Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk Apr 2024

Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk

Master's Theses

Semantic segmentation of point clouds is a basic step for many autonomous systems including automobiles. In autonomous driving systems, LiDAR sensors are frequently used to produce point cloud sequences that allow the system to perceive the environment and navigate safely. Modern machine learning techniques for segmentation have predominately focused on single-scan segmentation, however sequence segmentation has often proven to perform better on common segmentation metrics. Using the popular Semantic KITTI dataset, we show that by providing point cloud sequences to a segmentation pipeline based on Point Transformer v3, we increase the segmentation performance between seven and fifteen percent when compared …


Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer Mar 2024

Improving Automatic Transcription Using Natural Language Processing, Anna Kiefer

Master's Theses

Digital Democracy is a CalMatters and California Polytechnic State University initia-
tive to promote transparency in state government by increasing access to the Califor-
nia legislature. While Digital Democracy is made up of many resources, one founda-
tional step of the project is obtaining accurate, timely transcripts of California Senate
and Assembly hearings. The information extracted from these transcripts provides
crucial data for subsequent steps in the pipeline. In the context of Digital Democracy,
upleveling is when humans verify, correct, and annotate the transcript results after
the legislative hearings have been automatically transcribed. The upleveling process
is done with the …


Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah Dec 2022

Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah

Master's Theses

An investigation into using attention mechanisms for better feature extraction in wildfire spread prediction models. This research examines the U-net architecture to achieve image segmentation, a process that partitions images by classifying pixels into one of two classes. The deep learning models explored in this research integrate modern deep learning architectures, and techniques used to optimize them. The models are trained on 12 distinct observational variables derived from the Google Earth Engine catalog. Evaluation is conducted with accuracy, Dice coefficient score, ROC-AUC, and F1-score. This research concludes that when augmenting U-net with attention mechanisms, the attention component improves feature suppression …


Rasm: Compiling Racket To Webassembly, Grant Matejka Jun 2022

Rasm: Compiling Racket To Webassembly, Grant Matejka

Master's Theses

WebAssembly is an instruction set designed for a stack based virtual machine, with an emphasis on speed, portability and security. As the use cases for WebAssembly grow, so does the desire to target WebAssembly in compilation. In this thesis we present Rasm, a Racket to WebAssembly compiler that compiles a select subset of the top forms of the Racket programming language to WebAssembly. We also present our early findings in our work towards adding a WebAssembly backend to the Chez Scheme compiler that is the backend of Racket. We address initial concerns and roadblocks in adopting a WebAssembly backend and …


Legislative Language For Success, Sanjana Gundala Jun 2022

Legislative Language For Success, Sanjana Gundala

Master's Theses

Legislative committee meetings are an integral part of the lawmaking process for local and state bills. The testimony presented during these meetings is a large factor in the outcome of the proposed bill. This research uses Natural Language Processing and Machine Learning techniques to analyze testimonies from California Legislative committee meetings from 2015-2016 in order to identify what aspects of a testimony makes it successful. A testimony is considered successful if the alignment of the testimony matches the bill outcome (alignment is "For" and the bill passes or alignment is "Against" and the bill fails). The process of finding what …


Wildfire Risk Assessment Using Convolutional Neural Networks And Modis Climate Data, Sean F. Nesbit Jun 2022

Wildfire Risk Assessment Using Convolutional Neural Networks And Modis Climate Data, Sean F. Nesbit

Master's Theses

Wildfires burn millions of acres of land each year leading to the destruction of homes and wildland ecosystems while costing governments billions in funding. As climate change intensifies drought volatility across the Western United States, wildfires are likely to become increasingly severe. Wildfire risk assessment and hazard maps are currently employed by fire services, but can often be outdated. This paper introduces an image-based dataset using climate and wildfire data from NASA’s Moderate Resolution Imaging Spectroradiometer (MODIS). The dataset consists of 32 climate and topographical layers captured across 0.1 deg by 0.1 deg tiled regions in California and Nevada between …


Patterns Of Academic Help-Seeking In Undergraduate Computing Students, Augie Doebling Mar 2022

Patterns Of Academic Help-Seeking In Undergraduate Computing Students, Augie Doebling

Master's Theses

Knowing when and how to seek academic help is crucial to the success of undergraduate computing students. While individual help-seeking resources have been studied, little is understood about the factors influencing students to use or avoid certain re- sources. Understanding students’ patterns of help-seeking can help identify factors contributing to utilization or avoidance of help resources by different groups, an important step toward improving the quality and accessibility of resources. We present a mixed-methods study investigating the help-seeking behavior of undergraduate computing students. We collected survey data (n = 138) about students’ frequency of using several resources followed by one-on-one …


A Performance Survey Of Text-Based Sentiment Analysis Methods For Automating Usability Evaluations, Kelsi Van Damme Jun 2021

A Performance Survey Of Text-Based Sentiment Analysis Methods For Automating Usability Evaluations, Kelsi Van Damme

Master's Theses

Usability testing, or user experience (UX) testing, is increasingly recognized as an important part of the user interface design process. However, evaluating usability tests can be expensive in terms of time and resources and can lack consistency between human evaluators. This makes automation an appealing expansion or alternative to conventional usability techniques.

Early usability automation focused on evaluating human behavior through quantitative metrics but the explosion of opinion mining and sentiment analysis applications in recent decades has led to exciting new possibilities for usability evaluation methods.

This paper presents a survey of modern, open-source sentiment analyzers’ usefulness in extracting and …


Neural Network Pruning For Ecg Arrhythmia Classification, Isaac E. Labarge Apr 2020

Neural Network Pruning For Ecg Arrhythmia Classification, Isaac E. Labarge

Master's Theses

Convolutional Neural Networks (CNNs) are a widely accepted means of solving complex classification and detection problems in imaging and speech. However, problem complexity often leads to considerable increases in computation and parameter storage costs. Many successful attempts have been made in effectively reducing these overheads by pruning and compressing large CNNs with only a slight decline in model accuracy. In this study, two pruning methods are implemented and compared on the CIFAR-10 database and an ECG arrhythmia classification task. Each pruning method employs a pruning phase interleaved with a finetuning phase. It is shown that when performing the scale-factor pruning …


Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei Dec 2019

Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei

Master's Theses

Data from software repositories are a very useful asset to building dierent kinds of

models and recommender systems aimed to support software developers. Specically,

the identication of likely defect-prone les (i.e., classes in Object-Oriented systems)

helps in prioritizing, testing, and analysis activities. This work focuses on automated

methods for labeling a class in a version as defective or not. The most used methods

for automated class labeling belong to the SZZ family and fail in various circum-

stances. Thus, recent studies suggest the use of aect version (AV) as provided by

developers and available in the issue tracker such as …


Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia Jun 2019

Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia

Master's Theses

Defect prediction aims at identifying software artifacts that are likely to exhibit a defect. The main purpose of defect prediction is to reduce the cost of testing and code review, by letting developers focus on specific artifacts. Several researchers have worked on improving the accuracy of defect estimation models using techniques such as tuning, re-balancing, or feature selection. Ultimately, the reliability of a prediction model depends on the quality of the dataset. Therefore effort has been spent in identifying sources of noise in the datasets, and how to deal with them, including defect misclassification and defect origin. A key component …


Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan May 2019

Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan

Master's Theses

Computer networks were not designed with security in mind, making research into the subject of network security vital. Virtual Networks are similar to computer networks, except the components of a Virtual Network are in software rather than hardware. With the constant threat of attacks on networks, security is always a big concern, and Virtual Networks are no different. Virtual Networks have many potential attack vectors similar to physical networks, making research into Virtual Network security of great importance. Virtual Networks, since they are composed of virtualized network components, have the ability to dynamically change topologies. In this paper, we explore …


A Study Of Face Embedding In Face Recognition, Khanh Duc Le Mar 2019

A Study Of Face Embedding In Face Recognition, Khanh Duc Le

Master's Theses

Face Recognition has been a long-standing topic in computer vision and pattern recognition field because of its wide and important applications in our daily lives such as surveillance system, access control, and so on. The current modern face recognition model, which keeps only a couple of images per person in the database, can now recognize a face with high accuracy. Moreover, the model does not need to be retrained every time a new person is added to the database.

By using the face dataset from Digital Democracy, the thesis will explore the capability of this model by comparing it with …


Dish: Democracy In State Houses, Nicholas A. Russo Feb 2019

Dish: Democracy In State Houses, Nicholas A. Russo

Master's Theses

In our current political climate, state level legislators have become increasingly impor- tant. Due to cuts in funding and growing focus at the national level, public oversight for these legislators has drastically decreased. This makes it difficult for citizens and activists to understand the relationships and commonalities between legislators. This thesis provides three contributions to address this issue. First, we created a data set containing over 1200 features focused on a legislator’s activity on bills. Second, we created embeddings that represented a legislator’s level of activity and engagement for a given bill using a custom model called Democracy2Vec. Third, we …


Polyxpress+: Using Social Networking To Enhance The User Experience Of An Interactive Location-Based Storytelling Application, Desiree Creel Jan 2019

Polyxpress+: Using Social Networking To Enhance The User Experience Of An Interactive Location-Based Storytelling Application, Desiree Creel

Master's Theses

There’s no denying the ever increasing presence of social networking in our daily lives. Every day, people share what they are thinking, doing, and experiencing. But even more so, they check their favorite networks to see what the people in their lives are sharing. Social networking has become so prevalent that most applications incorporate it since it keeps users engaged and beckons them back to the application again and again.

