Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (6)
- City University of New York (CUNY) (3)
- San Jose State University (3)
- Bard College (2)
- Boise State University (2)
-
- East Tennessee State University (2)
- Eastern Washington University (2)
- Georgia Southern University (2)
- Kennesaw State University (2)
- Louisiana State University (2)
- Rollins College (2)
- The University of Akron (2)
- University of Louisville (2)
- Western University (2)
- Chapman University (1)
- Dakota State University (1)
- James Madison University (1)
- La Salle University (1)
- Louisiana Tech University (1)
- Southern Methodist University (1)
- The College of Wooster (1)
- The University of Maine (1)
- University of Massachusetts Amherst (1)
- University of Missouri, St. Louis (1)
- University of New Mexico (1)
- University of New Orleans (1)
- University of North Florida (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- Western Michigan University (1)
- Keyword
-
- Machine Learning (5)
- Machine learning (5)
- Computer Science (4)
- Algorithm (2)
- Mobile (2)
-
- Neural Networks (2)
- Social Media (2)
- 360-Degree Images (1)
- Academic -- UNF -- Computing; trust; trustworthiness; website design (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Acceleration (1)
- Activity recognition (1)
- Adaboost (1)
- Alpha Values (1)
- Alternative futures analysis (1)
- Android (1)
- Anonymity networks (1)
- Arbitrage (1)
- Archives (1)
- Assistive Technology (1)
- Basketball (1)
- Bentham (1)
- Binding Sites (1)
- Blended Images (1)
- Blindness accessibility (1)
- Blocking (1)
- Bot (1)
- Bot Detection (1)
- Brain-Computer Interfaces (1)
- Case Study (1)
- Publication
-
- Electronic Theses and Dissertations (5)
- Master's Theses (5)
- Master's Projects (3)
- Boise State University Theses and Dissertations (2)
- Computer Science (2)
-
- Dissertations, Theses, and Capstone Projects (2)
- Doctoral Dissertations (2)
- EWU Masters Thesis Collection (2)
- Electronic Thesis and Dissertation Repository (2)
- LSU Master's Theses (2)
- Master of Science in Computer Science Theses (2)
- Senior Projects Spring 2018 (2)
- Williams Honors College, Honors Research Projects (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Computer Science ETDs (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Computer Science and Software Engineering (1)
- English (MA) Theses (1)
- Honors College Theses (1)
- Honors Theses (1)
- Masters Theses & Doctoral Dissertations (1)
- Mathematics and Computer Science Capstones (1)
- Senior Honors Projects, 2010-2019 (1)
- Senior Independent Study Theses (1)
- Student Theses (1)
- Theses (1)
- Theses and Dissertations (1)
- UNF Graduate Theses and Dissertations (1)
- Undergraduate Honors Theses (1)
- University of New Orleans Theses and Dissertations (1)
Articles 31 - 50 of 50
Full-Text Articles in Physical Sciences and Mathematics
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
Distributed Iterative Graph Processing Using Nosql With Data Locality, Ayam Pokhrel
LSU Master's Theses
A tremendous amount of data is generated every day from a wide range of sources such as social networks, sensors, and application logs. Among them, graph data is one type that represents valuable relationships between various entities. Analytics of large graphs has become an essential part of business processes and scientific studies because it leads to deep and meaningful insights into the related domain based on the connections between various entities. However, the optimal processing of large-scale iterative graph computations is very challenging due to the issues like fault tolerance, high memory requirement, parallelization, and scalability. Most of the contemporary …
Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major
Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major
Theses
Making use of three historic philosophical thought experiments, this paper blends psychological perspectives with philosophical reasoning to show how social media is corrupting our perception of reality, the result of which is ultimately detrimental to society as a whole. This is accomplished by first using Plato’s “Allegory of the Cave” to analyze and discuss the ways in which social media is limiting humanity’s access to real knowledge. Next, Michel Foucault’s analysis of punishment in its social context, Discipline and Punish, is used to discuss the ways in which social media is adversely affecting our behavior. Finally, Robert Nozick’s “Experience …
Lee Honors College Mobile Application, James Ward
Lee Honors College Mobile Application, James Ward
Honors Theses
In the spring of 2018 three Computer Science students Benjamin Campbell, James Ward, and Peter Shutt created a mobile application. This app was developed over the span of two semesters for their senior design project; a capstone to their degrees.
Their client, The Lee Honors College at Western Michigan University --referred to as LHC and WMU respectively hereafter-- has a plethora of academic and social information, and a large demand for access to it. This information includes building hours, contact information, health resources, a LHC specific course catalog, social media posts, event descriptions, and much more. The volume of information, …
Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu
Computational Modelling Of Human Transcriptional Regulation By An Information Theory-Based Approach, Ruipeng Lu
Electronic Thesis and Dissertation Repository
ChIP-seq experiments can identify the genome-wide binding site motifs of a transcription factor (TF) and determine its sequence specificity. Multiple algorithms were developed to derive TF binding site (TFBS) motifs from ChIP-seq data, including the entropy minimization-based Bipad that can derive both contiguous and bipartite motifs. Prior studies applying these algorithms to ChIP-seq data only analyzed a small number of top peaks with the highest signal strengths, biasing their resultant position weight matrices (PWMs) towards consensus-like, strong binding sites; nor did they derive bipartite motifs, disabling the accurate modelling of binding behavior of dimeric TFs.
This thesis presents a novel …
An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi
An Investigation Of Scenic Visualization Using Virtual Reality During Rehearsal, Cyrus Jian Bonyadi
Computer Science
In this paper, we discuss the use of virtual reality as a tool for actors during the rehearsal process and assess methods to implement and continue this research in future works. During the rehearsal process, the scenic design is normally introduced to actors close to the end of rehearsals. In introducing a virtual reality environment to train actors, we hoped to help them develop a better understanding of the design at an earlier point in the process. Our investigative pilot study involves two productions in a university theatre, where we render the scenic design of the production for which our …
Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman
Survey Of Techniques For Producing Blended Images: A Case Study Using Rollins College Archives, Hannah Holman
Computer Science
The Rollins College Archives are a treasure trove of historic resources relating to the college’s history, and they are often underutilized or overlooked by both the student body and the surrounding community. In particular, historic resources are all too often excluded from work in computer science and related fields. This project aims to bridge that gap by bringing the two areas together. To that end, the goal of this project is to merge past and present by blending historic photos with input of a present day scene in order to reveal changes and juxtapositions of the same scene across eras. …
Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems
Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems
Computer Science and Engineering Theses and Dissertations
Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security …
Detecting Speakers In Video Footage, Michael Williams
Detecting Speakers In Video Footage, Michael Williams
Master's Theses
Facial recognition is a powerful tool for identifying people visually. Yet, when the end goal is more specific than merely identifying the person in a picture problems can arise. Speaker identification is one such task which expects more predictive power out of a facial recognition system than can be provided on its own. Speaker identification is the task of identifying who is speaking in video not simply who is present in the video. This extra requirement introduces numerous false positives into the facial recognition system largely due to one main scenario. The person speaking is not on camera. This paper …
A Capability-Centric Approach To Cyber Risk Assessment And Mitigation, Thomas H. Llansó
A Capability-Centric Approach To Cyber Risk Assessment And Mitigation, Thomas H. Llansó
Masters Theses & Doctoral Dissertations
Cyber-enabled systems are increasingly ubiquitous and interconnected, showing up in traditional enterprise settings as well as increasingly diverse contexts, including critical infrastructure, avionics, cars, smartphones, home automation, and medical devices. Meanwhile, the impact of cyber attacks against these systems on our missions, business objectives, and personal lives has never been greater. Despite these stakes, the analysis of cyber risk and mitigations to that risk tends to be a subjective, labor-intensive, and costly endeavor, with results that can be as suspect as they are perishable. We identified the following gaps in those risk results: concerns for (1) their repeatability/reproducibility, (2) the …
Relating Justification Logic Modality And Type Theory In Curry–Howard Fashion, Konstantinos Pouliasis
Relating Justification Logic Modality And Type Theory In Curry–Howard Fashion, Konstantinos Pouliasis
Dissertations, Theses, and Capstone Projects
This dissertation is a work in the intersection of Justification Logic and Curry--Howard Isomorphism. Justification logic is an umbrella of modal logics of knowledge with explicit evidence. Justification logics have been used to tackle traditional problems in proof theory (in relation to Godel's provability) and philosophy (Gettier examples, Russel's barn paradox). The Curry--Howard Isomorphism or proofs-as-programs is an understanding of logic that places logical studies in conjunction with type theory and -- in current developments -- category theory. The point being that understanding a system as a logic, a typed calculus and, a language of a class of categories constitutes …
Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen
Is There Joy Beyond The Joystick?: Immersive Potential Of Brain-Computer Interfaces, Elias Solomon Posen
Senior Projects Spring 2018
Immersion, the state of being fully engaged in one's current operation, is a descriptor commonly used to appraise user experience in computer games and software applications. As the use of brain-computer interfaces (BCIs) begins to expand into the consumer sphere, questions arise concerning the ability of BCIs to modulate user immersion. This study employed a computer game to examine the effect of a consumer-grade BCI (the Emotiv EPOC) on immersion. In doing so, this study also explored the relationship between BCI usability and immersion levels. An experiment with twenty-seven participants showed that users were significantly more immersed when controlling the …
Glyph Based Segmentation Of Chinese Calligraphy Characters In The "Collected Characters" Stele., David A. Mcinnis
Glyph Based Segmentation Of Chinese Calligraphy Characters In The "Collected Characters" Stele., David A. Mcinnis
EWU Masters Thesis Collection
Text character segmentation is the process of detecting the bounding box position of individual characters within a written text document image. The character segmentation problem remains extremely difficult for ancient Chinese calligraphy documents. This paper examines a glyph-based segmentation technique for segmenting Chinese Calligraphy characters in the "Collected Characters". The glyph-based character segmentation pipeline utilizes a combination of well-understood image processing techniques in a novel pipeline which is able to detect Chinese calligraphy characters from ink-blots with a good reliability.
