Student Theses, Dissertations, & Professional Papers
Biological sequence datasets are increasing at a prodigious rate. The volume of data in these datasets surpasses what is observed in many other fields of science. New developments wherein metagenomic DNA from complex bacterial communities is recovered and sequenced are producing a new kind of data known as metagenomic data, which is comprised of DNA fragments from many genomes. Developing a utility to analyze such metagenomic data and predict the sample class from which it originated has many possible implications for ecological and medical applications. Within this document is a description of a series of analytical techniques used to process …
A New Reinforcement Learning Algorithm With Fixed Exploration For Semi-Markov Decision Processes, Angelo Michael Encapera
A New Reinforcement Learning Algorithm With Fixed Exploration For Semi-Markov Decision Processes, Angelo Michael Encapera
Masters Theses
"Artificial intelligence or machine learning techniques are currently being widely applied for solving problems within the field of data analytics. This work presents and demonstrates the use of a new machine learning algorithm for solving semi-Markov decision processes (SMDPs). SMDPs are encountered in the domain of Reinforcement Learning to solve control problems in discrete-event systems. The new algorithm developed here is called iSMART, an acronym for imaging Semi-Markov Average Reward Technique. The algorithm uses a constant exploration rate, unlike its precursor R-SMART, which required exploration decay. The major difference between R-SMART and iSMART is that the latter uses, in addition …
Novel Neuroevolution Techniques For The Life Science Domain, Timothy Manning
Novel Neuroevolution Techniques For The Life Science Domain, Timothy Manning
Theses
The life science domain is a high value research area, both in terms of the benefits in increased knowledge and in societal impact. Much of the research funding has focused on wet lab based approaches to increase visibility into biological processes and producing maximal relevant information on which to make decisions. Given the complexity of biological functions, in many cases this has led to an information overload. Researchers are now able to routinely generate and access petabytes of data as a result of high throughput experiments, and this capability is growing. This data can be difficult to interpret and intractable …
Artificial Intelligence And Its Potential Adverse Impacts On The Philippine Economy, Krista Danielle Yu, Caesar Cororaton, Joel P. Ilao, Charibeth K. Cheng, Kathleen Aviso, Christina D. Cayamanda, Michael Angelo B. Promentilla, Ringgold P. Atienza, Roman Julio B. Infante, Raymond R. Tan
Artificial Intelligence And Its Potential Adverse Impacts On The Philippine Economy, Krista Danielle Yu, Caesar Cororaton, Joel P. Ilao, Charibeth K. Cheng, Kathleen Aviso, Christina D. Cayamanda, Michael Angelo B. Promentilla, Ringgold P. Atienza, Roman Julio B. Infante, Raymond R. Tan
Angelo King Institute for Economic and Business Studies (AKI)
Recent developments in artificial intelligence (AI) and deep learning techniques are expected to reshape the nature of the working environment in many economic sectors through the automation of many white collar jobs. This technological breakthrough poses threats of job obsolescence in several industries, particularly for a labor abundant country such as the Philippines. With human capital as one of its largest resources, the services sector is a major contributor to the country’s economy, contributing around 60% of the total gross domestic product and employing about 22.8 million workers (Philippine Statistics Authority, 2017).
Social Data Mining For Crime Intelligence, Haruna Isah
Social Data Mining For Crime Intelligence, Haruna Isah
Publications and Scholarship
With the advancement of the Internet and related technologies, many traditional crimes have made the leap to digital environments. The successes of data mining in a wide variety of disciplines have given birth to crime analysis. Traditional crime analysis is mainly focused on understanding crime patterns, however, it is unsuitable for identifying and monitoring emerging crimes. The true nature of crime remains buried in unstructured content that represents the hidden story behind the data. User feedback leaves valuable traces that can be utilised to measure the quality of various aspects of products or services and can also be used to …
Managing Operator Mental Workload With Standards Based Decision Support, Maurice Wilkins
Managing Operator Mental Workload With Standards Based Decision Support, Maurice Wilkins
H-Workload 2017: Models and Applications (Works in Progress)
H-Workload 2017: The first international symposium on human mental workload, Dublin Institute of Technology, Dublin, Ireland, June 28-30.
