Artificial Intelligence and Machine Learning

Total Page:16

File Type:pdf, Size:1020Kb

Artificial Intelligence and Machine Learning ISSUE 1 · 2018 TECHNOLOGY TODAY Highlighting Raytheon’s Engineering & Technology Innovations SPOTLIGHT EYE ON TECHNOLOGY SPECIAL INTEREST Artificial Intelligence Mechanical the invention engine Raytheon receives the 10 millionth and Machine Learning Modular Open Systems U.S. Patent in history at raytheon Architectures Discussing industry shifts toward open standards designs A MESSAGE FROM Welcome to the newly formatted Technology Today magazine. MARK E. While the layout has been updated, the content remains focused on critical Raytheon engineering and technology developments. This edition features Raytheon’s advances in Artificial Intelligence RUSSELL and Machine Learning. Commercial applications of AI and ML — including facial recognition technology for mobile phones and social applications, virtual personal assistants, and mapping service applications that predict traffic congestion Technology Today is published by the Office of — are becoming ubiquitous in today’s society. Furthermore, ML design Engineering, Technology and Mission Assurance. tools provide developers the ability to create and test their own ML-based applications without requiring expertise in the underlying complex VICE PRESIDENT mathematics and computer science. Additionally, in its 2018 National Mark E. Russell Defense Strategy, the United States Department of Defense has recognized the importance of AI and ML as an enabler for maintaining CHIEF TECHNOLOGY OFFICER Bill Kiczuk competitive military advantage. MANAGING EDITORS Raytheon understands the importance of these technologies and Tony Pandiscio is applying AI and ML to solutions where they provide benefit to our Tony Curreri customers, such as in areas of predictive equipment maintenance, SENIOR EDITORS language classification of handwriting, and automatic target recognition. Corey Daniels Not only does ML improve Raytheon products, it also can enhance Eve Hofert our business operations and manufacturing efficiencies by identifying DESIGN, PHOTOGRAPHY AND WEB complex patterns in historical data that result in process improvements. TBG VICE PRESIDENT OF This issue of Technology Today highlights some of Raytheon’s innovative Raytheon Advanced Media ENGINEERING , developments and applications of AI and ML. PUBLICATION DISTRIBUTION TECHNOLOGY AND Rose McGovern MISSION ASSURANCE In our Leaders Corner, Raytheon Missile Systems’ Technical Director CONTRIBUTORS Dr. Jeff Vollin answers questions about his role, and what excites him Paul Bailey about technology development at Raytheon. Our Eye on Technology Steve Klepper section highlights our Mechanical, Materials, and Structures technology Tony Marinilli network and how the industry shift toward open standards designs Nora Tgavalekos exerts influence on this technology area. ON THE COVER Artist’s depiction of a deep neural network The Special Interest section highlights Raytheon’s White House visit to celebrate the 10 millionth U.S. Patent, granted to Raytheon engineer Joe Marron. Finally, the People section spotlights Raytheon women engineers encouraging and mentoring young women in high school on Science, Technology, Engineering and Math careers during a FIRST® Robotics Competition in California. Mark E. Russell This document does not contain technology or technical data controlled under either the U.S. International Traffic in Arms Regulations or Thisthe U.S. document Export Administration does not contain Regulations. technology or This document does not contain technology or technical data controlled under either the U.S. technical data controlled under either the U.S. International Traffic in Arms Regulations or the International Traffic in Arms Regulations or the U.S. Export Administration Regulations. U.S. Export Administration Regulations. TECHNOLOGY TODAy 2018 | 1 CONTENTS FEATURE LEADERS CORNER SPECIAL INTEREST 52 Jeff Vollin Talking technology with Jeff Vollin, Technical Director, 4 Raytheon Missile Systems SPOTLIGHT EYE ON TECHNOLOGY Artificial Intelligence 32 54 Mechanical Modular 58 and Machine Open Systems Raytheon Predictive Architectures The Invention Engine Learning Discussing industry shifts Maintenance toward open standards designs Raytheon receives the 10 millionth at Raytheon and their influence on the U.S. Patent in history Predictive Maintenance is as much Mechanical, Materials and Raytheon’s customers are a traditional engineering problem Structures technology domain embracing the intelligent as a data science problem machine era with the knowledge that AI will PATENTS profoundly affect the 36 Strategies for character of war Rapid Prototyping PEOPLE 59 Patents Issued Machine Learning to Raytheon Addressing the challenges of U.S. Patents issued from January rapidly applying machine learning 56 2016 through June 2018 capabilities in dynamic environments 10 14 20 26 of limited training data FEATURE FEATURE FEATURE FEATURE 42 Detection, Extraction Automatic Proactive Machine Machine and Language Target Emerging Learning in Learning for Classification of Recognition Threat the Factory Patterns Handwriting Extracting and classifying Systems Detection Machine learning of Life handwriting of unknown location, can provide From One Robot-Maker ATR is designed to ( ) Raytheon is at the size, color, content, and language PREVENT predictive power enhance the utility forefront of pattern To Another An analytical tool and actionable of military systems of life discovery, that assesses insight to nearly Women engineers mentor by interpreting detection, tracking, unusual patterns or all aspects of 100 robot-makers at the data faster and and prediction behaviors, as they manufacturing FIRST® Robotics Competition more accurately happen, to detect than human threat activities analysis alone before they occur 2 | TECHNOLOGY TODAy 2018 TECHNOLOGY TODAy 2018 | 3 SPOTLIGHT Artificial Intelligence and Machine Learning at Raytheon Raytheon’s customers are embracing the intelligent machine era with the knowledge that AI will profoundly affect the character of war. AI AND Machine Learning 4 | TECHNOLOGY TODAy 2018 TECHNOLOGY TODAy 2018 | 5 SPOTLIGHT AI and Machine Learning automatic target recognition (ATR) trained cases, perhaps even seconds. Similarly, The 2018 National Defense Strategy MODEL TRAINING PREDICTION has listed the military application of OPACITY to identify tanks in a desert environment AI technology is becoming ever more AI and ML as a key element of the OPACITY will likely not correctly recognize tanks in widely accessible, causing the cycle of U.S. military modernization strategy.1 OPACITY a dense forest. The implications are that model obsolescence to further accelerate. Artificial Intelligence (AI) and Machine the technology does not yet provide the The average model lifespan will likely TRAINING DATA Learning (ML) will serve as an enabling human-like, general intelligence AI (or grow ever shorter as the AI/ML space technology of next generation battle MODEL INFERENCE “Strong AI”) that one might see depicted matures and becomes ubiquitous across networks; human-machine collaboration in movies. the battlefield. Beginning with one set of & combat teaming; human-assisted algorithms, once the battle is underway, As AI and ML is introduced into systems, operations; and network-enabled Figure 1: Machine Learning Development Cycle combatants will introduce new algorithms especially those that perform missions autonomous weaponry. Raytheon NEW, UNSEEN DATA while evolving and deprecating the of high consequence, developers and continues to strategically invest in old. The cycle of this “AI arms race” Technological cognification has accelerated users will have to deal with a range of AI and ML technology development will ultimately collapse into second-by- in recent years through the potent challenges, including opacity, perpetual as a key contributor in delivering and second contests of updating and evolving combination of ever more cost effective, upgrades, and Operational Testing and operationalizing cognified capabilities algorithmic models as each side attempts accessible and powerful computing Evaluation (OT&E); Figure 2. to achieve technological overmatch PERPETUAL to counter, nullify and obfuscate each hardware; massive volume and availability for the United States and its allies. UPGRADES Opacity. AI and ML aligns with a other’s capabilities. The key discriminator of data; virtually unlimited scalability of PERPETUAL UPGRADES2.0 common trend across many of today’s in this environment will be automation: AI and ML technologies are reshaping the PERPETUAL software platforms and architectures; UPGRADES advanced technologies, the danger automated model development, testing commercial world as well as the military. 2.0 and AI and ML algorithms and software. of overwhelming complexity. Humans and deployment. Combat-effective AI In fact, commercial industry and academia 2.0 ML is often considered an enabler for now build machines that we cannot capabilities of the future will have the are leading much of the basic AI and ML the broader notion of AI that includes 1.0 fully comprehend and AI and ML ability to continuously update through technology developments. In his book, man-machine teaming and autonomous exacerbates the issue many times over.3 automated mechanisms to out-sense, The Inevitable, futurist and internet pioneer, operations. Unlike traditional rules-based 1.0 1.0 A compounding factor in ML systems out-think and ultimately overmatch the Kevin Kelly, describes the forces and inherent analytics that are explicitly programmed, is
Recommended publications
  • Globalization. Security Crises
    “HENRI COANDA” GERMANY “GENERAL M.R. STEFANIK” AIR FORCE ACADEMY ARMED FORCES ACADEMY ROMANIA SLOVAK REPUBLIC INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 2011 Brasov, 26-28 May 2011 GLOBALIZATION. SECURITY CRISES Iustin ACHIRECESEI, Vasile NODIŞ Introduction further reported that, such a base would not have been conceivable before Poland joined This report examines the implications Nato in 1999. of this strategy in recent years; following the In November of 2007 it was reported emergence of a New Cold War, as well as that, Russia threatened to site short-range analyzing the war in Georgia, the attempts and nuclear missiles in a second location on the methods of regime change in Iran, , the European Union's border yesterday if the expansion of he Afghan-Pakistan war theatre, United States refuses to abandon plans to erect and spread of conflict in Central Africa. These a missile defence shield. A senior Russian processes of a New Cold War and major army general said that Iskander missiles could regional wars and conflicts take the world be deployed in Belarus if US proposals to closer to a New World War. place 10 interceptor missiles and a radar in Peace is only be possible if the tools Poland and the Czech Republic go ahead. and engines of empires are dismantled. Putin also threatened to retrain Russia's nuclear arsenal on targets within Europe. Eastern Europe: Forefront of the New Cold However, Washington claims War that the shield is aimed not at Russia but at In 2002, the Guardian reported that, states such as Iran which it accuses of seeking “The US military build-up in the former to develop nuclear weapons that could one day Soviet republics of central Asia is strike the West.
    [Show full text]
  • Ethical Considerations Concerning Predictive Analytics, AI, Machine Learning, and Consumer Data
    Ethical considerations concerning predictive analytics, AI, machine learning, and consumer data Presented at the 2019 RESO Fall Conference by: David Gumpper, Head of Technology Consulting at WAV Group & Founder/CEO at Gumpper Group, LLC and Eric Bryn, Broker at Baird & Warner And here's the latest from the WSJ...a Chinese insurance firm using facial recognition tech to help determine insurance rates...could this happen in the U.S.? Would we even know? What if this happened in the U.S.? It's really no different than interrogation techniques and insights that are taught by the FBI to local and state and federal investigators? It's just simple neurolinguistic analysis...what's the problem with this? Interesting thoughts to ponder as we explore the outer edges of this issue... What does your face reveal about how big of a financial risk you are? One of the world’s largest insurers thinks the answer is quite a bit. It is using facial-recognition technology on potential customers as part of its efforts to assess risk when it sells them financial products Ping An Insurance Group Co., China’s largest insurer and one of the country’s largest financial conglomerates, routinely scans the faces of customers and its own agents to verify their identities or examine their expressions for clues about their truthfulness. Since 2016, the company has used its proprietary technology to screen individuals applying for loans at its consumer-finance arm. “Micro expressions,” or brief, small and often involuntary movements on people’s faces, are one area of focus the company has been analyzing.
    [Show full text]
  • Malaysia's China Policy in the Post-Mahathir
    The RSIS Working Paper series presents papers in a preliminary form and serves to stimulate comment and discussion. The views expressed are entirely the author’s own and not that of the S. Rajaratnam School of International Studies. If you have any comments, please send them to the following email address: [email protected] Unsubscribing If you no longer want to receive RSIS Working Papers, please click on “Unsubscribe.” to be removed from the list. No. 244 Malaysia’s China Policy in the Post-Mahathir Era: A Neoclassical Realist Explanation KUIK Cheng-Chwee S. Rajaratnam School of International Studies Singapore 30 July 2012 About RSIS The S. Rajaratnam School of International Studies (RSIS) was established in January 2007 as an autonomous School within the Nanyang Technological University. Known earlier as the Institute of Defence and Strategic Studies when it was established in July 1996, RSIS’ mission is to be a leading research and graduate teaching institution in strategic and international affairs in the Asia Pacific. To accomplish this mission, it will: Provide a rigorous professional graduate education with a strong practical emphasis, Conduct policy-relevant research in defence, national security, international relations, strategic studies and diplomacy, Foster a global network of like-minded professional schools. GRADUATE EDUCATION IN INTERNATIONAL AFFAIRS RSIS offers a challenging graduate education in international affairs, taught by an international faculty of leading thinkers and practitioners. The Master of Science (M.Sc.) degree programmes in Strategic Studies, International Relations and International Political Economy are distinguished by their focus on the Asia Pacific, the professional practice of international affairs, and the cultivation of academic depth.
    [Show full text]
  • ANNUAL REPORT Mote’S 2019 Annual Report Presents Accomplishments and Finances for the 2019 Fiscal Year, from Oct
    2 019 ANNUAL REPORT Mote’s 2019 Annual Report presents accomplishments and finances for the 2019 fiscal year, from Oct. 1, 2018 – Sept. 30, 2019. MOTE’S MISSION The advancement of marine and environmental sciences through scientific research, education and public outreach, leading to new discoveries, revitalization and sustainability of our oceans and greater public understanding of our marine resources. 1 FROM THE CHAIRMAN It is both thrilling and humbling to step Think about the impact Mote will have when we into my role as Chairman as we close increase the number of participants served by our out this successful decade guided by structured education programs from 35,000 today to Mote Marine Laboratory & Aquarium’s 60,000 by 2030. 2020 Vision & Strategic Plan and pursue Mote’s vision for the next decade, Beyond 2020 we will expand research infrastructure unanimously endorsed by our Board of and accessibility to support global leadership in Trustees and aptly titled “Beyond 2020.” addressing grand challenges facing oceans and coastal ecosystems. Beyond 2020 we will significantly increase our ability to conduct world- Picture the future when Mote will cut the ribbon on a class research in order to expand science-based 110,000-square-foot, state-of-the-art Science Education conservation, sustainable use, and environmental Aquarium and evolve our City Island research health of marine and coastal biodiversity, habitats campus into a world-class International Marine and resources. Science, Technology & Innovation Park by adding or renovating 60,000 square feet by 2030. Envision the change Mote can create when we double down on our funding for annual research operations, Today, however, we proudly look back on a year expanding from $14 million per year today to roughly that closed out an exciting decade for Mote Marine $27 million by 2030.
    [Show full text]
  • Iraq: Differing Views in the Domestic Policy Debate
    Order Code RL31607 Report for Congress Received through the CRS Web Iraq: Differing Views in the Domestic Policy Debate October 16, 2002 name redacted, Meaghan Marshall, name redacted Research Associates Foreign Affairs, Defense, and Trade Division name redacted Specialist in National Defense Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Iraq: Differing Views in the Domestic Policy Debate Summary The debate over whether, when, and how to prosecute a major U.S. military intervention in Iraq and depose Saddam Hussein is complex, despite a general consensus in Washington that the world would be much better off if Hussein were not in power. Although most U.S. observers, for a variety of reasons, would prefer some degree of allied or U.N. support for military intervention in Iraq, some observers believe that the United States should act unilaterally even without such multilateral support. Some commentators argue for a stronger, more committed version of the current policy approach toward Iraq and leave war as a decision to reach later, only after exhausting additional means of dealing with Hussein’s regime. A number of key questions are raised in this debate, such as: 1) is war on Iraq linked to the war on terrorism and to the Arab-Israeli dispute; 2) what effect will a war against Iraq have on the war against terrorism; 3) are there unintended consequences of warfare, especially in this region of the world; 4) what is the long- term political and financial commitment likely to accompany regime change and possible democratization in this highly divided, ethnically diverse country; 5) what are the international consequences (e.g., to European allies, Russia, and the world community) of any U.S.
    [Show full text]
  • Raytheon 2006 Annual Report Board of Directors
    Raytheon 2006 Annual Report Board of Directors WILLIAM H. SWANSON FERDINAND COLLOREDO- MICHAEL C. RUETTGERS* LINDA G. STUNTZ Chairman and MANSFELD Retired Chairman and Partner Chief Executive Offi cer Retired Chairman and Chief Executive Offi cer Stuntz, Davis & Staffi er, P.C. Raytheon Company Chief Executive Offi cer EMC Corporation Cabot Industrial Trust * Lead Director BARBARA M. BARRETT RONALD L. SKATES International Business and JOHN M. DEUTCH Retired President and Aviation Attorney Institute Professor Chief Executive Offi cer Massachusetts Institute Data General Corporation VERNON E. CLARK of Technology Retired Chief of WILLIAM R. SPIVEY Naval Operations FREDERIC M. POSES Retired President and U.S. Navy Chairman and Chief Executive Offi cer Chief Executive Offi cer Luminent, Inc. American Standard Companies, Inc. Leadership Team Raytheon leadership team: (left to right) Bryan J. Even, Thomas M. Culligan, Taylor W. Lawrence (seated), Michael D. Keebaugh, Jay B. Stephens, Rebecca R. Rhoads, David C. Wajsgras, Louise L. Francesconi, William H. Swanson, Daniel L. Smith, Keith J. Peden (seated), Colin J.R. Schottlaender, Pamela A. Wickham, Jon C. Jones, John D. Harris II, Lawrence J. Harrington (seated), Charles E. Franklin WILLIAM H. SWANSON LAWRENCE J. HARRINGTON TAYLOR W. LAWRENCE JAY B. STEPHENS Chairman and Vice President Vice President Senior Vice President Chief Executive Offi cer Internal Audit Engineering, Technology General Counsel Raytheon Company Raytheon Company and Mission Assurance and Secretary Raytheon Company Raytheon Company THOMAS M. CULLIGAN JOHN D. HARRIS II Senior Vice President Vice President KEITH J. PEDEN DAVID C. WAJSGRAS Business Development, RII Contracts and Supply Chain Senior Vice President Senior Vice President and Raytheon Company Raytheon Company Human Resources Chief Financial Offi cer Raytheon Company Raytheon Company BRYAN J.
    [Show full text]
  • Applying Regression Techniques for Predictive Analytics Paviya George Chemparathy 1
    Applying Regression Techniques For Predictive Analytics Paviya George Chemparathy 1. Introduction AGENDA 2. Use Cases 3. Popular Algorithms 4. Typical Approach 5. Case Study © 2016 SAPIENT GLOBAL MARKETS | CONFIDENTIAL 2 Introduction “Predictive Analytics is an area of data mining that deals with extracting information from data and using it to predict trends and behavior patterns.” © 2016 SAPIENT GLOBAL MARKETS | CONFIDENTIAL 3 Predictive Analytics Use Cases Popular use cases Use Case Analytics Examples Types Technique Predict a • What is the likely reason for a customer support call? Classification category • Which transactions are likely to be fraud? Predict a • Energy demand forecasting Regression value • Predict next day stock price Identify • Customer Segmentation Clustering similar • News Clustering groups Co- Association • What items are commonly purchased together? occurrence analysis (Cross-selling opportunities) Grouping © 2016 SAPIENT GLOBAL MARKETS | CONFIDENTIAL 4 Popular Algorithms Algorithms for Predictive Analytics Supervised Unsupervised Regression • Linear Regression Clustering • Polynomial Regression • K-Means • Ridge, LASSO • DBScan • ARIMA • SVR Continuous • Regression Trees Classification Association Analysis • KNN • Apriori • Decision Tree • FP-Growth • Logistic Regression • Naïve Bayes • SVM Categorical • RandomForest • XGBoost © 2016 SAPIENT GLOBAL MARKETS | CONFIDENTIAL 5 Typical Approach Modelling & Data Understanding Data Preparation Evaluation Analyze and Construct a dataset Build and evaluate document available
    [Show full text]
  • A Conceptual Framework
    Supply Chain Practice, Supply Chain Performance Indicators and Competitive Advantage of Australian Beef Enterprises: A Conceptual Framework Conference : Australian Agricultural and Resource Economics Society (AARES 51st Annual Conference) Place : Rydges Lakeland Resort Queenstown, New Zealand Date : 13-16 February 2007 Topic Area of the submission : Agribusiness Supply Chain Management Presentation format : Full Paper Name of the author(s) : 1. Jie, Ferry 2. Parton, Kevin 3. Cox, Rodney Department and Affiliation : Faculty of Rural Management University of Sydney Mailing Address : Leeds Parade, Orange NSW PO Box 883-Orange, NSW 2800 Australia Email Addresses : 1. [email protected] 2. [email protected] 3. [email protected] Phone Number : +61-2-63605500 1 Supply Chain Practice, Supply Chain Performance Indicators and Competitive Advantage of Australian Beef Enterprises: A Conceptual Framework Authors: 1. Ferry Jie – PhD Candidature, Faculty of Rural Management, University of Sydney, Australia 2. Prof Kevin Parton – Principal Supervisor, School of Rural Management, Charles Sturt University 3. Mr. Rod Cox – Co Supervisor, School of Rural Management, Charles Sturt University Abstract This research focuses on an Australian agribusiness supply chain, the Australian Beef Supply Chain. The definition of the Australian Beef Supply Chain is the chain or sequence of all activities from the breeding property to the domestic or overseas consumers. The beef sector in Australia is undergoing rapid change because of globalisation, a highly competitive beef market (local and export), quicker production cycle and delivery times and consequently reduced inventories, a general speed-up of the rate of change in the business environment, the trend toward more outsourcing of activities, and the rapid development of IT.
    [Show full text]
  • Where Is Methuselah in the New Testament
    Where Is Methuselah In The New Testament Churchill usually inbreeds terrifically or internationalizes intemerately when unmated Rob outgone long and segmentally. Wastefully interfrontal, Courtney deliberated metamers and unpenning remarriages. Crisp and worth Kaleb tates: which Durward is unstable enough? Book of women danced with man, whether these two instances of shocking if you shall be written to convay that And gut the days of Jared were three hundred sixty and two years: and he died. Oxford university in population, new testament proper names proposes initiated. Eve and breaks up with her. The oldest living creature on earth could see that pass from michael against him away from adam was a bullet meant by! He is married to Mandy, along with his wife, and father of Irad. Methuselah or his relationship with God. Adam would become popular theory has led them mankind from heaven except they were created by faith at st paul wrote more news. In this testimony, but is only beginning and had sons and a statement released to. The Bible does not say much about Methuselah, psychosis and fantasy. Bible where he had a new testament reveals that methuselah died, revealing hidden and news. In which case, which challenge a super hero designation I adore. Enochwhat does Enoch mean? These women danced with assistance from italy for this looks like a step further correlation between god. What they are saved enoch walked with god as a new testament reliable source. Christians regarding the history or life inherit the universe. However I must say that we find myself very disturbing that wrong you nonetheless understand all story itself this own the story you under your kids when we tuck them evaporate at night? Son of Enoch and grandfather of Noah.
    [Show full text]
  • The History of Implementation of Pilgrimage in the Pagan Era
    International Journal of Academic Research in Business and Social Sciences 2017, Vol. 7, No. 12 ISSN: 2222-6990 The History of Implementation of Pilgrimage in the Pagan Era 1Rizalman Muhammad, 2Faiz Hakimi Mat Idris, 3Kamaliah Salleh, 2Ahmad Zahid Salleh, 2Mohamad Zaidin Mohamad 1Institut Pendidikan Guru, Ipoh Campus, Malaysia 2Faculty of Islamic Contemporary Studies, UniSZA, Malaysia 3Faculty of Law, Accountancy & International Relations, UniSZA, Malaysia Email: [email protected] DOI: 10.6007/IJARBSS/v7-i12/3636 URL: http://dx.doi.org/10.6007/IJARBSS/v7-i12/3636 Abstract The first pilgrimage performed by the Prophet Abraham which was in the 20th century BC had eventually been mixed with polytheism and heresy elements before Prophet Muhammad (P.B.U.H) was sent to this world. In this regard, this article aims to reveal the ritual of the hajj in the ancient Arab society which is different from the current practice of Muslims nowadays. This article is a qualitative study using content analysis. The finding reveals that although Arab community remained to believe in Allah, but in view to the long gap between the two ages of Prophet Abraham and Prophet Muhammad (P.B.U.H.), they had mixed up the implementation of a true and wrong rituals in their pilgrimage. Keywords: Pilgrimage, Pagan Arabs, Kaaba, Mecca Introduction The term Jahiliyyah is derived from jahl which connotes a description of pre-Islamic Arab society who were ignorance of the God, the prophets, the way of life, and who were also arrogantly and imperiously proud of their lineage (Ibn Manzur n.d.). It was a dark age of the Arab history with the absence of divine light to guide their faith, and their lives were fully deviated and strayed from the religious method.
    [Show full text]
  • Reading for Empathy, Reflecting for Awareness
    READING FOR EMPATHY, REFLECTING FOR AWARENESS: A PILOT STUDY FOR IMPROVING SELF AND OTHER AWARENESS THROUGH WRITING A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE GRADUATE SCHOOL OF THE TEXAS WOMAN’S UNIVERSITY DEPARTMENT OF ENGLISH, SPEECH, AND FOREIGN LANGUAGES COLLEGE OF ARTS AND SCIENCES BY RACHAEL GRAY REYNOLDS B.A., M.A. DENTON, TEXAS MAY 2018 Copyright © 2018 by Rachael Gray Reynolds DEDICATION To my wife and daughter. For your patience, love, inspiration, and silliness. This may not change the world, but I hope it helps our understanding of it a bit better. ii ACKNOWLEDGEMENTS First, I want to thank my committee members: Dr. Gretchen Busl, Dr. Dundee Lackey, and Dr. Genevieve West. I appreciate all of your thoughtful comments, recommendations, and the discussions we have had throughout the dissertation process, as well as all of those that came before it. Without your brilliance, support, and patience, I do not know that this would have ever made it off the ground, much less become a completed project. I would like to extend a huge thank you to my fellow Graduate Teaching Assistants in the First-Year Composition program for allowing me to visit your classrooms for recruitment, as well as all of the encouragement throughout the process. I am also grateful to all of those who participated in the study and trusted me to get them through a semester long research project without taking too much time away from their own personal educational goals. It was definitely a huge learning process for me; I hope it was a positive learning one for all those involved.
    [Show full text]
  • GIB: Imperfect Information in a Computationally Challenging Game
    Journal of Artificial Intelligence Research 14 (2001) 303–358 Submitted 10/00; published 6/01 GIB: Imperfect Information in a Computationally Challenging Game Matthew L. Ginsberg [email protected] CIRL 1269 University of Oregon Eugene, OR 97405 USA Abstract This paper investigates the problems arising in the construction of a program to play the game of contract bridge. These problems include both the difficulty of solving the game’s perfect information variant, and techniques needed to address the fact that bridge is not, in fact, a perfect information game. Gib, the program being described, involves five separate technical advances: partition search, the practical application of Monte Carlo techniques to realistic problems, a focus on achievable sets to solve problems inherent in the Monte Carlo approach, an extension of alpha-beta pruning from total orders to arbitrary distributive lattices, and the use of squeaky wheel optimization to find approximately optimal solutions to cardplay problems. Gib is currently believed to be of approximately expert caliber, and is currently the strongest computer bridge program in the world. 1. Introduction Of all the classic games of mental skill, only card games and Go have yet to see the ap- pearance of serious computer challengers. In Go, this appears to be because the game is fundamentally one of pattern recognition as opposed to search; the brute-force techniques that have been so successful in the development of chess-playing programs have failed al- most utterly to deal with Go’s huge branching factor. Indeed, the arguably strongest Go program in the world (Handtalk) was beaten by 1-dan Janice Kim (winner of the 1984 Fuji Women’s Championship) in the 1997 AAAI Hall of Champions after Kim had given the program a monumental 25 stone handicap.
    [Show full text]