Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (29)
- Selected Works (7)
- Chapman University (5)
- University of North Florida (5)
- California State University, San Bernardino (4)
-
- Purdue University (4)
- SelectedWorks (3)
- University of Kentucky (3)
- Portland State University (2)
- The University of Akron (2)
- University of Arkansas, Fayetteville (2)
- University of Tennessee, Knoxville (2)
- Western University (2)
- Boise State University (1)
- City University of New York (CUNY) (1)
- Department of Primary Industries and Regional Development, Western Australia (1)
- East Tennessee State University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Georgia Southern University (1)
- The University of Maine (1)
- The University of Southern Mississippi (1)
- University of Dayton (1)
- University of Louisville (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of New Orleans (1)
- Keyword
-
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (4)
- Thesis; University of North Florida; UNF; Dissertations (4)
- Coalgebra (3)
- Game (3)
- Music (3)
-
- Parse (3)
- Automated (2)
- Economics (2)
- Graphics (2)
- IOS (2)
- Javascript (2)
- OpenGL (2)
- Real-time (2)
- Security (2)
- Solar (2)
- 2D Game (1)
- 2D animation (1)
- 3D virtual worlds (1)
- Abstract GSOS (1)
- Academic -- UNF -- Computing (1)
- Academic -- UNF -- Computing; Cloudstone; Web 2.0; Faban; Olio; IaaS; Benchmarking (1)
- Academic -- UNF -- Computing; Computer Security; Energy Optimization; Energy Aware Computing (1)
- Academic -- UNF -- Computing; Workflow; Unknown exceptions; BPEL4PEOPLE; Web Services; Human Task; SWIMs (1)
- Academic libraries (1)
- Acappella (1)
- Across-spaces learning (1)
- ActionScript (1)
- Active (1)
- Ad hoc networks (1)
- Adobe AIR (1)
- Publication
-
- Computer Engineering (14)
- Computer Science and Software Engineering (11)
- Engineering Faculty Articles and Research (5)
- UNF Graduate Theses and Dissertations (5)
- Electronic Theses, Projects, and Dissertations (4)
-
- Electronic Theses and Dissertations (3)
- Liberal Arts and Engineering Studies (3)
- Dissertations and Theses (2)
- Doctoral Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Hyoil Han (2)
- MODVIS Workshop (2)
- Russell C. Hardie (2)
- Theses and Dissertations--Computer Science (2)
- Abhijith Anand (1)
- College of Arts and Sciences Presentations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electrical and Computer Engineering Faculty Research (1)
- Electronics Elements (1)
- FIU Electronic Theses and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Innovative Research Publications IRP India (1)
- Ivan M. Jorrín Abellán (1)
- Master's Theses (1)
- Publications and Research (1)
- Purdue Polytechnic Directed Projects (1)
- Ryan Jasper (1)
- Publication Type
- File Type
Articles 1 - 30 of 84
Full-Text Articles in Engineering
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Surbhi Dangi
In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …
Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho
Hyperspectral Data Acquisition And Its Application For Face Recognition, Woon Cho
Doctoral Dissertations
Current face recognition systems are rife with serious challenges in uncontrolled conditions: e.g., unrestrained lighting, pose variations, accessories, etc. Hyperspectral imaging (HI) is typically employed to counter many of those challenges, by incorporating the spectral information within different bands. Although numerous methods based on hyperspectral imaging have been developed for face recognition with promising results, three fundamental challenges remain: 1) low signal to noise ratios and low intensity values in the bands of the hyperspectral image specifically near blue bands; 2) high dimensionality of hyperspectral data; and 3) inter-band misalignment (IBM) correlated with subject motion during data acquisition.
This dissertation …
Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams
Hands-Free Computer Interaction Using A Sip/Puff Sensor As A Mouse, Daniel Williams
Computer Engineering
No abstract provided.
Free2play, Corey Lee Wilson
Free2play, Corey Lee Wilson
Computer Engineering
Free2Play is a website based upon the wildly popular PC video game League of Legends created by Riot Gaming. The website contains helpful information for new and old players of the game, such as articles containing the latest League of Legends new, a rune calculator, and recommended item builds for characters. The website uses HTML5, jquery, node.js, MySQL, and PHP to pull data from Riot’s web API and Champion.gg’s website.
Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard
Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard
Computer Engineering
In today’s society, we are seeing incredible improvements in terms of creating smaller technological devices that behave more and more like the personal computers of yesterday. Mobile “Smart” devices, in particular, are becoming incredibly powerful not just in terms of processing power, but in the fact that they are able to provide assistance to users in their everyday lives. Application developers are now able utilize the power and size of these devices, to create and realize ideas that would have been previously viewed as impossible. This project applies the fields of digital signal processing, music, and mobile application development, to …
Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav
Modification In Weighted Clustering Algorithm For Faster Clustering Formation By Considering Absolute Attributes Of Mobile Nodes And Greedy Method For Role Selection Of Mobile Nodes In Manet, Vijayanand Kumar, Rajesh Kumar Yadav
Innovative Research Publications IRP India
Wirelessly allocated mobile nodes which are configured in a geographically adjacent to each other can form cluster by applying rules on the mobile nodes. Each cluster family have different members with different assigned roles such as cluster head, cluster members, gateway members and ordinary nodes which can perform roles of any three mentioned roles as the time progresses based on absolute and relative attribute information. Absolute attributes of mobile nodes can be mobility, energy consumed and entropy of the mobile node. Relative attributes can be considered as neighbour information and sum of distances of neighbours etc. Relative attributes are the …
Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman
Creating Business Value From Digital Data Streams: The Role Of Organizational Interventions, Rajeev Sharma, Abhijith Anand, Tim Coltman
Abhijith Anand
No abstract provided.
The Information Of Spam, Sawyer C. Anderson
The Information Of Spam, Sawyer C. Anderson
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper explores the value of information contained in spam tweets as it pertains to prediction accuracy. As a case study, tweets discussing Bitcoin were collected and used to predict the rise and fall of Bitcoin value. Precision of prediction both with and without spam tweets, as identified by a naive Bayesian spam filter, were measured. Results showed a minor increase in accuracy when spam tweets were included, indicating that spam messages likely contain information valuable for prediction of market fluctuations.
Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper
Exclusive-Or Preprocessing And Dictionary Coding Of Continuous-Tone Images., Takiyah K. Cooper
Electronic Theses and Dissertations
The field of lossless image compression studies the various ways to represent image data in the most compact and efficient manner possible that also allows the image to be reproduced without any loss. One of the most efficient strategies used in lossless compression is to introduce entropy reduction through decorrelation. This study focuses on using the exclusive-or logic operator in a decorrelation filter as the preprocessing phase of lossless image compression of continuous-tone images. The exclusive-or logic operator is simply and reversibly applied to continuous-tone images for the purpose of extracting differences between neighboring pixels. Implementation of the exclusive-or operator …
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Electronic Theses, Projects, and Dissertations
In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …
Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens
Space Traffic Management Conference
The Space Data Integrator (SDI) Project is the initial step to satisfy the Federal Aviation Administration (FAA) strategic initiative to integrate commercial space launch and reentry vehicles into the National Airspace System. The project addresses the needs for greater situational awareness and monitoring, and increased response capability during non-nominal and catastrophic incidents during space operations.
The initial phase of this project leverages current FAA systems, and provide an initial demonstration of capability that will provide for state data from a commercial reentry vehicle to be ingested into a the FAA Traffic Flow Management System, and displayed on Traffic Situation Displays. …
Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu
Addressing Food Wastage By Tracking The Expiry Date, Shiva P. Bachu
Electronics Elements
We know trash is an enormous problem in the world since trash does not only affect just humans but it also affects living creatures in general. The biggest contributor of trash in the United States is food waste. Food waste is produced by every human and the amounts of food waste is astonishing. Americans throw away almost half of the food that they buy, which is almost worth $165 billion per year. Food waste which end up in landfills and incinerators produces methane which is a greenhouse gas and can contribute to global warming. Trash in general and food waste …
Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han
Answer Credibility: A Language Modeling Approach To Answer Validation, Protima Banerjee, Hyoil Han
Hyoil Han
Answer Validation is a topic of significant interest within the Question Answering community. In this paper, we propose the use of language modeling methodologies for Answer Validation, using corpus-based methods that do not require the use of external sources. Specifically, we propose a model for Answer Credibility which quantifies the reliability of a source document that contains a candidate answer and the Question’s Context Model.
Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han
Survey Of Word Sense Disambiguation Approaches, Xiaohua Zhou, Hyoil Han
Hyoil Han
Word Sense Disambiguation (WSD) is an important but challenging technique in the area of natural language processing (NLP). Hundreds of WSD algorithms and systems are available, but less work has been done in regard to choosing the optimal WSD algorithms. This paper summarizes the various knowledge sources used for WSD and classifies existing WSD algorithms according to their techniques. The rationale, tasks, performance, knowledge sources used, computational complexity, assumptions, and suitable applications for each class of WSD algorithms are also discussed. This paper will provide users with general knowledge for choosing WSD algorithms for their specific applications or for further …
Rfid Microscope Lab, Patricia Carranza
Rfid Microscope Lab, Patricia Carranza
Computer Engineering
The RFID Microscope Lab is a new exhibit created for the San Luis Obispo Children's Museum. The goal of the project is to create a modern, interactive exhibit that will teach children about different natural specimens through the use of technology. A computer, custom software, and RFID technology, will be used to display facts, microscopic images, and short videos of ten different specimens.
Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande
Developing Java Programs On Android Mobile Phones Using Speech Recognition, Santhrushna Gande
Electronic Theses, Projects, and Dissertations
Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program. The …
Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang
Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang
FIU Electronic Theses and Dissertations
Thanks to the advanced technologies and social networks that allow the data to be widely shared among the Internet, there is an explosion of pervasive multimedia data, generating high demands of multimedia services and applications in various areas for people to easily access and manage multimedia data. Towards such demands, multimedia big data analysis has become an emerging hot topic in both industry and academia, which ranges from basic infrastructure, management, search, and mining to security, privacy, and applications. Within the scope of this dissertation, a multimedia big data analysis framework is proposed for semantic information management and retrieval with …
Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii
Accelerating Scientific Computing Models Using Gpu Processing, Raymond F. Flagg Iii
Electronic Theses and Dissertations
GPGPUs offer significant computational power for programmers to leverage. This computational power is especially useful when utilized for accelerating scientific models. This thesis analyzes the utilization of GPGPU programming to accelerate scientific computing models.
First the construction of hardware for visualization and computation of scientific models is discussed. Several factors in the construction of the machines focus on the performance impacts related to scientific modeling.
Image processing is an embarrassingly parallel problem well suited for GPGPU acceleration. An image processing library was developed to show the processes of recognizing embarrassingly parallel problems and serves as an excellent example of converting …
Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher
Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher
The Summer Undergraduate Research Fellowship (SURF) Symposium
Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a …
Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande
Network Structure, Network Flows And The Phenomenon Of Influence In Online Social Networks: An Exploratory Empirical Study Of Twitter Conversations About Youtube Product Categories, Nitin Venkat Mayande
Dissertations and Theses
Traditional marketing models are swiftly being upended by the advent of online social networks. Yet, practicing firms that are engaging with online social networks neither have a reliable theory nor sufficient practical experience to make sense of the phenomenon. Extant theory in particular is based on observations of the real world, and may thus not apply to online social networks. Practicing firms may consequently be misallocating a large amount of resources, simply because they do not know how the online social networks with which they interact are organized.
The purpose of this dissertation is to investigate how online social networks …
Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li
Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li
Doctoral Dissertations
Compressed Sensing (CS) is an emerging field based on the revelation that a small collection of linear projections of a sparse signal contains enough information for reconstruction. It is promising that CS can be utilized in environments where the signal acquisition process is extremely difficult or costly, e.g., a resource-constrained environment like the smartphone platform, or a band-limited environment like visual sensor network (VSNs). There are several challenges to perform sensing due to the characteristic of these platforms, including, for example, needing active user involvement, computational and storage limitations and lower transmission capabilities. This dissertation focuses on the study of …
Jsish, Ryan Grasell
Jsish, Ryan Grasell
Computer Science and Software Engineering
For my senior project, I implemented Professor Keen’s JSish spec in C++. JSish is a subset of Javascript with support for execution from the command line and files.
