Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 436

Full-Text Articles in Entire DC Network

Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, Joshua Engelkes Feb 2024

Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, Joshua Engelkes

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

With the increase of digital music audio uploads, applications that deal with music information have been widely requested by streaming platforms. Automatic music genre classification is an important function of music recommendation and music search applications. Since the music genre categorization criteria continually shift, data-driven methods such as neural networks have been proven especially useful to music information retrieval. An enhanced CNN architecture, the Bottom-up Broadcast Neural Network, uses mel-spectrograms to push music data through a network where important low-level information is preserved. An enhanced RNN architecture, the Independent Recurrent Neural Network for Music Genre Classification, takes advantage of the …


The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson Feb 2024

The Threads That Shape Us: Fashioning A Sustainable Future From Silk, Bryne Croyle Johnson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Silk has been used for centuries as a natural fiber, but has declined in popularity due to synthetic alternatives. In this pop-science article style paper, the history, present, and possible futures of silk are discussed at a generally accessible level. Anthropology, Biology, Sociology, and Environmental Science are brought together to present a case for a renewed interest in silk as a sustainable fiber.


Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol Jun 2023

Possible Attacks On Match-In-Database Fingerprint Authentication, Jadyn Sondrol

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep …


Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek Jun 2023

Probing As A Technique To Understand Abstract Spaces, Ashlen A. Plasek

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Machine learning models, while very powerful, have their operation obfuscated behind millions of parameters. This obfuscation can make deriving a human meaningful process from a machine learning model very difficult. However, while the intermediate states of a machine learning model are similarly obfuscated, using probing, we can start to explore looking at possible structure in those intermediate states. Large language models are a prime example of this obfuscation, and probing can begin to allow novel experimentation to be performed.


Deep-Learning Realtime Upsampling Techniques In Video Games, Biruk Mengistu Jun 2023

Deep-Learning Realtime Upsampling Techniques In Video Games, Biruk Mengistu

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper addresses the challenge of keeping up with the ever-increasing graphical complexity of video games and introduces a deep-learning approach to mitigating it. As games get more and more demanding in terms of their graphics, it becomes increasingly difficult to maintain high-quality images while also ensuring good performance. This is where deep learning super sampling (DLSS) comes in. The paper explains how DLSS works, including the use of convolutional autoencoder neural networks and various other techniques and technologies. It also covers how the network is trained and optimized, as well as how it incorporates temporal antialiasing and frame generation …


Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson Jun 2023

Lidar Segmentation-Based Adversarial Attacks On Autonomous Vehicles, Blake Johnson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Autonomous vehicles utilizing LiDAR-based 3D perception systems are susceptible to adversarial attacks. This paper focuses on a specific attack scenario that relies on the creation of adversarial point clusters with the intention of fooling the segmentation model utilized by LiDAR into misclassifying point cloud data. This can be translated into the real world with the placement of objects (such as road signs or cardboard) at these adversarial point cluster locations. These locations are generated through an optimization algorithm performed on said adversarial point clusters that are introduced by the attacker.


Not-So-Super Superfund: Cercla’S Biggest Issues, Cameron Berthiaume Jun 2023

Not-So-Super Superfund: Cercla’S Biggest Issues, Cameron Berthiaume

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The Comprehensive Environmental Response, Compensation and Liability Act (CERCLA/Superfund) is a federal law that allows the Environmental Protection Agency (EPA) to clean up contaminated sites and hold the parties responsible for the contamination financially liable. However, CERCLA faces a number of challenges to fulfilling its mission. This report examines some of the biggest issues facing the law in the past and present.


Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell Mar 2023

Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Today many devices contain hardware to transmit data across the internet via cellular, WiFi, and wired connections. Many of these devices communicate by using a protocol known as Transmission Control Protocol (TCP). TCP was developed when network resources were expensive, and it was rare for a typical network-aware device to have more than one connection to a network. An extension to TCP known as Multipath TCP (MPTCP) was developed to leverage the multiple network connections to which devices now have access. While the MPTCP extension has been successful in its goal of using multiple network connections to send data simultaneously, …


North Shore Prospecting, Shae Lindholm Mar 2023

North Shore Prospecting, Shae Lindholm

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

If one wanted to pick a violently controversial issue in the North Shore region of Minnesota, mining and mineral prospecting would be at the top of the list. As someone who lives in the region, this EIS is a demonstration of policies directly relevant to my home, and is why I picked it. “Federal Hardrock Mineral Prospecting Permits” is an EIS originating from 2012 that, like the title of the EIS implies, deals with a request for permits to dig exploratory boreholes in various locations in the Superior National Forest, which would come from the USDA Forest Service and the …


