Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", 2013 California Polytechnic State University - San Luis Obispo
Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", Christopher Wallis
Computer Science and Software Engineering
This write-up describes the creation and utilization of a paint effect from both the perspective of the programmer and the animator. The paint effect simulates a 2D fluid using the algorithm described in Jos Stam's ``Real-time Fluid Dynamics for Games'' \cite{stam}, bakes the results into an image sequence, and then wraps the sequence around a 3D mesh. The second half of this paper describes how the effect was integrated into the animation short, ``Color Clash'' and the animation pipeline that was used.
Ticketcloud, 2013 California Polytechnic State University - San Luis Obispo
Ticketcloud, Ross Mckelvie
Computer Science and Software Engineering
TicketCloud is a digital ticket service that offers advantages to both event hosts/vendors and consumers. Using QR Codes, RESTful cloud APIs, and mobile devices TicketCloud takes an outdated market digital and opens up new methods of transacting, allowing customers to resell tickets from their couch and for vendors to reap the benefits of these transactions.
Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, 2013 California Polytechnic State University, San Luis Obispo
Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky
Master's Theses
Culling out non-visible portions of 3D scenes is important for rendering large complex worlds at an interactive frame rate. Past 3D engines used static prebaked visibility data which was generated using complex algorithms. Hardware Occlusion Queries are a modern feature that allows engines to determine if objects are invisible on the fly. This allows for fully dynamic destructible and editable environments as opposed to static prebaked environments of the past. This paper presents an algorithm that uses Hardware Occlusion Queries to cull fully dynamic scenes in real-time. This algorithm is relatively simple in comparison to other real-time occlusion culling techniques, …
Paris: A Parallel Rsa-Prime Inspection Tool, 2013 California Polytechnic State University, San Luis Obispo
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Master's Theses
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.
Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …
Buddy: A Breathalyzer For Iphone, 2013 California Polytechnic State University - San Luis Obispo
Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans
Electrical Engineering
Buddy is a Breathalyzer for the iPhone designed to be more a product than a project. Through proprietary hardware and a custom iOS application, Buddy provides users with a previously untapped link from the alcohol in their body to the display on their phones. Buddy uses an alcohol sensor connected to an Arduino Uno to accurately detect the BAC of the user’s breath. The BAC is then transmitted to an iPhone via the headphone jack where it is displayed and logged in a captivating app. The finished prototype successfully measured the approximate BAC of intoxicated users. The product website has …
Nbconvert Refactor, 2013 California Polytechnic State University - San Luis Obispo
Nbconvert Refactor, Jonathan Frederic
Physics
IPython is an interactive Python computing environment. It provides an enhanced interactive Python shell. The IPython Notebook is a browser based interface distributed with IPython. It enables the creation of richly formatted notebooks that contain embedded IPython code. With nbconvert, notebooks can be exported to various formats including, but not limited to, LaTeX, reveal.js, RST, and HTML. This is important for users that want to be able to share their work outside of IPython. This senior project is the addition of a Sphinx LaTeX output format and the refactor of nbconvert.
An Expert System For Guitar Sheet Music To Guitar Tablature, 2013 University of Tennessee, Knoxville
An Expert System For Guitar Sheet Music To Guitar Tablature, Chuanjun He
Doctoral Dissertations
This project applies analysis, design and implementation of the Optical Music Recognition (OMR) to an expert system for transforming guitar sheet music to guitar tablature. The first part includes image processing and music semantic interpretation to interpret and transform sheet music or printed scores into editable and playable electronic form. Then after importing the electronic form of music into internal data structures, our application uses effective pruning to explore the entire search space to find the best guitar tablature. Also considered are alternate guitar tunings and transposition of the music to improve the resulting tablature.
A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, 2013 Embry-Riddle Aeronautical University
A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben
Publications
Objective: This paper presents continued research toward the development of a knowledge-based system for the diagnosis of human toxic exposures. In particular, this research focuses on the challenging task of diagnosing exposures to multiple toxins. Although only 10% of toxic exposures in the United States involve multiple toxins, multiple exposures account for more than half of all toxin-related fatalities. Using simple medical mathematics, we seek to produce a practical decision support system capable of supplying useful information to aid in the diagnosis of complex cases involving multiple unknown substances.
Methods: The system is automatically trained using data mining …
Categorization Of Security Design Patterns, 2013 East Tennessee State University
Categorization Of Security Design Patterns, Jeremiah Y. Dangler
Electronic Theses and Dissertations
Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, …
Gesture Based Home Automation For The Physically Disabled, 2013 University of Arkansas, Fayetteville
Gesture Based Home Automation For The Physically Disabled, Alexander Hugh Nelson
Graduate Theses and Dissertations
Paralysis and motor-impairments can greatly reduce the autonomy and quality of life of a patient while presenting a major recurring cost in home-healthcare. Augmented with a non-invasive wearable sensor system and home-automation equipment, the patient can regain a level of autonomy at a fraction of the cost of home nurses. A system which utilizes sensor fusion, low-power digital components, and smartphone cellular capabilities can extend the usefulness of such a system to allow greater adaptivity for patients with various needs. This thesis develops such a system as a Bluetooth enabled glove device which communicates with a remote web server to …
Electronic Medical Record Ipad Application, 2013 University of Tennessee, Knoxville
Electronic Medical Record Ipad Application, Mischa Symmone Buckler, Dwayne Wiliam Flaherty, John Thomas Cotham, Mark Bellott
Chancellor’s Honors Program Projects
No abstract provided.
