Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans Dec 2011

Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans

UNLV Theses, Dissertations, Professional Papers, and Capstones

Context. Application of the Nintendo Wii-fit balance board and its games have been used in Physical Therapy clinics, showing success in individuals with neurological disorders, and has been recommended as a minimum baseline assessment of a symptoms checklist and standardized cognitive and balance assessments for concussion management by the NCAA. However, it still faces challenges of being considered a reliable and consistent tool for producing normative data in the allied healthcare. Because there is little to no evidence for the Wii-fit balance board as a valid balance assessment tool for clinical and/or research usage, the significance of this study is …


Digital Watermarking Security, Jonathan Blake, Shahram Latifi Sep 2011

Digital Watermarking Security, Jonathan Blake, Shahram Latifi

Electrical & Computer Engineering Faculty Research

As creative works (e.g. books, films, music, photographs) become increasingly available in digital formats in a highly connected world, it also becomes increasingly difficult to secure intellectual property rights. Digital watermarking is one potential technology to aid intellectual property owners in controlling and tracking the use of their works. Surveys the state of digital watermarking research and examines the attacks that the technology faces and how it fares against them. Digital watermarking is an inherently difficult design problem subject to many constraints. The technology currently faces an uphill battle to be secure against relatively simple attacks.


Comparison Of Time-Domain Reflectometry Performance Factors For Several Dielectric Geometries: Theory And Experiments, S. V. Maheshwarla, R. Venkatasubramanian, Robert F. Boehm Aug 1995

Comparison Of Time-Domain Reflectometry Performance Factors For Several Dielectric Geometries: Theory And Experiments, S. V. Maheshwarla, R. Venkatasubramanian, Robert F. Boehm

Electrical & Computer Engineering Faculty Research

We propose three nontraditional dielectric geometries and present an experimental and theoretical analysis and comparison of time domain reflectometry (TDR) performances for them. The traditional geometry (the probes inserted in material of essentially infinite extent) is compared to three nontraditional geometries where the probes are affixed outside of a core sample, inside of a bore, or flat on the surface of a semi-infinite solid. Our derivation relates the velocity of electromagnetic wave propagation to the complex permittivities and permeabilities of the media and the geometry for the three nontraditional configurations. Experimental results for air, styrofoam, dry sand, wet sand of …