PolyXpress is an interactive, location-based storytelling mobile application that functions as a platform for creating and experiencing stories. Written as a research project at California Polytechnic State University, it allows …


Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu Dec 2018

Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu

Master's Theses

Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …


Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang Jun 2018

Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang

Master's Theses

With the emergence of big data, scientific data analysis and visualization (DAV) tools are critical components of the data science software ecosystem; the usability of these tools is becoming extremely important to facilitate next-generation scientific discoveries. JupyterLab has been considered as one of the best polyglot, web-based, open-source data science tools. As the next phase of extensible interface for the classic iPython Notebooks, this tool supports interactive data science and scientific computing across multiple programming languages with great performances. Despite these advantages, previous heuristics evaluation studies have shown that JupyterLab has some significant flaws in the data visualization side. The …


Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson Jun 2018

Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson

Master's Theses

Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their own …


An Empirical Study Of Css Code Smells In Web Frameworks, Tobias Paul Bleisch Mar 2018

An Empirical Study Of Css Code Smells In Web Frameworks, Tobias Paul Bleisch

Master's Theses

Cascading Style Sheets (CSS) has become essential to front-end web development for the specification of style. But despite its simple syntax and the theoretical advantages attained through the separation of style from content and behavior, CSS authoring today is regarded as a complex task. As a result, developers are increasingly turning to CSS preprocessor languages and web frameworks to aid in development. However, previous studies show that even highly popular websites which are known to be developed with web frameworks contain CSS code smells such as duplicated rules and hard-coded values. Such code smells have the potential to cause adverse …


Automating Self Evaluations For Software Engineers, Jonathan Rodrigo A. Miranda Jun 2016

Automating Self Evaluations For Software Engineers, Jonathan Rodrigo A. Miranda

Master's Theses

Software engineers frequently compose self-evaluations as part of employee perfor- mance reviews. These evaluations can be a key artifact for assessing a software engineer’s contributions to a team and organization, and for generating useful feed- back. Self-evaluations can be challenging because a) they can be time consuming, b) individuals may forget about important contributions especially when the review period is long such as a full year, c) some individuals can consciously or unconsciously overstate their contributions, and d) some individuals can be reluctant to describe their contributions for fear of appearing too proud [24].

UNBIASED, Useful New Basic Interactive Automated …


Predicting Changes To Source Code, Justin James Roll Apr 2016

Predicting Changes To Source Code, Justin James Roll

Master's Theses

Organizations typically use issue tracking systems (ITS) such as Jira to plan software releases and assign requirements to developers. Organizations typically also use source control management (SCM) repositories such as Git to track historical changes to a code-base. These ITS and SCM repositories contain valuable data that remains largely untapped. As developers churn through an organization, it becomes expensive for developers to spend time determining which software artifact must be modified to implement a requirement. In this work we created, developed, tested and evaluated a tool called Class Change Predictor, otherwise known as CCP, for predicting which class will implement …


Spest – A Tool For Specification-Based Testing, Corrigan Redford Johnson Jan 2016

Spest – A Tool For Specification-Based Testing, Corrigan Redford Johnson

Master's Theses

This thesis presents a tool for SPEcification based teSTing (SPEST). SPEST is designed to use well known practices for automated black-box testing to reduce the burden of testing on developers. The tool uses a simple formal specification language to generate highly-readable unit tests that embody best practices for thorough software testing. Because the specification language used to generate the assertions about the code can be compiled, it can also be used to ensure that documentation describing the code is maintained during development and refactoring.

The utility and effectiveness of SPEST were validated through several exper- iments conducted with students in …


Geospatial Data Modeling To Support Energy Pipeline Integrity Management, Austin Wylie Jun 2015

Geospatial Data Modeling To Support Energy Pipeline Integrity Management, Austin Wylie

Master's Theses

Several hundred thousand miles of energy pipelines span the whole of North America -- responsible for carrying the natural gas and liquid petroleum that power the continent's homes and economies. These pipelines, so crucial to everyday goings-on, are closely monitored by various operating companies to ensure they perform safely and smoothly.

Happenings like earthquakes, erosion, and extreme weather, however -- and human factors like vehicle traffic and construction -- all pose threats to pipeline integrity. As such, there is a tremendous need to measure and indicate useful, actionable data for each region of interest, and operators often use computer-based decision …


A Mathematical Framework Of Human Thought Process: Rectifying Software Construction Inefficiency And Identifying Characteristic Efficiencies Of Networked Systems Via Problem-Solution Cycle, Jonathan Sarbah-Yalley Jan 2015

A Mathematical Framework Of Human Thought Process: Rectifying Software Construction Inefficiency And Identifying Characteristic Efficiencies Of Networked Systems Via Problem-Solution Cycle, Jonathan Sarbah-Yalley

Master's Theses

Problem

The lack of a theory to explain human thought process latently affects the general perception of problem solving activities. This present study was to theorize human thought process (HTP) to ascertain in general the effect of problem solving inadequacy on efficiency.

Method

To theorize human thought process (HTP), basic human problem solving activities were investigated through the vein of problem-solution cycle (PSC). The scope of PSC investigation was focused on the inefficiency problem in software construction and latent characteristic efficiencies of a similar networked system. In order to analyze said PSC activities, three mathematical quotients and a messaging wavefunction …


A Proof Of Concept For Crowdsourcing Color Perception Experiments, Ryan Nathaniel Mcleod Jun 2014

A Proof Of Concept For Crowdsourcing Color Perception Experiments, Ryan Nathaniel Mcleod

Master's Theses

Accurately quantifying the human perception of color is an unsolved prob- lem. There are dozens of numerical systems for quantifying colors and how we as humans perceive them, but as a whole, they are far from perfect. The ability to accurately measure color for reproduction and verification is critical to indus- tries that work with textiles, paints, food and beverages, displays, and media compression algorithms. Because the science of color deals with the body, mind, and the subjective study of perception, building models of color requires largely empirical data over pure analytical science. Much of this data is extremely dated, …


Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong Dec 2013

Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong

Master's Theses

Software permeates every aspect of our modern lives. In many applications, such in the software for airplane flight controls, or nuclear power control systems software failures can have catastrophic consequences. As we place so much trust in software, how can we know if it is trustworthy? Through software assurance, we can attempt to quantify just that.

Building complex, high assurance software is no simple task. The difficult information landscape of a software engineering project can make verification and validation, the process by which the assurance of a software is assessed, very difficult. In order to manage the inevitable information overload …


Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes Jun 2013

Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes

Master's Theses

In the field of speech recognition, an algorithm must learn to tell the difference between "a nice rock" and "a gneiss rock". These identical-sounding phrases are called oronyms. Word frequency dictionaries are often used by speech recognition systems to help resolve phonetic sequences with more than one possible orthographic phrase interpretation, by looking up which oronym of the root phonetic sequence contains the most-common words.

Our paper demonstrates a technique used to validate word frequency dictionary values. We chose to use frequency values from the UNISYN dictionary, which tallies each word on a per-occurance basis, using a proprietary text corpus, …


Improving Webide Through Delightful Design And Gamification, Michael Hilton Mar 2013

Improving Webide Through Delightful Design And Gamification, Michael Hilton

Master's Theses

WebIDE is a web-based online learning environment. WebIDE has been used

successfully to teach CS0 and CS1 students Java and C concepts and software

engineering best practices, specically Test Driven Development. Previous Web-

IDE development has concentrated on developing functionality. The main goal

of this eort is to improve two non-functional aspects of WebIDE. The rst is to

design a more delightful user interface. The second is to add a scoring mecha-

nism that encourages students to develop best practices. The scoring mechanism

rewards students who answer the question correctly on the rst attempt, dis-

couraging them from spamming the …


Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker Jun 2012

Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker

Master's Theses

Massively parallel programming is an increasingly growing field with the recent introduction of general purpose GPU computing. Modern graphics processors from NVIDIA and AMD have massively parallel architectures that can be used for such applications as 3D rendering, financial analysis, physics simulations, and biomedical analysis. These massively parallel systems are exposed to programmers through in- terfaces such as NVIDIAs CUDA, OpenCL, and Microsofts C++ AMP. These frame- works expose functionality using primarily either C or C++. In order to use these massively parallel frameworks, programs being implemented must be run on machines equipped with massively parallel hardware. These requirements limit …


Developing Digital Field Guides For Plants: A Study From The Perspective Of Users, Emily Roseanne Schwarz Jun 2011

Developing Digital Field Guides For Plants: A Study From The Perspective Of Users, Emily Roseanne Schwarz

Master's Theses

A field guide is a tool to identify an object of natural history. Field guides
cover a wide range of topics from plants to fungi, birds to mammals, and shells to minerals. Traditionally, field guides are books, usually small enough to be carried outdoors . They enjoy wide popularity in modern life; almost every American home and library owns at least one field guide, and the same is also true for other areas of the world.


At this time, companies, non-profits, and universities are developing computer
technologies to replace printed field guides for identifying plants. This thesis
examines the state …