Open Access. Powered by Scholars. Published by Universities.®

Graphics and Human Computer Interfaces Commons

Open Access. Powered by Scholars. Published by Universities.®

1,098 Full-Text Articles 1,372 Authors 301,990 Downloads 104 Institutions

All Articles in Graphics and Human Computer Interfaces

Faceted Search

1,098 full-text articles. Page 5 of 39.

Learning To Identify Depth Edges In Real-World Images With 3d Ground Truth, Krista A. Ehinger, Kevin T. Joseph, Wendy J. Adams, Erich W. Graf, James H. Elder 2017 York University

Learning To Identify Depth Edges In Real-World Images With 3d Ground Truth, Krista A. Ehinger, Kevin T. Joseph, Wendy J. Adams, Erich W. Graf, James H. Elder

MODVIS Workshop

No abstract provided.


Measuring Presence In A Police Use Of Force Simulation, Dharmesh Rajendra Desai 2017 University of New Orleans

Measuring Presence In A Police Use Of Force Simulation, Dharmesh Rajendra Desai

University of New Orleans Theses and Dissertations

We have designed a simulation that can be used to train police officers. Digital simulations are more cost-effective than a human role play. Use of force decisions are complex and made quickly, so there is a need for better training and innovative methods. Using this simulation, we are measuring the degree of presence that a human experience in a virtual environment. More presence implies better training. Participants are divided into two groups in which one group performs the experiment using a screen, keyboard, and mouse, and another uses virtual reality controls. In this experiment, we use subjective measurements and physiological ...


Development Of An Alumni Relations Web App Using An Agile Approach, Spencer Linsner 2017 The College at Brockport

Development Of An Alumni Relations Web App Using An Agile Approach, Spencer Linsner

Senior Honors Theses

I present my experience developing a web app to interface with an alumni database for the Computing Sciences department at Brockport. Prior to the end of each semester, the College seeks to gather relevant information from graduating students (e.g. contact information, employment data, etc.). All this information is stored in a database, whose schema was designed by the department faculty some years ago. A prior project took a UML modeling-based waterfall approach to constructing the web app to interface to this database using a ‘pure’ MVC approach and the CakePHP tool. This effort did not meet user needs. Therefore ...


Introduction To Gephi, Jesse Fagan 2017 University of Kentucky

Introduction To Gephi, Jesse Fagan

Research Data and Scholarly Communications Committee Workshops

Gephi is a visualization and exploration software for graphs and networks. Think Photoshop, but for graph data. This session will provide an overview of the software, its features, and resources for further study. Gephi is open-source, free to download, and runs on Windows, Mac OS X, and Linux.

The presentation slides are available by clicking the Download button on the right. The video and audio files of this workshop are listed as the additional files below and are available for download.


Analysis Of Eye-Tracking Data In Visualization And Data Space, Sayeed Safayet Alam 2017 Florida International University

Analysis Of Eye-Tracking Data In Visualization And Data Space, Sayeed Safayet Alam

FIU Electronic Theses and Dissertations

Eye-tracking devices can tell us where on the screen a person is looking. Researchers frequently analyze eye-tracking data manually, by examining every frame of a visual stimulus used in an eye-tracking experiment so as to match 2D screen-coordinates provided by the eye-tracker to related objects and content within the stimulus. Such task requires significant manual effort and is not feasible for analyzing data collected from many users, long experimental sessions, and heavily interactive and dynamic visual stimuli. In this dissertation, we present a novel analysis method. We would instrument visualizations that have open source code, and leverage real-time information about ...


We Are Alfred: Empathy Learned Through A Medical Education Virtual Reality Project, Barbara Swartzlander, Elizabeth Dyer, Marilyn R. Gugliucci 2017 University of New England

We Are Alfred: Empathy Learned Through A Medical Education Virtual Reality Project, Barbara Swartzlander, Elizabeth Dyer, Marilyn R. Gugliucci

Library Services Faculty Posters

Poster describing project collaboration among University of New England (UNE) librarians and College of Osteopathic Medicine (COM) faculty, whose goal was to adopt technology which will teach UNECOM students to be empathic with older adults and familiarize medical students with information resources from the NIH/NLM related to older adult health. Technology tested was the Alfred Lab developed by Embodied Labs. First year medical students were required to complete the ‘We Are Alfred’ virtual reality module and a pre and post assessment. Descriptive statistics were applied to finite questions on pre and post assessments, and content analysis on open ended ...


