Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Losing Shahrazad: A Distant Reading Of 1001 Nights, Taysa Mohler Jan 2018

Losing Shahrazad: A Distant Reading Of 1001 Nights, Taysa Mohler

Senior Projects Spring 2018

This project is a distant reading analysis of seven 19th and 20th-century English translations of One Thousand and One Nights or The Arabian Nights. Through the use of computer programming and distant reading, it becomes clear that the Nights' frame tale is the carrier of the internal logic and generative power of the story cycle. Further, the frame tale expresses the Nights' self-representation, which serves to undermine the historical use of the Nights as synecdoche for the Orient. Therefore, the translators that remove the frame story from their versions further the Nights' use as an Orientalist object, …


Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen Jan 2018

Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen

Senior Projects Spring 2018

Immersion, the state of being fully engaged in one's current operation, is a descriptor commonly used to appraise user experience in computer games and software applications. As the use of brain-computer interfaces (BCIs) begins to expand into the consumer sphere, questions arise concerning the ability of BCIs to modulate user immersion. This study employed a computer game to examine the effect of a consumer-grade BCI (the Emotiv EPOC) on immersion. In doing so, this study also explored the relationship between BCI usability and immersion levels. An experiment with twenty-seven participants showed that users were significantly more immersed when controlling the …


Don't Take This Personally: Sentiment Analysis For Identification Of "Subtweeting" On Twitter, Noah L. Segal-Gould Jan 2018

Don't Take This Personally: Sentiment Analysis For Identification Of "Subtweeting" On Twitter, Noah L. Segal-Gould

Senior Projects Spring 2018

The purpose of this project is to identify subtweets. The Oxford English Dictionary defines "subtweet" as a "[Twitter post] that refers to a particular user without directly mentioning them, typically as a form of furtive mockery or criticism." This paper details a process for gathering a labeled ground truth dataset, training a classifier, and creating a Twitter bot which interacts with subtweets in real time. The Naive Bayes classifier trained in this project classifies tweets as subtweets and non-subtweets with an average F1 score of 72%.


Neural Network Reconstruction Via Graph Locality-Driven Machine Learning, Hayden Sehon Sartoris Jan 2018

Neural Network Reconstruction Via Graph Locality-Driven Machine Learning, Hayden Sehon Sartoris

Senior Projects Spring 2018

Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.


The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman Jan 2018

The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman

Senior Projects Spring 2018

Senior Project submitted to The Division of Languages and Literature of Bard College.


A Study Of Neural Networks For The Quantum Many-Body Problem, Liam B. Schramm Jan 2018

A Study Of Neural Networks For The Quantum Many-Body Problem, Liam B. Schramm

Senior Projects Spring 2018

One of the fundamental problems in analytically approaching the quantum many-body problem is that the amount of information needed to describe a quantum state. As the number of particles in a system grows, the amount of information needed for a full description of the system increases exponentially. A great deal of work then has gone into finding efficient approximate representations of these systems. Among the most popular techniques are Tensor Networks and Quantum Monte Carlo methods. However, one new method with a number of promising theoretical guarantees is the Neural Quantum State. This method is an adaptation of the Restricted …


Using Byte Code To Find Idiosyncratic Android Camera Apps, Christopher Blake Burnley Jan 2018

Using Byte Code To Find Idiosyncratic Android Camera Apps, Christopher Blake Burnley

Senior Projects Spring 2018

The growing popularity of Android devices has made them an increasing target for malicious apps. Of course, a malicious app is most effective when a user is not aware of its intent. Therefore, they often take the form of ostensibly benign, helpful, and, for that matter, free applications. Our goal is to discover how common this is among free camera applications. Camera applications are a good test case because they ought to be very simple. This paper uses static analysis on the Dalvik byte code of camera applications to search for certain characteristics or identify applications that demonstrate behavior that …


An Implementation Of The Solution To The Conjugacy Problem On Thompson's Group V, Rachel K. Nalecz Jan 2018

An Implementation Of The Solution To The Conjugacy Problem On Thompson's Group V, Rachel K. Nalecz

Senior Projects Spring 2018

We describe an implementation of the solution to the conjugacy problem in Thompson's group V as presented by James Belk and Francesco Matucci in 2013. Thompson's group V is an infinite finitely presented group whose elements are complete binary prefix replacement maps. From these we can construct closed abstract strand diagrams, which are certain directed graphs with a rotation system and an associated cohomology class. The algorithm checks for conjugacy by constructing and comparing these graphs together with their cohomology classes. We provide a complete outline of our solution algorithm, as well as a description of the data structures which …