Contours Of Virtual Enfreakment In Fighting Game Characters,
2022
Singapore Management University
Contours Of Virtual Enfreakment In Fighting Game Characters, Sercan Sengun, Peter Mawhorter, James Bowie-Wilson, Yusef Audeh, Haewoon Kwak, D. Fox Harrell
Research Collection School Of Computing and Information Systems
Characters in fighting videogames1 such as Street Fighter V and Tekken7 typically reveal a phenomenon that we define as virtual enfreakment: their bodies, costumes, and fighting styles are exaggerated (1) in a manner that emphasizes perceived exoticism and (2) to enable them to be easily visually and conceptually distinguishable from one another. Here, using both quantitative and qualitative methods, including crowd-sourced surveys and analyses of game mechanics, we report on the contours of virtual enfreakment in those games. We specifically examine differences in character design across gender, national-origin, and skin-color lines. Disappointingly but not surprisingly, we find racism and sexism ...
Coded Distributed Function Computation,
2022
The Graduate Center, City University of New York
Coded Distributed Function Computation, Pedro J. Soto
Dissertations, Theses, and Capstone Projects
A ubiquitous problem in computer science research is the optimization of computation on large data sets. Such computations are usually too large to be performed on one machine and therefore the task needs to be distributed amongst a network of machines. However, a common problem within distributed computing is the mitigation of delays caused by faulty machines. This can be performed by the use of coding theory to optimize the amount of redundancy needed to handle such faults. This problem differs from classical coding theory since it is concerned with the dynamic coded computation on data rather than just statically ...
Decomposing Generation Networks With Structure Prediction For Recipe Generation,
2022
Singapore Management University
Decomposing Generation Networks With Structure Prediction For Recipe Generation, Hao Wang, Guosheng Lin, Steven C. H. Hoi, Chunyan Miao
Research Collection School Of Computing and Information Systems
Recipe generation from food images and ingredients is a challenging task, which requires the interpretation of the information from another modality. Different from the image captioning task, where the captions usually have one sentence, cooking instructions contain multiple sentences and have obvious structures. To help the model capture the recipe structure and avoid missing some cooking details, we propose a novel framework: Decomposing Generation Networks (DGN) with structure prediction, to get more structured and complete recipe generation outputs. Specifically, we split each cooking instruction into several phases, and assign different sub-generators to each phase. Our approach includes two novel ideas ...
Implementation Of A Least Squares Method To A Navier-Stokes Solver,
2022
Francis Marion University
Implementation Of A Least Squares Method To A Navier-Stokes Solver, Jada P. Lytch, Taylor Boatwright, Ja'nya Breeden
Rose-Hulman Undergraduate Mathematics Journal
The Navier-Stokes equations are used to model fluid flow. Examples include fluid structure interactions in the heart, climate and weather modeling, and flow simulations in computer gaming and entertainment. The equations date back to the 1800s, but research and development of numerical approximation algorithms continues to be an active area. To numerically solve the Navier-Stokes equations we implement a least squares finite element algorithm based on work by Roland Glowinski and colleagues. We use the deal.II academic library , the C++ language, and the Linux operating system to implement the solver. We investigate convergence rates and apply the least squares ...
On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations,
2022
Universidade Federal do Rio de Janeiro
On The Richardson-Lucy Algorithm With A Varying Point Spread Function Along The Iterations, Erica S. Souza, Maria Ines Silvani, Gevaldo L. Almeida, Ricardo T. Lopes
International Journal of Image Processing and Vision Science
Abstract: This work analyses the soundness of two algorithms, Fishsint and Almexp to improve images using the Richardson-Lucy (RL) algorithm under a varying Point Spread Function (PSF) along the iterations. A plethora of methods based on Richardson-Lucy has been published, but no further proposal involving such an alternative has been published. Whereas the unnamed predecessor of Fishsint addressed only small size synthetic images under a blind fashion procedure, Fishsint and Almexp employs an algorithm Wdet to determine the initial PSF and all subsequent values after each iteration, respectively. Fishsint performs a loop, where the last determined PSF improves the previously ...
A Molecular Dynamics Study Of Polymer Chains In Shear Flows And Nanocomposites,
2022
The University of Western Ontario
A Molecular Dynamics Study Of Polymer Chains In Shear Flows And Nanocomposites, Venkat Bala
Electronic Thesis and Dissertation Repository
In this work we study single chain polymers in shear flows and nanocomposite polymer melts extensively through the use of large scale molecular dynamics simulations through LAMMPS. In the single polymer chain shear flow study, we use the Lattice Boltzmann method to simulate fluid dynamics and also include thermal noise as per the \emph{fluctuation-dissipation} theorem in the system. When simulating the nanocomposite polymer melts, we simply use a Langevin thermostat to mimic a heat bath. In the single polymer in shear flow study we investigated the margination of a single chain towards solid surfaces and how strongly the shear ...
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting,
2022
University of Birmingham
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke
MODVIS Workshop
No abstract provided.
A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions,
2022
Mississippi State University
A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions, Christian A. Spencer-Coker
Theses and Dissertations
The direct and adjoint methods are to linearize the time-averaged solution of bounded dynamical systems about one or more design parameters. Hence, such methods are one way to obtain the gradient necessary in locally optimizing a dynamical system’s time-averaged behavior over those design parameters. However, when analyzing nonlinear systems whose solutions exhibit chaos, standard direct and adjoint sensitivity methods yield meaningless results due to time-local instability of the system. The present work proposes a new method of solving the direct and adjoint linear systems in time, then tests that method’s ability to solve instances of the Lorenz system ...
Evaluating The Persuasiveness Of Mobile Health: The Intersection Of Persuasive System Design And Data Science,
2022
University of South Alabama
Evaluating The Persuasiveness Of Mobile Health: The Intersection Of Persuasive System Design And Data Science, Aleise Mcgowan
Theses and Dissertations
Persuasive technology is an umbrella term that encompasses any software (e.g., mobile app) or hardware (e.g., smartwatch) designed to influence users to perform a preferable behavior once or on a long-term basis. Considering the ubiquitous nature of mobile devices across all socioeconomic groups, user behavior modification thrives under the personalized care that persuasive technology can offer. This research examines the roles psychological characteristics play in interpreted mHealth screen perceived persuasiveness. A review of the literature revealed a gap regarding how developers of digital health technologies are often tasked with developing tools designed to engage patients, yet little emphasis ...
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna,
2022
University of Arkansas, Fayetteville
A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall
Computer Science and Computer Engineering Undergraduate Honors Theses
The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move ...
An Investigation Into, And The Construction Of, An Operable Windows Notifier,
2022
University of Arkansas, Fayetteville
An Investigation Into, And The Construction Of, An Operable Windows Notifier, Grey Hixson
Computer Science and Computer Engineering Undergraduate Honors Theses
The Office of Sustainability at the University of Arkansas identified that building occupants that have control over operable windows may open them at inappropriate times. Windows opened in a building with a temperature and air differential leads to increased HVAC operating costs and building occupant discomfort. This led the Associate Vice Chancellor of Facilities at the University of Arkansas to propose the construction of a mobile application that a building occupant can use to make an informed decision before opening their window. I have formulated a series of research objectives in conjunction with the Director of the Office of Sustainability ...
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking,
2022
University of Arkansas, Fayetteville
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Side-Channel Analysis On Post-Quantum Cryptography Algorithms,
2022
University of Arkansas, Fayetteville
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the ...
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks,
2022
University of Arkansas, Fayetteville
Gauging The State-Of-The-Art For Foresight Weight Pruning On Neural Networks, Noah James
Computer Science and Computer Engineering Undergraduate Honors Theses
The state-of-the-art for pruning neural networks is ambiguous due to poor experimental practices in the field. Newly developed approaches rarely compare to each other, and when they do, their comparisons are lackluster or contain errors. In the interest of stabilizing the field of pruning, this paper initiates a dive into reproducing prominent pruning algorithms across several architectures and datasets. As a first step towards this goal, this paper shows results for foresight weight pruning across 6 baseline pruning strategies, 5 modern pruning strategies, random pruning, and one legacy method (Optimal Brain Damage). All strategies are evaluated on 3 different architectures ...
Data And Algorithmic Modeling Approaches To Count Data,
2022
Murray State University
Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack
Honors College Theses
Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as ...
