Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 57896

Full-Text Articles in Physical Sciences and Mathematics

Coarse-Gridded Simulation Of The Nonlinear Schrödinger Equation With Machine Learning, Benjamin F. Akers, Kristina O. F. Williams Sep 2024

Coarse-Gridded Simulation Of The Nonlinear Schrödinger Equation With Machine Learning, Benjamin F. Akers, Kristina O. F. Williams

Faculty Publications

A numerical method for evolving the nonlinear Schrödinger equation on a coarse spatial grid is developed. This trains a neural network to generate the optimal stencil weights to discretize the second derivative of solutions to the nonlinear Schrödinger equation. The neural network is embedded in a symmetric matrix to control the scheme’s eigenvalues, ensuring stability. The machine-learned method can outperform both its parent finite difference method and a Fourier spectral method. The trained scheme has the same asymptotic operation cost as its parent finite difference method after training. Unlike traditional methods, the performance depends on how close the initial data …


Analyzing Student Prompts And Their Effect On Chatgpt’S Performance, Ghadeer Sawalha, Imran Taj, Abdulhadi Shoufan Sep 2024

Analyzing Student Prompts And Their Effect On Chatgpt’S Performance, Ghadeer Sawalha, Imran Taj, Abdulhadi Shoufan

All Works

Large language models present new opportunities for teaching and learning. The response accuracy of these models, however, is believed to depend on the prompt quality which can be a challenge for students. In this study, we aimed to explore how undergraduate students use ChatGPT for problem-solving, what prompting strategies they develop, the link between these strategies and the model’s response accuracy, the existence of individual prompting tendencies, and the impact of gender in this context. Our students used ChatGPT to solve five problems related to embedded systems and provided the solutions and the conversations with this model. We analyzed the …


Cyberattack Detection And Handling For Neural Network-Approximated Economic Model Predictive Control, Jihan Abou Halloun, Helen E. Durand Sep 2024

Cyberattack Detection And Handling For Neural Network-Approximated Economic Model Predictive Control, Jihan Abou Halloun, Helen E. Durand

Chemical Engineering and Materials Science Faculty Research Publications

Cyberattacks on control systems can create unprofitable and unsafe operating conditions. To enhance safety and attack resiliency of control systems, cyberattack detection strategies can be developed. Prior work in our group has sought to develop cyberattack detection strategies that are integrated with an advanced control formulation known as Lyapunov-based economic model predictive control (LEMPC), in the sense that the controller properties can be used to analyze closed-loop stability in the presence or absence of undetected attacks. In this work, we consider neural network-approximated control laws, concepts for mitigating cyberattacks on such control laws, and how these ideas elucidate concepts in …


Profit Considerations For Nonlinear Control-Integrated Cyberattack Detection On Process Actuators, Keshav Kasturi Rangan, Helen E. Durand Sep 2024

Profit Considerations For Nonlinear Control-Integrated Cyberattack Detection On Process Actuators, Keshav Kasturi Rangan, Helen E. Durand

Chemical Engineering and Materials Science Faculty Research Publications

Prior research from our group developed a control-integrated active actuator cyberattack detection strategy. This strategy continuously probed for cyberattacks by updating target steady-states at every sampling time and then moving the process state toward these over the subsequent sampling period. Attacks were fagged if a Lyapunov function around the target steady-state did not decrease over a sampling period. This strategy had the benefit of ensuring safety of the process until an attack was detected. However, the continuous probing for attacks could decrease profit from the process compared to not probing for the attacks, which could limit the attractiveness of the …


Lyapunov-Based Cyberattack Detection For Distinguishing Between Sensor And Actuator Attacks, Dominic Messina, Helen E. Durand Sep 2024

Lyapunov-Based Cyberattack Detection For Distinguishing Between Sensor And Actuator Attacks, Dominic Messina, Helen E. Durand

Chemical Engineering and Materials Science Faculty Research Publications

Control-theoretic cyberattack detection strategies are control strategies where control theory can be used in the design of the detection policies and analysis of stability properties with and without cyberattacks. This work provides a step toward understanding how to diagnose cyberattacks using control-theoretic cyberattack detection mechanisms. Specifically, we analyze the conditions under which a control-theoretic cyberattack detection strategy developed in our prior work to handle detection of simultaneous actuator and sensor attacks can be extended to distinguish between whether attacks are occurring on sensors or actuators. We present and evaluate heuristic concepts for attempting to diagnose sensor attacks; these again demonstrate …


Rethinking Retrieval Automated Fine-Tuning In An Evolving Llm Landscape, Nicholas Sager, Timothy Cabaza, Matthew Cusack, Ryan Bass, Joaquin Dominguez Sep 2024

Rethinking Retrieval Automated Fine-Tuning In An Evolving Llm Landscape, Nicholas Sager, Timothy Cabaza, Matthew Cusack, Ryan Bass, Joaquin Dominguez

SMU Data Science Review

This study explores the utilization of Retrieval Augmented Fine-Tuning (RAFT) to enhance the performance of Large Language Models (LLMs) in domain-specific Retrieval Augmented Generation (RAG) tasks. By integrating domain-specific information during the retrieval process, RAG aims to reduce hallucination and improve the accuracy of LLM outputs. We investigate the use of RAFT, an approach that enhances LLMs by incorporating domain-specific knowledge and effectively handling distractor documents. This paper validates previous work, which found that RAFT can considerably improve the performance of Llama2-7B in specific domains. We also expand upon previous work into new state-of-the-art open-source models and other datasets with …


The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang Sep 2024

The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang

Research Collection School Of Accountancy

Using a sample of U.S. firms for the period 2005–2017, we provide evidence that managerial myopic actions contribute to corporate cybersecurity risk. Specifically, we show that abnormal cuts in discretionary expenditures, our proxy for managerial myopia, are positively associated with the likelihood of data breaches. The association is largely driven by firms that appear to cut discretionary expenditures to meet short-term earnings targets. In addition, the association is stronger for firms with greater short-term equity incentives, higher earnings response coefficients, low levels of institutional block ownership, or large market shares. Finally, firms appear to increase discretionary expenditures upon the announcement …


The Impact Of Data Recovery Criteria, Data Backup Schedule And Data Backup Prosses On The Efficiency Of Data Recovery Management In Data Centers, Maen T. Alrashdan, Mutaz Abdel Wahed, Emran Aljarrah, Mohammad Tubishat, Malek Alzaqebah, Nader Aljawarneh Sep 2024

The Impact Of Data Recovery Criteria, Data Backup Schedule And Data Backup Prosses On The Efficiency Of Data Recovery Management In Data Centers, Maen T. Alrashdan, Mutaz Abdel Wahed, Emran Aljarrah, Mohammad Tubishat, Malek Alzaqebah, Nader Aljawarneh

All Works

A large-scale cloud data center must have a low failure incidence rate and great service dependability and availability. However, due to several issues, such as hardware and software malfunctions that regularly cause task and job failure, large-scale cloud data centers still have high failure rates. These mistakes can have a substantial impact on cloud service dependability and need a large resource allocation to recover from failures. Therefore, it is important to have an efficient management of data recovery to protect organizations data from loss. This paper aims to study some factors that may improve the management of data recovery by …


Recasting The Mould – Librarianship Of The Future: Leveraging Automation, Apis, And Ai, Samantha Seah Sep 2024

Recasting The Mould – Librarianship Of The Future: Leveraging Automation, Apis, And Ai, Samantha Seah

Research Collection Library

With leaps in artificial intelligence made in recent years redefining the information landscape and introducing new means of information production, librarianship also must evolve to include new literacies. One way librarians can equip and empower ourselves is by understanding the building blocks of how machines and automation work. Perhaps more important than learning specific programming languages, learning computational thinking provides us with more ways to spot and evaluate problems and devise solutions without extensive coding knowledge. My presentation will take the improvement of membership processing as an example using Power Automate, a low-code Microsoft tool mimicking block programming. The tool …


Certified Continual Learning For Neural Network Regression, Hong Long Pham, Jun Sun Sep 2024

Certified Continual Learning For Neural Network Regression, Hong Long Pham, Jun Sun

Research Collection School Of Computing and Information Systems

On the one hand, there has been considerable progress on neural network verification in recent years, which makes certifying neural networks a possibility. On the other hand, neural network in practice are often re-trained over time to cope with new data distribution or for solving different tasks (a.k.a. continual learning). Once re-trained, the verified correctness of the neural network is likely broken, particularly in the presence of the phenomenon known as catastrophic forgetting. In this work, we propose an approach called certified continual learning which improves existing continual learning methods by preserving, as long as possible, the established correctness properties …


Some Studies On Mathematical Morphology In Remotely Sensed Data Analysis, Geetika Barman Sep 2024

Some Studies On Mathematical Morphology In Remotely Sensed Data Analysis, Geetika Barman

