Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Escape The Planet: Revolutionizing Game Design With Novel Oop Techniques, Qusai Kamal Fannoun Jan 2024

Escape The Planet: Revolutionizing Game Design With Novel Oop Techniques, Qusai Kamal Fannoun

All Graduate Theses, Dissertations, and Other Capstone Projects

Mobile devices are continuously evolving and greater computing power and graphics capabilities are being introduced every year. As a result, there is an increasing demand for challenging and engaging mobile games that leverage these advanced features. This project explores best design practices using the development of Escape the Planet, which is an intricate maze game for mobile devices in which players navigate using a spaceship that is trapped in a hostile planet’s maze while avoiding obstacles and enemy attacks. The goal is to safely guide the spaceship out of the maze without colliding into walls or taking bullets from defensive …


Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko Jan 2023

Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko

All Graduate Theses, Dissertations, and Other Capstone Projects

With the surge in information management technology reliance and the looming presence of cyber threats, user authentication has become paramount in computer security. Traditional static or one-time authentication has its limitations, prompting the emergence of continuous authentication as a frontline approach for enhanced security. Continuous authentication taps into behavior-based metrics for ongoing user identity validation, predominantly utilizing machine learning techniques to continually model user behaviors. This study elucidates the potential of mouse movement dynamics as a key metric for continuous authentication. By examining mouse movement patterns across two contrasting gaming scenarios - the high-intensity "Team Fortress" and the low-intensity strategic …


Rankings Of Mma Fighters, Michael Schaefer Jan 2022

Rankings Of Mma Fighters, Michael Schaefer

All Graduate Theses, Dissertations, and Other Capstone Projects

Ranking is an essential process that allows sporting authorities to determine the relative performance of athletes. While ranking is straightforward in some sports, it is more complicated in MMA (mixed martial arts), where competition is often fragmented. This paper describes the mathematics behind four existing ranking algorithms: Elo’s System, Massey’s Method, Colley’s Method, and Google’s PageRank, and shows how to adapt them to rank MMA fighters in the UFC (Ultimate Fighting Championship). We also provide a performance analysis for each ranking method.


Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff Jan 2021

Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff

All Graduate Theses, Dissertations, and Other Capstone Projects

Multiprocessor System-on-Chip (MPSoC) integrating heterogeneous processing elements (CPU, GPU, Accelerators, memory, I/O modules ,etc.) are the de-facto design choice to meet the ever-increasing performance/Watt requirements from modern computing machines. Although at consumer level the number of processing elements (PE) are limited to 8-16, for high end servers, the number of PEs can scale up to hundreds. A Network-on-Chip (NoC) is a microscale network that facilitates the packetized communication among the PEs in such complex computational systems. Due to the heterogeneous integration of the cores, execution of diverse (serial and parallel) applications on the PEs, application mapping strategies, and many other …


A Methodology For Detecting Credit Card Fraud, Kayode Ayorinde Jan 2021

A Methodology For Detecting Credit Card Fraud, Kayode Ayorinde

All Graduate Theses, Dissertations, and Other Capstone Projects

Fraud detection has appertained to many industries such as banking, retails, financial services, healthcare, etc. As we know, fraud detection is a set of campaigns undertaken to avert the acquisition of illegal means to obtain money or property under false pretense. With an unlimited and growing number of ways fraudsters commit fraud crimes, detecting online fraud was so tricky to achieve. This research work aims to examine feasible ways to identify credit card fraudulent activities that negatively impact financial institutes. In the United States, an average of U.S consumers lost a median of $429 from credit card fraud in 2017, …


Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro Jan 2021

Proposed Data Governance Framework For Small And Medium Scale Enterprises (Smes), Rejoice Okoro

All Graduate Theses, Dissertations, and Other Capstone Projects

Data governance is not a one size fits all, instead, it should be an evolutionary process that can be started small and measurable along the way. This research aims at proposing a data governance framework by ensuring data management processes, data security and control are compliant with laws and policies. This article also presents the first results of a comparative analysis between three data privacy laws and outlines five components which together form a data governance framework for SMEs. The data governance model documents data quality roles and their type of interaction with data quality management activities exploring how data …


Classification Of Chess Games: An Exploration Of Classifiers For Anomaly Detection In Chess, Masudul Hoque Jan 2021

Classification Of Chess Games: An Exploration Of Classifiers For Anomaly Detection In Chess, Masudul Hoque

All Graduate Theses, Dissertations, and Other Capstone Projects

Chess is a strategy board game with its inception dating back to the 15th century. The Covid-19 pandemic has led to a chess boom online with 95,853,038 chess games being played during January, 2021 on lichess.com. Along with the chess boom, instances of cheating have also become more rampant. Classifications have been used for anomaly detection in different fields and thus it is a natural idea to develop classifiers to detect cheating in chess. However, there are no specific examples of this, and it is difficult to obtain data where cheating has occurred. So, in this paper, we develop 4 …


Gröbner Bases And Systems Of Polynomial Equations, Rachel Holmes Jan 2020

Gröbner Bases And Systems Of Polynomial Equations, Rachel Holmes

All Graduate Theses, Dissertations, and Other Capstone Projects

This paper will explore the use and construction of Gröbner bases through Buchberger's algorithm. Specifically, applications of such bases for solving systems of polynomial equations will be discussed. Furthermore, we relate many concepts in commutative algebra to ideas in computational algebraic geometry.


Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan Jan 2020

Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan

All Graduate Theses, Dissertations, and Other Capstone Projects

From the book "Speaking into the Air: A History of the Idea of Communication," written by John Durham Peters, we understand a notion about developing one’s destiny; people have the freedom to choose multiple paths to follow (Peters, 2012). If we reject this idea, it is also easy for people to come up with distinct explanations. Even though the meaning of the same issues might vary subject to who is interpreting them, the primary concepts can be interpreted as more or less the same. If we study these two--"artificial intelligence" and "communication"- simultaneously, we can assume some characteristics. Thus, this …


Fault Detection And Classification Of A Single Phase Inverter Using Artificial Neural Networks, Ayomikun Samuel Orukotan Jan 2020

Fault Detection And Classification Of A Single Phase Inverter Using Artificial Neural Networks, Ayomikun Samuel Orukotan

All Graduate Theses, Dissertations, and Other Capstone Projects

The detection of switching faults of power converters or the Circuit Under Test (CUT) is real-time important for safe and efficient usage. The CUT is a single-phase inverter. This thesis presents two unique methods that rely on backpropagation principles to solve classification problems with a two-layer network. These mathematical algorithms or proposed networks are able to diagnose single, double, triple, and multiple switching faults over different iterations representing range of frequencies. First, the fault detection and classification problems are formulated as neural network-based classification problems and the neural network design process is clearly described. Then, neural networks are trained over …


Development Of A Sensing System For Underground Optic Fiber Cable Conduit Mapping, Sherif Bakr Jan 2019

Development Of A Sensing System For Underground Optic Fiber Cable Conduit Mapping, Sherif Bakr

All Graduate Theses, Dissertations, and Other Capstone Projects

The motivation of this research is to obtain an accurate three-dimensional (3D) layout of an underground conduit, which may be beneficial to optic fiber cable installers and engineers. A newly designed algorithm for 3D position tracking with the help of an inertial sensor and an encoder has been developed. Two types of representations (Euler angle and Quaternion) for orientation and rotation are also introduced, followed by several data pre-processing procedures. A sensing fusion method is utilized to overcome the accumulated errors introduced by the sensor drifting. Considering the application of 3D underground duct mapping in this research, a sensing system …


A Statistical Analysis And Machine Learning Of Genomic Data, Jongyun Jung Jan 2019