Curiosity: Emergent Behavior Through Interacting Multi-Level Predictions, Douglas S. Blank, Lisa Meeden, James Marshall 2017 Swarthmore College

Curiosity: Emergent Behavior Through Interacting Multi-Level Predictions, Douglas S. Blank, Lisa Meeden, James Marshall

Computer Science Faculty Research and Scholarship

Over the past 15 years our research group has been exploring models of developmental robotics and curiosity. Our research is based on the premise that intelligent behavior arises through emergent interactions between opposing forces in an open-ended, task-independent environment. In an initial experiment we constructed a recurrent neural network model where self-motivation was "an emergent property generated by the competing pressures that arise in attempting to balance predictability and novelty". The system first focused on its error, then learned to successfully predict its error, and finally became habituated to what caused the error. This process of focusing, learning, and habituating ...


Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel 2017 Western Washington University

Recognition, Internalization, Growth: Intuitive Design For Archival Representation, Jaime L. Ganzel

Graduate Student Symposium

Although there is a pressing need for archival description and access systems to be more intuitive and user-friendly, the uniqueness of archival records presents significant barriers to establishing simplistic and standardized conventions for the representation of archival materials. Indecipherable finding aids and access tools prevent new and inexperienced researchers from accessing the unique information and documentation held in archives. This article aims to help open the archival record to new and non-traditional archival users, support individual development of archival literacy skills, and cultivate a greater level of archival awareness in our society by developing a usable model for archivists to ...


Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson 2017 Augustana College - Rock Island

Investigating Trust And Trust Recovery In Human-Robot Interactions, Abigail L. Thomson

Celebration of Learning

As artificial intelligence and robotics continue to advance and be used in increasingly different functions and situations, it is important to look at how these new technologies will be used. An important factor in how a new resource will be used is how much it is trusted. This experiment was conducted to examine people’s trust in a robotic assistant when completing a task, how mistakes affect this trust, and if the levels of trust exhibited with a robot assistant were significantly different than if the assistant were human. The task was to watch a computer simulation of the three-cup ...


Hybridguard: A Principal-Based Permission And Fine-Grained Policy Enforcement Framework For Web-Based Mobile Applications, Phu Huu Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar 2017 University of Dayton

Hybridguard: A Principal-Based Permission And Fine-Grained Policy Enforcement Framework For Web-Based Mobile Applications, Phu Huu Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar

Computer Science Faculty Publications

Web-based or hybrid mobile applications (apps) are widely used and supported by various modern hybrid app development frameworks. In this architecture, any JavaScript code, local or remote, can access available APIs, including JavaScript bridges provided by the hybrid framework, to access device resources. This JavaScript inclusion capability is dangerous, since there is no mechanism to determine the origin of the code to control access, and any JavaScript code running in the mobile app can access the device resources through the exposed APIs. Previous solutions are either limited to a particular platform (e.g., Android) or a specific hybrid framework (e ...


Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, Silas B. Lankford 2017 University of Arkansas, Fayetteville

Simulating Foodborne Pathogens In Poultry Production And Processing To Defend Against Intentional Contamination, Silas B. Lankford

Computer Science and Computer Engineering Undergraduate Honors Theses

There is a lack of data in recent history of food terrorism attacks, and as such, it is difficult to predict its impact. The food supply industry is one of the most vulnerable industries for terrorist threats while the poultry industry is one of the largest food industries in the United States. A small food terrorism attack against just a single poultry processing center has the potential to affect a much larger population than its immediate consumers. In this work, the spread of foodborne pathogens is simulated in a poultry production and processing system to defend against intentional contamination. An ...


Music Feature Matching Using Computer Vision Algorithms, Mason Hollis 2017 University of Arkansas, Fayetteville

Music Feature Matching Using Computer Vision Algorithms, Mason Hollis

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper seeks to establish the validity and potential benefits of using existing computer vision techniques on audio samples rather than traditional images in order to consistently and accurately identify a song of origin from a short audio clip of potentially noisy sound. To do this, the audio sample is first converted to a spectrogram image, which is used to generate SURF features. These features are compared against a database of features, which have been previously generated in a similar fashion, in order to find the best match. This algorithm has been implemented in a system that can run as ...


Socket Golf - Building A Google Cardboard Game In Unity, Caleb P. Carlson 2017 University of Wyoming

Socket Golf - Building A Google Cardboard Game In Unity, Caleb P. Carlson

Honors Theses AY 16/17

Virtual reality is a new and emerging technology in the field of computer science designed to immerse the consumer into the product. To study and learn more about this technology, a four-person team of graduating seniors set out to build a mobile game for Google Cardboard. The game that was created uses the Unity game engine along with Unity multiplayer servers for the development tools. The application was designed to be run using both a Google Cardboard headset and an android controller to allow the user to control the game without removing themselves from the immersive experience.

The idea for ...


