Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–25 of 25 results for author: Morgan, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13379  [pdf, other

    cs.CV eess.IV

    Removing cloud shadows from ground-based solar imagery

    Authors: Amal Chaoui, Jay Paul Morgan, Adeline Paiement, Jean Aboudarham

    Abstract: The study and prediction of space weather entails the analysis of solar images showing structures of the Sun's atmosphere. When imaged from the Earth's ground, images may be polluted by terrestrial clouds which hinder the detection of solar structures. We propose a new method to remove cloud shadows, based on a U-Net architecture, and compare classical supervision with conditional GAN. We evaluate… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2404.08399  [pdf, other

    cs.CV

    Mitigating Challenges of the Space Environment for Onboard Artificial Intelligence: Design Overview of the Imaging Payload on SpIRIT

    Authors: Miguel Ortiz del Castillo, Jonathan Morgan, Jack McRobbie, Clint Therakam, Zaher Joukhadar, Robert Mearns, Simon Barraclough, Richard Sinnott, Andrew Woods, Chris Bayliss, Kris Ehinger, Ben Rubinstein, James Bailey, Airlie Chapman, Michele Trenti

    Abstract: Artificial intelligence (AI) and autonomous edge computing in space are emerging areas of interest to augment capabilities of nanosatellites, where modern sensors generate orders of magnitude more data than can typically be transmitted to mission control. Here, we present the hardware and software design of an onboard AI subsystem hosted on SpIRIT. The system is optimised for on-board computer vis… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: AI4Space 2024, 3rd Workshop on AI for Space, CVPR 2024

  3. arXiv:2403.08079  [pdf, other

    cs.SE stat.ME

    BayesFLo: Bayesian fault localization of complex software systems

    Authors: Yi Ji, Simon Mak, Ryan Lekivetz, Joseph Morgan

    Abstract: Software testing is essential for the reliable development of complex software systems. A key step in software testing is fault localization, which uses test data to pinpoint failure-inducing combinations for further diagnosis. Existing fault localization methods, however, are largely deterministic, and thus do not provide a principled approach for assessing probabilistic risk of potential root ca… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  4. arXiv:2311.07894  [pdf

    cs.CR

    Security in Drones

    Authors: Jonathan Morgan, Julio Perez, Jordan Wade, Sundar Krishnan

    Abstract: Drones are used in our everyday world for private, commercial, and government uses. It is important to establish both the cyber threats drone users face and security practices to combat those threats. Privacy will always be the main concern when using drones. Protecting information legally collected on drones and protecting people from the illegal collection of their data are topics that security… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  5. arXiv:2309.09102  [pdf, other

    cs.RO

    CppFlow: Generative Inverse Kinematics for Efficient and Robust Cartesian Path Planning

    Authors: Jeremy Morgan, David Millard, Gaurav S. Sukhatme

    Abstract: In this work we present CppFlow - a novel and performant planner for the Cartesian Path Planning problem, which finds valid trajectories up to 129x faster than current methods, while also succeeding on more difficult problems where others fail. At the core of the proposed algorithm is the use of a learned, generative Inverse Kinematics solver, which is able to efficiently produce promising entire… ▽ More

    Submitted 3 June, 2024; v1 submitted 16 September, 2023; originally announced September 2023.

  6. arXiv:2208.11934  [pdf, other

    cs.LG physics.chem-ph

    Domain-informed graph neural networks: a quantum chemistry case study

    Authors: Jay Morgan, Adeline Paiement, Christian Klinke

    Abstract: We explore different strategies to integrate prior domain knowledge into the design of a deep neural network (DNN). We focus on graph neural networks (GNN), with a use case of estimating the potential energy of chemical systems (molecules and crystals) represented as graphs. We integrate two elements of domain knowledge into the design of the GNN to constrain and regularise its learning, towards h… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

  7. Process Visualization of Manufacturing Execution System (MES) Data

    Authors: Meadhbh O'Neill, Jeff Morgan, Kevin Burke

    Abstract: Process visualizations of data from manufacturing execution systems (MESs) provide the ability to generate valuable insights for improved decision-making. Industry 4.0 is awakening a digital transformation where advanced analytics and visualizations are critical. Exploiting MESs with data-driven strategies can have a major impact on business outcomes. The advantages of employing process visualizat… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

    MSC Class: 62P30

    Journal ref: 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI) (2021) 659-664

  8. arXiv:2111.08933  [pdf, other

    cs.RO

    IKFlow: Generating Diverse Inverse Kinematics Solutions

    Authors: Barrett Ames, Jeremy Morgan, George Konidaris

    Abstract: Inverse kinematics - finding joint poses that reach a given Cartesian-space end-effector pose - is a common operation in robotics, since goals and waypoints are typically defined in Cartesian space, but robots must be controlled in joint space. However, existing inverse kinematics solvers return a single solution pose, where systems with more than 6 degrees of freedom support infinitely many such… ▽ More

    Submitted 29 August, 2022; v1 submitted 17 November, 2021; originally announced November 2021.

    Comments: Revised version - updated with feedback from RA-L submission

  9. Friend or Foe: A Review and Synthesis of Computational Models of the Identity Labeling Problem

    Authors: Kenneth Joseph, Jonathan Howard Morgan

    Abstract: We introduce the identity labeling problem - given an individual in a social situation, can we predict what identity(ies) they will be labeled with by someone else? This problem remains a theoretical gap and methodological challenge, evidenced by the fact that models of social-cognition often sidestep the issue by treating identities as already known. We build on insights from existing models to d… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: Accepted at Journal of Mathematical Sociology

  10. arXiv:2102.06585  [pdf, other

    cs.LG cs.LO

    A Computability Perspective on (Verified) Machine Learning

    Authors: Tonicha Crook, Jay Morgan, Arno Pauly, Markus Roggenbach

    Abstract: There is a strong consensus that combining the versatility of machine learning with the assurances given by formal verification is highly desirable. It is much less clear what verified machine learning should mean exactly. We consider this question from the (unexpected?) perspective of computable analysis. This allows us to define the computational tasks underlying verified ML in a model-agnostic… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

  11. arXiv:2101.09108  [pdf, other

    cs.LG

    Adaptive Neighbourhoods for the Discovery of Adversarial Examples

    Authors: Jay Morgan, Adeline Paiement, Arno Pauly, Monika Seisenberger

    Abstract: Deep Neural Networks (DNNs) have often supplied state-of-the-art results in pattern recognition tasks. Despite their advances, however, the existence of adversarial examples have caught the attention of the community. Many existing works have proposed methods for searching for adversarial examples within fixed-sized regions around training points. Our work complements and improves these existing a… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  12. arXiv:2008.12314  [pdf, other

    cs.CY

    A Taxonomy of Knowledge Gaps for Wikimedia Projects (Second Draft)

    Authors: Miriam Redi, Martin Gerlach, Isaac Johnson, Jonathan Morgan, Leila Zia

    Abstract: In January 2019, prompted by the Wikimedia Movement's 2030 strategic direction, the Research team at the Wikimedia Foundation identified the need to develop a knowledge gaps index -- a composite index to support the decision makers across the Wikimedia movement by providing: a framework to encourage structured and targeted brainstorming discussions; data on the state of the knowledge gaps across t… ▽ More

    Submitted 29 January, 2021; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: Second draft: see summary of changes at https://meta.wikimedia.org/wiki/Research:Knowledge_Gaps_Index/Taxonomy/Summary_of_Changes_for_Second_Version

  13. arXiv:2004.12043  [pdf, other

    cs.CL

    When do Word Embeddings Accurately Reflect Surveys on our Beliefs About People?

    Authors: Kenneth Joseph, Jonathan H. Morgan

    Abstract: Social biases are encoded in word embeddings. This presents a unique opportunity to study society historically and at scale, and a unique danger when embeddings are used in downstream applications. Here, we investigate the extent to which publicly-available word embeddings accurately reflect beliefs about certain kinds of people as measured via traditional survey methods. We find that biases found… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: Accepted at ACL2020

  14. arXiv:1906.03263  [pdf, other

    cs.CY

    Crypto art: A decentralized view

    Authors: Massimo Franceschet, Giovanni Colavizza, Tai Smith, Blake Finucane, Martin Lukas Ostachowski, Sergio Scalet, Jonathan Perkins, James Morgan, Sebastian Hernandez

