Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Electronic Theses and Dissertations (2)
- FIU Electronic Theses and Dissertations (2)
- CMC Senior Theses (1)
- David B. Dennis (1)
- History: Faculty Publications and Other Works (1)
-
- International Journal of Undergraduate Community Engagement (1)
- Oluleye Babatunde (1)
- Scripps Senior Theses (1)
- Senior Independent Study Theses (1)
- Senior Theses (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- University of the Pacific Theses and Dissertations (1)
- WWU Honors College Senior Projects (1)
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Entire DC Network
Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu
Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu
WWU Honors College Senior Projects
Chinese second language learners of English often use Machine Translators (MT) to translate personal and professional messages from their first language to English. MT’s are not perfect and have historically create messages that lack the cohesiveness and authenticity of natively written English. This paper describes our attempts to quantify the differences between human translation and machine translation in a specific scope with that hope that both MTs and post editing systems can be benefited through awareness of common error and differences between human and machine translations. In order to achieve this we implemented existing algorithms designed to identify common errors …
Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal
Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal
David B. Dennis
No abstract provided.
Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal
Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal
History: Faculty Publications and Other Works
No abstract provided.
Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde
Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde
Oluleye Babatunde
Google Street View As A Medium For Social Gaming, Steven Dao, Tien Ho, Austin Pahl
Google Street View As A Medium For Social Gaming, Steven Dao, Tien Ho, Austin Pahl
Senior Theses
safehouse is a head-to-head Street View game drawing inspiration from GeoGuessr and Pursued. It will be available to play in a web browser on our website, http://thesafe.house. The game aims to let players discover new places in the world in a uniquely competitive way. At the start of each match, players will find themselves in a random Street View location in an unknown area, pitted against each other with one of two tasks: the pursued must locate a safe house somewhere in the city, and the pursuer must catch the pursued. Each player will have to rely on quick …
Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff
Cedarlogic 2.0 Update, Colin Broberg, Julian Pernia, Tyler Drake, James Von Eiff
The Research and Scholarship Symposium (2013-2019)
CedarLogic is the Cedarville University’s student-developed, digital logic simulator. Engineering and Computer Science students use this software for several of their classes. Our primary goal for this update is adding black boxes, buses, and cross-platform compatibility. Our additional improvements in user-friendliness and functionality will give students an improved CedarLogic experience.
Customized Interfaces For Modern Storage Devices, Leonardo Marmol
Customized Interfaces For Modern Storage Devices, Leonardo Marmol
FIU Electronic Theses and Dissertations
In the past decade, we have seen two major evolutions on storage technologies: flash storage and non-volatile memory. These storage technologies are both vastly different in their properties and implementations than the disk-based storage devices that current soft- ware stacks and applications have been built for and optimized over several decades. The second major trend that the industry has been witnessing is new classes of applications that are moving away from the conventional ACID (SQL) database access to storage. The resulting new class of NoSQL and in-memory storage applications consume storage using entirely new application programmer interfaces than their predecessors. …
Oblivious Network Optimization And Security Modeling In Sustainable Smart Grids And Cities, Kianoosh G. Boroojeni
Oblivious Network Optimization And Security Modeling In Sustainable Smart Grids And Cities, Kianoosh G. Boroojeni
FIU Electronic Theses and Dissertations
Today's interconnected world requires an inexpensive, fast, and reliable way of transferring information. There exists an increasingly important need for intelligent and adaptable routing of network flows. In the last few years, many researchers have worked toward developing versatile solutions to the problem of routing network flows in unpredictable circumstances. These attempts have evolved into a rich literature in the area of "oblivious network design" which typically route the network flows via a routing scheme that makes use of a spanning tree or a set of trees of the graph representation of the network.
In the first chapter, we provide …
Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk
Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk
International Journal of Undergraduate Community Engagement
In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.