Public Participation In The Vineyard Wind Project, Jude Humphrey Mar 2023

Public Participation In The Vineyard Wind Project, Jude Humphrey

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper analyzes the environmental and social impact of Vineyard Wind, a proposed offshore wind farm, as well as the public response to these impacts. This was done by reading and summarizing the draft and final environmental impact statement and comments made during the public participation process. Lawsuits brought against the company were also included in this analysis. The public participation process was deemed adequate and in some cases more than required by federal agencies, however the comments and lawsuits show that there are still concerns that were not included in the approved alternative. The public response to this project …


Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden Mar 2023

Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper will discuss two versions of probabilistic context-free grammar password-guessing models. The first model focuses on using English semantics to break down passwords and identify patterns. The second model identifies repeating chunks in passwords and uses this information to create possible passwords. Then, we will show the performance of each model on leaked password databases, and finally discuss the observations made on these tests.


Exploring Methods Used In Face Swapping, Joshua Eklund Mar 2023

Exploring Methods Used In Face Swapping, Joshua Eklund

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Face swapping involves replacing the face in one image (the target) with a face in a different image (the source) while maintaining the pose and expression of the target face. Previous methods of face swapping required extensive computer power and man hours. As such, new methods are being developed that are quicker, less resource intensive, and more accessible to the non-expert. This paper provides background information on key methods used for face swapping and outlines three recently developed approaches: one based on generative adversarial networks, one based on linear 3D morphable models, and one based on encoder-decoders.


Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer Mar 2023

Applications Of Generative Adversarial Networks In Single Image Datasets, Dylan E. Cramer

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

One of the main difficulties faced in most generative machine learning models is how much data is required to train it, especially when collecting a large dataset is not feasible. Recently there have been breakthroughs in tackling this issue in SinGAN, with its researchers being able to train a Generative Adversarial Network (GAN) on just a single image with a model that can perform many novel tasks, such as image harmonization. ConSinGAN is a model that builds upon this work by concurrently training several stages in a sequential multi-stage manner while retaining the ability to perform those novel tasks.


Mach's Principle: Why Are Some Reference Frames Inertial, And Others Not?, Joseph Moonan Walbran Jul 2022

Mach's Principle: Why Are Some Reference Frames Inertial, And Others Not?, Joseph Moonan Walbran

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Mach's principle is a conjecture that was popular among physicists in the early 1900s, and which still sees occasional interest today. The principle states that large accelerating masses induce a local inertial reference frame around them. This paper introduces the principle and its history, and discusses its influence on later theories, like Maxwellian theories of gravity and general relativity.


Intuitr: A Theorem Prover For Intuitionistic Propositional Logic, Erik Rauer Jul 2022

Intuitr: A Theorem Prover For Intuitionistic Propositional Logic, Erik Rauer

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

A constructive proof proves the existence of a mathematical object by giving the steps necessary to construct said object. Proofs of this type can be interpreted as an algorithm for creating such an object. Intuitionistic Propositional Logic (IPL) is a propositional logic system wherein all valid proofs are constructive. intuitR is a theorem prover for IPL, that is, it determines whether a given formula is valid in IPL or not. In this paper, we describe how intuitR determines the validity of a formula and review its performance. When compared on a benchmark set of problems, intuitR was determined to solve …


Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist Jul 2022

Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The Internet of Things has increased in popularity in recent years, with daily life now being surrounded by “smart devices.” This network of smart devices, such as thermostats, refrigerators, and even stationary bikes affords us convenience, but at a cost. Security measures are typically inferior on these devices; considering that they collect our data around the clock, this is a big reason for concern. Recent research shows that blockchain technology may be one way to address these security concerns. This paper discusses the Internet of Things and the current issues with how security is handled, discusses how blockchain can shore …


Filling Gaps On The Pareto Front In Multi- And Many-Objective Optimization, Richard Lussier Jul 2022

Filling Gaps On The Pareto Front In Multi- And Many-Objective Optimization, Richard Lussier

