Skip to main content

Showing 1–44 of 44 results for author: James, J

  1. arXiv:2410.07400  [pdf

    cs.CL cs.SD eess.AS

    Advocating Character Error Rate for Multilingual ASR Evaluation

    Authors: Thennal D K, Jesin James, Deepa P Gopinath, Muhammed Ashraf K

    Abstract: Automatic speech recognition (ASR) systems have traditionally been evaluated using English datasets, with the word error rate (WER) serving as the predominant metric. WER's simplicity and ease of interpretation have contributed to its widespread adoption, particularly for English. However, as ASR systems expand to multilingual contexts, WER fails in various ways, particularly with morphologically… ▽ More

    Submitted 18 October, 2024; v1 submitted 9 October, 2024; originally announced October 2024.

    Comments: 4 pages

  2. arXiv:2410.04981  [pdf, other

    cs.CL

    On the Rigour of Scientific Writing: Criteria, Analysis, and Insights

    Authors: Joseph James, Chenghao Xiao, Yucheng Li, Chenghua Lin

    Abstract: Rigour is crucial for scientific research as it ensures the reproducibility and validity of results and findings. Despite its importance, little work exists on modelling rigour computationally, and there is a lack of analysis on whether these criteria can effectively signal or measure the rigour of scientific papers in practice. In this paper, we introduce a bottom-up, data-driven framework to aut… ▽ More

    Submitted 7 October, 2024; originally announced October 2024.

    Comments: Accepted Findings at EMNLP 2024

  3. arXiv:2407.17416  [pdf, other

    eess.AS cs.AI cs.CL

    Explaining Spectrograms in Machine Learning: A Study on Neural Networks for Speech Classification

    Authors: Jesin James, Balamurali B. T., Binu Abeysinghe, Junchen Liu

    Abstract: This study investigates discriminative patterns learned by neural networks for accurate speech classification, with a specific focus on vowel classification tasks. By examining the activations and features of neural networks for vowel classification, we gain insights into what the networks "see" in spectrograms. Through the use of class activation mapping, we identify the frequencies that contribu… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 5th International Conference on Artificial Intelligence and Speech Technology (AIST-2023), New Delhi, India

  4. arXiv:2405.16774  [pdf, ps, other

    cs.RO

    Probabilistic Height Grid Terrain Mapping for Mining Shovels using LiDAR

    Authors: Vedant Bhandari, Jasmin James, Tyson Phillips, P. Ross McAree

    Abstract: This paper explores the question of creating and maintaining terrain maps in environments where the terrain changes. The specific example explored is the construction of terrain maps from 3D LiDAR measurements on an electric rope shovel. The approach extends the height grid representation of terrain to include a Hidden Markov Model in each cell, enabling confidence-based mapping of constantly chan… ▽ More

    Submitted 21 June, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

    Comments: 6 pages, 5 figures

  5. arXiv:2405.02556  [pdf, other

    cs.CV cs.RO

    Few-Shot Fruit Segmentation via Transfer Learning

    Authors: Jordan A. James, Heather K. Manching, Amanda M. Hulse-Kemp, William J. Beksi

    Abstract: Advancements in machine learning, computer vision, and robotics have paved the way for transformative solutions in various domains, particularly in agriculture. For example, accurate identification and segmentation of fruits from field images plays a crucial role in automating jobs such as harvesting, disease detection, and yield estimation. However, achieving robust and precise infield fruit segm… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: To be published in the 2024 IEEE International Conference on Robotics and Automation (ICRA)

  6. arXiv:2404.17038  [pdf, other

    cs.RO

    Evaluating Collaborative Autonomy in Opposed Environments using Maritime Capture-the-Flag Competitions

    Authors: Jordan Beason, Michael Novitzky, John Kliem, Tyler Errico, Zachary Serlin, Kevin Becker, Tyler Paine, Michael Benjamin, Prithviraj Dasgupta, Peter Crowley, Charles O'Donnell, John James

    Abstract: The objective of this work is to evaluate multi-agent artificial intelligence methods when deployed on teams of unmanned surface vehicles (USV) in an adversarial environment. Autonomous agents were evaluated in real-world scenarios using the Aquaticus test-bed, which is a Capture-the-Flag (CTF) style competition involving teams of USV systems. Cooperative teaming algorithms of various foundations… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Accepted to the IEEE ICRA Workshop on Field Robotics 2024

  7. arXiv:2311.05452  [pdf, other

    eess.IV cs.CV cs.LG

    Transformer-based Model for Oral Epithelial Dysplasia Segmentation

    Authors: Adam J Shephard, Hanya Mahmood, Shan E Ahmed Raza, Anna Luiza Damaceno Araujo, Alan Roger Santos-Silva, Marcio Ajudarte Lopes, Pablo Agustin Vargas, Kris McCombe, Stephanie Craig, Jacqueline James, Jill Brooks, Paul Nankivell, Hisham Mehanna, Syed Ali Khurram, Nasir M Rajpoot

    Abstract: Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. OED grading is subject to large inter/intra-rater variability, resulting in the under/over-treatment of patients. We developed a new Transformer-based pipeline to improve detection and segmentation of OED in haematoxylin and eosin (H&E) stained whole slide images (WSIs). Our model was… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 5 pages, 2 figures, 4 tables

  8. arXiv:2309.15217  [pdf, other

    cs.CL

    RAGAS: Automated Evaluation of Retrieval Augmented Generation

    Authors: Shahul Es, Jithin James, Luis Espinosa-Anke, Steven Schockaert

    Abstract: We introduce RAGAs (Retrieval Augmented Generation Assessment), a framework for reference-free evaluation of Retrieval Augmented Generation (RAG) pipelines. RAG systems are composed of a retrieval and an LLM based generation module, and provide LLMs with knowledge from a reference textual database, which enables them to act as a natural language layer between a user and textual databases, reducing… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: Reference-free (not tied to having ground truth available) evaluation framework for retrieval agumented generation

  9. arXiv:2309.05645  [pdf, other

    cs.CV cs.RO

    CitDet: A Benchmark Dataset for Citrus Fruit Detection

    Authors: Jordan A. James, Heather K. Manching, Matthew R. Mattia, Kim D. Bowman, Amanda M. Hulse-Kemp, William J. Beksi

    Abstract: In this letter, we present a new dataset to advance the state of the art in detecting citrus fruit and accurately estimate yield on trees affected by the Huanglongbing (HLB) disease in orchard environments via imaging. Despite the fact that significant progress has been made in solving the fruit detection problem, the lack of publicly available datasets has complicated direct comparison of results… ▽ More

    Submitted 9 October, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: To be published in IEEE Robotics and Automation Letters (RA-L)

  10. arXiv:2307.03757  [pdf

    q-bio.QM cs.CV eess.IV

    A Fully Automated and Explainable Algorithm for the Prediction of Malignant Transformation in Oral Epithelial Dysplasia

    Authors: Adam J Shephard, Raja Muhammad Saad Bashir, Hanya Mahmood, Mostafa Jahanifar, Fayyaz Minhas, Shan E Ahmed Raza, Kris D McCombe, Stephanie G Craig, Jacqueline James, Jill Brooks, Paul Nankivell, Hisham Mehanna, Syed Ali Khurram, Nasir M Rajpoot

    Abstract: Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. Its grading suffers from significant inter-/intra- observer variability, and does not reliably predict malignancy progression, potentially leading to suboptimal treatment decisions. To address this, we developed a novel artificial intelligence algorithm that can assign an Oral Maligna… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

  11. arXiv:2301.09617  [pdf, other

    cs.CV

    Fully transformer-based biomarker prediction from colorectal cancer histology: a large-scale multicentric study

    Authors: Sophia J. Wagner, Daniel Reisenbüchler, Nicholas P. West, Jan Moritz Niehues, Gregory Patrick Veldhuizen, Philip Quirke, Heike I. Grabsch, Piet A. van den Brandt, Gordon G. A. Hutchins, Susan D. Richman, Tanwei Yuan, Rupert Langer, Josien Christina Anna Jenniskens, Kelly Offermans, Wolfram Mueller, Richard Gray, Stephen B. Gruber, Joel K. Greenson, Gad Rennert, Joseph D. Bonner, Daniel Schmolze, Jacqueline A. James, Maurice B. Loughrey, Manuel Salto-Tellez, Hermann Brenner , et al. (6 additional authors not shown)

    Abstract: Background: Deep learning (DL) can extract predictive and prognostic biomarkers from routine pathology slides in colorectal cancer. For example, a DL test for the diagnosis of microsatellite instability (MSI) in CRC has been approved in 2022. Current approaches rely on convolutional neural networks (CNNs). Transformer networks are outperforming CNNs and are replacing them in many applications, but… ▽ More

    Submitted 1 March, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

    Comments: Updated Figure 2 and Table A.5

  12. arXiv:2301.00049  [pdf

    cs.RO cs.HC

    Multi-Finger Haptics: Analysis of Human Hand Grasp towards a Tripod Three-Finger Haptic Grasp model

    Authors: Jose James

    Abstract: Grasping is an incredible ability of animals using their arms and limbs in their daily life. The human hand is an especially astonishing multi-fingered tool for precise grasping, which helped humans to develop the modern world. The implementation of the human grasp to virtual reality and telerobotics is always interesting and challenging at the same time. In this work, authors surveyed, studied, a… ▽ More

    Submitted 30 December, 2022; originally announced January 2023.

    Journal ref: Sensor 2022

  13. arXiv:2210.13769  [pdf, other

    cs.CV cs.LG

    GlobalFlowNet: Video Stabilization using Deep Distilled Global Motion Estimates

    Authors: Jerin Geo James, Devansh Jain, Ajit Rajwade

    Abstract: Videos shot by laymen using hand-held cameras contain undesirable shaky motion. Estimating the global motion between successive frames, in a manner not influenced by moving objects, is central to many video stabilization techniques, but poses significant challenges. A large body of work uses 2D affine transformations or homography for the global motion. However, in this work, we introduce a more g… ▽ More

    Submitted 4 November, 2022; v1 submitted 25 October, 2022; originally announced October 2022.

    Comments: Accepted in WACV 2023

  14. arXiv:2208.11278  [pdf, other

    cs.LG cs.CR eess.IV

    Federated Self-Supervised Contrastive Learning and Masked Autoencoder for Dermatological Disease Diagnosis

    Authors: Yawen Wu, Dewen Zeng, Zhepeng Wang, Yi Sheng, Lei Yang, Alaina J. James, Yiyu Shi, Jingtong Hu

    Abstract: In dermatological disease diagnosis, the private data collected by mobile dermatology assistants exist on distributed mobile devices of patients. Federated learning (FL) can use decentralized data to train models while keeping data local. Existing FL methods assume all the data have labels. However, medical data often comes without full labels due to high labeling costs. Self-supervised learning (… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.07470

  15. arXiv:2208.09778  [pdf, other

    cs.CL

    The Development of a Labelled te reo Māori-English Bilingual Database for Language Technology

    Authors: Jesin James, Isabella Shields, Vithya Yogarajan, Peter J. Keegan, Catherine Watson, Peter-Lucas Jones, Keoni Mahelona

    Abstract: Te reo Māori (referred to as Māori), New Zealand's indigenous language, is under-resourced in language technology. Māori speakers are bilingual, where Māori is code-switched with English. Unfortunately, there are minimal resources available for Māori language technology, language detection and code-switch detection between Māori-English pair. Both English and Māori use Roman-derived orthography ma… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: Submitted to Springer Language Resources and Evaluation Journal 2022

  16. arXiv:2208.09775  [pdf, other

    eess.AS cs.SD

    Visualising Model Training via Vowel Space for Text-To-Speech Systems

    Authors: Binu Abeysinghe, Jesin James, Catherine I. Watson, Felix Marattukalam

    Abstract: With the recent developments in speech synthesis via machine learning, this study explores incorporating linguistics knowledge to visualise and evaluate synthetic speech model training. If changes to the first and second formant (in turn, the vowel space) can be seen and heard in synthetic speech, this knowledge can inform speech synthesis technology developers. A speech synthesis model trained on… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: Accepted to Interspeech 2022

  17. arXiv:2206.11520  [pdf, other

    cs.CV eess.IV

    ICOS Protein Expression Segmentation: Can Transformer Networks Give Better Results?

    Authors: Vivek Kumar Singh, Paul O Reilly, Jacqueline James, Manuel Salto Tellez, Perry Maxwell

    Abstract: Biomarkers identify a patients response to treatment. With the recent advances in artificial intelligence based on the Transformer networks, there is only limited research has been done to measure the performance on challenging histopathology images. In this paper, we investigate the efficacy of the numerous state-of-the-art Transformer networks for immune-checkpoint biomarker, Inducible Tcell COS… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: Accepted MIUA conference (Abstract short paper)

  18. arXiv:2205.01167  [pdf

    cs.CV cond-mat.mtrl-sci eess.IV

    3D Convolutional Neural Networks for Dendrite Segmentation Using Fine-Tuning and Hyperparameter Optimization

    Authors: Jim James, Nathan Pruyne, Tiberiu Stan, Marcus Schwarting, Jiwon Yeom, Seungbum Hong, Peter Voorhees, Ben Blaiszik, Ian Foster

    Abstract: Dendritic microstructures are ubiquitous in nature and are the primary solidification morphologies in metallic materials. Techniques such as x-ray computed tomography (XCT) have provided new insights into dendritic phase transformation phenomena. However, manual identification of dendritic morphologies in microscopy data can be both labor intensive and potentially ambiguous. The analysis of 3D dat… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  19. arXiv:2202.07470  [pdf, other

    cs.LG cs.AI cs.CV eess.IV

    Federated Contrastive Learning for Dermatological Disease Diagnosis via On-device Learning

    Authors: Yawen Wu, Dewen Zeng, Zhepeng Wang, Yi Sheng, Lei Yang, Alaina J. James, Yiyu Shi, Jingtong Hu

    Abstract: Deep learning models have been deployed in an increasing number of edge and mobile devices to provide healthcare. These models rely on training with a tremendous amount of labeled data to achieve high accuracy. However, for medical applications such as dermatological disease diagnosis, the private data collected by mobile dermatology assistants exist on distributed mobile devices of patients, and… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

  20. Jack The Rippler: Arbitrage on the Decentralized Exchange of the XRP Ledger

    Authors: Gaspard Peduzzi, Jason James, Jiahua Xu

    Abstract: The XRP Ledger (XRPL) is a peer-to-peer cryptographic ledger. It features a decentralized exchange (DEX) where network participants can issue and trade user-defined digital assets and currencies. We present Jack the Rippler, a bot that identifies and exploits arbitrage opportunities on the XRPL DEX. We describe Jack's arbitrage process and discuss risks associated with using arbitrage bots.

    Submitted 9 November, 2021; v1 submitted 29 June, 2021; originally announced June 2021.

    Journal ref: 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (2021)

  21. arXiv:2012.05928  [pdf, other

    astro-ph.GA astro-ph.CO astro-ph.IM cs.LG

    A machine learning approach to galaxy properties: joint redshift-stellar mass probability distributions with Random Forest

    Authors: S. Mucesh, W. G. Hartley, A. Palmese, O. Lahav, L. Whiteway, A. F. L. Bluck, A. Alarcon, A. Amon, K. Bechtol, G. M. Bernstein, A. Carnero Rosell, M. Carrasco Kind, A. Choi, K. Eckert, S. Everett, D. Gruen, R. A. Gruendl, I. Harrison, E. M. Huff, N. Kuropatkin, I. Sevilla-Noarbe, E. Sheldon, B. Yanny, M. Aguena, S. Allam , et al. (50 additional authors not shown)

    Abstract: We demonstrate that highly accurate joint redshift-stellar mass probability distribution functions (PDFs) can be obtained using the Random Forest (RF) machine learning (ML) algorithm, even with few photometric bands available. As an example, we use the Dark Energy Survey (DES), combined with the COSMOS2015 catalogue for redshifts and stellar masses. We build two ML models: one containing deep phot… ▽ More

    Submitted 19 February, 2021; v1 submitted 10 December, 2020; originally announced December 2020.

    Comments: 18 pages, 8 figures, Accepted by MNRAS

    Report number: FERMILAB-PUB-20-653-AE, DES-2020-0542

    Journal ref: Monthly Notices of the Royal Astronomical Society, Volume 502, Issue 2, April 2021, Pages 2770-2786

  22. arXiv:2010.01928  [pdf, other

    cs.RO

    Slip detection for grasp stabilisation with a multi-fingered tactile robot hand

    Authors: Jasper W. James, Nathan F. Lepora

    Abstract: Tactile sensing is used by humans when grasping to prevent us dropping objects. One key facet of tactile sensing is slip detection, which allows a gripper to know when a grasp is failing and take action to prevent an object being dropped. This study demonstrates the slip detection capabilities of the recently developed Tactile Model O (T-MO) by using support vector machines to detect slip and test… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: Accepted into IEEE Transactions on Robotics

