Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 751 - 780 of 57928

Full-Text Articles in Physical Sciences and Mathematics

Learning Multi-Faceted Prototypical User Interests, Nhu Thuat Tran, Hady Wirawan Lauw May 2024

Learning Multi-Faceted Prototypical User Interests, Nhu Thuat Tran, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

We seek to uncover the latent interest units from behavioral data to better learn user preferences under the VAE framework. Existing practices tend to ignore the multiple facets of item characteristics, which may not capture it at appropriate granularity. Moreover, current studies equate the granularity of item space to that of user interests, which we postulate is not ideal as user interests would likely map to a small subset of item space. In addition, the compositionality of user interests has received inadequate attention, preventing the modeling of interactions between explanatory factors driving a user's decision. To resolve this, we propose …


Anomalyclip: Object-Agnostic Prompt Learning For Zero-Shot Anomaly Detection, Qihang Zhou, Guansong Pang, Yu Tian, Shibo He, Jiming Chen May 2024

Anomalyclip: Object-Agnostic Prompt Learning For Zero-Shot Anomaly Detection, Qihang Zhou, Guansong Pang, Yu Tian, Shibo He, Jiming Chen

Research Collection School Of Computing and Information Systems

Zero-shot anomaly detection (ZSAD) requires detection models trained using auxiliary data to detect anomalies without any training sample in a target dataset. It is a crucial task when training data is not accessible due to various concerns, e.g., data privacy, yet it is challenging since the models need to generalize to anomalies across different domains where the appearance of foreground objects, abnormal regions, and background features, such as defects/tumors on different products/ organs, can vary significantly. Recently large pre-trained vision-language models (VLMs), such as CLIP, have demonstrated strong zero-shot recognition ability in various vision tasks, including anomaly detection. However, their …


Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa Waleed, Liznerski Philipp, Antoine Ledent, Wagner Dennis, Wang Puyu, Kloft Marius May 2024

Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa Waleed, Liznerski Philipp, Antoine Ledent, Wagner Dennis, Wang Puyu, Kloft Marius

Research Collection School Of Computing and Information Systems

Adversarial examples are manipulated samples used to deceive machine learning models, posing a serious threat in safety-critical applications. Existing safety certificates for machine learning models are limited to individual input examples, failing to capture generalization to unseen data. To address this limitation, we propose novel generalization bounds based on the PAC-Bayesian and randomized smoothing frameworks, providing certificates that predict the model’s performance and robustness on unseen test samples based solely on the training data. We present an effective procedure to train and compute the first non-vacuous generalization bounds for neural networks in adversarial settings. Experimental results on the widely recognized …


Compositional Policy Learning In Stochastic Control Systems With Formal Guarantees, Dorde Zikelic, Mathias Lechner, Abhinav Verma, Krishnendu Chatterjee, Thomas A. Henzinger May 2024

Compositional Policy Learning In Stochastic Control Systems With Formal Guarantees, Dorde Zikelic, Mathias Lechner, Abhinav Verma, Krishnendu Chatterjee, Thomas A. Henzinger

Research Collection School Of Computing and Information Systems

Reinforcement learning has shown promising results in learning neural network policies for complicated control tasks. However, the lack of formal guarantees about the behavior of such policies remains an impediment to their deployment. We propose a novel method for learning a composition of neural network policies in stochastic environments, along with a formal certificate which guarantees that a specification over the policy's behavior is satisfied with the desired probability. Unlike prior work on verifiable RL, our approach leverages the compositional nature of logical specifications provided in SPECTRL, to learn over graphs of probabilistic reach-avoid specifications. The formal guarantees are provided …


Evaluation Of Orca 2 Against Other Llms For Retrieval Augmented Generation, Donghao Huang, Zhaoxia Wang May 2024

Evaluation Of Orca 2 Against Other Llms For Retrieval Augmented Generation, Donghao Huang, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