Automated Parallel Optimization Of Simulation Parameters Using Modified Nelder-Mead Simplex Algorithm,
2022
Clemson University
Automated Parallel Optimization Of Simulation Parameters Using Modified Nelder-Mead Simplex Algorithm, Erina Mills
All Dissertations
Computational simulations used in many fields have parameters that define models that are used to evaluate simulated properties. When developing these models, the goal is to choose the parameters that best replicate a set of desired properties. Mathematical optimization methods can be used to optimize the simulation parameters by defining a function that uses simulation parameters as input and outputs a value describing how well a set of experimental properties are reproduced.
Because simulated properties are often calculated using stochastic sampling methods, this optimization involves an objective function that is noisy and expensive to evaluate. Also, optimization of the simulation ...
Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework,
2022
University of Tennessee, Knoxville
Tokamak 3d Heat Load Investigations Using An Integrated Simulation Framework, Thomas Looby
Doctoral Dissertations
Reactor class nuclear fusion tokamaks will be inherently complex. Thousands of interconnected systems that span orders of magnitude in physical scale must operate cohesively for the machine to function. Because these reactor class tokamaks are all in an early design stage, it is difficult to quantify exactly how each subsystem will act within the context of the greater systems. Therefore, to predict the engineering parameters necessary to design the machine, simulation frameworks that can model individual systems as well as the interfaced systems are necessary. This dissertation outlines a novel framework developed to couple otherwise disparate computational domains together into ...
Meta-Heuristic Optimization Techniques For The Production Of Medical Isotopes Through Special Target Design,
2022
University of Tennessee, Knoxville
Meta-Heuristic Optimization Techniques For The Production Of Medical Isotopes Through Special Target Design, Cameron Ian Salyer
Masters Theses
Medical isotopes are used for a variety of different diagnostic and therapeutic purposes Ruth (2008). Due to recent newly discovered applications, their production has become rapidly more scarce than ever before Charlton (2019). Therefore, more efficient and less time consuming methods are of interest for not only the industry’s demand, but for the individuals who require radio-isotope procedures. Currently, the primary source of most medical isotopes used today are provided by reactor and cyclotron irradiation techniques, followed by supplemental radio-chemical separations Ruth (2008). Up until this point, target designs have been optimized by experience, back of the envelope calculations ...
Competition And Third-Party Platform-Integration In Ride-Sourcing Markets,
2022
Hong Kong University of Science and Technology
Competition And Third-Party Platform-Integration In Ride-Sourcing Markets, Yaqian Zhou, Hai Yang, Jintao Ke, Hai Wang, Xinwei Li
Research Collection School Of Computing and Information Systems
Recently, some third-party integrators attempt to integrate the ride services offered by multiple independent ride-sourcing platforms. Accordingly, passengers can request ride through the integrators and receive ride service from any one of the ride-sourcing platforms. This novel business model, termed as third-party platform-integration in this work, has potentials to alleviate market fragmentation cost resulting from demand splitting among multiple platforms. Although most existing studies focus on operation strategies for one single monopolist platform, much less is known about the competition and platform-integration and their implications on operation strategy and system efficiency. In this work, we propose mathematical models to describe ...
Managing The Phaseout Of Coal Power: A Comparison Of Power Decarbonization Pathways In Jilin Province,
2022
Singapore Management University
Managing The Phaseout Of Coal Power: A Comparison Of Power Decarbonization Pathways In Jilin Province, Weirong Zhang, Zhixu Meng, Jiongjun Yang, Yan Song, Yiou Zhou, Changhong Zhao, Jiahai Yuan
Research Collection School Of Computing and Information Systems
With the periodic goals of reaching carbon emission peak before 2030 and achieving carbon neutrality before 2060 (“dual carbon” goals), China shows its unprecedented determination to coal power phaseout. This research takes Jilin Province to showcase possible pathways of coal power units’ phaseout on provincial level. We set up four different coal power phaseout scenarios, under which their transition cost and effectiveness would be calculated, respectively. In terms of natural resource endowment and electricity demand, Jilin Province would achieve a complete coal power phaseout by 2045 or even by 2040. However, after assessing the effectiveness of power transition under the ...