Doctoral Theses

The application of Mathematical Morphology (MM) techniques has proven to be beneficial in the extraction of shapebased and texture-based features during remote sensing image analysis. The characteristics of these techniques, such as nonlinear adaptability and comprehensive lattice structure, make them useful for contextual spatial feature analysis. Despite the advancements, there are still persistent challenges, including the curse of dimensionality, maintaining spatial correlation, and the adaptability of morphological operators in higher dimensions. The focus of this thesis is to explore the potential of MM-based methods to analyse spatial features in addressing these challenges, specifically in the context of spatialcontextual feature analysis …


Reimagining Education With Ai, Margherita Pagani, Steven Miller, Jerry Wind Sep 2024

Reimagining Education With Ai, Margherita Pagani, Steven Miller, Jerry Wind

Research Collection School Of Computing and Information Systems

This chapter examines AI’s transformative potential in education, focusing on Generative AI (GenAI) and Large Language Models (LLMs) while at the same time emphasizing the importance of grounding and guiding AI efforts with learning science and education research findings. It synthesizes analyses and expert recommendations, highlighting opportunities like personalized learning and enhanced teacher productivity, alongside challenges such as over-reliance on AI. Practical steps for instructors include adopting a question-first approach, utilizing AI for personalized feedback, designing AI-enhanced learning experiences, fostering critical thinking, and ensuring ethical AI use. The chapter concludes with strategic recommendations for leveraging AI to sustainably improve educational …


Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu Sep 2024

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu

Research Collection School Of Computing and Information Systems

This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …


Satirical Deepfakes, Surreal Dreamscapes & Nostalgic Pixels: The Rapid Evolution And Cultural Commentary Of Ai-Aesthetics, Andrew Smith, James Hutson Sep 2024

Satirical Deepfakes, Surreal Dreamscapes & Nostalgic Pixels: The Rapid Evolution And Cultural Commentary Of Ai-Aesthetics, Andrew Smith, James Hutson

Faculty Scholarship

The rapid evolution of visual aesthetics driven by AI, shared globally through the internet and social media, has dramatically accelerated what once took centuries to develop. This article explores the unique visual tropes emerging from AI-generated content, characterized by surreal, uncanny, and often unsettling imagery. Examples range from the Dor Brothers' stylized narrative videos to horrifying depictions of transformations, such as people morphing into motorcycles. The article contextualizes this aesthetic within historical developments in creative experimentation, drawing parallels with David Bowie's unconventional approach to sound creation in the 1970s. It also considers how AI-driven art, free from copyright constraints in …


Enabling Emg-Based Silent Speech Transcription Through Speech-To-Text Transfer Learning, Alexander T. Garcia Sep 2024

Enabling Emg-Based Silent Speech Transcription Through Speech-To-Text Transfer Learning, Alexander T. Garcia

Master's Theses

In recent years, advances in deep learning have allowed various forms of electrographic signals, such as electroencephalography (EEG) and electromyography (EMG), to be used as a viable form of input in artificial intelligence applications, particularly for applications in the medical field. One such topic that EMG inputs have been used is in silent speech interfaces, or devices capable of processing speech without an audio-based input. The goal of this thesis is to explore a novel method of training a machine learning model to be used for silent speech interface development: using transfer learning to leverage a pre-trained speech recognition model …


Unraveling The Dynamics Of Stable And Curious Audiences In Web Systems, Rodrigo Alves, Antoine Ledent, Renato Assunção, Pedro Vaz-De-Melo, Marius Kloft Sep 2024

Unraveling The Dynamics Of Stable And Curious Audiences In Web Systems, Rodrigo Alves, Antoine Ledent, Renato Assunção, Pedro Vaz-De-Melo, Marius Kloft

Research Collection School Of Computing and Information Systems

We propose the Burst-Induced Poisson Process (BPoP), a model designed to analyze time series data such as feeds or search queries. BPoP can distinguish between the slowly-varying regular activity of a stable audience and the bursty activity of a curious audience, often seen in viral threads. Our model consists of two hidden, interacting processes: a self-feeding process (SFP) that generates bursty behavior related to viral threads, and a non-homogeneous Poisson process (NHPP) with step function intensity that is influenced by the bursts from the SFP. The NHPP models the normal background behavior, driven solely by the overall popularity of the …


Bridging Disciplines With Ai-Powered Coding: Empowering Non-Stem Students To Build Advanced Apis In The Humanities, Daniel Plate, James Hutson Sep 2024

