A Capacitive Sensing Gym Mat For Exercise Classification & Tracking, 2020 University of Arkansas, Fayetteville
A Capacitive Sensing Gym Mat For Exercise Classification & Tracking, Adam Goertz
Computer Science and Computer Engineering Undergraduate Honors Theses
Effective monitoring of adherence to at-home exercise programs as prescribed by physiotherapy protocols is essential to promoting effective rehabilitation and therapeutic interventions. Currently physical therapists and other health professionals have no reliable means of tracking patients' progress in or adherence to a prescribed regimen. This project aims to develop a low-cost, privacy-conserving means of monitoring at-home exercise activity using a gym mat equipped with an array of capacitive sensors. The ability of the mat to classify different types of exercises was evaluated using several machine learning models trained on an existing dataset of physiotherapy exercises.
Lexicon Based Approaches To Sentiment Analysis Of Spanish Tweets: A Comparative Study, 2020 University of Arkansas, Fayetteville
Lexicon Based Approaches To Sentiment Analysis Of Spanish Tweets: A Comparative Study, Jean Roca
Computer Science and Computer Engineering Undergraduate Honors Theses
Sentiment analysis is a natural language processing technique that aims to classify text based on the emotions expressed in them. It is a research area that has been around for almost 20 years and has seen a lot of development. The works presented in this paper attempts to target a less-developed area in sentiment analysis known as multilingual sentiment analysis. More specifically, multilingual sentiment analysis of micro-texts. Using the existing WordNet lexicon and a domain-specific lexicon for a corpus of Spanish tweets, we analyze the effectiveness of these techniques.
Efficient Elevator Algorithm, 2020 University of Tennessee, Knoxville
Efficient Elevator Algorithm, Sean M. Toll, Owen Barbour, Carl Edwards, Daniel Nichols, Austin Day
Chancellor’s Honors Program Projects
No abstract provided.
Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, 2020 Southern Methodist University
Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, Steven Bramhall, Hayley Horn, Michael Tieu, Nibhrat Lohia
SMU Data Science Review
In this paper, we introduce a proof of concept that addresses the assumption and limitation of linear local boundaries by Local Interpretable Model-Agnostic Explanations (LIME), a popular technique used to add interpretability and explainability to black box models. LIME is a versatile explainer capable of handling different types of data and models. At the local level, LIME creates a linear relationship for a given prediction through generated sample points to present feature importance. We redefine the linear relationships presented by LIME as quadratic relationships and expand its flexibility in non-linear cases and improve the accuracy of feature interpretations. We coin ...
Privacy-Aware Security Applications In The Era Of Internet Of Things, 2020 Florida International University
Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar
FIU Electronic Theses and Dissertations
In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA ...
Sunseeker Solar Car Display And Driver Unit, 2020 Western Michigan University
Sunseeker Solar Car Display And Driver Unit, Conner Mccarthy
Digital dashboard displays with critical driver information are found in all modern vehicles. Examples of such information available to the driver include a speedometer, odometer, engine RPM, fuel gauge and more. The current 2016 Sunseeker solar car already has numerous displays that can show critical information to the driver, however, there are several problems that exist. Each display itself is less than two inches in size, the text on the screens is difficult to read, and the measurements have no units. Furthermore, these displays were made by a company that no longer exists, thus preventing the solar car team from ...
Vex U Robotics, 2020 Embry-Riddle Aeronautical University
Vex U Robotics, Kyle Lutterman, Jeffrey Ryan, Sierra Wong, Elizabeth Geiger
Discovery Day - Prescott
VEX U is a competition hosted by the REC Foundation for university students to get engaged in hands-on engineering. Each team produces two robots using the VEX provided parts to compete in the VEX U competition. The competition changes every year with the only constants being the size of the field, the tools and parts teams are able to use, and the size constraints of the robots. The teams compete in regional competitions in order to qualify for the World Championship Competition, which is the highest competition a team can compete in for VEX U. The VEX U teams at ...
Supporting Self-Regulation Of Children With Adhd Using Wearables: Tensions And Design Challenges, 2020 Chapman University
Supporting Self-Regulation Of Children With Adhd Using Wearables: Tensions And Design Challenges, Franceli L. Cibrian, Kimberley D. Lakes, Arya Tavakoulnia, Kayla Guzman, Sabrina Schuck, Gillian R. Hayes
Engineering Faculty Articles and Research
The design of wearable applications supporting children with Attention Deficit Hyperactivity Disorders (ADHD) requires a deep understanding not only of what is possible from a clinical standpoint but also how the children might understand and orient towards wearable technologies, such as a smartwatch. Through a series of participatory design workshops with children with ADHD and their caregivers, we identified tensions and challenges in designing wearable applications supporting the self-regulation of children with ADHD. In this paper, we describe the specific challenges of smartwatches for this population, the balance between self-regulation and co-regulation, and tensions when receiving notifications on a smartwatch ...
Bracelet Reminder For Alzheimer’S, 2020 CUNY New York City College of Technology
Bracelet Reminder For Alzheimer’S, Jennifer Islam, Caroline Rodriguez, Farrukh Zia
Publications and Research
This project involves the design, construction and testing of a personal reminder device for elderly who suffer from Alzheimer’s using a clock system and LED wearable technology. The device consists of an RGB LED strip connected to a 7-segment display (which operates as a clock circuit) attached to a microcontroller board. The device uses visual output to alert the user at that certain time the color being emitted represents the reminder the user set for that time. The project involves two phases. In the first phase, an RGB LED strip will be used to make a wearable device and ...
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, 2020 University of Massachusetts Amherst
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.
Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, 2020 Air Force Institute of Technology
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger
Theses and Dissertations
Traditional frame-based technology continues to suffer from motion blur, low dynamic range, speed limitations and high data storage requirements. Event-based sensors offer a potential solution to these challenges. This research centers around a comparative assessment of frame and event-based object detection and tracking. A basic frame-based algorithm is used to compare against two different event-based algorithms. First event-based pseudo-frames were parsed through standard frame-based algorithms and secondly, target tracks were constructed directly from filtered events. The findings show there is significant value in pursuing the technology further.
Scalable Profiling And Visualization For Characterizing Microbiomes, 2020 Florida International University
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
FIU Electronic Theses and Dissertations
Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.
The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters ...
Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, 2020 Kent State University - Kent Campus
Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.
National Training Aircraft Symposium (NTAS)
Many virtual reality (VR)-based flight simulation programs provide pilots the enhanced reality from the 1st person-view to make themselves immersed in the cockpit. Using the VR simulations, pilots can take flight training in many challenging situations that are hard to create in real environments due to its natural entropy and safety concerns such as severe crosswind or engine fire. Mixed reality (MR) technology provides three-dimensional graphics so that users can effectively see all 360 degree-vertical and horizontal aspects of an object while they freely move around to see the graphics maintaining the consciousness of real space. Flight instructors ...
Room Management Web Application And Movement And Temperature Sensors, 2020 California Polytechnic State University, San Luis Obispo
Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong
There are three main parts of this system: micro-controller, database, and website. Micro-controller detects motion of people walking in and out and It also measures room temperature and humidity in a confined space then updates collected data to the database. Our system’s database contains 6 main columns: room number, room capacity, number of students, temperature in Celsius, humidity in percent and date created. Finally, this database is queried by the website to display the information on the webpage. Users could also navigate on our site to check the most and least occupy rooms, and they can also search for ...
Dynamic Procedural Music Generation From Npc Attributes, 2020 California Polytechnic State University, San Luis Obispo
Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn
Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.
Music in video games is essential for establishing developers' intended mood ...
Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, 2020 Symbiosis Institute of Technology ,Symbiosis International University
Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha
Library Philosophy and Practice (e-journal)
Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using ...
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, 2020 The University of Western Ontario
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, 2020 University of the Pacific
A Probabilistic Machine Learning Framework For Cloud Resource Selection On The Cloud, Syeduzzaman Khan
University of the Pacific Theses and Dissertations
The execution of the scientific applications on the Cloud comes with great flexibility, scalability, cost-effectiveness, and substantial computing power. Market-leading Cloud service providers such as Amazon Web service (AWS), Azure, Google Cloud Platform (GCP) offer various general purposes, memory-intensive, and compute-intensive Cloud instances for the execution of scientific applications. The scientific community, especially small research institutions and undergraduate universities, face many hurdles while conducting high-performance computing research in the absence of large dedicated clusters. The Cloud provides a lucrative alternative to dedicated clusters, however a wide range of Cloud computing choices makes the instance selection for the end-users. This thesis ...
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, 2020 Old Dominion University
Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal
The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability ...
A Saliency-Driven Video Magnifier For People With Low Vision, 2020 Old Dominion University
A Saliency-Driven Video Magnifier For People With Low Vision, Ali Selman Aydin, Shirin Feiz, Iv Ramakrishnan, Vikas Ashok
Computer Science Faculty Publications
Consuming video content poses significant challenges for many screen magnifier users, which is the “go to” assistive technology for people with low vision. While screen magnifier software could be used to achieve a zoom factor that would make the content of the video visible to low-vision users, it is oftentimes a major challenge for these users to navigate through videos. Towards making videos more accessible for low-vision users, we have developed the SViM video magnifier system . Specifically, SViM consists of three different magnifier interfaces with easy-to-use means of interactions. All three interfaces are driven by visual saliency as a ...