Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (1770)
- Selected Works (261)
- California Polytechnic State University, San Luis Obispo (194)
- Western University (194)
- Air Force Institute of Technology (104)
-
- SelectedWorks (103)
- California State University, San Bernardino (85)
- City University of New York (CUNY) (70)
- University of Tennessee, Knoxville (52)
- Edith Cowan University (47)
- Old Dominion University (47)
- University of Nevada, Las Vegas (46)
- Portland State University (42)
- University of Arkansas, Fayetteville (38)
- University of Nebraska - Lincoln (36)
- San Jose State University (32)
- Loyola University Chicago (30)
- Rochester Institute of Technology (29)
- Kennesaw State University (27)
- Technological University Dublin (22)
- University of Dayton (22)
- Purdue University (21)
- Embry-Riddle Aeronautical University (18)
- The University of Akron (18)
- University of Massachusetts Amherst (17)
- Institute of Business Administration (16)
- Universitas Negeri Yogyakarta (16)
- Dakota State University (15)
- United Arab Emirates University (15)
- University of Nebraska at Omaha (14)
- Keyword
-
- Software engineering (131)
- Software (83)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (72)
- Machine learning (65)
- Deep learning (59)
-
- Software Engineering (55)
- Android (54)
- Computer science (44)
- Computer Science (43)
- Empirical study (43)
- Machine Learning (39)
- Programming (38)
- Software development (38)
- Java (35)
- Software maintenance (34)
- Deep Learning (33)
- Security (33)
- Refactoring (32)
- Model Check (29)
- Software testing (29)
- Collaboration (27)
- Data mining (26)
- Ontology (25)
- Testing (25)
- Services Computing (24)
- Algorithms (23)
- Computer software -- Development (23)
- Mobile computing (23)
- Stack Overflow (23)
- Visualization (23)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (1725)
- Electrical and Computer Engineering Publications (129)
- Theses and Dissertations (115)
- Collaborative Agent Design (CAD) Research Center (103)
- Philadelphia University, Jordan (79)
-
- Theses Digitization Project (73)
- Electronic Thesis and Dissertation Repository (62)
- Publications and Research (55)
- Jia Zhang (47)
- David LO (39)
- Master's Theses (37)
- Articles (29)
- Computer Science: Faculty Publications and Other Works (29)
- Computer Science Faculty Publications (28)
- Theses : Honours (28)
- Honors Theses (27)
- Gabriel A. Moreno (26)
- Computer Science and Software Engineering (25)
- Dissertations and Theses Collection (Open Access) (25)
- The Harlan D. Mills Collection (25)
- Computer Engineering (24)
- Separations Campaign (TRP) (24)
- Computer Science Faculty Publications and Presentations (21)
- Doctoral Dissertations (21)
- Computer Science and Computer Engineering Undergraduate Honors Theses (19)
- Electronic Theses and Dissertations (19)
- Theses (19)
- Master's Projects (18)
- Williams Honors College, Honors Research Projects (18)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (17)
Articles 1 - 30 of 3926
Full-Text Articles in Physical Sciences and Mathematics
Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu
Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu
Research Collection School Of Computing and Information Systems
This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …
Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He
Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He
Research Collection School Of Computing and Information Systems
Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …
Henna Chatbot Capstone Review, Kobe Norcross
Henna Chatbot Capstone Review, Kobe Norcross
University Honors Theses
This thesis reviews the development of the Henna Chatbot, an AI-powered DEI consultant designed to provide personalized feedback to organizations. Sponsored by DEI consultant Arsh Haque, the project aims to address gaps in current DEI software, which often lacks team-specific feedback. The Henna Chatbot leverages GPT-3.5 Turbo to create an affordable SaaS platform where organizations can train Henna with their DEI values, and Henna will help organizations stay aligned with those values. The project spanned twenty weeks and was completed by a team of eight computer science students at Portland State University. The development process followed Agile methodologies, emphasizing effective …
The Institutional Challenges Of A Quantified Self Study An Attempt To Ascertain How Data Collected From A Mobile Device Can Be An Indicator Of Personal Mental Health Over Time., Julian E. Lazaras
University Honors Theses
The adoption of an application of new technology always comes with a bias, this is never more true for the case of human behavioral analytics within higher education. While movements such as the quantified self movement make strides to reinterpret the realm of data analytics, psychology, and computer science, there are inevitably limitations to the adoption and application of such approaches within the standard realm of research. Herein is presented a case where an effort to evaluate the prospect of use of mobile phone data as secondary indicators of personal mental health through the lens of data analysis was put …
Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha
Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha
University Honors Theses
Collectible card games (CCGs) have been a wildly popular game genre since the release of Wizards of the Coast’s Magic: The Gathering. These games revolve around their thousands of cards and the hundreds of thousands of interactions they can create with their many effects. For designers, it is an incredibly demanding task to ensure that every single card works properly and that each card’s text unambiguously conveys its intended behavior in all cases. The task only grows more difficult over time as the number of cards in the game grows and card effects become more complex or experimental. If the …
The Robot On The Hill, James Ryan
The Robot On The Hill, James Ryan
College of Computing and Digital Media Dissertations
“The Robot on the Hill” is a rogue-like autobattler that procedurally models the state of the individual in the information age. The game abruptly transitions between diverse framings - a hill, a bedroom, a pond, a chessboard, the void - in order to highlight the disjointedness that is present in the informationalizing of self and reality. It dialogues with Byung Chul Han and Heidegger to portray what Han describes as a ‘narrative crisis’ in modernity and the devaluation of experience. When the value of experience diminishes and disintegrates, “all that is left is bare life, a kind of survival.” …
Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude
Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude
Research Collection School Of Computing and Information Systems
This article looks into possible scenarios where developers might consider turning their free and open source software into protestware. Using different frameworks commonly used in artificial intelligence (AI) ethics, we extend the applications of AI ethics to the study of protestware.
Virtual Field Environments Capstone Software Review, Ashton Sawyer
Virtual Field Environments Capstone Software Review, Ashton Sawyer
University Honors Theses
This is a review of the Virtual Field Environments computer science capstone project, sponsored by geology professor Rick Hugo. The tool aims to create and render VFEs, interactable 360° environments hosted on the web that are used as virtual field trips for K-12 students. This essay discusses the development process, including understanding requirements, tool and technology selection, problem-solving, and decision-making strategies. It also highlights the differences between the capstone and the other core computer science courses, and how those differences help to prepare students for the workforce. The project was completed over the course of twenty weeks by a team …
Auditory Ace Mobile Application Capstone Review, Makayla Smith
Auditory Ace Mobile Application Capstone Review, Makayla Smith
University Honors Theses
This paper describes the development process and outcomes of my 2023-2024 Capstone Project, Auditory Ace, a self-directed auditory training mobile application for individuals with cochlear implants. Recognizing the limitations of current market offerings, Dr. Timothy Anderson created a Capstone project proposal to develop an accessible auditory training mobile application. The Capstone team that took on this proposal consisted of Darya Haines, Dustin Huynh, Jordan Nguyen, Nihar Koppolu, Scott Thorkelson, Sienna Day, and myself, Layla Smith. This paper is structured to follow the Agile software development methodology, which we used to develop Auditory Ace, reviewing in detail every major choice we …
Lang2views Capstone: The Importance Of A Conscientious Team Lead, Joseph D. Wornath
Lang2views Capstone: The Importance Of A Conscientious Team Lead, Joseph D. Wornath
University Honors Theses
This review essay reflects the Lang2views capstone project from the perspective of a team lead. The Lang2views capstone project was a web-based user interface designed to simplify how the Lang2views corporation localizes videos into other languages for their clients. Our capstone group was split into three subgroups: front-end, back-end, and DevOps. The strategy for completing the project went through a major change midway through development wherein we changed our software development methodology from a more rigid Waterfall-type approach to a more flexible Agile methodology. Because of this, many of the initially planned features had to be reevaluated as out of …
A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug
A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug
Honors College Theses
Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …
Machine Learning: Face Recognition, Mohammed E. Amin
Machine Learning: Face Recognition, Mohammed E. Amin
Publications and Research
This project explores the cutting-edge intersection of machine learning (ML) and face recognition (FR) technology, utilizing the OpenCV library to pioneer innovative applications in real-time security and user interface enhancement. By processing live video feeds, our system encodes visual inputs and employs advanced face recognition algorithms to accurately identify individuals from a database of photos. This integration of machine learning with OpenCV not only showcases the potential for bolstering security systems but also enriches user experiences across various technological platforms. Through a meticulous examination of unique facial features and the application of sophisticated ML algorithms and neural networks, our project …
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Military Cyber Affairs
Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Large Language Models For Qualitative Research In Software Engineering: Exploring Opportunities And Challenges, Muneera Bano, Rashina Hoda, Didar Zowghi, Christoph Treude
Large Language Models For Qualitative Research In Software Engineering: Exploring Opportunities And Challenges, Muneera Bano, Rashina Hoda, Didar Zowghi, Christoph Treude
Research Collection School Of Computing and Information Systems
The recent surge in the integration of Large Language Models (LLMs) like ChatGPT into qualitative research in software engineering, much like in other professional domains, demands a closer inspection. This vision paper seeks to explore the opportunities of using LLMs in qualitative research to address many of its legacy challenges as well as potential new concerns and pitfalls arising from the use of LLMs. We share our vision for the evolving role of the qualitative researcher in the age of LLMs and contemplate how they may utilize LLMs at various stages of their research experience.
Breathpro: Monitoring Breathing Mode During Running With Earables, Changshuo Hu, Thivya Kandappu, Yang Liu, Cecilia Mascolo, Dong Ma
Breathpro: Monitoring Breathing Mode During Running With Earables, Changshuo Hu, Thivya Kandappu, Yang Liu, Cecilia Mascolo, Dong Ma
Research Collection School Of Computing and Information Systems
Running is a popular and accessible form of aerobic exercise, significantly benefiting our health and wellness. By monitoring a range of running parameters with wearable devices, runners can gain a deep understanding of their running behavior, facilitating performance improvement in future runs. Among these parameters, breathing, which fuels our bodies with oxygen and expels carbon dioxide, is crucial to improving the efficiency of running. While previous studies have made substantial progress in measuring breathing rate, exploration of additional breathing monitoring during running is still lacking. In this work, we fill this gap by presenting BreathPro, the first breathing mode monitoring …
Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton
Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton
<strong> Theses and Dissertations </strong>
As virtual reality (VR) becomes more commonly used in education, it is important to understand the technology’s weakness and mitigate any potential negative effects on student success. One adverse side-effect of VR use is simulation-induced motion sickness, known in the context of VR as VR sickness. Previous research by Howard and Van Zandt (2021) found that possessing a phobia had a significant positive correlation with VR sickness, but only if the phobia is triggered by the simulation, suggesting that symptoms are actually connected to the anxiety the phobia induces. This study explored the hypothesized correlation between anxiety and VR sickness, …
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo
Research Collection School Of Computing and Information Systems
With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate detection systems. Heart rate is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable heart rate monitoring with wearable devices has therefore gained increasing attention in recent years. Existing heart rate detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient …
The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi
The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi
Computer Science and Computer Engineering Undergraduate Honors Theses
The strategic planning of offensive passing plays in the NFL incorporates numerous variables, including defensive coverages, player positioning, historical data, etc. This project develops an application using an analytical framework and an interactive model to simulate and visualize an NFL offense's passing strategy under varying conditions. Using R-programming and data management, the model dynamically represents potential passing routes in response to different defensive schemes. The system architecture integrates data from historical NFL league years to generate quantified route scores through designed mathematical equations. This allows for the prediction of potential passing routes for offensive skill players in response to the …
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Computer Science and Computer Engineering Undergraduate Honors Theses
As traditional centralized social media platforms face growing concerns over data privacy, censorship, and lack of user control, there has been an increasing interest in decentralized alternatives. This thesis explores the design and implementation of a decentralized social media application by integrating two key technologies: Solid and the InterPlanetary File System (IPFS). Solid, led by Sir Tim Berners-Lee, enables users to store and manage their personal data in decentralized "Pods," giving them ownership over their digital identities. IPFS, a peer-to-peer hypermedia protocol, facilitates decentralized file storage and sharing, ensuring content availability and resilience against censorship. By leveraging these technologies, the …
Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz
Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Formal software testing education is important for building efficient QA professionals. Various aspects of quality assurance approaches are usually covered in courses for training software testing students. Automated Test Tools is one of the core courses in the software testing post-graduate curriculum due to the high demand for automated testers in the workforce. It is important to understand which factors are affecting student performance in the automated testing course to be able to assist the students early on based on their needs. Various metrics that are considered for predicting student performance in this testing course are student engagement, grades on …
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi
University of New Orleans Theses and Dissertations
This study compares the performance of deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Transformer, in predicting stock prices across five companies (AAPL, CSCO, META, MSFT, and TSLA) from July 2019 to July 2023. Key findings reveal that GRU models generally exhibit the lowest Mean Absolute Error (MAE), indicating higher precision, particularly notable for CSCO with a remarkably low MAE. While LSTM models often show slightly higher MAE values, they outperform Transformer models in capturing broader trends and variance in stock prices, as evidenced by higher R-squared (R2) values. Transformer models generally exhibit higher MAE …
Graph-Based And Anomaly Detection Learning Models For Just-In-Time Defect Prediction, Aradhana Soni
Graph-Based And Anomaly Detection Learning Models For Just-In-Time Defect Prediction, Aradhana Soni
Doctoral Dissertations
Efficiently identifying and resolving software defects is essential for producing high quality software. Early and accurate prediction of these defects plays a pivotal role in maintaining software quality. This dissertation focuses on advancing software defect prediction methodologies and practical applications by incorporating graph-based learning techniques and generative adversarial-based anomaly detection techniques. First, we present a novel approach to software defect prediction by introducing a graph-based defect ratio (GDR). This innovative metric leverages the intricate graph structure that captures the interdependencies among developers, commits, and repositories, offering a promising alternative to standard traditional features. This study highlights the potential for graph-based …
Easier Air Alert Platform: A Design And Approach To Creating A Distributed Air Quality Monitoring And Alert System, Bryceton Bible
Easier Air Alert Platform: A Design And Approach To Creating A Distributed Air Quality Monitoring And Alert System, Bryceton Bible
Masters Theses
This thesis presents the design approach, development and implementation of the Elders Alert System for Imminent Environmental Risk (EASIER) project, an air quality monitoring and alert system aiming to improve the health and wellness of under-served elder communities, as a part of the Tennessee Valley Authority Connected Communities initiative for Environmental Justice. The EASIER project provides homes with a fully integrated, connected system capable of real-time air quality monitoring, notifications and descriptions of potential air quality risks, and educational material to empower these community members to take charge of their own air health. Further, EASIER aims to inform relevant family/friends …
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes
A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes
Honors Thesis
Frequency shift keying (FSK) is an old but powerful form of modulation that powered much of the early modems of the 1960’s, and the author felt inspired to make his own version of audio binary FSK modulation. He researched the general history and legacy of the Bell 103, a modem using FSK that defined telecommunication for the next few decades. Using research of the most common English characters of recent emails to determine which English characters should have the shortest bit length, a novel character encoding standard was created using variable bit rate. In addition, he has created a modulation …
Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk
Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk
Master's Theses
Semantic segmentation of point clouds is a basic step for many autonomous systems including automobiles. In autonomous driving systems, LiDAR sensors are frequently used to produce point cloud sequences that allow the system to perceive the environment and navigate safely. Modern machine learning techniques for segmentation have predominately focused on single-scan segmentation, however sequence segmentation has often proven to perform better on common segmentation metrics. Using the popular Semantic KITTI dataset, we show that by providing point cloud sequences to a segmentation pipeline based on Point Transformer v3, we increase the segmentation performance between seven and fifteen percent when compared …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
ATU Research Symposium
Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
ATU Research Symposium
JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …