Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Abstraction (1)
- Advanced Algorithms (1)
- Assistive Shopping (1)
- Assistive Technology (1)
- Barcodes (1)
-
- Blind Shopping (1)
- Computer Security (1)
- Computer Vision (1)
- Computer science (1)
- Content-based image retrieval (1)
- Data Mining (1)
- Detection (1)
- Evaluative (1)
- Framework Creation (1)
- Graph-based image retrieval (1)
- Hierarchical data structure (1)
- IS Security (1)
- Large-scale and small-scale databases (1)
- Localization (1)
- Long-term and short-term learning (1)
- Machine Learning (1)
- Multimedia Retrieval (1)
- Nblock (1)
- Nutrition facts (1)
- Nutritional Facts (1)
- Programs (1)
- Qualitative (1)
- Recruiting (1)
- Retaining (1)
- Security Framework (1)
Articles 1 - 7 of 7
Full-Text Articles in Entire DC Network
Effective Graph-Based Content--Based Image Retrieval Systems For Large-Scale And Small-Scale Image Databases, Ran Chang
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Digital imaging was a great invention in the last century. Since digital cameras became popular in the public, a large amount of digital images emerged in the late of the twentieth century. How to manage the huge amount of images and find desired images among them became an urgent issue during the same period.
Techniques of retrieving a desired image are generally categorized into two basic classes. One relies on text-based key words to retrieve desired images in the image
database. The other one relies on image-based queries to retrieve desired images in the image database. The second technique is …
The Effects Of Abstraction On Best Nblock First Search, Justin R. Redd
The Effects Of Abstraction On Best Nblock First Search, Justin R. Redd
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Search is an important aspect of Artificial Intelligence. Efficiently searching for solutions to large problems is important. One way to scale search large in problems quickly is to divide the work between multiple processors. There are many ways to divide this work using abstractions. This thesis examines the previous way this has been done in the past and introduces other ways to more efficiently divide the work and search in parallel.
On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, Christopher Blay
On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, Christopher Blay
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The Computer Science Assistive Technology Laboratory (CSATL) at Utah State University has a long history of research in visually impaired grocery shopping tech. CSATL’s ShopMobile II introduced nutrition facts table (NFT) analysis but only with perfectly aligned and square input images.
A new method which detects and localizes NFTs more quickly and from rotated or non-square images has been released and is slated for integration with ShopMobile II to improve this feature substantially. This is great news for the estimated 3.6 million adults in the United States having visual impairment or blindness and also opens the doors to other applications …
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.
Knowledge Extraction In Video Through The Interaction Analysis Of Activities, Omar Ulises Florez
Knowledge Extraction In Video Through The Interaction Analysis Of Activities, Omar Ulises Florez
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
A video is a growing stream of unstructured data that significantly increases the amount of information transmitted and stored on the Internet. For example, every minute YouTube users upload 72 GB of information. Some of the best applications for video analysis include the monitoring of activities in defense and security scenarios such as the autonomous planes that collect video and images at reduced risk and the surveillance cameras in public places like traffic lights, airports, and schools.
Some of the challenges in the analysis of video correspond to implement complex operations such as searching of activities, understanding of scenes, and …
Eyes-Free Vision-Based Scanning Of Aligned Barcodes And Information Extraction From Aligned Nutrition Tables, Aliasgar Kutiyanawala
Eyes-Free Vision-Based Scanning Of Aligned Barcodes And Information Extraction From Aligned Nutrition Tables, Aliasgar Kutiyanawala
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Independent grocery shopping is one of the biggest challenges faced by visually impaired (VI) individuals. VI individuals may be able to get to a store on their own by using public transportation or by walking but are unable to shop there independently. Some of the problems that they face after getting to the store include long wait times to get an employee to assist them or getting a store employee who is not familiar with the store layout, gets irritated with long searches, or does not possess the required English skills. These problems ultimately result in VI shoppers having to …
A Qualitative And Evaluative Study On Recruiting And Retaining Students In College Computer Science Programs, Matthew Gardner
A Qualitative And Evaluative Study On Recruiting And Retaining Students In College Computer Science Programs, Matthew Gardner
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Computer science is a discipline that is increasing in importance and value in our society, yet we are still failing to graduate a sufficient number of students to keep up with the demand required in the United States economy. We research several ways to retain students. We also discuss ways to increase students’ interest in the major, i.e., those who normally would not know about computer science. We discuss ways to increase female participation as well as overall participation in the major.