Bridging Disciplines With Ai-Powered Coding: Empowering Non-Stem Students To Build Advanced Apis In The Humanities, Daniel Plate, James Hutson

Faculty Scholarship

The integration of AI-powered coding assistants, such as Cursor AI, GitHub Copilot, and Replit’s Ghostwriter AI, represents a transformative shift in programming education, particularly for non-STEM students. These tools democratize coding by enabling natural language code generation, intelligent error correction, and context-aware assistance within familiar coding environments. This article explores how these technologies empower educators across disciplines to introduce basic and advanced coding concepts to humanities students, a demographic traditionally underserved in programming education. By leveraging AI, instructors can teach non-STEM students the foundational principles of coding and guide them through the development of sophisticated projects, such as building APIs …


Dynamic Difficulty Adjustment For Combat Systems In Role-Playing Genre Video Games, Cheuk Man Chan Sep 2024

Dynamic Difficulty Adjustment For Combat Systems In Role-Playing Genre Video Games, Cheuk Man Chan

Dissertations, Theses, and Capstone Projects

Static difficulty adjustment has been applied to video games since their inception. However, dynamic difficulty adjustment did not become a topic of interest in either the academic fields or the industry until the turn of the century with sufficient advancement in processing power of computers and console systems. Amongst the work done in this area, most of the focus has either been placed on the action/adventure or the strategy game genre. However, there are only a limited number of studies regarding the role playing game genre which, by the nature of such games, generates a massive amount of data regarding …


Solving Fractional Differential Equations On A Quantum Computer: A Variational Approach, Fong Yew Leong, Dax Enshan Koh, Jian Feng Kong, Siong Thye Goh, Jun Yong Khoo, Wei Bin Ewe, Hongying Li, Jayne Thompson, Dario Poletti Sep 2024

Solving Fractional Differential Equations On A Quantum Computer: A Variational Approach, Fong Yew Leong, Dax Enshan Koh, Jian Feng Kong, Siong Thye Goh, Jun Yong Khoo, Wei Bin Ewe, Hongying Li, Jayne Thompson, Dario Poletti

Research Collection School Of Computing and Information Systems

We introduce an efficient variational hybrid quantum-classical algorithm designed for solving Caputo time-fractional partial differential equations. Our method employs an iterable cost function incorporating a linear combination of overlap history states. The proposed algorithm is not only efficient in terms of time complexity but also has lower memory costs compared to classical methods. Our results indicate that solution fidelity is insensitive to the fractional index and that gradient evaluation costs scale economically with the number of time steps. As a proof of concept, we apply our algorithm to solve a range of fractional partial differential equations commonly encountered in engineering …


Ai Satire And Digital Dystopia: The Dor Brothers Crafting Imperfection And Political Commentary In Contemporary Video Art, James Hutson, Andrew Smith Sep 2024

Ai Satire And Digital Dystopia: The Dor Brothers Crafting Imperfection And Political Commentary In Contemporary Video Art, James Hutson, Andrew Smith

Faculty Scholarship

The Dor Brothers' AI-generated video content exemplifies an inflection point in digital creativity, where technological limitations are repurposed as aesthetic tools. Drawing on recent interviews with Yonatan Dor, this article explores the innovative techniques of the brothers, such as masking visual imperfections with retro filters and embracing the unpredictability of AI outputs. Through generating numerous clips and meticulously editing selections, they create a unique aesthetic that juxtaposes surrealism with a gritty realism, often reminiscent of early CCTV or VHS footage. Their work not only transcends the typical "morphing face" trope of AI videos but also engages in satire, using deepfake-like …


Technoculture And Language Models In Archaeology: Reconstructing And Preserving Cultural Narratives Through Digital Humanities, James Hutson Sep 2024

Technoculture And Language Models In Archaeology: Reconstructing And Preserving Cultural Narratives Through Digital Humanities, James Hutson

Faculty Scholarship

Technoculture, which examines the intersection of culture and technology, has increasingly permeated archaeological practice, transforming both scholarly research and public engagement [1-3]. The introduction of digital tools such as virtual reality (VR), geographic information systems (GIS), and large language models (LLMs) has democratized access to archaeological knowledge, enabling communities to engage more actively with their cultural heritage [4-6]. This short article explores the mutual influence of technocultural studies and AI technologies on archaeology, with a focus on the preservation and reconstruction of cultural narratives through digital means.

