Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Theses/Dissertations

Data

Discipline
Institution
Publication Year
Publication

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Stand-Up Comedy Visualized, Berna Yenidogan Feb 2023

Stand-Up Comedy Visualized, Berna Yenidogan

Dissertations, Theses, and Capstone Projects

Stand-up comedy has become an increasingly popular form of comedy in the recent years and comedians reach audiences beyond the halls they are performing through streaming services, podcasts and social media. While comedic performances are typically judged by how 'funny' they are, which could be proxied by the frequency and intensity of laughs through the performance, comedians also explore untapped social issues and provoke conversation, especially in this age where interaction with artists goes beyond their act. It is easy to see commonalities in the topics addressed in comedians’ work such as relationships, race and politics.This project provides an interactive …


Happiness And Policy Implications: A Sociological View, Sarah M. Kahl Jun 2022

Happiness And Policy Implications: A Sociological View, Sarah M. Kahl

Dissertations, Theses, and Capstone Projects

The World Happiness Report is released every year, ranking each country by who is “happier” and explaining the variables and data they have used. This project attempts to build from that base and create a machine learning algorithm that can predict if a country will be in a “happy” or “could be happier” category. Findings show that taking a broader scope of variables can better help predict happiness. Policy implications are discussed in using both big data and considering social indicators to make better and lasting policies.


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar May 2022

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg Jan 2017

System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg

Williams Honors College, Honors Research Projects

Power racks are a weight machine used by swimmers to provide resistance while they swim away from a wall toward the center of the pool. The objective of this project is to build a modular data system that can be added to these machines to record and log quantitative information during their use. This information will be stored on a web server, and made available to the user for analysis and visualization through a web application. Workout data can also be downloaded and interpreted at a later time, independent of the web application. The data system should be water resistant, …


Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson Jun 2016

Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson

Computer Engineering

This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur …


The Development Of Project Grade-Up, Dalin Glenn Williams Jan 2016

The Development Of Project Grade-Up, Dalin Glenn Williams

MS in Computer Science Theses

The university classroom has greatly evolved from a simple syllabus and in class discussion to the modern online documentation and virtual classrooms. These developments have changed the way students review their grades and balance their workloads. With the plethora of new technologies, students are often burdened with a full school schedule, work, and social events, with few tools to help them effectively understand their grades or manage their time. Current solutions addressing this issue do not present data in an organized way that allows the student to easily comprehend their past performance or up coming work load. Our solution builds …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Data Transfer Using Light, Ryan Thomas Suarez May 2014

Data Transfer Using Light, Ryan Thomas Suarez

Computer Engineering

A proof of concerpt for data transmission using light as a medium. Data is transferred by strobing and LED faster than the human eye can detect in an attempt to come up with a more secure alternate to in-building wifi.


Wavelets In Intelligent Transportation Systems: Data Compression And Incident Detection, Shaurya Agarwal Aug 2012

Wavelets In Intelligent Transportation Systems: Data Compression And Incident Detection, Shaurya Agarwal

UNLV Theses, Dissertations, Professional Papers, and Capstones

Research show that wavelets can be used efficiently in denoising and feature extraction of a given signal. This thesis discusses about intelligent transportation systems(ITS), its requirement and benefits. We explore use of wavelets in intelligent transportation systems for knowledge discovery, compression and incident detection. In the first section of thesis, we focus on the following problems related to traffic matrix: data compression, retrieval and visualization. We propose a methodology using wavelet transform for data visualization and compression of traffic data. Aim is to research on the wavelet compression technique for the traffic data, come up with the performance of various …


Wireless Ad Hoc Networks For Mobile Devices Via High Frequency Sound Waves, Yashar Bahman Jun 2012

Wireless Ad Hoc Networks For Mobile Devices Via High Frequency Sound Waves, Yashar Bahman

Computer Engineering

The purpose of this research it to give mobile phones the ability to create a cross-platfor wireless ad-hoc network. To accomplish this the phone’s speaker/microphone will be treated as a modulator/demodulator (or modem for short). The idea is that the phone will generate sine waves at various frequencies to output them on the speaker on one end and also record audio with the microphone to analyze and decode it into data on the other.

Once complete, these functionalities will all be rolled up into one easy to use library named Wave, which can be used to send data back and …