This study presents a comprehensive evaluation of Microsoft Research’s Orca 2, a small yet potent language model, in the context of Retrieval Augmented Generation (RAG). The research involved comparing Orca 2 with other significant models such as Llama-2, GPT-3.5-Turbo, and GPT-4, particularly focusing on its application in RAG. Key metrics, included faithfulness, answer relevance, overall score, and inference speed, were assessed. Experiments conducted on high-specification PCs revealed Orca 2’s exceptional performance in generating high quality responses and its efficiency on consumer-grade GPUs, underscoring its potential for scalable RAG applications. This study highlights the pivotal role of smaller, efficient models like …


Large Language Model Powered Agents In The Web, Yang Deng, An Zhang, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua May 2024

Large Language Model Powered Agents In The Web, Yang Deng, An Zhang, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Web applications serve as vital interfaces for users to access information, perform various tasks, and engage with content. Traditional web designs have predominantly focused on user interfaces and static experiences. With the advent of large language models (LLMs), there’s a paradigm shift as we integrate LLM-powered agents into these platforms. These agents bring forth crucial human capabilities like memory and planning to make them behave like humans in completing various tasks, effectively enhancing user engagement and offering tailored interactions in web applications. In this tutorial, we delve into the cutting-edge techniques of LLM-powered agents across various web applications, such as …


Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba May 2024

Analysis And Numerical Simulation Of Tumor Growth Models, Daniel Acosta Soba

Masters Theses and Doctoral Dissertations

In this dissertation we focus on the numerical analysis of tumor growth models. Due to the difficulty of developing physically meaningful approximations of such models, we divide the main problem into more simple pieces of work that are addressed in the different chapters. First, in Chapter 2 we present a new upwind discontinuous Galerkin (DG) scheme for the convective Cahn–Hilliard model with degenerate mobility which preserves the pointwise bounds and prevents non-physical spurious oscillations. These ideas are based on a well-suited piecewise constant approximation of convection equations. The proposed numerical scheme is contrasted with other approaches in several numerical experiments. …


Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota, Ayman Nassar, Soukaina Filali Boubrahimi, Shah Muhammad Hamdi, Pouya Hosseinzadeh May 2024

Enhancing Monthly Streamflow Prediction Using Meteorological Factors And Machine Learning Models In The Upper Colorado River Basin, Saichand Thota, Ayman Nassar, Soukaina Filali Boubrahimi, Shah Muhammad Hamdi, Pouya Hosseinzadeh

Computer Science Student Research

Streamflow prediction is crucial for planning future developments and safety measures along river basins, especially in the face of changing climate patterns. In this study, we utilized monthly streamflow data from the United States Bureau of Reclamation and meteorological data (snow water equivalent, temperature, and precipitation) from the various weather monitoring stations of the Snow Telemetry Network within the Upper Colorado River Basin to forecast monthly streamflow at Lees Ferry, a specific location along the Colorado River in the basin. Four machine learning models—Random Forest Regression, Long short-term memory, Gated Recurrent Unit, and Seasonal AutoRegresive Integrated Moving Average—were trained using …


Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung May 2024

Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung

Electronic Theses and Dissertations

Bioinformatics is a domain that has experienced rapid research growth in recent years, as evidenced by the increasing number of articles in biomedical databases such as PubMed, which adds over a million publications every year. However, this also poses a challenge for researchers who need to find relevant citations for their work. Therefore, developing efficient indexing and searching methods for text data is crucial for Bioinformatics. One key technique for information retrieval is document inversion, which involves creating an inverted index to enable efficient searching through vast collections of text or documents. This Ph.D. research aims to design the research …


Particle Classification Of Electromagnetic Clusters Using The Sphenix Detector, Fredrick J. Melhorn May 2024

Particle Classification Of Electromagnetic Clusters Using The Sphenix Detector, Fredrick J. Melhorn

Chancellor’s Honors Program Projects

No abstract provided.