I chose this project because I wanted to reinforce my programing language skills, learn C++, and gain a deeper understanding of garbage collection.
I quickly grew familiar with C++. My prior experience with both C and Java was a good enough introduction to let me hit the ground running. The biggest hurdle for me was the lack of garbage collection built into C++. I understood the principles of manual memory management, but …
Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas
Adaptive Controller Using Runtime Partial Hardware Reconfiguration For Unmanned Aerial Vehicles (Uavs), Nikhil Thomas
Graduate Theses and Dissertations
The goal of this thesis is to explore the feasibility of a multirotor controller system which can dynamically change the arm configuration of a multirotor. Currently most of the multirotor systems have to be powered down, rewired, and programmed with new firmware, to configure how many arms/motors they use to fly. The focus of our effort is to develop a Field Programmable Gate Array (FPGA) based hardware/software controller which uses dynamic partial hardware reconfiguration to switch the arm/motor configuration of a multirotor during operation. We believe that this will make a multirotor more fault tolerant and adaptive. This thesis explains …
A Maturity Model For Mobile Learning, Muasaad Alrasheedi
A Maturity Model For Mobile Learning, Muasaad Alrasheedi
Electronic Thesis and Dissertation Repository
Higher education is becoming increasingly interested in adopting innovative and modern technologies as a mode of imparting education. Mobile technologies are considered to be the next frontier of educational platforms as they have the capability to provide high-quality learning experiences and to satisfy the increasing demand for mobility and flexibility. In view of the ubiquitous nature of mobile technology and the immense opportunities it offers, there are favorable indications that the technology could be introduced as the next generation of learning platforms. The present research aims to develop a comprehensive framework based on the well-known Capability Maturity Model (CMM) and …
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
UNLV Gaming Research & Review Journal
Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …
Seizure Tracker, Zachary Reardon
Seizure Tracker, Zachary Reardon
Computer Engineering
The goal of this project is to make a Module that enables anyone watching a person with disabilities to record any seizure that this person has under their care. Then when the Doctor/parent receives their patient/kid they are able to download all the seizures that their patient/kid had while they were away. The Doctor/parent then has the exact time, the duration of the seizure, and the type of seizure for all the seizures that have occurred while they were away from their patient/kid. From this data it is possible that the Doctor may see some sort of patterns that enables …
Nutty Adventures, Tony Hsu, Mandy Chan
Nutty Adventures, Tony Hsu, Mandy Chan
Computer Engineering
Nutty Adventures is an Android game. The goal is to gather acorns for day-to-day survival, upgrades, and hoarding. Ultimately, the player must have enough acorns by the time Winter comes to fulfill the squirrel’s quest: providing enough acorns for his squirrel kingdom during the barren Winter season. Throughout the days, the player has to keep track of time and monsters, which might influence player decisions.
Automated Solar-Powered Chicken Coop Door, Brenna Yagade
Automated Solar-Powered Chicken Coop Door, Brenna Yagade
Computer Engineering
The purpose of this project was to plan, design, and build an automated, low power system to open and close a chicken-coop door, which is powered through a solar panel.
Slaps Music Sharing App, Maximillian L. Parelius
Slaps Music Sharing App, Maximillian L. Parelius
Computer Engineering
Slaps is a fun way to share new songs with friends. Users can simply select songs from their personal library of music, select a short sample of the song to share, and then select which friends to share it with. If a user loves a song that he/she receives, they can link directly to iTunes through the app to download the full song.
Wau: Location-Based Photo-Sharing And Friend-Finding Android Application, Tam P. Nguyen
Wau: Location-Based Photo-Sharing And Friend-Finding Android Application, Tam P. Nguyen
Computer Engineering
Wau (Where are u?) is a location-based photo-sharing and friend-finding Android application. The basic concept of my app is to help people avoid the hassle of having to call/text their friends in order to know where they are. The ability to simply tap on a name and visually see their location in reference to your own would be a huge convenience. Another neat feature is that it allows users to take and upload pictures wherever they are, and the only way for anyone to see the picture is to be within the same vicinity that it was taken. I imagine …