A Statistical Analysis And Machine Learning Of Genomic Data, Jongyun Jung

All Graduate Theses, Dissertations, and Other Capstone Projects

Machine learning enables a computer to learn a relationship between two assumingly related types of information. One type of information could thus be used to predict any lack of informaion in the other using the learned relationship. During the last decades, it has become cheaper to collect biological information, which has resulted in increasingly large amounts of data. Biological information such as DNA is currently analyzed by a variety of tools. Although machine learning has already been used in various projects, a flexible tool for analyzing generic biological challenges has not yet been made. The recent advancements in the DNA …


Cleaning Up Minnesota's Archeological Record With Maid: The Minnesota Archeological Integrated Database, Andrew Allen Brown Jan 2016

Cleaning Up Minnesota's Archeological Record With Maid: The Minnesota Archeological Integrated Database, Andrew Allen Brown

All Graduate Theses, Dissertations, and Other Capstone Projects

Minnesota archeologists face many difficulties in conducting archeological research and managing the state's cultural resources such as a lack of standardized data formats and field/lab procedures, a lack of a centralized data repository, and insufficient existing databases. The purpose of this thesis is to build the foundation for a database system that addresses these difficulties along with being efficient and effective for entering, managing, and analyzing archeological data produced in the field and in the lab. The Minnesota Archeological Integrated Database is being built to be a long-lasting, constantly evolving system to be used by archeologists and cultural resource managers …


Study Of Touch Gesture Performance By Four And Five Year-Old Children: Point-And-Touch, Drag-And-Drop, Zoom-In And Zoom-Out, And Rotate, Zainab Hamza Jan 2014

Study Of Touch Gesture Performance By Four And Five Year-Old Children: Point-And-Touch, Drag-And-Drop, Zoom-In And Zoom-Out, And Rotate, Zainab Hamza

All Graduate Theses, Dissertations, and Other Capstone Projects

Past research has focused on children's interaction with computers through mouse clicks, and mouse research studies focused on point-and-click and drag-and-drop. However, More research is necessary in regard to children's ability to perform touch gestures such as point-and-touch, drag-and-drop, zoom-in and zoom-out, and rotate. Furthermore, research should consider specific gestures such as zoom-in and zoom-out, and rotate tasks for young children. The aim of this thesis is to study the ability of 4 and 5 year-old children to interact with touch devices and perform tasks such as: point-and-touch, drag-and-drop, zoom-in and zoom-out, and rotate. This thesis tests an iPad application …


Technology Initiative Assessment Through Acceptance And Satisfaction: A Case Study, Virginia Otto Jan 2014

Technology Initiative Assessment Through Acceptance And Satisfaction: A Case Study, Virginia Otto

All Graduate Theses, Dissertations, and Other Capstone Projects

This case study examines a University-wide tablet program to assess the primary users’ (students) acceptance and satisfaction of the implemented technology. Technology Acceptance Model (TAM) and user satisfaction research acted as the theoretical foundation that directed how to assess students’ attitudes and beliefs toward this newly adopted technology. Wixom & Todd’s (2005) Integrated Model of User Satisfaction and Technology Acceptance, served as the conceptual model to examine how students’ acceptance and satisfaction of the tablet related. Online surveys were distributed to examine if perceived usefulness and ease of use can predict user satisfaction. Multiple regression tests found that the combination …


An Exploratory Study Of A User's Facebook Security And Privacy Settings, Brandon Charles Hoffmann Jan 2012

An Exploratory Study Of A User's Facebook Security And Privacy Settings, Brandon Charles Hoffmann

All Graduate Theses, Dissertations, and Other Capstone Projects

There are many potential security risks with social networking sites and the individuals who use them. These sites have been adopted by people of all ages worldwide, empowering new opportunities for the presentation of the self-learning, construction of a wide circle of relationships, and the management of privacy and intimacy. This study analyses the effect of social networking security practices, more specifically Facebook and its security and privacy settings. We identify four hypotheses: The more important Facebook users believe security is an important factor in choosing a social network, the more often they will change their security settings, the more …