An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris May 2024

An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris

Computer Science and Computer Engineering Undergraduate Honors Theses

Phasor measurement unit (PMU) systems often experience unavoidable missing and erroneous measurements, which undermine power system observability and operational effectiveness. Traditional solutions for recovering missing PMU data employ a centralized approach at the control center, resulting in lengthy recovery times due to data transmission and aggregation. In this work, we leverage P4-based programmable networks to expedite missing data recovery. Our approach utilizes the data plane programmability offered by P4 to present an in-network solution for PMU data recovery. We establish a data-plane pipeline on P4 switches, featuring a customized PMU protocol parser, a missing data detection module, and an auto-regressive …


A Little Loud And A Little Alone: A Phenomenology Of Leadership Identity Construction Among Women In Higher Education Technology, Amy Barry May 2024

A Little Loud And A Little Alone: A Phenomenology Of Leadership Identity Construction Among Women In Higher Education Technology, Amy Barry

Department of Teaching, Learning, and Teacher Education: Theses and Other Student Research

This qualitative study is an exploration of how women in higher education information technology (IT) positions navigate constructing their leadership identities. This includes the messy, personal, internal identity work that occurs prior to claiming their leadership identities on the public stage, followed by an examination of what the experience of attempting to claim and negotiate a leadership identity is like in the social context of their organizations. This educational and sociological study employs an Interpretative Phenomenological Analysis approach with a series of three interviews per participant that allowed the researcher to deeply explore the personal identity experiences of participants. Findings …


Using Dynamic Schemas For Query Optimization Over Json Data., Tomas Felipe Llano-Rios May 2024

Using Dynamic Schemas For Query Optimization Over Json Data., Tomas Felipe Llano-Rios

Electronic Theses and Dissertations

Query optimization in document stores has traditionally relied on rule-based approaches, but recent research advocates for a shift towards cost-based optimization. However, this transition is hindered by the fragmented nature of existing approaches, stemming from the early development stage of cost-based query optimization for document databases. A key challenge lies in the absence of a standardized query language and semantics, exacerbated by the diverse and schema-less nature of JSON document collections. To tackle these challenges, the literature has proposed dynamic schemas, primarily utilized at parsing time. However, these schemas lack a formal foundation that describes meaningful semantics for query optimization. …


Comparing And Assessing Four Ai Chatbots' Competence In Economics, Patrik T. Hultberg, David Santandreu Calonge, Firuz Kamalov, Linda Smail May 2024

Comparing And Assessing Four Ai Chatbots' Competence In Economics, Patrik T. Hultberg, David Santandreu Calonge, Firuz Kamalov, Linda Smail

All Works

Artificial Intelligence (AI) chatbots have emerged as powerful tools in modern academic endeavors, presenting both opportunities and challenges in the learning landscape. They can provide content information and analysis across most academic disciplines, but significant differences exist in terms of response accuracy for conclusions and explanations, as well as word counts. This study explores four distinct AI chatbots, GPT-3.5, GPT-4, Bard, and LLaMA 2, for accuracy of conclusions and quality of explanations in the context of university-level economics. Leveraging Bloom’s taxonomy of cognitive learning complexity as a guiding framework, the study confronts the four AI chatbots with a standard test …


Classification And Explanation Of Iron Deficiency Anemia From Complete Blood Count Data Using Machine Learning, Siddartha Pullakhandam May 2024

Classification And Explanation Of Iron Deficiency Anemia From Complete Blood Count Data Using Machine Learning, Siddartha Pullakhandam

Theses and Dissertations

Anemia is a global health problem, and over 2 billion people are affected. Although, the major cause of anemia is iron deficiency (IDA), global estimates suggest that only about half of anemia could be attributed to ID. The typical test of anemia involves measurement of hemoglobin using Complete Blood Count (CBC) test, which also gives additional information on blood cell numbers and morphology. The diagnosis of iron deficiency anemia (IDA, both anemic and ID co-exist in a subject) requires additional expensive serum ferritin test. However, blood cell count, and morphology can also be utilized for diagnosis of IDA. The goal …