  23. arXiv:2009.12856  [pdf, other

    astro-ph.EP astro-ph.IM cs.LG

    Machine Learning for Searching the Dark Energy Survey for Trans-Neptunian Objects

    Authors: B. Henghes, O. Lahav, D. W. Gerdes, E. Lin, R. Morgan, T. M. C. Abbott, M. Aguena, S. Allam, J. Annis, S. Avila, E. Bertin, D. Brooks, D. L. Burke, A. CarneroRosell, M. CarrascoKind, J. Carretero, C. Conselice, M. Costanzi, L. N. da Costa, J. DeVicente, S. Desai, H. T. Diehl, P. Doel, S. Everett, I. Ferrero , et al. (34 additional authors not shown)

    Abstract: In this paper we investigate how implementing machine learning could improve the efficiency of the search for Trans-Neptunian Objects (TNOs) within Dark Energy Survey (DES) data when used alongside orbit fitting. The discovery of multiple TNOs that appear to show a similarity in their orbital parameters has led to the suggestion that one or more undetected planets, an as yet undiscovered "Planet 9… ▽ More

    Submitted 10 December, 2020; v1 submitted 27 September, 2020; originally announced September 2020.

    Comments: Published in PASP, 16 pages, 6 figures

    Journal ref: PASP 133 014501 (2021)

  24. arXiv:2009.00150  [pdf, ps, other

    eess.SY cs.IT

    Exactly Optimal Bayesian Quickest Change Detection for Hidden Markov Models

    Authors: Jason J. Ford, Jasmin James, Timothy L. Molloy

    Abstract: This paper considers the quickest detection problem for hidden Markov models (HMMs) in a Bayesian setting. We construct an augmented HMM representation of the problem that allows the application of a dynamic programming approach to prove that Shiryaev's rule is an (exact) optimal solution. This augmented representation highlights the problem's fundamental information structure and suggests possibl… ▽ More

    Submitted 15 March, 2023; v1 submitted 31 August, 2020; originally announced September 2020.

  25. arXiv:2008.06904  [pdf, other

    cs.RO

    A Biomimetic Tactile Fingerprint Induces Incipient Slip

    Authors: Jasper W. James, Stephen J. Redmond, Nathan F. Lepora

    Abstract: We present a modified TacTip biomimetic optical tactile sensor design which demonstrates the ability to induce and detect incipient slip, as confirmed by recording the movement of markers on the sensor's external surface. Incipient slip is defined as slippage of part, but not all, of the contact surface between the sensor and object. The addition of ridges - which mimic the friction ridges in the… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: Accepted into IROS 2020

  26. arXiv:2001.04574  [pdf

    cs.CY

    Preliminary Study of a Google Home Mini

    Authors: Min Jin Park, Joshua I. James

    Abstract: Many artificial intelligence (AI) speakers have recently come to market. Beginning with Amazon Echo, many companies producing their own speaker technologies. Due to the limitations of technology, most speakers have similar functions, but the way of handling the data of each speaker is different. In the case of Amazon echo, the API of the cloud is open for any developers to develop their API. The A… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 12 pages, 6 figures, 3 tables

    Journal ref: Journal of Digital Forensics 13-3: 163-174 (2019). https://kdfs.jams.or.kr/jams/download/KCI_FI002513079.pdf

  27. arXiv:2001.02320  [pdf, other

    cs.RO eess.SY

    RoboFly: An insect-sized robot with simplified fabrication that is capable of flight, ground, and water surface locomotion

    Authors: Yogesh M Chukewad, Johannes James, Avinash Singh, Sawyer Fuller

    Abstract: Aerial robots the size of a honeybee (~100 mg) have advantages over larger robots because of their small size, low mass and low materials cost. Previous iterations have demonstrated controlled flight but were difficult to fabricate because they consisted of many separate parts assembled together. They also were unable to perform locomotion modes besides flight. This paper presents a new design of… ▽ More

    Submitted 25 October, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: 15 pages. Submitted to IEEE Transactions on Robotics (T-RO)

  28. A Feature Comparison of Modern Digital Forensic Imaging Software

    Authors: Jiyoon Ham, Joshua I. James

    Abstract: Fundamental processes in digital forensic investigation, such as disk imaging, were developed when digital investigation was relatively young. As digital forensic processes and procedures matured, these fundamental tools, that are the pillars of the reset of the data processing and analysis phases of an investigation, largely stayed the same. This work is a study of modern digital forensic imaging… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 6 pages, 1 figure

    Journal ref: The Journal of The Institute of Internet, Broadcasting and Communication 19-6: 15-20 (2019)

  29. arXiv:1912.10822  [pdf, other

    cs.CV cs.IR cs.LG

    DeepHashing using TripletLoss

    Authors: Jithin James

    Abstract: Hashing is one of the most efficient techniques for approximate nearest neighbour search for large scale image retrieval. Most of the techniques are based on hand-engineered features and do not give optimal results all the time. Deep Convolutional Neural Networks have proven to generate very effective representation of images that are used for various computer vision tasks and inspired by this the… ▽ More

    Submitted 17 December, 2019; originally announced December 2019.

  30. arXiv:1908.01940  [pdf, other

    cs.CV

    Restoration of Non-rigidly Distorted Underwater Images using a Combination of Compressive Sensing and Local Polynomial Image Representations

    Authors: Jerin Geo James, Pranay Agrawal, Ajit Rajwade

    Abstract: Images of static scenes submerged beneath a wavy water surface exhibit severe non-rigid distortions. The physics of water flow suggests that water surfaces possess spatio-temporal smoothness and temporal periodicity. Hence they possess a sparse representation in the 3D discrete Fourier (DFT) basis. Motivated by this, we pose the task of restoration of such video sequences as a compressed sensing (… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: Accepted in ICCV 2019 for oral presentation

    Journal ref: ICCV 2019

  31. arXiv:1907.07535  [pdf, other

    cs.RO

    Tactile Model O: Fabrication and testing of a 3d-printed, three-fingered tactile robot hand

    Authors: Jasper W. James, Alex Church, Luke Cramphorn, Nathan F. Lepora

    Abstract: Bringing tactile sensation to robotic hands will allow for more effective grasping, along with the wide range of benefits of human-like touch. Here we present a 3D-printed, three-fingered tactile robot hand comprising an OpenHand Model O customized to house a TacTip soft biomimetic tactile sensor in the distal phalanx of each finger. We expect that combining the grasping capabilities of this under… ▽ More

    Submitted 14 August, 2020; v1 submitted 17 July, 2019; originally announced July 2019.

    Comments: 15 pages, 10 figures, 3 tables

  32. arXiv:1903.03275  [pdf, other

    cs.RO

    Below Horizon Aircraft Detection Using Deep Learning for Vision-Based Sense and Avoid

    Authors: Jasmin James, Jason J. Ford, Timothy L. Molloy

    Abstract: Commercial operation of unmanned aerial vehicles (UAVs) would benefit from an onboard ability to sense and avoid (SAA) potential mid-air collision threats. In this paper we present a new approach for detection of aircraft below the horizon. We address some of the challenges faced by existing vision-based SAA methods such as detecting stationary aircraft (that have no relative motion to the backgro… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

  33. Update Thresholds of More Accurate Time Stamp for Event Reconstruction

    Authors: Joshua I. James, Yunsik Jang

    Abstract: Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

    Comments: 13 pages, 7 figures

    Journal ref: James, J. I., & Jang, Y. (2017). Update Thresholds of More Accurate Time Stamp for Event Reconstruction. The Journal of the Institute of Internet Broadcasting and Communication, 17(2), 7-13. https://doi.org/10.7236/JIIBC.2017.17.2.7

  34. arXiv:1711.04502  [pdf

    cs.CY

    United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

    Authors: Nikolay Akatyev, Joshua I. James

    Abstract: Prior works, such as the Tallinn manual on the international law applicable to cyber warfare, focus on the circumstances of cyber warfare. Many organizations are considering how to conduct cyber warfare, but few have discussed methods to reduce, or even prevent, cyber conflict. A recent series of publications started developing the framework of Cyber Peacekeeping (CPK) and its legal requirements.… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

    Journal ref: European Conference on Information Warfare and Security, ECCWS. p.8-16 (2017)

  35. arXiv:1711.04500  [pdf

    cs.CY

    A Case Study of the 2016 Korean Cyber Command Compromise

    Authors: Kyong Jae Park, Sung Mi Park, Joshua I. James

    Abstract: On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of 'evidence' were used for attribution purposes. Disclosed methods of att… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

    Journal ref: European Conference on Information Warfare and Security, ECCWS. p.315-321 (2017)

  36. Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Authors: Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev

    Abstract: As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This… ▽ More

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 2014

  37. Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations

    Authors: Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev

    Abstract: This work presents a method for the measurement of the accuracy of evidential artifact extraction and categorization tasks in digital forensic investigations. Instead of focusing on the measurement of accuracy and errors in the functions of digital forensic tools, this work proposes the application of information retrieval measurement techniques that allow the incorporation of errors introduced by… ▽ More

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: 17 pages, 2 appendices, 1 figure, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 147-169, 2014

  38. Practical and Legal Challenges of Cloud Investigations

    Authors: Joshua I. James, Yunsik Jang

    Abstract: An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in b… ▽ More

    Submitted 4 February, 2015; originally announced February 2015.

    Comments: 7 pages

    ACM Class: K.4.1; K.4.2

    Journal ref: The Journal of The Institute of Internet, Broadcasting and Communication, 14(6), 33-39, 2014

  39. Automated Inference of Past Action Instances in Digital Investigations

    Authors: Joshua I. James, Pavel Gladyshev

    Abstract: As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance approximation to automatically reconstruct past user activities within a compromised or suspect system.… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: International Journal of Information Security

  40. Measuring digital crime investigation capacity to guide international crime prevention strategies

    Authors: Joshua I. James, Yunsik Jake Jang

    Abstract: This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing wit… ▽ More

    Submitted 29 August, 2013; originally announced August 2013.

    Comments: 7 pages, 3 figures, Presented at FutureTech 2013

    Journal ref: Future Information Technology. Springer Berlin Heidelberg, 2014. 361-366

  41. arXiv:1307.0076  [pdf, ps, other

    cs.CY

    An Assessment Model for Cybercrime Investigation Capacity

    Authors: Joshua I. James, Yunsik Jake Jang

    Abstract: Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model - specifically focused on cybercrime investigation - that is based on improving investigator capability while also considering the capacity… ▽ More

    Submitted 29 June, 2013; originally announced July 2013.

    Comments: 1 figure, World Crime Forum 1st Asian Regional Conference - Information Society and Cybercrime: Challenges for Criminology and Criminal Justice

  42. arXiv:1303.4498  [pdf

    cs.CY

    Challenges with Automation in Digital Forensic Investigations

    Authors: Joshua I. James, Pavel Gladyshev

    Abstract: The use of automation in digital forensic investigations is not only a technological issue, but also has political and social implications. This work discusses some challenges with the implementation and acceptance of automation in digital forensic investigation, and possible implications for current digital forensic investigators. Current attitudes towards the use of automation in digital forensi… ▽ More

    Submitted 19 March, 2013; originally announced March 2013.

    Comments: 17 pages, 1 figure

  43. Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    Authors: Joshua I. James, Pavel Gladyshev, Yuandong Zhu

    Abstract: This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a system. Traditional forensic analysis and the inferences an investigator normally makes when given digital eviden… ▽ More

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 15 pages, 4 figures, 5 tables, 1 appendix, 2nd International Conference on Digital Forensics and Cyber Crime

    Journal ref: James, J.I., P. Gladyshev, Y. Zhu. (2011) "Signature Based Detection of User Events for Post-Mortem Forensic Analysis". Digital Forensics and Cyber Crime. Vol 53. pp 96-109. Springer

  44. Analysis of Evidence Using Formal Event Reconstruction

    Authors: Joshua I. James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu

    Abstract: This paper expands upon the finite state machine approach for the formal analysis of digital evidence. The proposed method may be used to support the feasibility of a given statement by testing it against a relevant system model. To achieve this, a novel method for modeling the system and evidential statements is given. The method is then examined in a case study example.

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 10 pages, 11 figures, Presented at the 1st International Conference on Digital Forensics & Cyber Crime

    Journal ref: James, J.I., P. Gladyshev, M. Abdullah, Y. Zhu (2010) "Analysis of Evidence Using Formal Event Reconstruction". Digital Forensics and Cyber Crime. Vol 31. pp 85-98. Springer