Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu Dec 2017

Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu

WWU Honors College Senior Projects

Chinese second language learners of English often use Machine Translators (MT) to translate personal and professional messages from their first language to English. MT’s are not perfect and have historically create messages that lack the cohesiveness and authenticity of natively written English. This paper describes our attempts to quantify the differences between human translation and machine translation in a specific scope with that hope that both MTs and post editing systems can be benefited through awareness of common error and differences between human and machine translations. In order to achieve this we implemented existing algorithms designed to identify common errors …


Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal Oct 2017

Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal

David B. Dennis

No abstract provided.


Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal Sep 2017

Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal

History: Faculty Publications and Other Works

No abstract provided.


Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde Jun 2017

Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde

Oluleye Babatunde

Biomedical laboratories often use different cell types in the same assay or the same cell type in different
assays. One cell type can become contaminated by another, or cells can be mis-identified, giving poor
results. Addressing these issues by DNA analyses can be time-consuming, labor intensive or costly to
implement. Here we uniquely employ Legendre moments (LM), Zernike moments (ZM), circularity and
a genetic algorithm (GA) to advance a computer-based vision system, and we task it to identify four cell
types used in virology: HeLa, Vero, BHK and PC3. By employing a k-nearest neighbor (kNN), multilayer
perceptron (MLP), Convolutional Neural …


Google Street View As A Medium For Social Gaming, Steven Dao, Tien Ho, Austin Pahl May 2017

Google Street View As A Medium For Social Gaming, Steven Dao, Tien Ho, Austin Pahl

Senior Theses

safehouse is a head-to-head Street View game drawing inspiration from GeoGuessr and Pursued. It will be available to play in a web browser on our website, http://thesafe.house. The game aims to let players discover new places in the world in a uniquely competitive way. At the start of each match, players will find themselves in a random Street View location in an unknown area, pitted against each other with one of two tasks: the pursued must locate a safe house somewhere in the city, and the pursuer must catch the pursued. Each player will have to rely on quick …


Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff Apr 2017

Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff

The Research and Scholarship Symposium (2013-2019)

CedarLogic is the Cedarville University’s student-developed, digital logic simulator. Engineering and Computer Science students use this software for several of their classes. Our primary goal for this update is adding black boxes, buses, and cross-platform compatibility. Our additional improvements in user-friendliness and functionality will give students an improved CedarLogic experience.


Customized Interfaces For Modern Storage Devices, Leonardo Marmol Mar 2017

Customized Interfaces For Modern Storage Devices, Leonardo Marmol

FIU Electronic Theses and Dissertations

In the past decade, we have seen two major evolutions on storage technologies: flash storage and non-volatile memory. These storage technologies are both vastly different in their properties and implementations than the disk-based storage devices that current soft- ware stacks and applications have been built for and optimized over several decades. The second major trend that the industry has been witnessing is new classes of applications that are moving away from the conventional ACID (SQL) database access to storage. The resulting new class of NoSQL and in-memory storage applications consume storage using entirely new application programmer interfaces than their predecessors. …


Oblivious Network Optimization And Security Modeling In Sustainable Smart Grids And Cities, Kianoosh G. Boroojeni Feb 2017

Oblivious Network Optimization And Security Modeling In Sustainable Smart Grids And Cities, Kianoosh G. Boroojeni

FIU Electronic Theses and Dissertations

Today's interconnected world requires an inexpensive, fast, and reliable way of transferring information. There exists an increasingly important need for intelligent and adaptable routing of network flows. In the last few years, many researchers have worked toward developing versatile solutions to the problem of routing network flows in unpredictable circumstances. These attempts have evolved into a rich literature in the area of "oblivious network design" which typically route the network flows via a routing scheme that makes use of a spanning tree or a set of trees of the graph representation of the network.

In the first chapter, we provide …


Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk Jan 2017

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk

International Journal of Undergraduate Community Engagement

In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.