Mapping Arbitrary Spiking Neural Networks To The Ravens Neuroprocessor, Jongheon Park May 2024

Mapping Arbitrary Spiking Neural Networks To The Ravens Neuroprocessor, Jongheon Park

Masters Theses

In neuromorphic computing, a hardware implementation of a spiking neural network is used to provide improved speed and power efficiency over simulations of the networks on a traditional Von Neumann architecture. These hardware implementations employ bio-inspired architecture usually consisting of artificial neurons and synapses implemented in either analog, digital, or mixed-signal circuits. Since these hardware spiking neural networks are designed to support arbitrary networks under the constraints imposed by the available hardware resource, they have to be programmed by off-chip software with awareness of those constraints. The TENNLab research group at the University of Tennessee, Knoxville has recently developed the …


Interpretable Spatio-Temporal Embedding For Brain Structural-Effective Network With Ordinary Differential Equation, Haoteng Tang, Guodong Liu, Siyuan Dai, Kai Ye, Kun Zhao, Wenlu Wang, Carl Yang, Lifang He, Alex D. Leow, Paul Thompson May 2024

Interpretable Spatio-Temporal Embedding For Brain Structural-Effective Network With Ordinary Differential Equation, Haoteng Tang, Guodong Liu, Siyuan Dai, Kai Ye, Kun Zhao, Wenlu Wang, Carl Yang, Lifang He, Alex D. Leow, Paul Thompson

Computer Science Faculty Publications and Presentations

The MRI-derived brain network serves as a pivotal instrument in elucidating both the structural and functional aspects of the brain, encompassing the ramifications of diseases and developmental processes. However, prevailing methodologies, often focusing on synchronous BOLD signals from functional MRI (fMRI), may not capture directional influences among brain regions and rarely tackle temporal functional dynamics. In this study, we first construct the brain-effective network via the dynamic causal model. Subsequently, we introduce an interpretable graph learning framework termed Spatio-Temporal Embedding ODE (STE-ODE). This framework incorporates specifically designed directed node embedding layers, aiming at capturing the dynamic interplay between structural and …


Dancetag: Using Sensors To Improve Feedback Given To Dance Students, Yanelly Mego May 2024

Dancetag: Using Sensors To Improve Feedback Given To Dance Students, Yanelly Mego

Student Scholar Symposium Abstracts and Posters

The structure of dance classrooms has remained unchanged for several years. Very little, if any, technology has been incorporated to improve the quality of teaching. This has motivated our research project, whose goal is to capture dance movements with wearable sensors, to develop DANCETAG (Data Analytics and Notation with Captured Event Tagging). This is a platform that allows the gathering of data captured by Sony’s Mocopi sensors and annotating them with the dancer's movements. The Mocopi sensors make up a motion capture system. It is comprised of six small, round sensors that can be attached to velcro straps and clips. …


Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas May 2024

Decentralized Unknown Building Exploration By Frontier Incentivization And Voronoi Segmentation In A Communication Restricted Domain, Huzeyfe M. Kocabas

All Graduate Theses and Dissertations, Fall 2023 to Present

Exploring unknown environments using multiple robots poses a complex challenge, particularly in situations where communication between robots is either impossible or limited. Existing exploration techniques exhibit research gaps due to unrealistic communication assumptions or the computational complexities associated with exploration strategies in unfamiliar domains. In our investigation of multi-robot exploration in unknown areas, we employed various exploration and coordination techniques, evaluating their performance in terms of robustness and efficiency across different levels of environmental complexity.