Distress And Worry As Mediators In The Relationship Between Psychosocial Risks And Upper Body Musculosketal Complaints In Highly Automated Manufacturing, Fiona Wixted, Leonard O'Sullivan
Distress And Worry As Mediators In The Relationship Between Psychosocial Risks And Upper Body Musculosketal Complaints In Highly Automated Manufacturing, Fiona Wixted, Leonard O'Sullivan
H-Workload 2017: Models and Applications (Works in Progress)
As a result of an upward trend in automation, the requirement for supervisory monitoring and consequently, cognitive demand has increased in automated manufacturing. The incidence of musculoskeletal disorders has also increased in the manufacturing sector. A model was developed based on survey data to test if distress and worry mediate the relationship between psychosocial factors (job control, cognitive demand, social isolation and skill discretion), stress states and upper body musculoskeletal complaints in highly automated manufacturing companies (n=235). Cognitive demand was shown to be related to higher distress in employees. The data raise the question about the link between job control …
Towards A Continuous Assessment Of Cognitive Workload For Smartphone Multitasking Users, Angel Jimenez-Molina, Hernan Lira
Towards A Continuous Assessment Of Cognitive Workload For Smartphone Multitasking Users, Angel Jimenez-Molina, Hernan Lira
H-Workload 2017: Models and Applications (Works in Progress)
The intermeshing of Smartphone interactions and daily activities depletes the availability of cognitive resources. This excessive demand may lead to several undesirable cognitive states, which can be avoided by continuously assessing the user cognitive workload. Recently, many attempts have emerged to assess this workload by using psycho physiological signals. This paper provides evidence that it is possible to train models that accurately identify in short time windows such cognitive workload by processing heart rate and blood oxygen saturation signals. This assessment could be applied in Smartphone notification delivery, interface adaptations or cognitive capabilities evaluation.
Human Performance Modelling In Manufacturing: Mental Workload And Task Complexity, Maria Chiara Leva, Lorenzo Comberti, Micaela Demichela, Rebecca Duane
Human Performance Modelling In Manufacturing: Mental Workload And Task Complexity, Maria Chiara Leva, Lorenzo Comberti, Micaela Demichela, Rebecca Duane
H-Workload 2017: Models and Applications (Works in Progress)
No abstract provided.
A Validated Description Of How Crew Manage Flight Operations For Two-Pilot And Reduced Crew Operations, Nick Mcdonnell, Alison Kay, Margaret Ryan, Rabea Morrison, Rolf Zon
A Validated Description Of How Crew Manage Flight Operations For Two-Pilot And Reduced Crew Operations, Nick Mcdonnell, Alison Kay, Margaret Ryan, Rabea Morrison, Rolf Zon
H-Workload 2017: Models and Applications (Works in Progress)
This research provides a rich validated description of how crew manage workload for both two-pilot and reduced crew operations. It outlines flight operations modelling, operational narratives, requirements and scenarios validated with expert advisers from the EU-FP7 ACROSS Project. The crew are considered to be the managers of the operation who receive integrated technical support to help them manage flight operations across of three configurations i.e. 1) standard two-crew configuration, 2) reduced crew under normal operations 3) reduced-crew under non-normal operations developed within the FP7 EU-funded ACROSS (Advanced Cockpit for the Reduction Of Stress and Workload) project.