Patch-Based Denoising Algorithms For Single And Multi-View Images, Monagi H. Alkinani 2017 The University of Western Ontario

The Bible Story Producer App, Michael D. Baxter, Noah W. Bragg, Grant W. Dennison, Robert J. Jacubec, Andrew D. Lockridge, Abigail M. Riffle 2017 Cedarville University

The Bible Story Producer App, Michael D. Baxter, Noah W. Bragg, Grant W. Dennison, Robert J. Jacubec, Andrew D. Lockridge, Abigail M. Riffle

The Research and Scholarship Symposium

The Bible Story Producer team at Cedarville University has been spending the past year on the Bible Story Producer app for Android. This app is a tool whose purpose is to facilitate the translation of Bible stories by bilingual laypersons in places where the Bible is unavailable in the vernacular. The aim of the app is to facilitate the oral translation of Bible stories transmitted as templates consisting of voice narration in a Language of Wider Communication (LWC). The narration is accompanied by a series of high-quality illustrations animated by the Ken Burns (pan and zoom) effect. An instance of ...


Smart Signalling For Bicycles Using User Riding Behavior, Nishant Tushar Sinha 2017 Georgia State University

Smart Signalling For Bicycles Using User Riding Behavior, Nishant Tushar Sinha

Georgia State Undergraduate Research Conference

No abstract provided.


Multi-View Ontology Explorer (Moe): Interactive Visual Exploration Of Ontologies, Zhao Lin 2017 The University of Western Ontario

Multi-View Ontology Explorer (Moe): Interactive Visual Exploration Of Ontologies, Zhao Lin

Electronic Thesis and Dissertation Repository

An ontology is an explicit specification of a conceptualization. This specification consists of a common vocabulary and information structure of a domain. Ontologies have applications in many fields to semantically link information in a standardized manner. In these fields, it is often crucial for both expert and non-expert users to quickly grasp the contents of an ontology; and to achieve this, many ontology tools implement visualization components. There are many past works on ontology visualization, and most of these tools are adapted from tree and graph based visualization techniques (e.g. treemaps, node-link graphs, and 3D interfaces). However, due to ...


Toward An Iot-Based Expert System For Heart Disease Diagnosis, Do Thanh Thai, Quang Tran Minh, Phu Huu Phung 2017 Ho Chi Minh City University of Technology

Toward An Iot-Based Expert System For Heart Disease Diagnosis, Do Thanh Thai, Quang Tran Minh, Phu Huu Phung

Computer Science Faculty Publications

IoT technology has been recently adopted in the healthcare system to collect Electrocardiogram (ECG) signals for heart disease diagnosis and prediction. However, noises in collected ECG signals make the diagnosis and prediction system unreliable and imprecise. In this work, we have proposed a new lightweight approach to removing noises in collected ECG signals to perform precise diagnosis and prediction. First, we have used a revised Sequential Recursive (SR) algorithm to transform the signals into digital format. Then, the digital data is proceeded using a revised Discrete Wavelet Transform (DWT) algorithm to detect peaks in the data to remove noises. Finally ...


Probabilistic Roadmaps For Virtual Camera Pathing With Cinematographic Principles, Katherine Davis 2017 California Polytechnic State University – San Luis Obispo

Probabilistic Roadmaps For Virtual Camera Pathing With Cinematographic Principles, Katherine Davis

Master's Theses and Project Reports

As technology use increases in the world and inundates everyday life, the visual aspect of technology or computer graphics becomes increasingly important. This thesis presents a system for the automatic generation of virtual camera paths for fly-throughs of a digital scene. The sample scene used in this work is an underwater setting featuring a shipwreck model with other virtual underwater elements such as rocks, bubbles and caustics. The digital shipwreck model was reconstructed from an actual World War II shipwreck, resting off the coast of Malta. Video and sonar scans from an autonomous underwater vehicle were used in a photogrammetry ...


Vulnerabilities, Attacks, And Countermeasures In Balise-Based Train Control Systems, Yongdong WU, Jian WENG, Zhe TANG, Xin LI, Robert H. DENG 2017 Singapore Management University

Vulnerabilities, Attacks, And Countermeasures In Balise-Based Train Control Systems, Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng

Research Collection School Of Information Systems

In modern rail transport systems, balises are widely used to exchange track-train information via air-gap interface. In this paper, we first present the vulnerabilities on the standard balise air-gap interface, and then conduct vulnerability simulations using the system parameters that were specified in the European Train Control System. The simulation results show that the vulnerabilities can be exploited to launch effective and practical attacks, which could lead to catastrophic consequences, such as train derailment or collision. To mitigate the vulnerabilities and attacks, we propose to implement a challenge-response authentication process in the air-gap interface in the existing transport infrastructure.


Digital Commons powered by bepress