Open Access. Powered by Scholars. Published by Universities.®

Computer Science and Computer Engineering Undergraduate Honors Theses

Theses/Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 30 of 30

Full-Text Articles in Graphics and Human Computer Interfaces

An Exploration Of Procedural Methods In Game Level Design, Hector Salinas May 2024

An Exploration Of Procedural Methods In Game Level Design, Hector Salinas

Computer Science and Computer Engineering Undergraduate Honors Theses

Video games offer players immersive experiences within intricately crafted worlds, and the integration of procedural methods in game level designs extends this potential by introducing dynamic, algorithmically generated content that could stand on par with handcrafted environments. This research highlights the potential to provide players with engaging experiences through procedural level generation, while potentially reducing development time for game developers.

Through a focused exploration on two-dimensional cave generation techniques, this paper aims to provide efficient solutions tailored to this specific environment. This exploration encompasses several procedural generation methods, including Midpoint Displacement, Random Walk, Cellular Automata, Perlin Worms, and Binary Space …


Developing Detection And Mapping Of Roads Within Various Forms Of Media Using Opencv, Jordan C. Lyle Dec 2023

Developing Detection And Mapping Of Roads Within Various Forms Of Media Using Opencv, Jordan C. Lyle

Computer Science and Computer Engineering Undergraduate Honors Theses

OpenCV, and Computer Vision in general, has been a Computer Science topic that has interested me for a long time while completing my Bachelor’s degree at the University of Arkansas. As a result of this, I ended up choosing to utilize OpenCV in order to complete the task of detecting road-lines and mapping roads when given a wide variety of images. The purpose of my Honors research and this thesis is to detail the process of creating an algorithm to detect the road-lines such that the results are effective and instantaneous, as well as detail how Computer Vision can be …


Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France May 2023

Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France

Computer Science and Computer Engineering Undergraduate Honors Theses

The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …


Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton May 2023

Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton

Computer Science and Computer Engineering Undergraduate Honors Theses

Undergraduate research has proven to be highly beneficial to students, yet there are many students who do not know how to get involved or who are too timid to approach professors to inquire about potential research opportunities. Our hypothesis is that a cross-platform application has the potential to bridge the gap and help more students get involved in undergraduate research by providing them information about open positions and the faculty or staff members who are mentoring the projects. The key focus of this thesis is to develop an application that provides details about participating faculty or staff including their research …


Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James May 2022

Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James

Computer Science and Computer Engineering Undergraduate Honors Theses

The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures …


An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson May 2022

An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson

Computer Science and Computer Engineering Undergraduate Honors Theses

The Office of Sustainability at the University of Arkansas identified that building occupants that have control over operable windows may open them at inappropriate times. Windows opened in a building with a temperature and air differential leads to increased HVAC operating costs and building occupant discomfort. This led the Associate Vice Chancellor of Facilities at the University of Arkansas to propose the construction of a mobile application that a building occupant can use to make an informed decision before opening their window. I have formulated a series of research objectives in conjunction with the Director of the Office of Sustainability …


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan May 2022

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover May 2022

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …


A Study Of Software Development Methodologies, Kendra Risener May 2022

A Study Of Software Development Methodologies, Kendra Risener

Computer Science and Computer Engineering Undergraduate Honors Theses

Software development methodologies are often overlooked by software engineers as aspects of development that are handled by project managers alone. However, if every member of the team better understood the development methodology being used, it increases the likelihood that the method is properly implemented and ultimately used to complete the project more efficiently. Thus, this paper seeks to explore six common methodologies: the Waterfall Model, the Spiral Model, Agile, Scrum, Kanban, and Extreme Programming. These are discussed in two main sections in the paper. In the first section, the frameworks are isolated and viewed by themselves. The histories, unique features, …


Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger May 2022

Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger

Computer Science and Computer Engineering Undergraduate Honors Theses

Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler Dec 2021

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke May 2021

City Goers: An Exploration Into Creating Seemingly Intelligent A.I. Systems, Matthew Brooke

Computer Science and Computer Engineering Undergraduate Honors Theses

Artificial Intelligence systems have come a long way over the years. One particular application of A.I. is its incorporation in video games. A key goal of creating an A.I. system in a video game is to convey a level of intellect to the player. During playtests for Halo: Combat Evolved, the developers at Bungie noticed that players deemed tougher enemies as more intelligent than weaker ones, despite the fact that there were no differences in behavior in the enemies. The tougher enemies provided a greater illusion of intelligence to the players. Inspired by this, I set out to create a …


Investigating Machine Learning Techniques For Gesture Recognition With Low-Cost Capacitive Sensing Arrays, Michael Fahr Jr. May 2020

Investigating Machine Learning Techniques For Gesture Recognition With Low-Cost Capacitive Sensing Arrays, Michael Fahr Jr.