Examining Application Components To Reveal Android Malware, 2013 Air Force Institute of Technology
Examining Application Components To Reveal Android Malware, John B. Guptill
Theses and Dissertations
Smartphones are becoming ubiquitous in everyday life and malware is exploiting these devices. Therefore, a means to identify the threats of malicious applications is necessary. This paper presents a method to classify and analyze Android malware through application component analysis. The experiment parses select portions from Android packages to collect features using byte sequences and permissions of the application. Multiple machine learning algorithms classify the samples of malware based on these features. The experiment utilizes instance based learner, naive Bayes, decision trees, sequential minimal optimization, boosted naive Bayes, and boosted decision trees to identify the best components that reveal malware …
Mickey's Memory Game: A Children's Memory Game Designed For Sifteo Cubes, 2013 California Polytechnic State University - San Luis Obispo
Mickey's Memory Game: A Children's Memory Game Designed For Sifteo Cubes, Anjelica Concepcion
Computer Engineering
Mickey’s Memory Game is a children’s memory game developed on the Sifteo platform. Sifteo cubes are small, interactive devices, which can display colored images and sense neighboring cubes or detect user actions, such as clicking, shaking, or tilting the cubes. Although many classic video games or mobile games can be recreated on the Sifteo cubes, the goal of this project was to utilize capabilities that are unique to the Sifteo gaming platform, while also creating a useful game for child development.
A Human Proximity Operations System Test Case Validation Approach, 2013 SelectedWorks
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
Jeremy Straub
A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, 2013 SelectedWorks
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin
Jeremy Straub
This paper presents a research work on small satellite data stream and related distribution to associated stakeholders, which is a field that needs to get explored in more detail. The algorithm that is presented to extract USDDP (User-Specific Data Denominated Products) is a self managing body, which will be within as Open Space Box environment or OSBE as a novel idea. It contains an individual stream transmitted by the small satellite, which later is to be converted into USDDP. The context defined here deals with area in detail. Contexts are vitally important because they control, influence and affect everything within …
Greek Patent Protection System And The Impacts Of Information Technology Industry, 2013 Seoul National University
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Emmanouil Alexander Zografakis EZ
Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …
Introducing Freedom Space And Wordifier In Cw Systems, 2013 University Sience Malaysia
Introducing Freedom Space And Wordifier In Cw Systems, Sadegh Aminifar, Arjuna Bin Marzuki
Sadegh Aminifar
This paper investigates the fuzzy systems in point of view of computing with words (CW) and introduces the concept of freedom space and wordifier. It is discussed that if present fuzzy systems compatible with CW or not. If not, what are the deficiencies? The solutions are investigated while introducing the concepts of “freedom space” and “worifier” and their roll in CW systems.A novel fuzzification model also is introduced which is more compatible with computing with words than traditional fuzzification models.
Gene-Machine, A New Search Heuristic Algorithm, 2013 SelectedWorks
Gene-Machine, A New Search Heuristic Algorithm, Alfredo O. Garcia Woods Prog.
Alfredo O Garcia Woods Prog.
This paper introduces Gene-Machine, an efficient and new search heuristic algorithm, based in the building-block hypothesis [1] [2].
It is inspired by natural evolution, but does not use some of the concepts present in genetic algorithms like population, mutation and generation.
This heuristic exhibits good performance in comparison with genetic algorithms, and can be used to generate useful solutions to optimization and search problems.
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, 2013 SelectedWorks
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, Atif F. Mohammad, Jeremy Straub
Jeremy Straub
A Cubesat is a small satellite with very less competence to compute, it requires software engineering techniques, which can enhance the computational power for this small box. A model-driven approach of software engineering, which is called OSBM or Open Space Box Modeling technique, is an excellent solution to this re-source maximization challenge. OSBM facilitates apparition of the key solution pro-cesses computation and satellite related data elements using Service Oriented Ar-chitecture 3.0 (SOA 3.0) as base to work on to design services. The key challenges that can be handled by utilizing OSBM include concurrent operation and tasking of few as five …
Geospatial Virtual Heritage: A Gesture-Based 3d Gis To Engage The Public With Ancient Maya Archaeology, 2013 University of Nebraska-Lincoln
Geospatial Virtual Heritage: A Gesture-Based 3d Gis To Engage The Public With Ancient Maya Archaeology, Heather Richards-Rissetto, Jim Robertsson, Jennifer Von Schwerin, Giorgio Agugario, Fabio Remondino, Gabrio Girardi
Department of Anthropology: Faculty Publications
This paper presents our research to develop a gesture-based 3D GIS system to engage the public in cultural heritage. It compares two types of interaction—device-based vs. natural interaction— and summarizes the beta-testing results of a 3D GIS tool for archaeology, called QueryArch3D, in which participants used device-based interaction (i.e. mouse and keyboard). It follows with a description of the gesture-based system—that we developed in response to these beta-tests. The system uses QueryArch3D and Microsoft’s Kinect to enable people use body movements (in lieu of keyboard or mouse) to navigate a virtual reality landscape, query 3D objects, and call up photos, …