Grasping The Void: Immersion Tactics Using Gesture Controlled Physics Interaction Systems In Virtual Reality, Avery Rapson Jan 2017

Grasping The Void: Immersion Tactics Using Gesture Controlled Physics Interaction Systems In Virtual Reality, Avery Rapson

Senior Independent Study Theses

This thesis uses the HTC Vive in Unity to compare two different types of object interaction systems in order to determine the effectiveness of physics based interaction systems in a virtual environment. The research problem that motivates this project is the fact that there is no standardized method for defining successful object interaction techniques in VR. There are numerous interaction techniques in VR that fall short of simulating realistic object interaction. This project explores a physics based interaction system and examines how effective it is by comparing it to a non-physics based system. A model house with various interactable objects …


Parallel, Cross-Platform Unit Testing For Real-Time Embedded Systems, Tosapon Pankumhang Jan 2017

Parallel, Cross-Platform Unit Testing For Real-Time Embedded Systems, Tosapon Pankumhang

Electronic Theses and Dissertations

Embedded systems are used in a wide variety of applications (e.g., automotive, agricultural, home security, industrial, medical, military, and aerospace) due to their small size, low-energy consumption, and the ability to control real-time peripheral devices precisely. These systems, however, are different from each other in many aspects: processors, memory size, develop applications/OS, hardware interfaces, and software loading methods. Unit testing is a fundamental part of software development and the lowest level of software testing, as it tests individual or groups of functions, methods, and classes, to increase confidence that the developed software satisfies both software specifications and user requirements. Although …


On Barrier Graphs Of Sensor Networks, Kirk Anthony Boyer Jan 2017

On Barrier Graphs Of Sensor Networks, Kirk Anthony Boyer

Electronic Theses and Dissertations

The study of sensor networks begins with a model, which usually has a geometric component. This thesis focuses on networks of sensors modeled as collections of rays in the plane whose use is to detect intruders, and in particular a graph derived from this geometry, called the barrier graph of the network, which captures information about the network's coverage. Every such ray-barrier sensor network corresponds to a barrier graph, but not every graph is the barrier graph of some network.

We show that any barrier graph is not just tripartite, but perfect. We describe how to find networks which have …


Autonomous Driving With A Simulation Trained Convolutional Neural Network, Cameron Franke Jan 2017

Autonomous Driving With A Simulation Trained Convolutional Neural Network, Cameron Franke

University of the Pacific Theses and Dissertations

Autonomous vehicles will help society if they can easily support a broad range of driving environments, conditions, and vehicles.

Achieving this requires reducing the complexity of the algorithmic system, easing the collection of training data, and verifying operation using real-world experiments. Our work addresses these issues by utilizing a reflexive neural network that translates images into steering and throttle commands. This network is trained using simulation data from Grand Theft Auto V~\cite{gtav}, which we augment to reduce the number of simulation hours driven. We then validate our work using a RC car system through numerous tests. Our system successfully drive …


A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan Jan 2017

A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan

CMC Senior Theses

Though women’s participation in science, technology, engineering, and mathematics (STEM) fields has greatly increased over the past 60 years, women’s participation in computer science peaked in the 1980s. The paper searches for key motivators for women entering computer science at the peak in order to isolate factors for the subsequent steep decline. A major finding of the paper is that having a computer at home is (weakly) statistically significant as a determinant for female students choosing to pursue computer science. This relationship is insignificant for students in other STEM and non-STEM fields. A final section of the paper examines employment …


Evolving Art: Modifying Context Free Art With A Genetic Algorithm, Marina Kent Jan 2017

Evolving Art: Modifying Context Free Art With A Genetic Algorithm, Marina Kent

Scripps Senior Theses

Context Free Design Grammar (CFDG) is a programming language for defining recursive structures that can be used to create art. I use CFDG as a design space for genetic programming, experimenting with various options for crossover, mutation, and fitness. In this exploratory work, multiple generations are manually assessed to determine the usefulness of the mutation strategies and fitness functions. I find that simple value mutation and fitness that alters general program structure is not enough to produce an increase of interesting images in CFDG. I discuss these findings as well as future avenues of inquiry for genetic programming in artistic …