Facing Human Workload: The Resilient Ego: A Psychoanalytic Point Of View, Glauco Maria Genga, Maria Gabriella Pediconii
Facing Human Workload: The Resilient Ego: A Psychoanalytic Point Of View, Glauco Maria Genga, Maria Gabriella Pediconii
H-Workload 2017: Models and Applications (Works in Progress)
The paper aims to show new connections among Human Factors, Human Workload and Resilience. We intend: 1) to highlight the role of subject in facing the human workload, inflected as demanding tasks and emergency situations; 2) to show how psychoanalysis can provide novel insights, not only into human errors, but also into human resilience. They have a common denominator, at least in part: the role of subjective contributions even in demanding situations. Human workload includes a work for satisfaction. We recall also the case study of US Airways Flight 1549 water landing (the so called “Miracle on the Hudson”), which …
System Identification Of Motion Artifact: Noise In Eeg Headsets From Locomotion, Kaela Shea, James Tung
System Identification Of Motion Artifact: Noise In Eeg Headsets From Locomotion, Kaela Shea, James Tung
H-Workload 2017: Models and Applications (Works in Progress)
Fall prevention for geriatric populations is a growing concern among clinicians and researchers due to severe risk of morbidity and loss of independence. Emerging evidence has demonstrated that mental workload while walking influences gait stability and the risk for falling. Electroencephalography (EEG) presents a potential method to provide objective measures of mental workload, particularly during daily activities. Noise introduced to the EEG signal during motion, however, is restrictive. The study presented in the following paper isolates EEG signal noise attained from gait for a commercially accessible EEG system, the "Emotiv" Time and spectral system identification techniques were applied to model …
Online Measuring Of Available Resources, Enrique Munoz-De-Escalona, José Juan Canas
Online Measuring Of Available Resources, Enrique Munoz-De-Escalona, José Juan Canas
H-Workload 2017: Models and Applications (Works in Progress)
This paper present a proposal for measuring available mental resources during the accomplishment of a task. Our proposal consists in measuring emotions provoked by perceived self-efficacy in the execution of the task. Self-efficacy is one of the most important factors that affect the resources that a person puts at the disposal of the execution of the task. When a person perceives that he/she is not being effective he/she will activate more resources to improve his performance. This self-efficacy will be reflected in the emotions that the person experiences. A good efficacy will provoke positive emotions and a bad efficacy negative …
A Systems Approach To Predicting And Measuring Workload In Rail Traffic Management Systems, Joanna Evans
A Systems Approach To Predicting And Measuring Workload In Rail Traffic Management Systems, Joanna Evans
H-Workload 2017: Models and Applications (Works in Progress)
The introduction of systems such as Traffic Management (TM) will result in a number of changes in how the railway is managed for operations and maintenance staff such as, an increase in collaborative working styles and shared responsibilities. In order to react to these changing operational demands and user needs, TM workstation designs need to have greater flexibility and be configurable to support the information requirements for each specific role as well as support each role during different scenarios. Although this flexibility in system design has the potential to enhance performance, it increases the complexity of measuring operator workload. The …
Robot Lives Matter?, Christopher Boolukos (Class Of 2017)
Robot Lives Matter?, Christopher Boolukos (Class Of 2017)
Writing Across the Curriculum
It’s 2016 and slavery is still a brutal reality around the world and a crime against humanity. The human race has never been shy when it comes to enslaving fellow human beings, so with progress in robotics and AI, we will soon be able to enslave robots to do our bidding. This poses a serious moral dilemma as to what rights such entities would possess and what responsibility we have, if any, on how we use them in society. Should it make any difference whether an entity is made of silicon or carbon, or whether its brain uses semi-conductors or …
An Alternative Approach To Training Sequence-To-Sequence Model For Machine Translation, Vivek Sah
An Alternative Approach To Training Sequence-To-Sequence Model For Machine Translation, Vivek Sah
Honors Theses
Machine translation is a widely researched topic in the field of Natural Language Processing and most recently, neural network models have been shown to be very effective at this task. The model, called sequence-to-sequence model, learns to map an input sequence in one language to a vector of fixed dimensionality and then map that vector to an output sequence in another language without any human intervention provided that there is enough training data. Focusing on English-French translation, in this paper, I present a way to simplify the learning process by replacing English input sentences by word-by-word translation of those sentences. …
Cognition-Based Approaches For High-Precision Text Mining, George John Shannon
Cognition-Based Approaches For High-Precision Text Mining, George John Shannon
Doctoral Dissertations
"This research improves the precision of information extraction from free-form text via the use of cognitive-based approaches to natural language processing (NLP). Cognitive-based approaches are an important, and relatively new, area of research in NLP and search, as well as linguistics. Cognitive approaches enable significant improvements in both the breadth and depth of knowledge extracted from text. This research has made contributions in the areas of a cognitive approach to automated concept recognition in.
Cognitive approaches to search, also called concept-based search, have been shown to improve search precision. Given the tremendous amount of electronic text generated in our digital …
Mouse Vs. Machine: The Game, Cafferty Aiko Frattarelli
Mouse Vs. Machine: The Game, Cafferty Aiko Frattarelli
Senior Projects Spring 2017
Many modern video games built by big name companies are coded by a group of people together using, and possibly modifying, an already designed game engine. These games usually have another group of people creating the artwork. In this project, I coded and designed a video game from scratch, as well as created all the artwork used in the game. The player controls a mouse character who fights a variety of monsters. In order to create the complexity of the game, I implement basic neural networks as the enemy artificial intelligence, i.e. the decision making process of the enemy. It …
The Disciple: A Talking Platformer, Benjamin Sernau
The Disciple: A Talking Platformer, Benjamin Sernau
Senior Projects Spring 2017
Working in Unity to create a two-dimensional platformer with a Natural Language Generation system, I have considered a new way in which Artificial Intelligence may affect gameplay. The resulting project, The Disciple, takes input from the environment of the game and offers successfully a sentence relevant to what occurs within the game's world. The sentences this system generates are diverse enough so that, while the Natural Language Generation system may restate what it has said, already, it does not utter the same sentence twice in a row. Often, the Natural Language Generation system selects a phrase I have written from …
An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. Elyamany, Miriam Am Capretz, Girma T. Bitsuamlak
An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. Elyamany, Miriam Am Capretz, Girma T. Bitsuamlak
Electrical and Computer Engineering Publications
During building operation, a significant amount of energy is wasted due to equipment and human-related faults. To reduce waste, today's smart buildings monitor energy usage with the aim of identifying abnormal consumption behaviour and notifying the building manager to implement appropriate energy-saving procedures. To this end, this research proposes a new pattern-based anomaly classifier, the collective contextual anomaly detection using sliding window (CCAD-SW) framework. The CCAD-SW framework identifies anomalous consumption patterns using overlapping sliding windows. To enhance the anomaly detection capacity of the CCAD-SW, this research also proposes the ensemble anomaly detection (EAD) framework. The EAD is a generic framework …
Security Analytics: Using Deep Learning To Detect Cyber Attacks, Glenn M. Lambert Ii
Security Analytics: Using Deep Learning To Detect Cyber Attacks, Glenn M. Lambert Ii
UNF Graduate Theses and Dissertations
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for financial gain. The resulting loss of revenue and reputation can have deleterious effects on governments and businesses alike. Signature recognition and anomaly detection are the most common security detection techniques in use today. These techniques provide a strong defense. However, they fall short of detecting complicated or sophisticated attacks. Recent literature suggests using security analytics to differentiate between normal and malicious user activities.