    Abstract: This is a decentralized position paper on crypto art, which includes viewpoints from different actors of the system: artists, collectors, galleries, art scholars, data scientists. The writing process went as follows: a general definition of the topic was put forward by two of the authors (Franceschet and Colavizza), and used as reference to ask to a set of diverse authors to contribute with their… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

  15. arXiv:1905.10412  [pdf, other

    cs.CL cs.AI cs.LG

    Using Deep Networks and Transfer Learning to Address Disinformation

    Authors: Numa Dhamani, Paul Azunre, Jeffrey L. Gleason, Craig Corcoran, Garrett Honke, Steve Kramer, Jonathon Morgan

    Abstract: We apply an ensemble pipeline composed of a character-level convolutional neural network (CNN) and a long short-term memory (LSTM) as a general tool for addressing a range of disinformation problems. We also demonstrate the ability to use this architecture to transfer knowledge from labeled data in one domain to related (supervised and unsupervised) tasks. Character-level neural networks and trans… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Comments: AI for Social Good Workshop at the International Conference on Machine Learning, Long Beach, United States (2019)

  16. arXiv:1904.03889  [pdf, other

    cs.IR

    Eliciting New Wikipedia Users' Interests via Automatically Mined Questionnaires: For a Warm Welcome, Not a Cold Start

    Authors: Ramtin Yazdanian, Leila Zia, Jonathan Morgan, Bahodir Mansurov, Robert West

    Abstract: Every day, thousands of users sign up as new Wikipedia contributors. Once joined, these users have to decide which articles to contribute to, which users to seek out and learn from or collaborate with, etc. Any such task is a hard and potentially frustrating one given the sheer size of Wikipedia. Supporting newcomers in their first steps by recommending articles they would enjoy editing or editors… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Comments: Accepted at the 13th International AAAI Conference on Web and Social Media (ICWSM-2019)

  17. arXiv:1902.11116  [pdf, other

    cs.CY cs.CL cs.DL

    Citation Needed: A Taxonomy and Algorithmic Assessment of Wikipedia's Verifiability

    Authors: Miriam Redi, Besnik Fetahu, Jonathan Morgan, Dario Taraborelli

    Abstract: Wikipedia is playing an increasingly central role on the web,and the policies its contributors follow when sourcing and fact-checking content affect million of readers. Among these core guiding principles, verifiability policies have a particularly important role. Verifiability requires that information included in a Wikipedia article be corroborated against reliable secondary sources. Because of… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

  18. arXiv:1901.08456  [pdf, ps, other

    cs.CL cs.LG

    Semantic Classification of Tabular Datasets via Character-Level Convolutional Neural Networks

    Authors: Paul Azunre, Craig Corcoran, Numa Dhamani, Jeffrey Gleason, Garrett Honke, David Sullivan, Rebecca Ruppel, Sandeep Verma, Jonathon Morgan

    Abstract: A character-level convolutional neural network (CNN) motivated by applications in "automated machine learning" (AutoML) is proposed to semantically classify columns in tabular data. Simulated data containing a set of base classes is first used to learn an initial set of weights. Hand-labeled data from the CKAN repository is then used in a transfer-learning paradigm to adapt the initial weights to… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  19. arXiv:1804.01503  [pdf, ps, other

    cs.AI cs.CL

    Abstractive Tabular Dataset Summarization via Knowledge Base Semantic Embeddings

    Authors: Paul Azunre, Craig Corcoran, David Sullivan, Garrett Honke, Rebecca Ruppel, Sandeep Verma, Jonathon Morgan

    Abstract: This paper describes an abstractive summarization method for tabular data which employs a knowledge base semantic embedding to generate the summary. Assuming the dataset contains descriptive text in headers, columns and/or some augmenting metadata, the system employs the embedding to recommend a subject/type for each text segment. Recommendations are aggregated into a small collection of super typ… ▽ More

    Submitted 5 April, 2018; v1 submitted 4 April, 2018; originally announced April 2018.