The first aspect of this intersection lies in how technocultural tools are creating …


Enhancing History Education With Google Notebooklm: Case Study Of Mary Easton Sibley’S Diary For Multimedia Content And Podcast Creation, Paul Huffman, James Hutson Sep 2024

Enhancing History Education With Google Notebooklm: Case Study Of Mary Easton Sibley’S Diary For Multimedia Content And Podcast Creation, Paul Huffman, James Hutson

Faculty Scholarship

This article explores new features of Google’s NotebookLM, an AI-powered tool designed for advanced document analysis and educational content generation. Tested on the 92-page transcribed diary of Mary Easton Sibley, the founder of Lindenwood University, NotebookLM effectively generated FAQs, a study guide, a table of contents, a briefing document, and an audio overview in podcast format. By transforming static historical documents into dynamic learning materials, the document-based AI model provides a user-friendly interface for educators and students, especially those without experience in audio editing or podcasting. While successful in creating study guides and audio formats, the tool faced challenges in …


Efficient Neural Collaborative Search For Pickup And Delivery Problems, Detian Kong, Yining Ma, Zhiguang Cao, Tianshu Yu, Jianhua Xiao Sep 2024

Efficient Neural Collaborative Search For Pickup And Delivery Problems, Detian Kong, Yining Ma, Zhiguang Cao, Tianshu Yu, Jianhua Xiao

Research Collection School Of Computing and Information Systems

In this paper, we introduce Neural Collaborative Search (NCS), a novel learning-based framework for efficiently solving pickup and delivery problems (PDPs). NCS pioneers the collaboration between the latest prevalent neural construction and neural improvement models, establishing a collaborative framework where an improvement model iteratively refines solutions initiated by a construction model. Our NCS collaboratively trains the two models via reinforcement learning with an effective shared-critic mechanism. In addition, the construction model enhances the improvement model with high-quality initial solutions via curriculum learning, while the improvement model accelerates the convergence of the construction model through imitation learning. Besides the new framework …


Certified Quantization Strategy Synthesis For Neural Networks, Yedi Zhang, Guangke Chen, Jun Sun, Jun Sun Sep 2024

Certified Quantization Strategy Synthesis For Neural Networks, Yedi Zhang, Guangke Chen, Jun Sun, Jun Sun

Research Collection School Of Computing and Information Systems

Quantization plays an important role in deploying neural networks on embedded, real-time systems with limited computing and storage resources (e.g., edge devices). It significantly reduces the model storage cost and improves inference efficiency by using fewer bits to represent the parameters. However, it was recently shown that critical properties may be broken after quantization, such as robustness and backdoor-freeness. In this work, we introduce the first method for synthesizing quantization strategies that verifiably maintain desired properties after quantization, leveraging a key insight that quantization leads to a data distribution shift in each layer. We propose to compute the preimage for …


Putting Gpt-4o To The Sword: A Comprehensive Evaluation Of Language, Vision, Speech, And Multimodal Proficiency, Sakib Shahriar, Brady D. Lund, Nishith Reddy Mannuru, Muhammad Arbab Arshad, Kadhim Hayawi, Ravi Varma Kumar Bevara, Aashrith Mannuru, Laiba Batool Sep 2024

Putting Gpt-4o To The Sword: A Comprehensive Evaluation Of Language, Vision, Speech, And Multimodal Proficiency, Sakib Shahriar, Brady D. Lund, Nishith Reddy Mannuru, Muhammad Arbab Arshad, Kadhim Hayawi, Ravi Varma Kumar Bevara, Aashrith Mannuru, Laiba Batool

All Works

As large language models (LLMs) continue to advance, evaluating their comprehensive capabilities becomes significant for their application in various fields. This research study comprehensively evaluates the language, vision, speech, and multimodal capabilities of GPT-4o. The study employs standardized exam questions, reasoning tasks, and translation assessments to assess the model’s language capability. Additionally, GPT-4o’s vision and speech capabilities are tested through image classification and object-recognition tasks, as well as accent classification. The multimodal evaluation assesses the model’s performance in integrating visual and linguistic data. Our findings reveal that GPT-4o demonstrates high accuracy and efficiency across multiple domains in language and reasoning …


Attention-Based Load Forecasting With Bidirectional Finetuning, Firuz Kamalov, Inga Zicmane, Murodbek Safaraliev, Linda Smail, Mihail Senyuk, Pavel Matrenin Sep 2024

Attention-Based Load Forecasting With Bidirectional Finetuning, Firuz Kamalov, Inga Zicmane, Murodbek Safaraliev, Linda Smail, Mihail Senyuk, Pavel Matrenin