A Practical And Efficient Algorithm For The K-Mismatch Shortest Unique Substring Finding Problem, Daniel Robert Allen
A Practical And Efficient Algorithm For The K-Mismatch Shortest Unique Substring Finding Problem, Daniel Robert Allen
EWU Masters Thesis Collection
This thesis revisits the k-mismatch shortest unique substring (SUS) finding problem and demonstrates that a technique recently presented in the context of solving the k-mismatch average common substring problem can be adapted and combined with parts of the existing solution, resulting in a new algorithm which has expected time complexity of O(n logk n), while maintaining a practical space complexity at O(kn), where n is the string length. When k > 0, which is the hard case, the new proposal significantly improves the any-case O(n2) time complexity of the prior best method for k-mismatch SUS finding. Experimental study …
Novel Support Vector Machines For Diverse Learning Paradigms, Gabriella A. Melki
Novel Support Vector Machines For Diverse Learning Paradigms, Gabriella A. Melki
Theses and Dissertations
This dissertation introduces novel support vector machines (SVM) for the following traditional and non-traditional learning paradigms: Online classification, Multi-Target Regression, Multiple-Instance classification, and Data Stream classification.
Three multi-target support vector regression (SVR) models are first presented. The first involves building independent, single-target SVR models for each target. The second builds an ensemble of randomly chained models using the first single-target method as a base model. The third calculates the targets' correlations and forms a maximum correlation chain, which is used to build a single chained SVR model, improving the model's prediction performance, while reducing computational complexity.
Under the multi-instance paradigm, …
Old English Character Recognition Using Neural Networks, Sattajit Sutradhar
Old English Character Recognition Using Neural Networks, Sattajit Sutradhar
Electronic Theses and Dissertations
Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …
Sports Analytics With Computer Vision, Colby T. Jeffries
Sports Analytics With Computer Vision, Colby T. Jeffries
Senior Independent Study Theses
Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …
Holistic Model Of Website Design Elements That Influence Trustworthiness, Christopher Travis Lavalley
Holistic Model Of Website Design Elements That Influence Trustworthiness, Christopher Travis Lavalley
UNF Graduate Theses and Dissertations
Trustworthiness of a website relies foremost on a good first impression which includes the visitor’s perception of the user interface. The focus of this research is to investigate the effects of website design elements on user perception of trustworthiness of a site and provide a set of guidelines for website designers.
The research design is based on Yosef Jabardeen’s (2009) “conceptual framework analysis”. In this research paper, a holistic model is developed to depict the relationships among website design elements and trustworthiness. The model was tested, validated and updated using the results of the repertory grid technique, a process that …
Comparing The Usage Of React Native And Ionic, Sam Borick
Comparing The Usage Of React Native And Ionic, Sam Borick
Williams Honors College, Honors Research Projects
This project will compare two popular programming frameworks for building mobile applications. These frameworks are called ‘cross-platform frameworks’ as they can develop applications on multiple platforms. The scope of this project is to understand the structural reasons for the differences in these frameworks. While this project does speculate on reasons for choosing either framework, this project does not attempt to make a hard recommendation.
In this project, I built two applications, as similar as possible, in React Native and Ionic. I found that there were differences in the goals of these frameworks, lending each of the two better to different …
Grocery List: An Android Application, Daniel Mcfadden
Grocery List: An Android Application, Daniel Mcfadden
Williams Honors College, Honors Research Projects
Grocery List is an android application that allows the user to save a grocery list to their device for reference at a store as opposed to the traditional pen and paper. Grocery List was created in Android developer, and uses Java and XML to run the application and display different layouts.
Grocery Lists' main purpose is to be an easy to use, flexible listing application that can serve multiple different listing uses such as grocery lists, to do tasks, and even just some simple reminders.
The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman
The Poem Will Resemble You: A Human-Computer Collaboration, Zoe M. Morgan-Weinman
Senior Projects Spring 2018
Senior Project submitted to The Division of Languages and Literature of Bard College.