Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

Theses/Dissertations

2018

Institution
Keyword
Publication

Articles 31 - 50 of 50

Full-Text Articles in Physical Sciences and Mathematics

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel Apr 2018

Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel

LSU Master's Theses

A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …


Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major Apr 2018

Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major

Theses

Making use of three historic philosophical thought experiments, this paper blends psychological perspectives with philosophical reasoning to show how social media is corrupting our perception of reality, the result of which is ultimately detrimental to society as a whole. This is accomplished by first using Plato’s “Allegory of the Cave” to analyze and discuss the ways in which social media is limiting humanity’s access to real knowledge. Next, Michel Foucault’s analysis of punishment in its social context, Discipline and Punish, is used to discuss the ways in which social media is adversely affecting our behavior. Finally, Robert Nozick’s “Experience …


Lee Honors College Mobile Application, James Ward Apr 2018

Lee Honors College Mobile Application, James Ward

Honors Theses

In the spring of 2018 three Computer Science students Benjamin Campbell, James Ward, and Peter Shutt created a mobile application. This app was developed over the span of two semesters for their senior design project; a capstone to their degrees.

Their client, The Lee Honors College at Western Michigan University --referred to as LHC and WMU respectively hereafter-- has a plethora of academic and social information, and a large demand for access to it. This information includes building hours, contact information, health resources, a LHC specific course catalog, social media posts, event descriptions, and much more. The volume of information, …


Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu Apr 2018

Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu

Electronic Thesis and Dissertation Repository

ChIP-seq experiments can identify the genome-wide binding site motifs of a transcription factor (TF) and determine its sequence specificity. Multiple algorithms were developed to derive TF binding site (TFBS) motifs from ChIP-seq data, including the entropy minimization-based Bipad that can derive both contiguous and bipartite motifs. Prior studies applying these algorithms to ChIP-seq data only analyzed a small number of top peaks with the highest signal strengths, biasing their resultant position weight matrices (PWMs) towards consensus-like, strong binding sites; nor did they derive bipartite motifs, disabling the accurate modelling of binding behavior of dimeric TFs.

This thesis presents a novel …


An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi Apr 2018

An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi

Computer Science

In this paper, we discuss the use of virtual reality as a tool for actors during the rehearsal process and assess methods to implement and continue this research in future works. During the rehearsal process, the scenic design is normally introduced to actors close to the end of rehearsals. In introducing a virtual reality environment to train actors, we hoped to help them develop a better understanding of the design at an earlier point in the process. Our investigative pilot study involves two productions in a university theatre, where we render the scenic design of the production for which our …


Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman Apr 2018

Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman

Computer Science

The Rollins College Archives are a treasure trove of historic resources relating to the college’s history, and they are often underutilized or overlooked by both the student body and the surrounding community. In particular, historic resources are all too often excluded from work in computer science and related fields. This project aims to bridge that gap by bringing the two areas together. To that end, the goal of this project is to merge past and present by blending historic photos with input of a present day scene in order to reveal changes and juxtapositions of the same scene across eras. …


Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems Apr 2018

Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems

Computer Science and Engineering Theses and Dissertations

Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security …


Detecting Speakers In Video Footage, Michael Williams Apr 2018

Detecting Speakers In Video Footage, Michael Williams

Master's Theses

Facial recognition is a powerful tool for identifying people visually. Yet, when the end goal is more specific than merely identifying the person in a picture problems can arise. Speaker identification is one such task which expects more predictive power out of a facial recognition system than can be provided on its own. Speaker identification is the task of identifying who is speaking in video not simply who is present in the video. This extra requirement introduces numerous false positives into the facial recognition system largely due to one main scenario. The person speaking is not on camera. This paper …


A Capability-Centric Approach To Cyber Risk Assessment And Mitigation, Thomas H. Llansó Mar 2018

A Capability-Centric Approach To Cyber Risk Assessment And Mitigation, Thomas H. Llansó

Masters Theses & Doctoral Dissertations

Cyber-enabled systems are increasingly ubiquitous and interconnected, showing up in traditional enterprise settings as well as increasingly diverse contexts, including critical infrastructure, avionics, cars, smartphones, home automation, and medical devices. Meanwhile, the impact of cyber attacks against these systems on our missions, business objectives, and personal lives has never been greater. Despite these stakes, the analysis of cyber risk and mitigations to that risk tends to be a subjective, labor-intensive, and costly endeavor, with results that can be as suspect as they are perishable. We identified the following gaps in those risk results: concerns for (1) their repeatability/reproducibility, (2) the …


Relating Justification Logic Modality And Type Theory In Curry–Howard Fashion, Konstantinos Pouliasis Feb 2018

Relating Justification Logic Modality And Type Theory In Curry–Howard Fashion, Konstantinos Pouliasis

Dissertations, Theses, and Capstone Projects

This dissertation is a work in the intersection of Justification Logic and Curry--Howard Isomorphism. Justification logic is an umbrella of modal logics of knowledge with explicit evidence. Justification logics have been used to tackle traditional problems in proof theory (in relation to Godel's provability) and philosophy (Gettier examples, Russel's barn paradox). The Curry--Howard Isomorphism or proofs-as-programs is an understanding of logic that places logical studies in conjunction with type theory and -- in current developments -- category theory. The point being that understanding a system as a logic, a typed calculus and, a language of a class of categories constitutes …


Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen Jan 2018

Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen

Senior Projects Spring 2018

Immersion, the state of being fully engaged in one's current operation, is a descriptor commonly used to appraise user experience in computer games and software applications. As the use of brain-computer interfaces (BCIs) begins to expand into the consumer sphere, questions arise concerning the ability of BCIs to modulate user immersion. This study employed a computer game to examine the effect of a consumer-grade BCI (the Emotiv EPOC) on immersion. In doing so, this study also explored the relationship between BCI usability and immersion levels. An experiment with twenty-seven participants showed that users were significantly more immersed when controlling the …


Glyph Based Segmentation Of Chinese Calligraphy Characters In The "Collected Characters" Stele., David A. Mcinnis Jan 2018

Glyph Based Segmentation Of Chinese Calligraphy Characters In The "Collected Characters" Stele., David A. Mcinnis

EWU Masters Thesis Collection

Text character segmentation is the process of detecting the bounding box position of individual characters within a written text document image. The character segmentation problem remains extremely difficult for ancient Chinese calligraphy documents. This paper examines a glyph-based segmentation technique for segmenting Chinese Calligraphy characters in the "Collected Characters". The glyph-based character segmentation pipeline utilizes a combination of well-understood image processing techniques in a novel pipeline which is able to detect Chinese calligraphy characters from ink-blots with a good reliability.


A Practical And Efficient Algorithm For The K-Mismatch Shortest Unique Substring Finding Problem, Daniel Robert Allen Jan 2018

A Practical And Efficient Algorithm For The K-Mismatch Shortest Unique Substring Finding Problem, Daniel Robert Allen

EWU Masters Thesis Collection

This thesis revisits the k-mismatch shortest unique substring (SUS) finding problem and demonstrates that a technique recently presented in the context of solving the k-mismatch average common substring problem can be adapted and combined with parts of the existing solution, resulting in a new algorithm which has expected time complexity of O(n logk n), while maintaining a practical space complexity at O(kn), where n is the string length. When k > 0, which is the hard case, the new proposal significantly improves the any-case O(n2) time complexity of the prior best method for k-mismatch SUS finding. Experimental study …


Novel Support Vector Machines For Diverse Learning Paradigms, Gabriella A. Melki Jan 2018

Novel Support Vector Machines For Diverse Learning Paradigms, Gabriella A. Melki

Theses and Dissertations

This dissertation introduces novel support vector machines (SVM) for the following traditional and non-traditional learning paradigms: Online classification, Multi-Target Regression, Multiple-Instance classification, and Data Stream classification.

Three multi-target support vector regression (SVR) models are first presented. The first involves building independent, single-target SVR models for each target. The second builds an ensemble of randomly chained models using the first single-target method as a base model. The third calculates the targets' correlations and forms a maximum correlation chain, which is used to build a single chained SVR model, improving the model's prediction performance, while reducing computational complexity.

Under the multi-instance paradigm, …


Old English Character Recognition Using Neural Networks, Sattajit Sutradhar Jan 2018

Old English Character Recognition Using Neural Networks, Sattajit Sutradhar

Electronic Theses and Dissertations

Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …


Sports Analytics With Computer Vision, Colby T. Jeffries Jan 2018

Sports Analytics With Computer Vision, Colby T. Jeffries

Senior Independent Study Theses

Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …


Holistic Model Of Website Design Elements That Influence Trustworthiness, Christopher Travis Lavalley Jan 2018

Holistic Model Of Website Design Elements That Influence Trustworthiness, Christopher Travis Lavalley

UNF Graduate Theses and Dissertations

Trustworthiness of a website relies foremost on a good first impression which includes the visitor’s perception of the user interface. The focus of this research is to investigate the effects of website design elements on user perception of trustworthiness of a site and provide a set of guidelines for website designers.

The research design is based on Yosef Jabardeen’s (2009) “conceptual framework analysis”. In this research paper, a holistic model is developed to depict the relationships among website design elements and trustworthiness. The model was tested, validated and updated using the results of the repertory grid technique, a process that …


Comparing The Usage Of React Native And Ionic, Sam Borick Jan 2018

Comparing The Usage Of React Native And Ionic, Sam Borick

Williams Honors College, Honors Research Projects

This project will compare two popular programming frameworks for building mobile applications. These frameworks are called ‘cross-platform frameworks’ as they can develop applications on multiple platforms. The scope of this project is to understand the structural reasons for the differences in these frameworks. While this project does speculate on reasons for choosing either framework, this project does not attempt to make a hard recommendation.

In this project, I built two applications, as similar as possible, in React Native and Ionic. I found that there were differences in the goals of these frameworks, lending each of the two better to different …


Grocery List: An Android Application, Daniel Mcfadden Jan 2018

Grocery List: An Android Application, Daniel Mcfadden

Williams Honors College, Honors Research Projects

Grocery List is an android application that allows the user to save a grocery list to their device for reference at a store as opposed to the traditional pen and paper. Grocery List was created in Android developer, and uses Java and XML to run the application and display different layouts.

Grocery Lists' main purpose is to be an easy to use, flexible listing application that can serve multiple different listing uses such as grocery lists, to do tasks, and even just some simple reminders.


The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman Jan 2018

The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman

Senior Projects Spring 2018

Senior Project submitted to The Division of Languages and Literature of Bard College.