Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

928 Full-Text Articles 1102 Authors 551693 Downloads 88 Institutions

All Articles in Other Computer Sciences

Faceted Search

928 full-text articles. Page 1 of 37.

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra 2017 California State University – San Bernardino

Comparing And Improving Facial Recognition Method, Brandon Luis Sierra

Electronic Theses, Projects, and Dissertations

Facial recognition is the process in which a sample face can be correctly identified by a machine amongst a group of different faces. With the never-ending need for improvement in the fields of security, surveillance, and identification, facial recognition is becoming increasingly important. Considering this importance, it is imperative that the correct faces are recognized and the error rate is as minimal as possible. Despite the wide variety of current methods for facial recognition, there is no clear cut best method. This project reviews and examines three different methods for facial recognition: Eigenfaces, Fisherfaces, and Local Binary Patterns to determine ...


Card Tricks: A Workflow For Scalability And Dynamic Content Creation Using Paper2d And Unreal Engine 4, Owen Gottlieb, Dakota Herold, Edward Amidon 2017 RIT (undergraduate student)

Card Tricks: A Workflow For Scalability And Dynamic Content Creation Using Paper2d And Unreal Engine 4, Owen Gottlieb, Dakota Herold, Edward Amidon

Presentations and other scholarship

In this paper, we describe the design and technological methods of

our dynamic sprite system in Lost & Found, a table-top-to-mobile

card game designed to improve literacy regarding prosocial

aspects of religious legal systems, specifically, collaboration and

cooperation. Harnessing the capabilities of Unreal Engine’s

Paper2D system, we created a dynamic content creation pipeline

that empowered our game designers so that they could rapidly

iterate on the game’s systems and balance externally from the

engine. Utilizing the Unreal Blueprint component system we were

also able to modularize each actor during runtime as data may be

changed. The technological approach behind ...


Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore 2017 Utah State University

Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore

All Graduate Plan B and other Reports

Let p be a prime positive integer and let α be a positive integer greater than 1. A method is given to reduce the problem of finding a nontrivial factorization of α to the problem of finding a solution to a system of modulo p polynomial congruences where each variable in the system is constrained to the set {0,...,p − 1}. In the case that p = 2 it is shown that each polynomial in the system can be represented by an ordered binary decision diagram with size less than 20.25log2(α)3 + 16.5log2(α)2 + 6log ...


Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra PhD 2017 Purdue University

Parallelization Of Molecular Docking Algorithms Using Cuda For Use In Drug Discovery, Brandon Stewart, Jonathan Fine, Gaurav Chopra Phd

The Summer Undergraduate Research Fellowship (SURF) Symposium

Traditional drug discovery methodology uses a multitude of software packages to design and evaluate new drug-like compounds. While software packages implement a wide variety of methods, the serial (i.e. single core) implementation for many of these algorithms, prohibit large scale docking, such as proteome-wide docking (i.e. thousands of compounds with thousands of proteins). Several docking algorithms can be parallelized, significantly reducing the runtime of the calculations, thus enabling large-scale docking. Implementing algorithms that take advantage of the distributed nature of graphical processing units (GPUs) via the Compute Unified Device Architecture (CUDA) enables us to efficiently implement massively parallel ...


A Semi-Automated System For 3d Scene Analysis: From Detection And Tracking To Reconstruction, Anthony Trofe 2017 Susquehanna University

A Semi-Automated System For 3d Scene Analysis: From Detection And Tracking To Reconstruction, Anthony Trofe

Landmark Conference Summer Research Symposium

Detection and tracking of flags from a handheld video allows for the computation of distance between these flags in a three dimensional space. With this tool, scientific experiments requiring spatial arrangements indicated by markers would become easier to both map and determine the area. The initial video, composing of different sets of flags laid out, is run through a detection program which provides locations of flags inside of the frame. From these coordinates, a second program is run, which determines tracking. The tracking works by looking to see if there are points in sequential frames that are closer than a ...


Size Constancy In Virtual Reality, Anne Loeliger, Toshiro Kubota 2017 Susquehanna University

Size Constancy In Virtual Reality, Anne Loeliger, Toshiro Kubota

Landmark Conference Summer Research Symposium

This project studies human perception of size within a controlled virtual reality environment. When we open our eyes and glance at the surrounding, we see stable scenes that appear absolute. However, many argue that this is a pure illusion as nothing in our visual pathway is stable. Thus, our perceived size of an object may not reflect accurately the extent of the projection onto our retina. We do experience such false perception when we see celestial objects near the horizon. But are such misjudgments ubiquitous in our daily lives? With this in mind, the virtual reality scene has been created ...


Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy 2017 Rensselaer Polytechnic Institute

Data Extraction From Web Tables: The Devil Is In The Details, George Nagy, Sharad C. Seth, Dongpu Jin, David W. Embley, Spencer Machado, Mukkai Krishnamoorthy

CSE Conference and Workshop Papers

We present a method based on header paths for efficient and complete extraction of labeled data from tables meant for humans. Although many table configurations yield to the proposed syntactic analysis, some require access to semantic knowledge. Clicking on one or two critical cells per table, through a simple interface, is sufficient to resolve most of these problem tables. Header paths, a purely syntactic representation of visual tables, can be transformed (“factored”) into existing representations of structured data such as category trees, relational tables, and RDF triples. From a random sample of 200 web tables from ten large statistical web ...


End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth 2017 Rensselaer Polytechnic Institute

End-To-End Conversion Of Html Tables For Populating A Relational Database, George Nagy, David W. Embley, Sharad C. Seth

CSE Conference and Workshop Papers

Automating the conversion of human-readable HTML tables into machine-readable relational tables will enable end-user query processing of the millions of data tables found on the web. Theoretically sound and experimentally successful methods for index-based segmentation, extraction of category hierarchies, and construction of a canonical table suitable for direct input to a relational database are demonstrated on 200 heterogeneous web tables. The methods are scalable: the program generates the 198 Access compatible CSV files in ~0.1s per table (two tables could not be indexed).


An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Fei Wang, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross 2017 Dublin Institute of Technology

An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Fei Wang, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross

Conference papers

Silhouette is one of the most popular and effective internal measures for the evaluation of clustering validity. Simplified Silhouette is a computationally simplified version of Silhouette. However, to date Simplified Silhouette has not been systematically analysed in a specific clustering algorithm. This paper analyses the application of Simplified Silhouette to the evaluation of k-means clustering validity and compares it with the k-means Cost Function and the original Silhouette from both theoretical and empirical perspectives. The theoretical analysis shows that Simplified Silhouette has a mathematical relationship with both the k-means Cost Function and the original Silhouette, while empirically, we show that ...


Educational Magic Tricks Based On Error-Detection Schemes, Ronald I. Greenberg 2017 Loyola University Chicago

Educational Magic Tricks Based On Error-Detection Schemes, Ronald I. Greenberg

Computer Science: Faculty Publications and Other Works

Magic tricks based on computer science concepts help grab student attention and can motivate them to delve more deeply. Error detection ideas long used by computer scientists provide a rich basis for working magic; probably the most well known trick of this type is one included in the CS Unplugged activities. This paper shows that much more powerful variations of the trick can be performed, some in an unplugged environment and some with computer assistance. Some of the tricks also show off additional concepts in computer science and discrete mathematics.


Travel Mode Identification With Smartphone Sensors, Xing Su 2017 The Graduate Center, City University of New York

Travel Mode Identification With Smartphone Sensors, Xing Su

All Graduate Works by Year: Dissertations, Theses, and Capstone Projects

Personal trips in a modern urban society typically involve multiple travel modes. Recognizing a traveller's transportation mode is not only critical to personal context-awareness in related applications, but also essential to urban traffic operations, transportation planning, and facility design. While the state of the art in travel mode recognition mainly relies on large-scale infrastructure-based fixed sensors or on individuals' GPS devices, the emergence of the smartphone provides a promising alternative with its ever-growing computing, networking, and sensing powers. In this thesis, we propose new algorithms for travel mode identification using smartphone sensors. The prototype system is built upon the ...


Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto 2017 California Polytechnic State University, San Luis Obispo

Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto

Computer Engineering

The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.


Procedurally Generating Genetic Keys, Adam A. Levasseur 2017 California Polytechnic State University, San Luis Obispo

Procedurally Generating Genetic Keys, Adam A. Levasseur

Computer Engineering

This project presents a method for creating multi-part models based on input keys to generate new, variant models via genetic algorithms. By utilizing 3D models as modular parts, this method allows for the generation of a unique, compound model based on one or multiple input keys. This paper explains the process of creating and testing such generation styles using simple geometry to create more complex, compound models.


Automated Grading Of Handwritten Numerical Answers, Mark T. Brown 2017 California Polytechnic State University, San Luis Obispo

Automated Grading Of Handwritten Numerical Answers, Mark T. Brown

Computer Engineering

The objective of this project was to automate the process of grading handwritten numerical answers in a classroom setting. The final program accepts a scanned answer sheet completed by the student along with a description of the correct answers and produces a detailed report describing the confidence of correctness for each answer.

Computer vision techniques are used to automatically locate the locations of the answers in the scan. Each digit is then passed through a convolutional neural network to predict what was written by the student. The individual probabilities of each digit produced by the network are aggregated into a ...


Predicting Pancreatic Cancer Using Support Vector Machine, Akshay Bodkhe 2017 San Jose State University

Predicting Pancreatic Cancer Using Support Vector Machine, Akshay Bodkhe

Master's Projects

This report presents an approach to predict pancreatic cancer using Support Vector Machine Classification algorithm. The research objective of this project it to predict pancreatic cancer on just genomic, just clinical and combination of genomic and clinical data. We have used real genomic data having 22,763 samples and 154 features per sample. We have also created Synthetic Clinical data having 400 samples and 7 features per sample in order to predict accuracy of just clinical data. To validate the hypothesis, we have combined synthetic clinical data with subset of features from real genomic data. In our results, we observed ...


Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, Abhilash Goyal 2017 San Jose State University

Path-Finding Methodology For Visually-Impaired Patients Based On Image-Processing, Abhilash Goyal

Master's Projects

The objective of this project is to propose and develop the path-finding methodology for the visually impaired patients. The proposed novel methodology is based on image-processing and it is targeted for the patients who are not completely blind. The major problem faced by visually impaired patients is to walk independently. It is mainly because these patients can not see obstacles in front of them due to the degradation in their eye sight. Degradation in the eye-sight is mainly because either the light doesn't focus on the retina properly or due to the malfunction of the photoreceptor cells on the ...


Web - Based Office Market, Manodivya Kathiravan 2017 San Jose State University

Web - Based Office Market, Manodivya Kathiravan

Master's Projects

People who work in an office often have different pools of resources that they want to exchange. They want to trade their resources/work(seller) with a person who wants that particular resource(buyer) and in return get another resource the buyer offers. These kind of exchanges are often called Barter-exchanges where an item is traded for another item without the involvement of actual money. An exchange is set to be complete when there is a match between an available item and a desired item. This exchange is called direct exchange. When an item desired by one user is made ...


Evolvability: What Is It And How Do We Get It?, Matthew Moreno 2017 University of Puget Sound

Evolvability: What Is It And How Do We Get It?, Matthew Moreno

Honors Program Theses

Biological organisms exhibit spectacular adaptation to their environments. However, another marvel of biology lurks behind the adaptive traits that organisms exhibit over the course of their lifespans: it is hypothesized that biological organisms also exhibit adaptation to the evolutionary process itself. That is, biological organisms are thought to possess traits that facilitate evolution. The term evolvability was coined to describe this type of adaptation. The question of evolvability has special practical relevance to computer science researchers engaged in longstanding efforts to harness evolution as an algorithm for automated design. It is hoped that a more nuanced understanding of biological evolution ...


Computational Analysis Of Cryptic Splice Sites, Remya Mohanan 2017 San Jose State University

Computational Analysis Of Cryptic Splice Sites, Remya Mohanan

Master's Projects

DNA in the nucleus of all eukaryotes is transcribed into mRNA where it is then translated into proteins. The DNA which is transcribed into mRNA is composed of coding and non-coding regions called exons and introns, respectively. It undergoes a post-trancriptional process called splicing where the introns or the non-coding regions are removed from the pre-mRNA to give the mature mRNA. Splicing of pre-mRNAs at 5 ́ and 3ˊ ends is a crucial step in the gene expression pathway. The mis-splicing by the spliceosome at different sites known as cryptic splice sites is caused by mutations which will affect the primary ...


Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, Tapomay Dey 2017 San Jose State University

Application Of Computational Methods To Study The Selection Of Authentic And Cryptic Splice Sites, Tapomay Dey

Master's Projects

Proteins are building blocks of the bodies of eukaryotes, and the process of synthesizing proteins from DNA is crucial for the good health of an organism [13]. However, some mutations in the DNA may disrupt the selection of 5’ or 3’ splice sites by a spliceosome. An important research question is whether the disruptions have a stochastic relation to the position of nucleotides in the vicinity of the known authentic and cryptic splice sites. This can be achieved by proving that the authentic and cryptic splice sites are intrinsically different. However, the behavior of the spliceosome is not accurately known ...


Digital Commons powered by bepress