Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Web site development (27)
- Java (Computer program language) (22)
- Web sites Design (19)
- Web sites Design. (19)
- Application software Development (13)
-
- Computer algorithms (13)
- Database design (12)
- Web site development. (12)
- Computer software Development (10)
- Computer programming (9)
- Proton beams Therapeutic use (9)
- Computer networks Security measures (8)
- Computer software -- Development (8)
- Educational technology (8)
- SQL (Computer program language) (8)
- Web services (8)
- Application software -- Development (7)
- Client/server computing (7)
- Computer games Design (7)
- Computer games Programming (7)
- Computer graphics (7)
- Database management (7)
- Computer programs (6)
- Information technology (6)
- Management information systems (6)
- Radiosurgery (6)
- Computer networks (5)
- Data structures (Computer science) (5)
- Electronic commerce (5)
- Information storage and retrieval systems (5)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 269
Full-Text Articles in Physical Sciences and Mathematics
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Electronic Theses, Projects, and Dissertations
Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.
CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …
Code For Care: Hypertension Prediction In Women Aged 18-39 Years, Kruti Sheth
Code For Care: Hypertension Prediction In Women Aged 18-39 Years, Kruti Sheth
Electronic Theses, Projects, and Dissertations
The longstanding prevalence of hypertension, often undiagnosed, poses significant risks of severe chronic and cardiovascular complications if left untreated. This study investigated the causes and underlying risks of hypertension in females aged between 18-39 years. The research questions were: (Q1.) What factors affect the occurrence of hypertension in females aged 18-39 years? (Q2.) What machine learning algorithms are suited for effectively predicting hypertension? (Q3.) How can SHAP values be leveraged to analyze the factors from model outputs? The findings are: (Q1.) Performing Feature selection using binary classification Logistic regression algorithm reveals an array of 30 most influential factors at an …
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Electronic Theses, Projects, and Dissertations
Online child predators pose a danger to children who use the Internet. Children fall victim to online predators at an alarming rate, based on the data from the National Center of Missing and Exploited Children. When making online profiles and joining websites, you only need a name, an email and a password without identity verification. Studies have shown that online predators use a variety of methods and tools to manipulate and exploit children, such as blackmail, coercion, flattery, and deception. These issues have created an opportunity for skilled online predators to have fewer obstacles when it comes to contacting and …
An Empirical Study On The Efficacy Of Llm-Powered Chatbots In Basic Information Retrieval Tasks, Naja Faysal
An Empirical Study On The Efficacy Of Llm-Powered Chatbots In Basic Information Retrieval Tasks, Naja Faysal
Electronic Theses, Projects, and Dissertations
The rise of conversational user interfaces (CUIs) powered by large language models (LLMs) is transforming human-computer interaction. This study evaluates the efficacy of LLM-powered chatbots, trained on website data, compared to browsing websites for finding information about organizations across diverse sectors. A within-subjects experiment with 165 participants was conducted, involving similar information retrieval (IR) tasks using both websites (GUIs) and chatbots (CUIs). The research questions are: (Q1) Which interface helps users find information faster: LLM chatbots or websites? (Q2) Which interface helps users find more accurate information: LLM chatbots or websites?. The findings are: (Q1) Participants found information significantly faster …
Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown
Leveraging Blockchain Technology To Revamp The Vehicle Electrification Journey: Perspectives Of Accountability And Economic Circularity, Eva Escobar Brown
Electronic Theses, Projects, and Dissertations
The automotive industry is undergoing a significant transition accelerated by global emission regulations for a phase out of internal combustion engines (ICEs) and a transition toward the adoption of electric vehicles (EVs). While regulatory measures and incentivized adoption for EVs presents opportunities for reducing emissions and promoting sustainability, it also poses complex challenges. The EV industry faces potential production challenges, particularly in the sourcing, manufacturing, and lifecycle management of critical minerals and raw materials for electric vehicle batteries (EVBs). With a heavy reliance on a steady and diversified supply of critical minerals such as lithium, cobalt and rare earth elements, …
Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa
Classification Of Remote Sensing Image Data Using Rsscn-7 Dataset, Satya Priya Challa
Electronic Theses, Projects, and Dissertations
