Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Sciences

Javafx Application, Pengfei Huang May 2020

Javafx Application, Pengfei Huang

Student Academic Conference

Developing java GUI application by using JavaFX.


Security Camera Using Raspberry Pi, Tejendra Khatri Jan 2020

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

Making a security camera using raspberry pi utilizing OpenCV for facial recognition, upper body recognition or full-body recognition


3d Procedural Maze & Cave Generation, Jacob Sharp Apr 2019

3d Procedural Maze & Cave Generation, Jacob Sharp

Student Scholar Showcase

The goal of this project is to generate a maze or cave procedurally so that a player may be able to explore infinitely without a reoccurring pattern. The project also utilizes Virtual Reality (VR); the user will be able to put on a VR Headset and become more immersed in a procedural environment. One of the challenges that needed to be overcome was simple random number generators did not generate natural looking worlds. Introducing VR to the project created the additional challenge of preventing the user from becoming motion sick. These challenges were both addressed through many hours of research …


Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski Apr 2018

Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski

Student Scholar Showcase

The Enron Scandal of the early 2000s shook the financial world. The subsequent investigation of the Enron Corporation resulted in the arrests of many top-level executives, but are these employees the only ones responsible for the wide scale fraud in the company? A topical analysis of a social network of over 150 employees of the Enron Corporation using Graph Theory could result in new findings or prove that the investigators were correct in their original findings. The research is a retrospective analysis of a corpus of over 500,000 emails from more than 150 employees and top-level executives of the Enron …


Rpp Panel Chicago: History Of Cafecs, Lucia Dettori, Dale Reed, Steven Mcgee, Don Yanek, Andrew Rasmussen, Ronald Greenberg Mar 2018

Rpp Panel Chicago: History Of Cafecs, Lucia Dettori, Dale Reed, Steven Mcgee, Don Yanek, Andrew Rasmussen, Ronald Greenberg

Computer Science: Faculty Publications and Other Works

No abstract provided.


Unsupervised Machine Learning In Agent-Based Modeling, Luke D. Robinson May 2017

Unsupervised Machine Learning In Agent-Based Modeling, Luke D. Robinson

Celebration of Learning

Agent-based models (ABMs) are used by researchers in a variety of fields to model natural phenomena. In an ABM, a wide range of behaviors and outcomes can be observed based on the parameters of the model. In many cases, these behaviors can be categorized into discrete outcomes identifiable by human observers. Our goal was to use clustering algorithms to identify those outcomes from model output data. For this project, we used data from the NetLogo Wolf Sheep Predation model to explore and evaluate three clustering algorithms from Python's scikit-learn package. If this task can be completed reliably by a computer, …


The Chess Puzzle Lock Screen, Ryan J. Hayes Apr 2017

The Chess Puzzle Lock Screen, Ryan J. Hayes

Student Scholar Showcase

The Chess Puzzle Lock Screen

Many times each day, owners of cellphones use their phone’s lock screen in order to access their device. The goal of this project has been to take advantage of the action of unlocking one’s device by incorporating an element of self-help into the process. Every time a user who is interested in learning a new field attempts to access their device, that user is faced with a problem pertaining to a subject they are interested in learning more about. After many repetitions of this scenario, the user will have increased their understanding of this field. …


Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline Jul 2016

Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline

STAR Program Research Presentations

The Monterey Bay Aquarium Research Institute routinely deploys remotely operated underwater vehicles equipped with high definition cameras for use in scientific studies. Utilizing a video collection of over 22,000 hours and the Video Annotation and Reference System, we have set out to automate the detection and classification of deep-sea animals. This paper serves to explore the pitfalls of automation and suggest possible solutions to automated detection in diverse ecosystems with varying field conditions. Detection was tested using a saliency-based neuromorphic selective attention algorithm. The animals that were not detected were then used to tune saliency parameters. Once objects are detected, …


Web-Based Student Peer Review: A Research Summary, Edward F. Gehringer Mar 2014

Web-Based Student Peer Review: A Research Summary, Edward F. Gehringer

Edward F Gehringer

Interest in Web-based peer-review systems dates back nearly 20 years. Systems were built to let students give feedback to other students, mainly to help them improve their writing. But students are not necessarily effective peer reviewers. Left to their own devices, they will submit cursory reviews, which are not very helpful to their peers. Techniques have been developed to improve the quality of reviews. Calibration is one such technique. Students are asked to assess samples of writing that have previously been assessed by experts. Students must submit an evaluation “close enough” to the experts’ before they are allowed to review …


Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman May 2013

Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman

Amanda Hartman McLellan

This workshop will cover some websites and mobile apps that are free and easy to use for a variety of purposes, from organization to just plain fun. If you've got a laptop, iPad or other mobile device, please bring it so you can play along!


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …


The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson Mar 2012

The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson

Jason A Bengtson

Mobile technology has exploded, with many libraries experiencing a surge in access to their resources through mobile devices. In response, many institutions have created or are creating mobile sites designed to accommodate themselves to the unique strictures of these devices. One hurdle faced by these organizations, however, is getting mobile users to those sites. One solution is mobile redirect scripts, which automatically redirect mobile users from a regular page to a mobile page. These scripts come in various forms and present unique challenges to libraries. How are these scripts created? What triggers can or should be used to activate them? …


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …