Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (2)
- Classical Literature and Philology (1)
- Classics (1)
- Communication (1)
- Dance (1)
-
- Disability and Equity in Education (1)
- Education (1)
- Elementary Education (1)
- Engineering Education (1)
- Gender Equity in Education (1)
- Islamic Studies (1)
- Religion (1)
- Religious Thought, Theology and Philosophy of Religion (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Theatre and Performance Studies (1)
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Other Computer Engineering
Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha
Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha
Honors Theses
The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …
Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour
Asynchronous, Distributed Optical Mutual Exclusion And Applications, Ahmed Bahaael Mansour
LSU Doctoral Dissertations
Silicon photonics have drawn much recent interest in the setting of intra-chip andmodule communication. In this dissertation, we address a fundamental computationalproblem, mutual exclusion, in the setting of optical interconnects. As a main result, wepropose an optical network and an algorithm for it to distribute a token (shared resource)mutually exclusively among a set ofnprocessing elements. Following a request, the tokenis granted in constant amortized time andO(n) worst case time; this assumes constantpropagation time for light within the chip. Additionally, the distribution of tokens is fair,ensuring that no token request is denied more thann−1 times in succession; this is thebest possible. …
Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda Xodjayeva, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova
Creation Of Mobile Applications For The Shrines Of Al-Hakim Al-Termizi, Mavlyuda Xodjayeva, Turdali Jumayev, Alimjon Dadamuhamedov, Barno Saydakhmedova
The Light of Islam
We recognize that the sustainable development of tourism has great potential for the development of cultural and humanitarian ties around the world. We emphasize the importance of information technology in tourism, especially in the areas of advertising, marketing, differentiation and specialization of tourism products. In addition, we reaffirm our commitment to pilgrimage tourism for the individual growth of people and the strengthening of basic social norms and national values. The program uses modern programming languages such as Php, Java, C ++. Al-Hakim at-Termizi is one of the most famous places of worship in Uzbekistan, which is also known for its …
Efficient Elevator Algorithm, Sean M. Toll, Owen Barbour, Carl Edwards, Daniel Nichols, Austin Day
Efficient Elevator Algorithm, Sean M. Toll, Owen Barbour, Carl Edwards, Daniel Nichols, Austin Day
Chancellor’s Honors Program Projects
No abstract provided.
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Virginia Journal of Science
The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …
Smarter Neat Nets, Ryan Swords Dehaven
Smarter Neat Nets, Ryan Swords Dehaven
Master's Theses
This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …