Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Automated Multi-Modal Search And Rescue Using Boosted Histogram Of Oriented Gradients, Matthew A. Lienemann Dec 2015

Automated Multi-Modal Search And Rescue Using Boosted Histogram Of Oriented Gradients, Matthew A. Lienemann

Master's Theses

Unmanned Aerial Vehicles (UAVs) provides a platform for many automated tasks and with an ever increasing advances in computing, these tasks can be more complex. The use of UAVs is expanded in this thesis with the goal of Search and Rescue (SAR), where a UAV can assist fast responders to search for a lost person and relay possible search areas back to SAR teams. To identify a person from an aerial perspective, low-level Histogram of Oriented Gradients (HOG) feature descriptors are used over a segmented region, provided from thermal data, to increase classification speed. This thesis also introduces a dataset …


Naturalists’ Perspectives On The Use Of Mobile Technology During A Nature Hike, Aubin Marishka Radzewicz St. Clair Aug 2015

Naturalists’ Perspectives On The Use Of Mobile Technology During A Nature Hike, Aubin Marishka Radzewicz St. Clair

Master's Theses

Naturalists act as our link between scientific knowledge and the public’s understanding of natural history and conservation efforts. In order for them to succeed, they need access to reference materials as well as up-to-date information (Mankin, Warner, & Anderson, 1999). Incorporating mobile technology (i.e. tablets) into naturalists’ endeavors in natural history and environmental education can be used as supportive and educational tools. My project investigated how newly trained naturalists used tablet technology while leading groups of children on nature hikes. I investigated naturalists’ views on the use of mobile technology as a tool during the hikes. My research was guided …


Geospatial Data Modeling To Support Energy Pipeline Integrity Management, Austin Wylie Jun 2015

Geospatial Data Modeling To Support Energy Pipeline Integrity Management, Austin Wylie

Master's Theses

Several hundred thousand miles of energy pipelines span the whole of North America -- responsible for carrying the natural gas and liquid petroleum that power the continent's homes and economies. These pipelines, so crucial to everyday goings-on, are closely monitored by various operating companies to ensure they perform safely and smoothly.

Happenings like earthquakes, erosion, and extreme weather, however -- and human factors like vehicle traffic and construction -- all pose threats to pipeline integrity. As such, there is a tremendous need to measure and indicate useful, actionable data for each region of interest, and operators often use computer-based decision …


Moxel Dags: Connecting Material Information To High Resolution Sparse Voxel Dags, Brent Robert Williams Jun 2015

Moxel Dags: Connecting Material Information To High Resolution Sparse Voxel Dags, Brent Robert Williams

Master's Theses

As time goes on, the demand for higher resolution and more visually rich images only increases. Unfortunately, creating these more realistic computer graphics is pushing our computational resources to their limits.

In realistic rendering, one of the common ways 3D objects are represented is as volumetric elements called voxels. Traditionally, voxel data structures are known for their high memory requirements. One of the standard ways these requirements are minimized is by storing the voxels in a sparse voxel octree (SVO). Very recently, a method called High Resolution Sparse Voxel DAGs was presented that can store binary voxel data orders of …


Gpuhelib And Distributedhelib: Distributed Computing Variants Of Helib, A Homomorphic Encryption Library, Ethan Andrew Frame Jun 2015

Gpuhelib And Distributedhelib: Distributed Computing Variants Of Helib, A Homomorphic Encryption Library, Ethan Andrew Frame

Master's Theses

Homomorphic Encryption, an encryption scheme only developed in the last five years, allows for arbitrary operations to be performed on encrypted data. Using this scheme, a user can encrypt data, and send it to an online service. The online service can then perform an operation on the data and generate an encrypted result. This encrypted result is then sent back to the user, who decrypts it. This decryption produces the same data as if the operation performed by the online service had been performed on the unencrypted data. This is revolutionary because it allows for users to rely on online …


Sudden Cardiac Arrest Prediction Through Heart Rate Variability Analysis, Luke Joseph Plewa Jun 2015

Sudden Cardiac Arrest Prediction Through Heart Rate Variability Analysis, Luke Joseph Plewa

Master's Theses

The increase in popularity for wearable technologies (see: Apple Watch and Microsoft Band) has opened the door for an Internet of Things solution to healthcare. One of the most prevalent healthcare problems today is the poor survival rate of out-of hospital sudden cardiac arrests (9.5% on 360,000 cases in the USA in 2013). It has been proven that heart rate derived features can give an early indicator of sudden cardiac arrest, and that providing an early warning has the potential to save many lives. Many of these new wearable devices are capable of providing this warning through their heart rate …


Calculating Staircase Slope From A Single Image, Nicholas Joseph Clarke Jun 2015

Calculating Staircase Slope From A Single Image, Nicholas Joseph Clarke

Master's Theses

Realistic modeling of a 3D environment has grown in popularity due to the increasing realm of practical applications. Whether for practical navigation purposes, entertainment value, or architectural standardization, the ability to determine the dimensions of a room is becoming more and more important. One of the trickier, but critical, features within any multistory environment is the staircase. Staircases are difficult to model because of their uneven surface and various depth aspects. Coupling this need is a variety of ways to reach this goal. Unfortunately, many such methods rely upon specialized sensory equipment, multiple calibrated cameras, or other such impractical setups. …


Detecting Learning Styles In Video Games, Benjamin Cooley Mar 2015

Detecting Learning Styles In Video Games, Benjamin Cooley

Master's Theses

Video games are increasingly becoming more intelligent, able to adapt themselves to the individual gamer. Learning styles are a set of models used to categorize people into different types of learners to explain why some people learn better through different methods. Since learning and exploration are such fundamental parts of the video game experience, it is interesting to consider the possibility of applying these learning style models to video games, allowing the video game to adapt to its player, providing a better experience. To consider such adaptation, the game must first be able to detect that learning style from how …


A Mathematical Framework Of Human Thought Process: Rectifying Software Construction Inefficiency And Identifying Characteristic Efficiencies Of Networked Systems Via Problem-Solution Cycle, Jonathan Sarbah-Yalley Jan 2015

A Mathematical Framework Of Human Thought Process: Rectifying Software Construction Inefficiency And Identifying Characteristic Efficiencies Of Networked Systems Via Problem-Solution Cycle, Jonathan Sarbah-Yalley

Master's Theses

Problem

The lack of a theory to explain human thought process latently affects the general perception of problem solving activities. This present study was to theorize human thought process (HTP) to ascertain in general the effect of problem solving inadequacy on efficiency.

Method

To theorize human thought process (HTP), basic human problem solving activities were investigated through the vein of problem-solution cycle (PSC). The scope of PSC investigation was focused on the inefficiency problem in software construction and latent characteristic efficiencies of a similar networked system. In order to analyze said PSC activities, three mathematical quotients and a messaging wavefunction …


Multi-Directional Warning Message Dissemination Protocol Based On Motion Vector Clustering For Vanets, Hung-Chou Wang Jan 2015

Multi-Directional Warning Message Dissemination Protocol Based On Motion Vector Clustering For Vanets, Hung-Chou Wang

Master's Theses

Problem. Most broadcast suppression protocols in vehicular ad hoc networks (VANET) mainly focus on one-dimensional message dissemination model for both highway and urban scenarios. Due to the non-line-of-sight (NLOS) problem occuring frequently in urban scenario, protocols mostly rely on either infrastructure or the vehicle that is passing through the intersection to forward the message in multiple directions manner. However, these one-dimensional message dissemination models fail to take into account realistic road topologies and traffic distribution. As a result, they tend to miss some possible dissemination directions.

Method. Vehicles travelling on the same road share similar motion pattern due to the …