Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke May 2023

Creating Project Contrast: A Video Game Exploring Consciousness And Qualia, Pierce Papke

Honors Projects

Project Contrast is a video game that explores how the unique traits inherent to video games might engage reflective player responses to qualitative experience. Project Contrast does this through suspension of disbelief, avatar projection, presence, player agency in storytelling, visual perception, functional gameplay, and art. Considering the difficulty in researching qualitative experience due to its subjectivity and circular explanations, I created Project Contrast not to analyze qualia, though that was my original hope. I instead created Project Contrast as an avenue for player self-reflection and learning about qualitative experience. While video games might be just code and art on a …


Using Deep Neural Networks To Classify Astronomical Images, Andrew D. Macpherson May 2023

Using Deep Neural Networks To Classify Astronomical Images, Andrew D. Macpherson

Honors Projects

As the quantity of astronomical data available continues to exceed the resources available for analysis, recent advances in artificial intelligence encourage the development of automated classification tools. This paper lays out a framework for constructing a deep neural network capable of classifying individual astronomical images by describing techniques to extract and label these objects from large images.


Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne May 2022

Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne

Honors Projects

Book recommendation applications combine word-of-mouth recommendations with algorithms that can suggest books based on a user’s account activity, creating a robust system for finding new books to read. Current research on recommendation systems is purely quantitative, focusing on the efficacy of the system, and content analyses are only just beginning to be performed on mobile applications. I use previous content analyses on applications as a basis for creating a content analysis framework for book recommendation applications. This framework can be used to analyze what users find important in book recommendation apps and inform app creators about their users’ wants and …


Machine Learning In Stock Price Prediction Using Long Short-Term Memory Networks And Gradient Boosted Decision Trees, Carl Samuel Cederborg May 2021

Machine Learning In Stock Price Prediction Using Long Short-Term Memory Networks And Gradient Boosted Decision Trees, Carl Samuel Cederborg

Honors Projects

Quantitative analysis has been a staple of the financial world and investing for many years. Recently, machine learning has been applied to this field with varying levels of success. In this paper, two different methods of machine learning (ML) are applied to predicting stock prices. The first utilizes deep learning and Long Short-Term Memory networks (LSTMs), and the second uses ensemble learning in the form of gradient tree boosting. Using closing price as the training data and Root Mean Squared Error (RMSE) as the error metric, experimental results suggest the gradient boosting approach is more viable.

Honors Symposium: ML is …


Encryption Backdoors: A Discussion Of Feasibility, Ethics, And The Future Of Cryptography, Jennifer A. Martin Jun 2017

Encryption Backdoors: A Discussion Of Feasibility, Ethics, And The Future Of Cryptography, Jennifer A. Martin

Honors Projects

In the age of technological advancement and the digitization of information, privacy seems to be all but an illusion. Encryption is supposed to be the white knight that keeps our information and communications safe from unwanted eyes, but how secure are the encryption algorithms that we use? Do we put too much trust in those that are charged with implementing our everyday encryption systems? This paper addresses the concept of backdoors in encryption: ways that encryption systems can be implemented so that the security can be bypassed by those that know about its existence. Many governments around the world are …