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Pareto fronts offer insight into the best found solutions of a given problem. Several algorithms have been developed to help maintain a well-distributed Pareto front and therefore offer a wide variety of solutions. However, in real-world problems, the Pareto front isn’t necessarily a continuous surface and may contain holes and/or discontinuous lines. These irregular areas on the Pareto front are considered gaps. These gaps can either be natural or artificial. In their research, Pellicer, Escudero, Alzueta, and Deb suggest a three-step procedure to find, validate, and fill these gaps. First, they developed an algorithm to generate gap points. Second, they …


Approaches To Broadening Participation With Ap Computer Science Principles, Audrey Le Meur Jul 2022

Approaches To Broadening Participation With Ap Computer Science Principles, Audrey Le Meur

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The Advanced Placement Computer Science Principles (AP CSP) course framework was created with the intention of broadening participation in computing. Research has produced mixed results on whether or not the framework succeeds in that goal. Given that teachers have significant freedom in how they choose to teach the AP CSP content, students can have a variety of experiences that may or may not impact their continued participation in CS. In this paper, I compare four different approaches to the AP CSP framework by examining their impact on AP exam scores, self-efficacy and confidence, belongingness and identity, and persistence and interest, …


An Overview Of Redirected Walking Approaches And Techniques In Virtual Reality, Benjamin Goldstein Jul 2022

An Overview Of Redirected Walking Approaches And Techniques In Virtual Reality, Benjamin Goldstein

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

One major obstacle to the ideal of virtual reality is the physical constraints of the user’s location, primarily its limited size. A commonly proposed solution is using redirected walking, defined as manipulation of the user’s experience to alter their walking path, to keep the user within a confined physical space without causing any perceivable sensory distortion for the user. This paper discusses various redirected walking approaches which have been proposed, including predictions of user movement via navigation meshes and simulated users, and subtle redirection techniques using blink-induced change blindness and avatar manipulation.


Using Temporal Session Types To Analyze Time Complexities Of Concurrent Programs, Joseph M. Walbran Mar 2022

Using Temporal Session Types To Analyze Time Complexities Of Concurrent Programs, Joseph M. Walbran

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Das et al. develop a method for analyzing the time complexity of concurrent, message-passing algorithms. Their method is based on adding timing information to datatypes. Specifically, they use a family of datatypes called session types; these constrain the structure of interactions that may take place over a channel of communication. In Das’s system, the timing properties of an algorithm can be verified by a typechecker: if the timing information in the session types is mismatched, the computer will report a type error. In their paper, Das et al. develop the theory for such a typechecker, but do not provide an …


The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang Mar 2022

The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Dynamic Difficulty Adjustment (DDA) is a process by which a video game adjusts its level of challenge to match a player’s skill level. Its popularity in the video game industry continues to grow as it has the ability to keep players continuously engaged in a game, a concept referred to as Flow. However, the influence of DDA on games has received mixed responses, specifically that it can enhance player experience as well as hinder it. This paper explores DDA through the Monte Carlo Tree Search algorithm and Reinforcement Learning, gathering feedback from players seeking to understand what about DDA is …


Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson Mar 2022

Intrusion Attacks On Automotive Can And Their Detection, Halley M. Paulson

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The main highway of communication in a vehicle is the Controller Area Network, commonly known by the acronym CAN. Any vulnerability in this network could allow bad actors to block communication between vehicle subsystems, risking the safety of the vehicle’s occupants. With the ever growing list of vulnerabilities being exposed in the CAN, it is critical to address its safety. This paper looks at one of the known vulnerabilities in the data link layer of the CAN and an Intrusion Detection System that could detect attacks on this network. We detail a few processes of the CAN, arbitration and error …


Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez Mar 2022

Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

When scheduled flights are forecast to overcrowd sections of enroute airspace, an air traffic control authority may need to delay departures. Mixed integer linear programming can be used to compute a schedule that resolves the congestion while bringing the sum of all delays to a minimum. Standard linear programming constraint formulations for such scheduling problems, however, have poor run times for instances of realistic size. A new constraint formulation based on cycles and paths through a route graph reduces run times in computational experiments. It shows particularly strong performance for schedules that approach the worst-case solution times in standard formulations.


