Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (7)
- California Polytechnic State University, San Luis Obispo (5)
- City University of New York (CUNY) (5)
- Utah State University (4)
- Western University (4)
-
- California State University, San Bernardino (3)
- University of Tennessee, Knoxville (3)
- Claremont Colleges (2)
- Colby College (2)
- Michigan Technological University (2)
- The University of Akron (2)
- Virginia Commonwealth University (2)
- Air Force Institute of Technology (1)
- Bellarmine University (1)
- Bowling Green State University (1)
- Central Washington University (1)
- Chapman University (1)
- Georgia Southern University (1)
- La Salle University (1)
- Louisiana Tech University (1)
- Regis University (1)
- The University of Southern Mississippi (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- University of Louisville (1)
- University of Montana (1)
- University of New Mexico (1)
- University of Puget Sound (1)
- University of South Florida (1)
- World Maritime University (1)
- Keyword
-
- Bioinformatics (2)
- Data Visualization (2)
- Hidden Markov Model (2)
- IOS (2)
- "hot hand" (1)
-
- 3D Printing (1)
- 3D model (1)
- 62-07 (1)
- 62-09 (1)
- 68-04 (1)
- Additive Manufacturing (1)
- Alternative reading frames (1)
- Android (1)
- App (1)
- Applied math (1)
- Applied sciences (1)
- Artificial Intelligence (1)
- Attractors (1)
- Auction systems (1)
- Augmented Reality (1)
- Auto awesome (1)
- BM3D (1)
- Backprojection (1)
- Barrier (1)
- Basketball (1)
- Bayesian Network (1)
- Bayesian Statistics (1)
- Bicluster Analysis (1)
- Big Data (1)
- Big data (1)
- Publication
-
- Master's Projects (7)
- Dissertations, Theses, and Capstone Projects (5)
- Electronic Thesis and Dissertation Repository (4)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (3)
- Computer Engineering (3)
-
- Electronic Theses and Dissertations (3)
- Electronic Theses, Projects, and Dissertations (3)
- Theses and Dissertations (3)
- Dissertations, Master's Theses and Master's Reports (2)
- Honors Theses (2)
- Masters Theses (2)
- Williams Honors College, Honors Research Projects (2)
- All Graduate Projects (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- CMC Senior Theses (1)
- Chancellor’s Honors Program Projects (1)
- Computational and Data Sciences Theses (1)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Computer Science and Software Engineering (1)
- Dissertations (1)
- Doctoral Dissertations (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- HMC Senior Theses (1)
- Honors Program Theses (1)
- Honors Projects (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Master's Theses (1)
- Mathematics and Computer Science Capstones (1)
- Regis University Student Publications (comprehensive collection) (1)
Articles 1 - 30 of 59
Full-Text Articles in Physical Sciences and Mathematics
Kodysynth, Ryan Kody
Kodysynth, Ryan Kody
Williams Honors College, Honors Research Projects
KodySynth is a VST digital synthesizer that can be loaded into any digital audio workstation such as FL Studio, Ableton, or Garageband. The program was made using the JUCE library which helped with streamlining the process and making it easier to create clean and intuitive looking graphics. The project also needs the Maximilian Library of sounds to create the sound waves that listeners will hear when playing the synthesizer. Users will also be able to plug in a MIDI keyboard to play KodySynth. The functionalities include a choice of 5 oscillator wave types, as well as an attack, decay, sustain, …
The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley
The Official Rulebook For Choice In Video Games: An Examination Of Choice In Modern Narrative Games, Tyler Paulley
Undergraduate Theses
Film, drama, and novels are each capable of telling stories in a specialized way. This thesis makes the claim that video games are the newest means of storytelling and that they can tell stories in unique and engaging ways by using choice. The first goal of this thesis is to determine how and why choice is being used by game developers by examining several modern narrative games. After this examination, it is determined that the increase of choice-driven and narrative games have had an impact on the expectations of players, the goals of video games, and on game culture itself. …
Statistical Analysis Of Momentum In Basketball, Mackenzi Stump
Statistical Analysis Of Momentum In Basketball, Mackenzi Stump
Honors Projects
The “hot hand” in sports has been debated for as long as sports have been around. The debate involves whether streaks and slumps in sports are true phenomena or just simply perceptions in the mind of the human viewer. This statistical analysis of momentum in basketball analyzes the distribution of time between scoring events for the BGSU Women’s Basketball team from 2011-2017. We discuss how the distribution of time between scoring events changes with normal game factors such as location of the game, game outcome, and several other factors. If scoring events during a game were always randomly distributed, or …
Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour
Self-Assembly Of Tiles: Theoretical Models, The Power Of Signals, And Local Computing, Amirhossein Simjour
Electronic Thesis and Dissertation Repository
DNA-based self-assembly is an autonomous process whereby a disordered system of DNA sequences forms an organized structure or pattern as a consequence of Watson-Crick complementarity of DNA sequences, without external direction.