A novel technique for remote sensing image scene classification is employed using the Compact Vision Transformer (CVT) architecture. This model strengthens the power of deep learning and self-attention algorithms to significantly intensify the accuracy and efficiency of scene classification in remote sensing imagery. Through extensive training and evaluation of the RSSCNN7 dataset, our CVT-based model has achieved an impressive accuracy rate of 87.46% on the original dataset. This remarkable result underscores the prospect of CVT models in the domain of remote sensing and underscores their applicability in real-world scenarios. Our report furnishes an elaborate account of the model's architecture, training …
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Hypothyroid Disease Analysis By Using Machine Learning, Sanjana Seelam
Electronic Theses, Projects, and Dissertations
Thyroid illness frequently manifests as hypothyroidism. It is evident that people with hypothyroidism are primarily female. Because the majority of people are unaware of the illness, it is quickly becoming more serious. It is crucial to catch it early on so that medical professionals can treat it more effectively and prevent it from getting worse. Machine learning illness prediction is a challenging task. Disease prediction is aided greatly by machine learning. Once more, unique feature selection strategies have made the process of disease assumption and prediction easier. To properly monitor and cure this illness, accurate detection is essential. In order …
Disease Of Lung Infection Detection Using Cnn Model -Bayesian Optimization, Poojitha Gutha
Disease Of Lung Infection Detection Using Cnn Model -Bayesian Optimization, Poojitha Gutha
Electronic Theses, Projects, and Dissertations
Auscultation plays a role, in diagnosing and identifying diseases during examinations. However, it requires training and expertise, for application. This study aims to tackle this challenge by introducing a model that categorizes respiratory sounds into eight groups: URTI, Healthy, Asthma, COPD, LRTI, Bronchiectasis, Pneumonia, and Bronchiolitis. To achieve this categorization the study utilizes a Convolutional Neural Network (CNN) model that has been optimized using techniques. The dataset used in the study consists of 920 audio samples obtained from 126 patients with durations ranging from 10 to 90 seconds. Impressively, the model demonstrates a noteworthy 83% validation accuracy and an impressive …
Twitter Policing, Hemanth Kumar Medisetty
Twitter Policing, Hemanth Kumar Medisetty
Electronic Theses, Projects, and Dissertations
Police departments are frequently utilizing social media platforms to actively interact with the public. Social media offers an opportunity to share information, facilitate communication, and foster stronger connections between police departments and the communities they serve. In this context sentiment analysis of social media data has become a tool, for identifying sentiments and tracking emerging trends.
This project utilizes sentiment analysis to examine the social media interactions with particular data obtained from the Twitter (X). Initially, the project gathers social media data, from twitter mentioned accounts on Twitter utilizing web scraping techniques. Afterwards, we perform a thorough sentiment analysis using …
General Population Projection Model With Census Population Data, Takenori Tsuruga
General Population Projection Model With Census Population Data, Takenori Tsuruga
Electronic Theses, Projects, and Dissertations
The US Census Bureau offers a wide range of data, and within this array, the American Community Survey 5-Year Estimate (ACS5) serves as a valuable resource for understanding the US population. This project embarks on an exploration of Machine Learning and the Software Development process with the goal of generating effective population projections from ACS5 data. The project aims to provide methods to make predictions for every city and town in the US, encompassing their total population and population divided into 5-year age groups. It's worth noting that while the generation of these projections is grounded in the generalized statistical …
Review Classification Using Natural Language Processing And Deep Learning, Brian Nazareth
Review Classification Using Natural Language Processing And Deep Learning, Brian Nazareth
Electronic Theses, Projects, and Dissertations
Sentiment Analysis is an ongoing research in the field of Natural Language Processing (NLP). In this project, I will evaluate my testing against an Amazon Reviews Dataset, which contains more than 100 thousand reviews from customers. This project classifies the reviews using three methods – using a sentiment score by comparing the words of the reviews based on every positive and negative word that appears in the text with the Opinion Lexicon dataset, by considering the text’s variating sentiment polarity scores with a Python library called TextBlob, and with the help of neural network training. I have created a neural …
Restaurant Management Website, Akhil Sai Gollapudi
Restaurant Management Website, Akhil Sai Gollapudi
Electronic Theses, Projects, and Dissertations
In the ever-evolving corporate landscape of today, it is crucial to respond to customer needs as efficiently and in a timely manner as possible. The project's primary objective is to create a method for clients to make reservations for restaurants online. This makes life easier for busy customers in their daily life.