The goal of this research is to develop a repeatable process to detect cyber attacks that is fast, accurate, comprehensive, and scalable. A model …
Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Walden Dissertations and Doctoral Studies
In recent years, numerous high tech companies have developed and used technology roadmaps when making their investment decisions. Jay Paap has proposed the Customer Focused Technology Planning (CFTP) framework to draw future technology roadmaps. However, the CFTP framework does not include risk assessment as a critical factor in decision making. The problem addressed in this quantitative study was that high tech companies are either losing money or getting a much smaller than expected return on investment when making technology investment decisions. The purpose of this research was to determine the relationship between returns on investment before and after adding risk …
Classification Of Radar Jammer Fm Signals Using A Neural Network Approach, Ariadna Estefania Mendoza
Classification Of Radar Jammer Fm Signals Using A Neural Network Approach, Ariadna Estefania Mendoza
Open Access Theses & Dissertations
A Neural Network (NN) used to classify radar signals is proposed for the purpose of military survivability and lethality analysis. The goal of the NN is to correctly differentiate Frequency-Modulated (FM) signals from Additive White Gaussian Noise (AWGN) using limited signal pre-processing. The FM signals used to test the NN approach are the linear or chirp FM and the power-law FM. Preliminary simulations using the moments of the signals in the time and frequency domain yielded better results in the frequency domain, suggesting that time domain training would not be as effective frequency domain training. To test this hypoThesis, we …
Intelligent Profiling Of Blood Donors In Ireland, Joanna Kossakowska
Intelligent Profiling Of Blood Donors In Ireland, Joanna Kossakowska
Theses
The demand for blood products in Ireland is constantly rising due to population growth and population ageing. It is believed that within the next decade these two factors will present challenges to blood donor recruitment and the availability of blood supplies. Improving the retention of blood donors will have a positive impact on the availability of blood products. Identification of suitable donors with the potential for long-term donating can potentially enhance the predictability of blood supply levels.
This research proposes that the patterns of blood donation behaviours of donors can be isolated from blood donor databases held by blood collecting …
Presenting A Labelled Dataset For Real-Time Detection Of Abusive User Posts, Hao Chen, Susan Mckeever, Sarah Jane Delany
Presenting A Labelled Dataset For Real-Time Detection Of Abusive User Posts, Hao Chen, Susan Mckeever, Sarah Jane Delany
Conference papers
Social media sites facilitate users in posting their own personal comments online. Most support free format user posting, with close to real-time publishing speeds. However, online posts generated by a public user audience carry the risk of containing inappropriate, potentially abusive content. To detect such content, the straightforward approach is to filter against blacklists of profane terms. However, this lexicon filtering approach is prone to problems around word variations and lack of context. Although recent methods inspired by machine learning have boosted detection accuracies, the lack of gold standard labelled datasets limits the development of this approach. In this work, …
Designing 2d Interfaces For 3d Gesture Retrieval Utilizing Deep Learning, Spencer Southard
Designing 2d Interfaces For 3d Gesture Retrieval Utilizing Deep Learning, Spencer Southard
UNF Graduate Theses and Dissertations
Gesture retrieval can be defined as the process of retrieving the correct meaning of the hand movement from a pre-assembled gesture dataset. The purpose of the research discussed here is to design and implement a gesture interface system that facilitates retrieval for an American Sign Language gesture set using a mobile device. The principal challenge discussed here will be the normalization of 2D gestures generated from the mobile device interface and the 3D gestures captured from video samples into a common data structure that can be utilized by deep learning networks. This thesis covers convolutional neural networks and auto encoders …
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Murray State Theses and Dissertations
We translate the RISK board into a graph which undergoes updates as the game advances. The dissection of the game into a network model in discrete time is a novel approach to examining RISK. A review of the existing statistical findings of skirmishes in RISK is provided. The graphical changes are accompanied by an examination of the statistical properties of RISK. The game is modeled as a discrete time dynamic network graph, with the various features of the game modeled as properties of the network at a given time. As the network is computationally intensive to implement, results are produced …
Optimization Of Neural Network Architecture For Classification Of Radar Jamming Fm Signals, Alberto Soto
Optimization Of Neural Network Architecture For Classification Of Radar Jamming Fm Signals, Alberto Soto
Open Access Theses & Dissertations
Radar jamming signal classification is valuable when situational awareness of radar systems is sought out for timely deployment of electronic support measures. Our Thesis shows that artificial neural networks can be utilized for effective and efficient signal classification. The goal is to optimize an artificial Neural Network (NN) approach capable of distinguishing between two common radar waveforms, namely bandlimited white Gaussian jamming noise (BWGN) and the ubiquitous linearly frequency modulated (LFM) signal. This is made possible by creating a theoretical framework for NN architecture testing that leads to a high probability of detection (PD) and a low probability of false …