Here, we propose self-assembly (SA) hypergraph automata as an automata-theoretic model for patterned self-assembly. We investigate the computational power of SA-hypergraph automata and show that for every recognizable picture language, there exists an SA-hypergraph automaton that accepts this language. Conversely, we prove that for any restricted SA-hypergraph automaton, there exists a Wang Tile System, a model for recognizable picture languages, that accepts the same language.
Moreover, we investigate the …
3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland
3d Printing Concrete Structures And Verifying Integrity Of Their G-Code Instructions: Border Wall A Case Study, Jason Breland
Dissertations
Thanks to advances in Additive Manufacturing (AM) technology and continued research by academics and entrepreneurs alike, the ability to “3d print” permanent concrete structures such as homes or offices is now a reality. Generally, AM is the process that allows for a 3d model of an object to be converted into hardware instructions to generate that object layer by layer using a malleable medium such as a plastic. Specifically, large scale concrete AM can now generate a structure, such as a building, layer by layer more quickly and efficiently than traditional construction methods [6, 39]. This innovative, semi-autonomous process promises …
Web Application For Graduate Course Advising System, Sanjay Karrolla
Web Application For Graduate Course Advising System, Sanjay Karrolla
Electronic Theses, Projects, and Dissertations
The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.
Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah
Spatiotemporal Subspace Feature Tracking By Mining Discriminatory Characteristics, Richard D. Appiah
Doctoral Dissertations
Recent advancements in data collection technologies have made it possible to collect heterogeneous data at complex levels of abstraction, and at an alarming pace and volume. Data mining, and most recently data science seek to discover hidden patterns and insights from these data by employing a variety of knowledge discovery techniques. At the core of these techniques is the selection and use of features, variables or properties upon which the data were acquired to facilitate effective data modeling. Selecting relevant features in data modeling is critical to ensure an overall model accuracy and optimal predictive performance of future effects. The …
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Comparing And Improving Facial Recognition Method, Brandon Luis Sierra
Electronic Theses, Projects, and Dissertations
Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine …
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Dissertations, Theses, and Capstone Projects
Group exponentiation is an important operation used in many cryptographic protocols, specifically public-key cryptosystems such as RSA, Diffie Hellman, ElGamal, etc. To expand the applicability of group exponentiation to computationally weaker devices, procedures were established by which to delegate this operation from a computationally weaker client to a computationally stronger server. However, solving this problem with a single, possibly malicious, server, has remained open since a formal cryptographic model was introduced by Hohenberger and Lysyanskaya in 2005. Several later attempts either failed to achieve privacy or only achieved constant security probability.
In this dissertation, we study and solve this problem …
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Dissertations, Theses, and Capstone Projects
Organisms are understood to be complex adaptive systems that evolved to thrive in hostile environments. Though widely studied, the phenomena of organism development and growth, and their relationship to organism dynamics is not well understood. Indeed, the large number of components, their interconnectivity, and complex system interactions all obscure our ability to see, describe, and understand the functioning of biological organisms.
Here we take a synthetic and computational approach to the problem, abstracting the organism as a cellular automaton. Such systems are discrete digital models of real-world environments, making them more accessible and easier to study then their physical world …
Research On Improving Navigation Safety Based On Big Data And Cloud Computing Technology For Qiongzhou Strait, Rui Wang
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury
Computer Vision Problems In 3d Plant Phenotyping, Ayan Chaudhury
Electronic Thesis and Dissertation Repository
In recent years, there has been significant progress in Computer Vision based plant phenotyping (quantitative analysis of biological properties of plants) technologies. Traditional methods of plant phenotyping are destructive, manual and error prone. Due to non-invasiveness and non-contact properties as well as increased accuracy, imaging techniques are becoming state-of-the-art in plant phenotyping. Among several parameters of plant phenotyping, growth analysis is very important for biological inference. Automating the growth analysis can result in accelerating the throughput in crop production. This thesis contributes to the automation of plant growth analysis.
First, we present a novel system for automated and non-invasive/non-contact plant …
Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore
Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
Let p be a prime positive integer and let α be a positive integer greater than 1. A method is given to reduce the problem of finding a nontrivial factorization of α to the problem of finding a solution to a system of modulo p polynomial congruences where each variable in the system is constrained to the set {0,...,p − 1}. In the case that p = 2 it is shown that each polynomial in the system can be represented by an ordered binary decision diagram with size less than 20.25log2(α)3 + 16.5log2(α)2 + …
A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner
A Gpu Implementation Of Distance-Driven Computed Tomography, Ryan D. Wagner
Masters Theses
Computed tomography (CT) is used to produce cross-sectional images of an object via noninvasive X-ray scanning of the object. These images have a wide range of uses including threat detection in checked baggage at airports. The projection data collected by the CT scanner must be reconstructed before the image may be viewed. In comparison to filtered backprojection methods of reconstruction, iterative reconstruction algorithms have been shown to increase overall image quality by incorporating a more complete model of the underlying physics. Unfortunately, iterative algorithms are generally too slow to meet the high throughput demands of this application. It is therefore …
Accurate And Justifiable : New Algorithms For Explainable Recommendations., Behnoush Abdollahi
Accurate And Justifiable : New Algorithms For Explainable Recommendations., Behnoush Abdollahi
Electronic Theses and Dissertations
Websites and online services thrive with large amounts of online information, products, and choices, that are available but exceedingly difficult to find and discover. This has prompted two major paradigms to help sift through information: information retrieval and recommender systems. The broad family of information retrieval techniques has given rise to the modern search engines which return relevant results, following a user's explicit query. The broad family of recommender systems, on the other hand, works in a more subtle manner, and do not require an explicit query to provide relevant results. Collaborative Filtering (CF) recommender systems are based on algorithms …
Visualization And 3d Printing Of A 3d Solar Tracker Model Using Mayavi And Pov-Ray, Aditya Mehra
Visualization And 3d Printing Of A 3d Solar Tracker Model Using Mayavi And Pov-Ray, Aditya Mehra
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
In this work, we have created a realistic model of a solar tracker using Mayavi: 3D scientific data visualization and plotting in Python, Enthought Canopy:a comprehensive Python analysis environment and Persistence of Vision Ray Tracer, or POV-Ray, a ray tracing program which generates photo-realistic images from a text-based scene description, a model of the solar tracker was also 3D printed.
Database Auto Awesome: Enhancing Database-Centric Web Applications Through Informed Code Generation, Jonathan Adams
Database Auto Awesome: Enhancing Database-Centric Web Applications Through Informed Code Generation, Jonathan Adams
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Database Auto Awesome is an approach to enhancing web applications comprised of forms used to interact with stored information. It was inspired by Google's Auto Awesome tool, which provides automatic enhancements for photos. Database Auto Awesome aims to automatically or semi-automatically provide improvements to an application by expanding the functionality of the application and improving the existing code.
This thesis describes a tool that gathers information from the application and provides details on how the parts of the application work together. This information provides the details necessary to generate new portions of an application.
These enhancements are directed by the …
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
(Dis)Enchanted: (Re)Constructing Love And Creating Community In The, Shannon A. Suddeth
(Dis)Enchanted: (Re)Constructing Love And Creating Community In The, Shannon A. Suddeth
USF Tampa Graduate Theses and Dissertations
This thesis examines a queer fan community for the television show Once Upon a Time (OUAT) that utilizes the social networking site Tumblr as their primary base of fan activity. The Swan Queen fan community is comprised of individuals that collectively support and celebrate a non-canon romantic relationship between two of the female lead characters of the show rather than the canonic, heterocentric relationships that occur between the two women and their respective male love interests. I answer two research questions in this study: First, how are members of the Swan Queen fan community developing counter narratives of …
Travel Mode Identification With Smartphone Sensors, Xing Su
Travel Mode Identification With Smartphone Sensors, Xing Su
Dissertations, Theses, and Capstone Projects
Personal trips in a modern urban society typically involve multiple travel modes. Recognizing a traveller's transportation mode is not only critical to personal context-awareness in related applications, but also essential to urban traffic operations, transportation planning, and facility design. While the state of the art in travel mode recognition mainly relies on large-scale infrastructure-based fixed sensors or on individuals' GPS devices, the emergence of the smartphone provides a promising alternative with its ever-growing computing, networking, and sensing powers. In this thesis, we propose new algorithms for travel mode identification using smartphone sensors. The prototype system is built upon the latest …
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto
Computer Engineering
The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.
Procedurally Generating Genetic Keys, Adam A. Levasseur
Procedurally Generating Genetic Keys, Adam A. Levasseur
Computer Engineering
This project presents a method for creating multi-part models based on input keys to generate new, variant models via genetic algorithms. By utilizing 3D models as modular parts, this method allows for the generation of a unique, compound model based on one or multiple input keys. This paper explains the process of creating and testing such generation styles using simple geometry to create more complex, compound models.