Our research is centered on optimizing the exploration process through strategic agent distribution. We initially address the challenge of city roadway coverage, aiming to minimize …


A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry May 2024

A Framework That Explores The Cognitive Load Of Cs1 Assignments Using Pausing Behavior, Joshua O. Urry

All Graduate Theses and Dissertations, Fall 2023 to Present

Pausing behavior in introductory Computer Science (CS1) courses has been related to a student’s performance in the course and could be linked to a student’s cognitive load, or assignment difficulty. Having an objective measure of the cognitive load would be beneficial to course instructors as it would help them design assignments that are not too difficult. Two studies are presented in this work. The first study uses Cognitive Load Theory and Vygotsky’s Zone of Proximal Development as a theoretical framework to analyze pause times between keystrokes to better understand what types of assignments need more educational support than others. The …


Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee May 2024

Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee

Senior Theses and Projects

This thesis examines the impacts of technology on fundamental aspects of human nature and experience. Drawing on the works from Kant, Turing, Arendt, Benjamin, and Freud, it explores how rapid technological change is redefining human reason, intelligence, and creativity in the digital age. The first chapter analyzes whether modern online communication platforms realize or undermine Kant's vision of an enlightened public sphere fostering free discourse and critique. It argues that prioritizing engagement over substantive debate, these digital realms corrode the depth of interaction essential for cultivating human reason. The second chapter explores the pursuit of artificial intelligence as a reproduction …


Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed May 2024

Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed

Honors Theses

The exponential growth of technology, epitomized by Moore's Law – “the observation that the number of transistors on an integrated circuit will double every two years”– has propelled the swift evolution of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. This phenomenon has revolutionized various facets of daily life, from smart home devices to autonomous vehicles, reshaping how individuals interact with the world around them. However, as governments worldwide increasingly harness these innovations to monitor and collect personal data, profound privacy concerns have arisen among the general populace. Despite the ubiquity of AI and IoT in modern society, formal …


Improving The Scalability Of Neural Network Surface Code Decoders, Kevin Wu May 2024

Improving The Scalability Of Neural Network Surface Code Decoders, Kevin Wu

Undergraduate Honors Theses

Quantum computers have recently gained significant recognition due to their ability to solve problems intractable to classical computers. However, due to difficulties in building actual quantum computers, they have large error rates. Thus, advancements in quantum error correction are urgently needed to improve both their reliability and scalability. Here, we first present a type of topological quantum error correction code called the surface code, and we discuss recent developments and challenges of creating neural network decoders for surface codes. In particular, the amount of training data needed to reach the performance of algorithmic decoders grows exponentially with the size of …


Code Syntax Understanding In Large Language Models, Cole Granger May 2024

Code Syntax Understanding In Large Language Models, Cole Granger

Undergraduate Honors Theses

In recent years, tasks for automated software engineering have been achieved using Large Language Models trained on source code, such as Seq2Seq, LSTM, GPT, T5, BART and BERT. The inherent textual nature of source code allows it to be represented as a sequence of sub-words (or tokens), drawing parallels to prior work in NLP. Although these models have shown promising results according to established metrics (e.g., BLEU, CODEBLEU), there remains a deeper question about the extent of syntax knowledge they truly grasp when trained and fine-tuned for specific tasks.

To address this question, this thesis introduces a taxonomy of syntax …


Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi May 2024

Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi

University of New Orleans Theses and Dissertations

This study compares the performance of deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Transformer, in predicting stock prices across five companies (AAPL, CSCO, META, MSFT, and TSLA) from July 2019 to July 2023. Key findings reveal that GRU models generally exhibit the lowest Mean Absolute Error (MAE), indicating higher precision, particularly notable for CSCO with a remarkably low MAE. While LSTM models often show slightly higher MAE values, they outperform Transformer models in capturing broader trends and variance in stock prices, as evidenced by higher R-squared (R2) values. Transformer models generally exhibit higher MAE …


Choreographing The Rhythms Of Observation: Dynamics For Ranged Observer Bipartite-Unipartite Spatiotemporal (Robust) Networks, Edward A. Holmberg Iv May 2024

Choreographing The Rhythms Of Observation: Dynamics For Ranged Observer Bipartite-Unipartite Spatiotemporal (Robust) Networks, Edward A. Holmberg Iv

University of New Orleans Theses and Dissertations

Existing network analysis methods struggle to optimize observer placements in dynamic environments with limited visibility. This dissertation introduces the novel ROBUST (Ranged Observer Bipartite-Unipartite SpatioTemporal) framework, offering a significant advancement in modeling, analyzing, and optimizing observer networks within complex spatiotemporal domains. ROBUST leverages a unique bipartite-unipartite approach, distinguishing between observer and observable entities while incorporating spatial constraints and temporal dynamics.