Grasping The Void: Immersion Tactics Using Gesture Controlled Physics Interaction Systems In Virtual Reality, Avery Rapson
Grasping The Void: Immersion Tactics Using Gesture Controlled Physics Interaction Systems In Virtual Reality, Avery Rapson
Senior Independent Study Theses
This thesis uses the HTC Vive in Unity to compare two different types of object interaction systems in order to determine the effectiveness of physics based interaction systems in a virtual environment. The research problem that motivates this project is the fact that there is no standardized method for defining successful object interaction techniques in VR. There are numerous interaction techniques in VR that fall short of simulating realistic object interaction. This project explores a physics based interaction system and examines how effective it is by comparing it to a non-physics based system. A model house with various interactable objects …
Parallel, Cross-Platform Unit Testing For Real-Time Embedded Systems, Tosapon Pankumhang
Parallel, Cross-Platform Unit Testing For Real-Time Embedded Systems, Tosapon Pankumhang
Electronic Theses and Dissertations
Embedded systems are used in a wide variety of applications (e.g., automotive, agricultural, home security, industrial, medical, military, and aerospace) due to their small size, low-energy consumption, and the ability to control real-time peripheral devices precisely. These systems, however, are different from each other in many aspects: processors, memory size, develop applications/OS, hardware interfaces, and software loading methods. Unit testing is a fundamental part of software development and the lowest level of software testing, as it tests individual or groups of functions, methods, and classes, to increase confidence that the developed software satisfies both software specifications and user requirements. Although …
On Barrier Graphs Of Sensor Networks, Kirk Anthony Boyer
On Barrier Graphs Of Sensor Networks, Kirk Anthony Boyer
Electronic Theses and Dissertations
The study of sensor networks begins with a model, which usually has a geometric component. This thesis focuses on networks of sensors modeled as collections of rays in the plane whose use is to detect intruders, and in particular a graph derived from this geometry, called the barrier graph of the network, which captures information about the network's coverage. Every such ray-barrier sensor network corresponds to a barrier graph, but not every graph is the barrier graph of some network.
We show that any barrier graph is not just tripartite, but perfect. We describe how to find networks which have …
Autonomous Driving With A Simulation Trained Convolutional Neural Network, Cameron Franke
Autonomous Driving With A Simulation Trained Convolutional Neural Network, Cameron Franke
University of the Pacific Theses and Dissertations
Autonomous vehicles will help society if they can easily support a broad range of driving environments, conditions, and vehicles.
Achieving this requires reducing the complexity of the algorithmic system, easing the collection of training data, and verifying operation using real-world experiments. Our work addresses these issues by utilizing a reflexive neural network that translates images into steering and throttle commands. This network is trained using simulation data from Grand Theft Auto V~\cite{gtav}, which we augment to reduce the number of simulation hours driven. We then validate our work using a RC car system through numerous tests. Our system successfully drive …
A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan
A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan
CMC Senior Theses
Though women’s participation in science, technology, engineering, and mathematics (STEM) fields has greatly increased over the past 60 years, women’s participation in computer science peaked in the 1980s. The paper searches for key motivators for women entering computer science at the peak in order to isolate factors for the subsequent steep decline. A major finding of the paper is that having a computer at home is (weakly) statistically significant as a determinant for female students choosing to pursue computer science. This relationship is insignificant for students in other STEM and non-STEM fields. A final section of the paper examines employment …
Evolving Art: Modifying Context Free Art With A Genetic Algorithm, Marina Kent
Evolving Art: Modifying Context Free Art With A Genetic Algorithm, Marina Kent
Scripps Senior Theses
Context Free Design Grammar (CFDG) is a programming language for defining recursive structures that can be used to create art. I use CFDG as a design space for genetic programming, experimenting with various options for crossover, mutation, and fitness. In this exploratory work, multiple generations are manually assessed to determine the usefulness of the mutation strategies and fitness functions. I find that simple value mutation and fitness that alters general program structure is not enough to produce an increase of interesting images in CFDG. I discuss these findings as well as future avenues of inquiry for genetic programming in artistic …