Automated Grading Of Handwritten Numerical Answers, Mark T. Brown
Automated Grading Of Handwritten Numerical Answers, Mark T. Brown
Computer Engineering
The objective of this project was to automate the process of grading handwritten numerical answers in a classroom setting. The final program accepts a scanned answer sheet completed by the student along with a description of the correct answers and produces a detailed report describing the confidence of correctness for each answer.
Computer vision techniques are used to automatically locate the locations of the answers in the scan. Each digit is then passed through a convolutional neural network to predict what was written by the student. The individual probabilities of each digit produced by the network are aggregated into a …
Custom T-Shirt Designs, Ranjan Khadka
Custom T-Shirt Designs, Ranjan Khadka
Electronic Theses, Projects, and Dissertations
Custom T-shirt Designs is a web-based application. The purpose of this project is to provide a website that would allow customers to be able to customize T-shirt and place an order of custom T-shirt. Customers can sign up, sign in, select T-shirt color, add text, choose Font, choose Font color, upload an image, apply filters to images, transform text or images, choose T-shirt size and save designs for future references. Customers would be able to add the design to a cart, manage cart and checkout with their credit card to purchase for the order and view their previous orders. The …
Predicting Pancreatic Cancer Using Support Vector Machine, Akshay Bodkhe
Predicting Pancreatic Cancer Using Support Vector Machine, Akshay Bodkhe
Master's Projects
This report presents an approach to predict pancreatic cancer using Support Vector Machine Classification algorithm. The research objective of this project it to predict pancreatic cancer on just genomic, just clinical and combination of genomic and clinical data. We have used real genomic data having 22,763 samples and 154 features per sample. We have also created Synthetic Clinical data having 400 samples and 7 features per sample in order to predict accuracy of just clinical data. To validate the hypothesis, we have combined synthetic clinical data with subset of features from real genomic data. In our results, we observed that …
Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, Abhilash Goyal
Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, Abhilash Goyal
Master's Projects
The objective of this project is to propose and develop the path-finding methodology for the visually impaired patients. The proposed novel methodology is based on image-processing and it is targeted for the patients who are not completely blind. The major problem faced by visually impaired patients is to walk independently. It is mainly because these patients can not see obstacles in front of them due to the degradation in their eye sight. Degradation in the eye-sight is mainly because either the light doesn't focus on the retina properly or due to the malfunction of the photoreceptor cells on the retina, …
Web - Based Office Market, Manodivya Kathiravan
Web - Based Office Market, Manodivya Kathiravan
Master's Projects
People who work in an office often have different pools of resources that they want to exchange. They want to trade their resources/work(seller) with a person who wants that particular resource(buyer) and in return get another resource the buyer offers. These kind of exchanges are often called Barter-exchanges where an item is traded for another item without the involvement of actual money. An exchange is set to be complete when there is a match between an available item and a desired item. This exchange is called direct exchange. When an item desired by one user is made available through a …
Evolvability: What Is It And How Do We Get It?, Matthew Moreno
Evolvability: What Is It And How Do We Get It?, Matthew Moreno
Honors Program Theses
Biological organisms exhibit spectacular adaptation to their environments. However, another marvel of biology lurks behind the adaptive traits that organisms exhibit over the course of their lifespans: it is hypothesized that biological organisms also exhibit adaptation to the evolutionary process itself. That is, biological organisms are thought to possess traits that facilitate evolution. The term evolvability was coined to describe this type of adaptation. The question of evolvability has special practical relevance to computer science researchers engaged in longstanding efforts to harness evolution as an algorithm for automated design. It is hoped that a more nuanced understanding of biological evolution …
Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, Tapomay Dey
Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, Tapomay Dey
Master's Projects
Proteins are building blocks of the bodies of eukaryotes, and the process of synthesizing proteins from DNA is crucial for the good health of an organism [13]. However, some mutations in the DNA may disrupt the selection of 5’ or 3’ splice sites by a spliceosome. An important research question is whether the disruptions have a stochastic relation to the position of nucleotides in the vicinity of the known authentic and cryptic splice sites. This can be achieved by proving that the authentic and cryptic splice sites are intrinsically different. However, the behavior of the spliceosome is not accurately known. …
Computational Analysis Of Cryptic Splice Sites, Remya Mohanan
Computational Analysis Of Cryptic Splice Sites, Remya Mohanan
Master's Projects
DNA in the nucleus of all eukaryotes is transcribed into mRNA where it is then translated into proteins. The DNA which is transcribed into mRNA is composed of coding and non-coding regions called exons and introns, respectively. It undergoes a post-trancriptional process called splicing where the introns or the non-coding regions are removed from the pre-mRNA to give the mature mRNA. Splicing of pre-mRNAs at 5 ́ and 3ˊ ends is a crucial step in the gene expression pathway. The mis-splicing by the spliceosome at different sites known as cryptic splice sites is caused by mutations which will affect the …