Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht Dec 2022

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht

Theses/Capstones/Creative Projects

Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.


Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger May 2022

Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger

Undergraduate Honors Theses

European Paper Wasps (Polistes dominula) are social insects that build round, symmetrical nests. Current models indicate that these wasps develop colonies by following simple heuristics based on nest stimuli. Computer simulations can model wasp behavior to imitate natural nest building. This research investigated various building heuristics through a novel Markov-based simulation. The simulation used a hexagonal grid to build cells based on the building rule supplied to the agent. Nest data was compared with natural data and through visual inspection. Larger nests were found to be less compact for the rules simulated.


Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim May 2022

Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim

All Theses

As the artificial intelligence (AI) technique improves, voice assistant (smart speaker) such as Amazon Alexa and Google Assistant are quickly, surely permeating into people's daily lives. With its powerful and convenient benefits and the circumstances that people started to stay at their home longer due to the pandemic, reliance on smart speakers has increased rapidly. But at the same time, concerns of security on smart speakers have increased.

In this thesis, we conducted an online user survey of smart speaker users with five different perspectives – 1) Users’ engagement with privacy policy; 2) Awareness of different policy requirements defined by …


Cook-It!: A Web Application For Easy Meal Planning, Carol Juneau Apr 2022

Cook-It!: A Web Application For Easy Meal Planning, Carol Juneau

Senior Theses

Cook-it! is a web application for meal planning based on the Django framework and deployed on the Heroku platform. This application has an intuitive interface to make it easy to use. The project has been developed over two semesters, roughly separated into a planning phase and an implementation phase. Cook-it! incorporates a robust feature set and an attractive design. Its core purpose is to make it easy for users to plan meals, interact with other users, and keep track of user information such as a grocery list.


Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr. Jan 2022

Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.

Doctoral Theses

Quantum key distribution (QKD) has raised some promise for more secured communication than its classical counterpart. It allows the legitimate parties to detect eavesdropping which introduces error in the channel. If disturbed, there are ways to distill a secure key within some threshold error-rate. The amount of information gained by an attacker is generally quantified by (Shannon) mutual information. Knowing the maximum amount of information that an intruder can gain is important for post-processing purposes, and we mainly focus on that side in the thesis. Renyi information is also useful especially when post-processing is considered. The scope of this thesis …


Utilization Of Virtual Reality For General Education Purposes, Amit Lal Jan 2022

Utilization Of Virtual Reality For General Education Purposes, Amit Lal

University of the Pacific Theses and Dissertations

The use of Virtual Reality (VR) in a variety of professional, military, governmental, and educational fields has continued to expand over the past several decades, and the recent Covid-19 pandemic has brought attention to this field. This study surveys 154 college students over 23 questions that include various demographics that can be used to look for discriminators, multiple-choice VR-related questions, as well as a few free-form questions about use of VR in learning environments. The students’ experience with, interest in, and thoughts on how to best use VR vary considerably. The Covid-19 pandemic is found to have limited impact thus …