Computer Science and Computer Engineering Undergraduate Honors Theses

Machine learning has proven to be an effective tool for forming models to make predictions based on sample data. Supervised learning, a subset of machine learning, can be used to map input data to output labels based on pre-existing paired data. Datasets for machine learning can be created from many different sources and vary in complexity, with popular datasets including the MNIST handwritten dataset and CIFAR10 image dataset. The focus of this thesis is to test and validate multiple machine learning models for accurately classifying gestures performed on a low-cost capacitive sensing array. Multiple neural networks are trained using gesture …


Speech Processing In Computer Vision Applications, Nicholas Waterworth May 2020

Speech Processing In Computer Vision Applications, Nicholas Waterworth

Computer Science and Computer Engineering Undergraduate Honors Theses

Deep learning has been recently proven to be a viable asset in determining features in the field of Speech Analysis. Deep learning methods like Convolutional Neural Networks facilitate the expansion of specific feature information in waveforms, allowing networks to create more feature dense representations of data. Our work attempts to address the problem of re-creating a face given a speaker's voice and speaker identification using deep learning methods. In this work, we first review the fundamental background in speech processing and its related applications. Then we introduce novel deep learning-based methods to speech feature analysis. Finally, we will present our …


Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson May 2018

Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson

Computer Science and Computer Engineering Undergraduate Honors Theses

The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent …


Dynamic 3d Network Data Visualization, Brok Stafford May 2018

Dynamic 3d Network Data Visualization, Brok Stafford

Computer Science and Computer Engineering Undergraduate Honors Theses

Monitoring network traffic has always been an arduous and tedious task because of the complexity and sheer volume of network data that is being consistently generated. In addition, network growth and new technologies are rapidly increasing these levels of complexity and volume. An effective technique in understanding and managing a large dataset, such as network traffic, is data visualization. There are several tools that attempt to turn network traffic into visual stimuli. Many of these do so in 2D space and those that are 3D lack the ability to display network patterns effectively. Existing 3D network visualization tools lack user …


Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, Silas B. Lankford May 2017

Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, Silas B. Lankford

Computer Science and Computer Engineering Undergraduate Honors Theses

There is a lack of data in recent history of food terrorism attacks, and as such, it is difficult to predict its impact. The food supply industry is one of the most vulnerable industries for terrorist threats while the poultry industry is one of the largest food industries in the United States. A small food terrorism attack against just a single poultry processing center has the potential to affect a much larger population than its immediate consumers. In this work, the spread of foodborne pathogens is simulated in a poultry production and processing system to defend against intentional contamination. An …


Music Feature Matching Using Computer Vision Algorithms, Mason Hollis May 2017

Music Feature Matching Using Computer Vision Algorithms, Mason Hollis

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper seeks to establish the validity and potential benefits of using existing computer vision techniques on audio samples rather than traditional images in order to consistently and accurately identify a song of origin from a short audio clip of potentially noisy sound. To do this, the audio sample is first converted to a spectrogram image, which is used to generate SURF features. These features are compared against a database of features, which have been previously generated in a similar fashion, in order to find the best match. This algorithm has been implemented in a system that can run as …


Improving Electroencephalography-Based Imagined Speech Recognition With A Simultaneous Video Data Stream, Sarah J. Stolze May 2016

Improving Electroencephalography-Based Imagined Speech Recognition With A Simultaneous Video Data Stream, Sarah J. Stolze

Computer Science and Computer Engineering Undergraduate Honors Theses

Electroencephalography (EEG) devices offer a non-invasive mechanism for implementing imagined speech recognition, the process of estimating words or commands that a person expresses only in thought. However, existing methods can only achieve limited predictive accuracy with very small vocabularies; and therefore are not yet sufficient to enable fluid communication between humans and machines. This project proposes a new method for improving the ability of a classifying algorithm to recognize imagined speech recognition, by collecting and analyzing a large dataset of simultaneous EEG and video data streams. The results from this project suggest confirmation that complementing high-dimensional EEG data with similarly …


The Design And Implementation Of A Lightweight Game Engine For The Iphone Platform, Luke B. Godfrey May 2014

The Design And Implementation Of A Lightweight Game Engine For The Iphone Platform, Luke B. Godfrey

Computer Science and Computer Engineering Undergraduate Honors Theses

In this thesis, the design for a two dimensional game engine for the iPhone using the entity component system (ECS) model is presented as a solution to enable developers to streamline game development. Some background concepts are explained, including the ECS model and a brief overview of part of the iOS SDK used in this project. Related work is explored. An implementation of the design is then described in detail, presented as two parts: a framework and a core set of systems. Finally, the implemented engine is evaluated according to three criteria: ease of use, flexibility, and efficiency. The results …


The Design And Implementation Of A Mobile Game Engine For The Android Platform, Jon Hammer Dec 2012

The Design And Implementation Of A Mobile Game Engine For The Android Platform, Jon Hammer

Computer Science and Computer Engineering Undergraduate Honors Theses

In this thesis, a two-dimensional game engine is proposed for the Android mobile platform that facilitates rapid development of those games by individual developers or hobbyists. The essential elements of game design are presented so as to introduce the reader to the concepts that are crucial for comprehension of the paper. A brief overview of the Android Operating System is also included for those unfamiliar with it. Three primary design goals are identified, and a prototype solution is described in detail. The prototype is then evaluated against those design goals to see how well it accomplishes each task. The results …