Comparing Ai Archetypes And Hybrids Using Blackjack, Robert Edward Noonan Jan 2012

Comparing Ai Archetypes And Hybrids Using Blackjack, Robert Edward Noonan

All Graduate Theses, Dissertations, and Other Capstone Projects

The discipline of artificial intelligence (AI) is a diverse field, with a vast variety of philosophies and implementations to consider. This work attempts to compare several of these paradigms as well as their variations and hybrids, using the card game of blackjack as the field of competition. This is done with an automated blackjack emulator, written in Java, which accepts computer-controlled players of various AI philosophies and their variants, training them and finally pitting them against each other in a series of tournaments with customizable rule sets. In order to avoid bias towards any particular implementation, the system treats each …


A Web Based Fuzzy Data Mining Using Combs Inference Method And Decision Predictor, Shajia Akhter Sharmin Jan 2011

A Web Based Fuzzy Data Mining Using Combs Inference Method And Decision Predictor, Shajia Akhter Sharmin

All Graduate Theses, Dissertations, and Other Capstone Projects

Fuzzy logic has become a very popular method of reasoning a system with approximate input system instead of a precise one. When qualitative variables are used to determine the decisions then we have to create some specific functions where the membership values of the input can be any number between 0 to 1 instead of 1 or 0 which is used in binary logic. When number of input attribute increases it the combinatorial rules increases exponentially, and diminishes performance of the system. The problem is generally known as “combinatorial rule explosion”. The Information Technology Department of Minnesota State University, Mankato …


Housing With Support Marketing Study Tool, Gary M. Travis Jan 2011

Housing With Support Marketing Study Tool, Gary M. Travis

All Graduate Theses, Dissertations, and Other Capstone Projects

Housing for persons with serious mental illness (SMI) that is permanent, affordable, and supportive is very limited because the availability of these resources is inadequate and subject to significant demand by persons that are disabled or on a limited income. The limited access to housing for persons with SMI is contributing to homelessness and Minnesota has seen a steady rise since 1994 in the rate and number of people that are homeless and coping with mental illness (Wilder Research, 2010a). While some of the impact of disability, homelessness, and limited affordable housing access is known, what remains uncertain is a …


Determining A Patient Recovery From A Total Knee Replacement Using Fuzzy Logic And Active Databases, Robert Azarbod Jan 2011

Determining A Patient Recovery From A Total Knee Replacement Using Fuzzy Logic And Active Databases, Robert Azarbod

All Graduate Theses, Dissertations, and Other Capstone Projects

The purpose of the knowledge-based system is to predict the rehabilitation timeline of a patient in physical therapy for a total knee replacement. All patients have various attributes that contribute to their rehabilitation rate such as: weight, gender, smoking habit, medications, physical ability, or other medical problems. A combination of any one or several of these attributes will affect the recovery process. The proposed FRTP (Fuzzy Rehabilitation Timeline Predictor) is a fuzzy data mining model that can predict the recovery length of a patient in physical therapy for a total knee replacement and provide feedback to experts for revision of …


An Exploration Of Multi-Agent Learning Within The Game Of Sheephead, Brady Brau Jan 2011

An Exploration Of Multi-Agent Learning Within The Game Of Sheephead, Brady Brau

All Graduate Theses, Dissertations, and Other Capstone Projects

In this paper, we examine a machine learning technique presented by Ishii et al. used to allow for learning in a multi-agent environment and apply an adaptation of this learning technique to the card game Sheephead. We then evaluate the effectiveness of our adaptation by running simulations against rule-based opponents. Multi-agent learning presents several layers of complexity on top of a single-agent learning in a stationary environment. This added complexity and increased state space is just beginning to be addressed by researchers. We utilize techniques used by Ishii et al. to facilitate this multi-agent learning. We model the environment of …