This research extends spatiotemporal network theory by introducing novel graph-based measures, including myopic degree, spatial closeness centrality, and edge length proportion. These measures, coupled with advanced clustering techniques like Proximal Recurrence, provide insights into network structure, resilience, and the effectiveness …


The Pawn System: How Procedurally Adaptive Webbed Narratives Create Stories, Steven T. Bordelon May 2024

The Pawn System: How Procedurally Adaptive Webbed Narratives Create Stories, Steven T. Bordelon

University of New Orleans Theses and Dissertations

This thesis describes the design, implementation, and testing of a novel procedural narrative system called the Procedurally Adaptive Webbed Narrative (PAWN) system. PAWN procedurally generates characters and, responding to choices made by the player, produces more responsive characters and relationships involving the player and these narrative agents. Initially, this thesis discusses other interactive narrative types that exist, such as emergent or event-driven narratives, along with their strengths and weaknesses. It then examines each aspect of PAWN, starting with initial actor generation, then moving to the capturing of game events and translating them into logical objects called Occurrences. These Occurrences are …


Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa May 2024

Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa

Electronic Theses, Projects, and Dissertations

A novel technique for remote sensing image scene classification is employed using the Compact Vision Transformer (CVT) architecture. This model strengthens the power of deep learning and self-attention algorithms to significantly intensify the accuracy and efficiency of scene classification in remote sensing imagery. Through extensive training and evaluation of the RSSCNN7 dataset, our CVT-based model has achieved an impressive accuracy rate of 87.46% on the original dataset. This remarkable result underscores the prospect of CVT models in the domain of remote sensing and underscores their applicability in real-world scenarios. Our report furnishes an elaborate account of the model's architecture, training …


An Empirical Study On The Efficacy Of Llm-Powered Chatbots In Basic Information Retrieval Tasks, Naja Faysal May 2024

An Empirical Study On The Efficacy Of Llm-Powered Chatbots In Basic Information Retrieval Tasks, Naja Faysal

Electronic Theses, Projects, and Dissertations

The rise of conversational user interfaces (CUIs) powered by large language models (LLMs) is transforming human-computer interaction. This study evaluates the efficacy of LLM-powered chatbots, trained on website data, compared to browsing websites for finding information about organizations across diverse sectors. A within-subjects experiment with 165 participants was conducted, involving similar information retrieval (IR) tasks using both websites (GUIs) and chatbots (CUIs). The research questions are: (Q1) Which interface helps users find information faster: LLM chatbots or websites? (Q2) Which interface helps users find more accurate information: LLM chatbots or websites?. The findings are: (Q1) Participants found information significantly faster …


Care-Teach: Proposing An Open-Source Approach To Personalized Learning, Jaime Augusto Alvarez Perez May 2024

Care-Teach: Proposing An Open-Source Approach To Personalized Learning, Jaime Augusto Alvarez Perez

Theses and Dissertations

Care-Teach is an algorithmic educational model that provides teachers and educators with the tools to create interactive, text-based lessons that address a student’s need for continuity and reinforcement. Care-Teach is built around two core components: a Student Behavior Profile and the Skill Tree. These models work together to give each student a personalized learning experience that reinforces their pre-existing strengths and inclinations. The Student Behavior Profile model keeps track of a learner’s inclinations and mood, utilizing metrics such as average response time and accuracy to categorize opportunities for educator involvement. The Skill Tree is an organizational …