A Modular Framework For Home Healthcare Monitoring, Blake Puryear May 2012

A Modular Framework For Home Healthcare Monitoring, Blake Puryear

Computer Science and Computer Engineering Undergraduate Honors Theses

Many patients with chronic health problems have multiple ailments but different patients may have different such ailments. Home monitoring systems for individual ailments exist but a patient may have multiple of these, all designed independently. There are no standard architectures so this leads to unmanageable diversity which causes problems for patients in having to learn to use a variety of monitors and for physicians in trying to monitor many patients. The purpose of this project was to design and prototype a next generation modular remote healthcare monitoring system capable of monitoring multiple ailments and extensible to new ailments in order …


Simple Touch-Based Gaming: Project Pond, Taylor Yust May 2012

Simple Touch-Based Gaming: Project Pond, Taylor Yust

Computer Science and Computer Engineering Undergraduate Honors Theses

The mainstream success of smartphone technology has prompted the video game industry to invest resources into new types of mobile games. While seemingly successful on the surface, there are unseen issues and risks that may potentially harm the long-term sustainability of the market. In response, I’ve developed my own smartphone gaming app that addresses what I find to be some of the largest problems in the market. My intent is to test my design theories while also challenging the status quo in mobile game design. The fruit of my labor is Pond, a smartphone gaming app for Windows Phone 7. …


Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu Dec 2011

Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu

Computer Science and Computer Engineering Undergraduate Honors Theses

Cell phone has become a fundamental element of people's life. People use it to call each other, browse websites, send text messages, etc. Among all the functionalities, the most important and frequently used is the search functionality. Based on ComScore, in July 2008, Google was estimated to host 235 millions searches per day. However, unlike the search on desktop, the search on cell phone has one critical constrain: battery. Cell phone performing a normal Google search, the battery drains very fast. The reason is that when sending a query to and fetching the results from Google, cell phone keeps communicating …


Webtailor: Internet Service For Salient And Automatic User Interest Profiles, John Anderson Dec 2011

Webtailor: Internet Service For Salient And Automatic User Interest Profiles, John Anderson

Computer Science and Computer Engineering Undergraduate Honors Theses

Website personalization systems seek to give users unique, tailored content and experiences on the Internet. A key feature of these systems is a user profile that represents each user in a way that distinguishes them from others. In current personalization systems, the data used to create these profiles is extremely limited, which leads to a host of problems and ineffectual personalization. The main goal of this thesis is to improve these personalization systems by addressing their lack of data and its poor quality, breadth, and depth. This is accomplished by analyzing and classifying the content of each user's Internet browsing …


Making An Impact On The Obesity Epidemic By Deploying A Mobile Fitness Suite On The Android Market, Chad Richards Dec 2011

Making An Impact On The Obesity Epidemic By Deploying A Mobile Fitness Suite On The Android Market, Chad Richards

Computer Science and Computer Engineering Undergraduate Honors Theses

The Mobile Fitness Suite aims to make an impact on the obesity epidemic by deploying a set of mobile fitness applications on the Android Market. The thesis details the health and financial issues with the obesity epidemic, along with its causes, and how a set of fitness applications can aid with the obesity epidemic. It also explains the reasons for releasing the program on the Android Market and details each step in the process of deploying a mobile application to the Android Market. Further, it discusses the design and architecture that went into the development of the Mobile Fitness Suite …


Mapping Reality Into Virtual Worlds, Josh Mcfarlane Dec 2008

Mapping Reality Into Virtual Worlds, Josh Mcfarlane

Computer Science and Computer Engineering Undergraduate Honors Theses

As virtual worlds become more prevalent, they become increasingly useful as a means of information dissemination. This thesis examines the possible connections between real world objects and their virtual world counterparts. We look at how, by attaching sensors to an object, or by using a smart object with embedded sensors, the information can be relayed to a server. From this information, it will be possible to create a duplicate object in the virtual world and have it mirror the real world object in terms of state and movement. Almost all current solutions for remotely viewing a room or area are …


Adding Virtual Rfid To Second Life, Casey Bailey May 2008

Adding Virtual Rfid To Second Life, Casey Bailey

Computer Science and Computer Engineering Undergraduate Honors Theses

Second Life (SL) is a popular online 3D multi-player virtual world where the limits of creating objects and scripting interactions among objects and avatars are based on the player's imagination and scripting skill. Real life, by comparison, is often limited by current technology more than creativity. This thesis investigates a new way to merge reality and virtual reality, in particular, by modeling one emerging real world technology, radio frequency identification (RFID), in the SL virtual world. We investigate how RFID can be deployed and tested in a virtual world, a modeled healthcare facility, as a step before the much more …


Computer Generation And Processing Of Music: Pitch Correction For The Human Voice, Jason Hardy May 2008

Computer Generation And Processing Of Music: Pitch Correction For The Human Voice, Jason Hardy

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Pitch Correction On The Human Voice, Suzanne Ownbey May 2008

Pitch Correction On The Human Voice, Suzanne Ownbey

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.