Fighting Gerrymandering By Automating Congressional Redistricting, Jacob Jenness Mar 2022

Fighting Gerrymandering By Automating Congressional Redistricting, Jacob Jenness

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Gerrymandering is a political problem that the United States has had for more than 200 years. Politicians have taken the dull and routine process of drawing congressional districts and turned it into a highly-partisan process. However, with recent improvements in redistricting algorithms, researchers Harry Levin and Sorelle Friedler have introduced their recursive Divide and Conquer Redistricting Algorithm. This algorithm has the potential to automate the process of congressional redistricting, thereby removing the potential for bias. By utilizing a set of partitioning and swapping algorithms, the Divide and Conquer Redistricting Algorithm achieves desirable goals, such as low population deviation, and high …


Umn Morris Carbon Footprint Calculations (2005 - 2020), Anneliese Tatham Aug 2021

Umn Morris Carbon Footprint Calculations (2005 - 2020), Anneliese Tatham

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The University of Minnesota Morris is well known for its commitment to sustainability. As a part of this commitment, the UMN Morris Office of Sustainability tracks and analyzes campus energy production, consumption and efficiency and summarizes this information as a carbon footprint. A carbon footprint combines all available greenhouse gas emissions data attributed to the institution from three categories: direct emissions from institution-owned or operated processes (Scope 1), indirect emissions related to the purchase of utilities (Scope 2), and indirect emissions from sources not owned by the institution but associated with its function (Scope 3). This project was an effort …


Electronic Voting Implementation Through Bitcoin Blockchain Technology, Cassie Schultz Aug 2021

Electronic Voting Implementation Through Bitcoin Blockchain Technology, Cassie Schultz

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Even with all the advances we have seen in secure digital technology, the most secure way to currently cast a vote on election day consist of a hand-marked paper ballot. When extenuating circumstances arise, offering a voting environment that is accessible and safe for everyone, but also secure can be a difficult task under the current voting system. This paper discusses one proposed electronic voting system which uses blockchain technology. Based on a review of literature on blockchain technology and specific implementations of voting systems, a summary of relevant background information as well as implementation protocol are provided. Even though …


Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein Aug 2021

Browser Fingerprinting And The Importance Of Digital Privacy, Aaron M. Corpstein

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Browser fingerprinting is a type of internet tracking where the attributes of a user’s computer and browser accessing a web page are remotely recorded and then used for profiling, tracking, and advertising purposes. This paper focuses on defining browser fingerprinting and enumerating ways in which the user can combat fingerprinting. Browser fingerprinting can be thwarted by changing attributes within the user’s browser or machine, using a browser designed to combat fingerprinting, or with security and anti-fingerprinting focused browser extensions. All of these methods are capable of increasing the security of the user.


Recent Advances In Smartphone Computational Photography, Paul Friederichsen Mar 2021

Recent Advances In Smartphone Computational Photography, Paul Friederichsen

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Smartphone cameras present many challenges, most of which come from the need for them to be physically small. Their small size puts a fundamental limit on their ability to resolve detail and collect light, which makes low-light photography and zooming difficult. This paper presents two approaches to improve smartphone photography through software techniques. The first is handheld super-resolution which uses natural hand movement to improve the resolution smartphone images, especially when zoomed. The second approach is a system which improves low light photography in smartphones.


Redefining Nietzsche’S Greatest Weight Into Contemporary Cosmology, Christian E. Coffinet-Crean Mar 2021

Redefining Nietzsche’S Greatest Weight Into Contemporary Cosmology, Christian E. Coffinet-Crean

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Friedrich Nietzsche’s theory of eternal recurrence and it’s cosmological value has been discredited and cast aside because of the lack of scientific backing the original theory had. In this essay, Nietzche’s eternal recurrence will be observed and analyzed through some of his major works and defended from outside criticism. Furthermore, Roger Penrose’s Conformal Cyclic Cosmology and Jean-Paul Luminet’s research are used in support for eternal recurrence as a cosmological theory. Luminet’s research of cosmic background radiation concludes that the universe has an odd but finite shape. Penrose’s research theorizes a sort of repeating universe, allowing time to be treated as …


Atmospheric Contrail Detection With A Deep Learning Algorithm, Nasir Siddiqui Jul 2020

Atmospheric Contrail Detection With A Deep Learning Algorithm, Nasir Siddiqui

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Aircraft contrail emission is widely believed to be a contributing factor to global climate change. We have used machine learning techniques on images containing contrails in hopes of being able to identify those which contain contrails and those that do not. The developed algorithm processes data on contrail characteristics as captured by long-term image records. Images collected by the United States Department of Energy’s Atmospheric Radiation Management user facility(ARM) were used to train a deep convolutional neural network for the purpose of this contrail classification. The neural network model was trained with 1600 images taken by the Total Sky Imager(TSI) …