Today, people are looking for comfort thanks to rapidly developing technology. As we can see, people invent and implement new technologies in all fields according to customer needs.
We got a unique restaurant idea that helps people save time. People prefer quick methods to get things done. With …
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Web Based Management System For Housing Society, Likhitha Reddy Eddala
Electronic Theses, Projects, and Dissertations
Web Based Management System for Housing Society plays a major role in our day-to-day life. We develop a global web dependent application using AngularJS, Node JS and MySQL, with Xampp as the server to make an effective management system. This system is designed to provide a user-friendly and efficient platform for managing all the details of daily notices, monthly meetings, events, payments, maids etc., This system mainly consists of three modules, they are: Admin, User and Security. Each module here serves specific features and functionalities present within society. Admin module provides the features for managing user, houses, security, maids, notices, …
Contactless Food Ordering System, Rishivar Kumar Goli
Contactless Food Ordering System, Rishivar Kumar Goli
Electronic Theses, Projects, and Dissertations
Contactless food ordering has revolutionized the way a customer interacts with restaurants by allowing them to place orders and make transactions. Through these web-based platforms, customers can now browse menus, customize orders, and make payments seamlessly. By scanning the restaurant’s QR code, customers can reserve a table. If the table is available, then automatically it will be reserved. However, if the table is occupied the customer will be added to the waiting list. Once the customer selects desired food then they can securely make payments based on ordered food items. The food will be delivered straight to the customer's table. …
Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides
Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides
Electronic Theses, Projects, and Dissertations
This report introduces a thorough analysis of wildfire prediction using satellite imagery by applying deep learning techniques. To find wildfire-prone geographical data, we use U-Net, a convolutional neural network known for its effectiveness in biomedical image segmentation. The input to the model is the Sentinel-2 multispectral images to supply a complete view of the terrain features.
We evaluated the wildfire risk prediction model’s performance using several metrics. The model showed high accuracy, with a weighted average F1 score of 0.91 and an AUC-ROC score of 0.972. These results suggest that the model is exceptionally good at predicting the location of …
A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum
A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum
Electronic Theses, Projects, and Dissertations
Social media is a great domain for news consumption; however, it is referred to as a double-edged sword. While it is user-friendly and low-cost, social media is the reason why fake news can spread rapidly, which is detrimental to society, businesses, and many consumers. Therefore, fake news detection is an emerging field. However, some challenges have restricted other researchers from developing a universal machine learning model that is fast, efficient, and reliable to stop the proliferation because of the lack of resources available, such as large-sized datasets. The goal of this culminating experience project is to explore how varying datasets …
Heart Disease Prediction Using Binary Classification, Virendra Sunil Devare
Heart Disease Prediction Using Binary Classification, Virendra Sunil Devare
Electronic Theses, Projects, and Dissertations
In this project, I built a neural network model to predict heard disease with binary classification technique using patient information dataset from UCI Machine Learning repository. This dataset was preprocessed to remove missing elements and performed feature extraction. Our result shows that the model that I built has the best performance accuracy in heart disease classification if compared to other models and algorithms. The model achieved 94.98% accuracy after hyperparameter tuning and 0.947 area under the curve in ROC curve analysis. In addition, to identify the most important factors in heart disease prediction, I also performed feature importance analysis. Our …
Deep Learning Edge Detection In Image Inpainting, Zheng Zheng
Deep Learning Edge Detection In Image Inpainting, Zheng Zheng
Electronic Theses, Projects, and Dissertations
