Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Other Computer Engineering

Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha May 2022

Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha

Honors Theses

The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …


Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour Nov 2021

Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour

LSU Doctoral Dissertations

Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …


Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda Xodjayeva, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova Jun 2020

Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda Xodjayeva, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova

The Light of Islam

We recognize that the sustainable development of tourism has great potential for the development of cultural and humanitarian ties around the world. We emphasize the importance of information technology in tourism, especially in the areas of advertising, marketing, differentiation and specialization of tourism products. In addition, we reaffirm our commitment to pilgrimage tourism for the individual growth of people and the strengthening of basic social norms and national values. The program uses modern programming languages such as Php, Java, C ++. Al-Hakim at-Termizi is one of the most famous places of worship in Uzbekistan, which is also known for its …


Efficient Elevator Algorithm, Sean M. Toll, Owen Barbour, Carl Edwards, Daniel Nichols, Austin Day May 2020

Efficient Elevator Algorithm, Sean M. Toll, Owen Barbour, Carl Edwards, Daniel Nichols, Austin Day

Chancellor’s Honors Program Projects

No abstract provided.


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …


Smarter Neat Nets, Ryan Swords Dehaven Aug 2013

Smarter Neat Nets, Ryan Swords Dehaven

Master's Theses

This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …