Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Effective Graph-Based Content--Based Image Retrieval Systems For Large-Scale And Small-Scale Image Databases, Ran Chang Dec 2013

Effective Graph-Based Content--Based Image Retrieval Systems For Large-Scale And Small-Scale Image Databases, Ran Chang

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Digital imaging was a great invention in the last century. Since digital cameras became popular in the public, a large amount of digital images emerged in the late of the twentieth century. How to manage the huge amount of images and find desired images among them became an urgent issue during the same period.

Techniques of retrieving a desired image are generally categorized into two basic classes. One relies on text-based key words to retrieve desired images in the image
database. The other one relies on image-based queries to retrieve desired images in the image database. The second technique is …


The Effects Of Abstraction On Best Nblock First Search, Justin R. Redd May 2013

The Effects Of Abstraction On Best Nblock First Search, Justin R. Redd

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Search is an important aspect of Artificial Intelligence. Efficiently searching for solutions to large problems is important. One way to scale search large in problems quickly is to divide the work between multiple processors. There are many ways to divide this work using abstractions. This thesis examines the previous way this has been done in the past and introduces other ways to more efficiently divide the work and search in parallel.


On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, Christopher Blay May 2013

On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, Christopher Blay

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The Computer Science Assistive Technology Laboratory (CSATL) at Utah State University has a long history of research in visually impaired grocery shopping tech. CSATL’s ShopMobile II introduced nutrition facts table (NFT) analysis but only with perfectly aligned and square input images.

A new method which detects and localizes NFTs more quickly and from rotated or non-square images has been released and is slated for integration with ShopMobile II to improve this feature substantially. This is great news for the estimated 3.6 million adults in the United States having visual impairment or blindness and also opens the doors to other applications …


The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton May 2013

The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.


Knowledge Extraction In Video Through The Interaction Analysis Of Activities, Omar Ulises Florez May 2013

Knowledge Extraction In Video Through The Interaction Analysis Of Activities, Omar Ulises Florez

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

A video is a growing stream of unstructured data that significantly increases the amount of information transmitted and stored on the Internet. For example, every minute YouTube users upload 72 GB of information. Some of the best applications for video analysis include the monitoring of activities in defense and security scenarios such as the autonomous planes that collect video and images at reduced risk and the surveillance cameras in public places like traffic lights, airports, and schools.

Some of the challenges in the analysis of video correspond to implement complex operations such as searching of activities, understanding of scenes, and …


Eyes-Free Vision-Based Scanning Of Aligned Barcodes And Information Extraction From Aligned Nutrition Tables, Aliasgar Kutiyanawala May 2013

Eyes-Free Vision-Based Scanning Of Aligned Barcodes And Information Extraction From Aligned Nutrition Tables, Aliasgar Kutiyanawala

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Independent grocery shopping is one of the biggest challenges faced by visually impaired (VI) individuals. VI individuals may be able to get to a store on their own by using public transportation or by walking but are unable to shop there independently. Some of the problems that they face after getting to the store include long wait times to get an employee to assist them or getting a store employee who is not familiar with the store layout, gets irritated with long searches, or does not possess the required English skills. These problems ultimately result in VI shoppers having to …


A Qualitative And Evaluative Study On Recruiting And Retaining Students In College Computer Science Programs, Matthew Gardner May 2013

A Qualitative And Evaluative Study On Recruiting And Retaining Students In College Computer Science Programs, Matthew Gardner

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Computer science is a discipline that is increasing in importance and value in our society, yet we are still failing to graduate a sufficient number of students to keep up with the demand required in the United States economy. We research several ways to retain students. We also discuss ways to increase students’ interest in the major, i.e., those who normally would not know about computer science. We discuss ways to increase female participation as well as overall participation in the major.