In recent years, deep learning has grown rapidly, and it has been creatively implemented for various applications. In 2019, deep learning based EdgeConnect image inpainting algorithm came out and occupied a place in the image inpainting field. Unlike traditional image inpainting methods which mainly read and use the color information of the remaining part of the image to fill the missing regions of the image, EdgeConnect uses the innovative edge-first and color-next approach. It uses an edge detector to generate an edge map of an image with missing regions, then the missing edges are completed by an edge model, finally …
Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa
Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional And Recurrent Neural Networks, Sonia Perez-Gamboa
Electronic Theses, Projects, and Dissertations
Non-intrusive sensor-based human activity recognition is utilized in a spectrum of applications including fitness tracking devices, gaming, health care monitoring, and smartphone applications. Deep learning models such as convolutional neural networks (CNNs) and long short-term memory (LSTMs) recurrent neural networks provide a way to achieve human activity recognition accurately and effectively. This project designed and explored a variety of multi-layer hybrid deep learning architectures which aimed to improve human activity recognition performance by integrating local features and was scale invariant with dependencies of activities. We achieved a 94.7% activity recognition rate on the University of California, Irvine public domain dataset …
Cyber Frameworks Small Business Application, Sergio Gonzales
Cyber Frameworks Small Business Application, Sergio Gonzales
Electronic Theses, Projects, and Dissertations
This project is an analysis of two cyber-attack analysis frameworks and how they may relate to a small business environment. Small businesses suffer significantly from malware attacks like ransomware. This analysis looks at the Cyber Kill Chain framework and the MITRE ATT&CK framework by looking at how each compare when applied to a simple small network and a malware attack. Each framework broke down the cyber-attack differently and by looking at how the frameworks performed within the simplified network provided insights to when small businesses should focus on malware risk reduction. Each framework, despite having different methods of analysis, arrived …
Advantages And Disadvantages Of Centralized Versus Decentralized Information Systems And Services From A Project Management Perspective, Garrett William Cuillier
Advantages And Disadvantages Of Centralized Versus Decentralized Information Systems And Services From A Project Management Perspective, Garrett William Cuillier
Electronic Theses, Projects, and Dissertations
After an extensive review of the available literature, it is evident that within the Information Systems and Technology (IT) field, project managers are still debating whether to centralize or decentralize IT systems and services personnel. This decision can have a major impact on the effectiveness of the project management process with both organizational structures having advantages and disadvantages. The study examines two real-world examples of projects in the aerospace and defense technology industry that were performed from either a centralized or decentralized organizational structure. Using an industry standard project management methodology (i.e., Agile and Scrum), the study clearly identified the …
College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran
College Of Education Filemaker Extraction And End-User Database Development, Andrew Tran
Electronic Theses, Projects, and Dissertations
The College of Education (CoE) at the California State University San Bernardino (CSUSB) developed a system to keep track of both state and national accreditation requirements using FileMaker 5, a database system. This accreditation data is crucial for reporting and record-keeping for the CSU Chancellor’s Office as well as the State of California. However, the database system was developed several decades ago, and software support has long since been dropped, causing the CoE’s legacy accreditation data to be at risk of being lost should the software or hardware suffer permanent failure. The purpose of this project was to perform extraction …
Learn Programming In Virtual Reality? A Project For Computer Science Students, Benjamin Alexander
Learn Programming In Virtual Reality? A Project For Computer Science Students, Benjamin Alexander
Electronic Theses, Projects, and Dissertations