All Works

Accurate load forecasting is essential for the efficient and reliable operation of power systems. Traditional models primarily utilize unidirectional data reading, capturing dependencies from past to future. This paper proposes a novel approach that enhances load forecasting accuracy by fine tuning an attention-based model with a bidirectional reading of time-series data. By incorporating both forward and backward temporal dependencies, the model gains a more comprehensive understanding of consumption patterns, leading to improved performance. We present a mathematical framework supporting this approach, demonstrating its potential to reduce forecasting errors and improve robustness. Experimental results on real-world load datasets indicate that our …


La Vida: Towards A Motivated Goal Reasoning Agent, Ursula Addison Sep 2024

La Vida: Towards A Motivated Goal Reasoning Agent, Ursula Addison

Dissertations, Theses, and Capstone Projects

An autonomous agent deployed to operate over extended horizons in uncertain environments will encounter situations for which it was not designed. A class of these situations involves an invalidation of agent goals and limited guidance in establishing a new set of goals to pursue. An agent will benefit from some mechanism that will allow it to pursue new goals under these circumstances such that the goals are broadly useful in its environment and take advantage of its existing skills while aligning with societal norms. We propose augmenting a goal reasoning agent, i.e., an agent that can deliberate on and self-select …


Antioxidant, Photoprotective, And Cytotoxic Activities Of Tristaniopsis Merguensis Leaf Fractions With Molecular Docking Study Of Potential Fraction, Boima Situmeang, Respati Tri Swasono, Tri Joko Raharjo Aug 2024

Antioxidant, Photoprotective, And Cytotoxic Activities Of Tristaniopsis Merguensis Leaf Fractions With Molecular Docking Study Of Potential Fraction, Boima Situmeang, Respati Tri Swasono, Tri Joko Raharjo

Karbala International Journal of Modern Science

Through experimental along with molecular docking techniques of potential fraction, this study intended to evaluate the essential phytochemical elements of Tristaniopsis merguensis leaflets as well as potential antioxidant, photoprotective, along with cytotoxic activities. The DPPH and ABTS tests were used to evaluate the antioxidant efficacy of the n-hexane (HPF), ethyl acetate (EPF), and methanol (MPF) fractions. Using an in-vitro solar protection factor (SPF) assessment, the photoprotective ability of T. merguensis components against UV damage was examined. Subsequently, invitro cytotoxic research were carried out against MCF-7 cell line (breast cancer line) assay. This was followed by molecular docking stimulation testing against …


Health Benefits And Adverse Effects Of Kratom: A Social Media Text-Mining Approach, Abdullah Wahbeh, Mohammad A. Al-Ramahi, Omar El-Gayar, Tareq Nasralah, Ahmed El Noshokaty Aug 2024

Health Benefits And Adverse Effects Of Kratom: A Social Media Text-Mining Approach, Abdullah Wahbeh, Mohammad A. Al-Ramahi, Omar El-Gayar, Tareq Nasralah, Ahmed El Noshokaty

All Faculty Scholarship

Background: Kratom is a substance that alters one’s mental state and is used for pain relief, mood enhancement, and opioid withdrawal, despite potential health risks. In this study, we aim to analyze the social media discourse about kratom to provide more insights about kratom’s benefits and adverse effects. Also, we aim to demonstrate how algorithmic machine learning approaches, qualitative methods, and data visualization techniques can complement each other to discern diverse reactions to kratom’s effects, thereby complementing traditional quantitative and qualitative methods. Methods: Social media data were analyzed using the latent Dirichlet allocation (LDA) algorithm, PyLDAVis, and t-distributed stochastic neighbor …


Adversarial Variational Autoencoders To Extend And Improve Generative Model, Loc Nguyen, Hassan I. Abdalla, Ali A. Amer Aug 2024

Adversarial Variational Autoencoders To Extend And Improve Generative Model, Loc Nguyen, Hassan I. Abdalla, Ali A. Amer

All Works

Generative artificial intelligence (GenAI) has been advancing with many notable achievements like ChatGPT and Bard. The deep generative model (DGM) is a branch of GenAI, which is preeminent in generating raster data such as image and sound due to the strong role of deep neural networks (DNNs) in inference and recognition. The built-in inference mechanism of DNN, which simulates and aims at synaptic plasticity of the human neuron network, fosters the generation ability of DGM, which produces surprising results with the support of statistical flexibility. Two popular approaches in DGM are the variational autoencoder (VAE) and generative adversarial network (GAN). …