  20. arXiv:1802.04350  [pdf, other

    cs.LG stat.ML

    Cost-Aware Learning for Improved Identifiability with Multiple Experiments

    Authors: Longyun Guo, Jean Honorio, John Morgan

    Abstract: We analyze the sample complexity of learning from multiple experiments where the experimenter has a total budget for obtaining samples. In this problem, the learner should choose a hypothesis that performs well with respect to multiple experiments, and their related data distributions. Each collected sample is associated with a cost which depends on the particular experiments. In our setup, a lear… ▽ More

    Submitted 13 July, 2019; v1 submitted 12 February, 2018; originally announced February 2018.

    Comments: 17 pages, 4 figures

    Journal ref: IEEE International Symposium on Information Theory (ISIT) 2019

  21. arXiv:1711.06333  [pdf, other

    cs.CG cs.CE math.NA

    Generation of unstructured meshes in 2-D, 3-D, and spherical geometries with embedded high resolution sub-regions

    Authors: J. M. Taramón, J. P. Morgan, C. Shi, J. Hasenclever

    Abstract: We present 2-D, 3-D, and spherical mesh generators for the Finite Element Method (FEM) using triangular and tetrahedral elements. The mesh nodes are treated as if they were linked by virtual springs that obey Hooke's law. Given the desired length for the springs, the FEM is used to solve for the optimal nodal positions for the static equilibrium of this spring system. A 'guide-mesh' approach allow… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

    Comments: 20 pages + supplement, submitted to SIAM J. Sci. Comp

  22. Registering large volume serial-section electron microscopy image sets for neural circuit reconstruction using FFT signal whitening

    Authors: Arthur W. Wetzel, Jennifer Bakal, Markus Dittrich, David G. C. Hildebrand, Josh L. Morgan, Jeff W. Lichtman

    Abstract: The detailed reconstruction of neural anatomy for connectomics studies requires a combination of resolution and large three-dimensional data capture provided by serial section electron microscopy (ssEM). The convergence of high throughput ssEM imaging and improved tissue preparation methods now allows ssEM capture of complete specimen volumes up to cubic millimeter scale. The resulting multi-terab… ▽ More

    Submitted 14 December, 2016; originally announced December 2016.

    Comments: 10 pages, 4 figures as submitted for the 2016 IEEE Applied Imagery and Pattern Recognition Workshop proceedings, Oct 18-20, 2016

  23. arXiv:1611.06973  [pdf, other

    q-bio.NC cs.CV

    RhoanaNet Pipeline: Dense Automatic Neural Annotation

    Authors: Seymour Knowles-Barley, Verena Kaynig, Thouis Ray Jones, Alyssa Wilson, Joshua Morgan, Dongil Lee, Daniel Berger, Narayanan Kasthuri, Jeff W. Lichtman, Hanspeter Pfister

    Abstract: Reconstructing a synaptic wiring diagram, or connectome, from electron microscopy (EM) images of brain tissue currently requires many hours of manual annotation or proofreading (Kasthuri and Lichtman, 2010; Lichtman and Sanes, 2008; Seung, 2009). The desire to reconstruct ever larger and more complex networks has pushed the collection of ever larger EM datasets. A cubic millimeter of raw imaging d… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

    Comments: 13 pages, 4 figures

  24. arXiv:1602.01084  [pdf, other

    cs.ET

    Simple fluidic digital half-adder

    Authors: Alex J. L. Morgan, David A. Barrow, Andrew Adamatzky, Martin M. Hanczyc

    Abstract: A fluidic one-bit half-adder is made of five channels which intersect at a junction. Two channels are inputs, two channels are outputs and one channel is the drain. The channels direct fluid from input fragments to output fragments and the streams of fluid interact at the junctions. Binary signals are represented by water droplets introduced in the input channels: presence of a droplet in an input… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

  25. arXiv:1412.1185  [pdf

    cs.SI cs.CY physics.soc-ph

    The Entropy of Attention and Popularity in YouTube Videos

    Authors: Jonathan Scott Morgan, Iman Barjasteh, Cliff Lampe, Hayder Radha

    Abstract: The vast majority of YouTube videos never become popular, languishing in obscurity with few views, no likes, and no comments. We use information theoretical measures based on entropy to examine how time series distributions of common measures of popularity in videos from YouTube's "Trending videos" and "Most recent" video feeds relate to the theoretical concept of attention. While most of the vide… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    ACM Class: C.4; H.3.5