This paper presents the development of a new learning platform in Virtual Reality to create a more immersive and intuitive learning experience for introduction of programming courses at an intermediate level. This platform is designed to create a central hub for interactive courseware and facilitate distance learning in our post COVID world. Utilizing Virtual Reality, the application teaches specific topics in Computer Science using scripted animations, tutorials, and interactive games. A pilot study was conducted to evaluate the user experience and learning outcomes. Participants of this study reported they were more engaged and motivated in learning programing concepts. We found …
Detection Of Epilepsy Using Machine Learning, Balamurugan Murugesan
Detection Of Epilepsy Using Machine Learning, Balamurugan Murugesan
Electronic Theses, Projects, and Dissertations
Epilepsy is a complex neurological disorder characterized by recurrent seizures. An electroencephalogram (EEG) is typically used in the diagnosis of Epilepsy. Normally, EEGs are reviewed and analyzed by trained neurologists, but this can be time-consuming and error-prone. In this paper, we propose combining multiple classifiers in a multi-level fashion using stacked generalization to develop an effective solution for the detection of epilepsy using EEG data. Different classifiers such as Random Forest (RF), Recurrent Neural Networks (RNN), and XGBoost (XGB) were tested. The method was evaluated using Children’s Hospital Boston and Massachusetts Institute of Technology (CHB-MIT) dataset. The experimental results demonstrated …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Electronic Theses, Projects, and Dissertations
The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …
Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain
Beginning The Information Security Journey For Small And Medium Enterprises Through Business Continuity Planning And Infrastructure Automation, Aaron Chamberlain
Electronic Theses, Projects, and Dissertations
Technology has become an essential component of enterprises, driving productivity, innovation, and defining entire processes and product categories. However, these advances come with additional risk; the devices that drive an enterprise can fail at any time or be attacked by malicious actors. Larger enterprises have learned to deal with these risks, but small and medium-sized enterprises (SMEs) have been largely left behind. This project sought to investigate the cybersecurity-related problems SMEs experience and what SMEs can do to solve them. In addition, the project examines the types of information security incidents that occur within SMEs and their financial preparedness for …
Desktop Application For The Puzzle Board Game “Rush Hour”, Huanqing Nong
Desktop Application For The Puzzle Board Game “Rush Hour”, Huanqing Nong
Electronic Theses, Projects, and Dissertations
Rush Hour is a sliding block puzzle board game. This game comes with a board of 6 x 6 grid simulating a parking lot with an exit at the right end of the third row and some vehicle models of size 1 x 2 or 1 x 3 which can slide along the grooves of the grid forward or backward. The goal of the game is to clear the path by moving the vehicles on the board in a certain way for the target car, which lies on the third row of the grid, to merge out the “parking lot” …
Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden
Cybersecurity: Creating A Cybersecurity Culture, Steven Edward Ogden
Electronic Theses, Projects, and Dissertations
Human error has been identified as one of the highest contributing factors to successful cyber-attacks and security incidents that result in data leaks and theft of sensitive information. Human error has been caused by employees not behaving securely when interacting with information systems. This culminating experience project investigated how a cybersecurity culture can be developed to address the human error problem. The research was based on several key questions that focus on influencing factors of human behavior and best practices that have been used to develop a cybersecurity culture so that employees engage in secure behaviors. Social Cognitive Theory was …
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Privacy Is Infringed In Plain Sight And How To Dissapear, Zachary Taylor
Electronic Theses, Projects, and Dissertations
This culminating project explored how Amazon, Apple, Facebook, Google, and Microsoft infringe on their user's information privacy. Focus was on tools and techniques one can use to strengthen their information privacy. Privacy or information privacy was defined as the right to have some control over how your personal information is collected and used. This project will also introduce a verity of open-source tools and techniques that would help the unsuspected user to maintain their privacy.The questions asked were: what are some common techniques that Amazon, Apple, Facebook, Google, or Microsoft use to gain personal information?, At what cost would it …