Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Mobile Solar Energy Environmental Control System With Remote Accessibility, Luis S. Garay May 2019

Mobile Solar Energy Environmental Control System With Remote Accessibility, Luis S. Garay

Theses and Dissertations

The proposed system, Mobile Solar Energy Environmental Control System with Remote Accessibility (mSEECS w/ RA), is based on the utilization of an already available Energy Storage Unit (ESU) in a Transport Unit System (TUS) to harness solar energy to provide a system to enhance the environment, safety and security of a TUS in a stationary or a mobile state by monitoring and controlling the operation of its onboard systems, and provide remote accessibility to know the state of affairs at any time. To relate to a real world application, the battery (ESU) of a vehicle (TUS) is underutilized …


The Public’S Perception Of Humanlike Robots: Online Social Commentary Reflects An Appearance-Based Uncanny Valley, A General Fear Of A “Technology Takeover”, And The Unabashed Sexualization Of Female-Gendered Robots, Megan K. Strait, Cynthia Aguillon, Virginia Contreras, Noemi Garcia Dec 2017

The Public’S Perception Of Humanlike Robots: Online Social Commentary Reflects An Appearance-Based Uncanny Valley, A General Fear Of A “Technology Takeover”, And The Unabashed Sexualization Of Female-Gendered Robots, Megan K. Strait, Cynthia Aguillon, Virginia Contreras, Noemi Garcia

Computer Science Faculty Publications and Presentations

Towards understanding the public’s perception of humanlike robots, we examined commentary on 24 YouTube videos depicting social robots ranging in human similarity – from Honda’s Asimo to Hiroshi Ishiguro’s Geminoids. In particular, we investigated how people have responded to the emergence of highly humanlike robots (e.g., Bina48) in contrast to those with more prototypically-“robotic” appearances (e.g., Asimo), coding the frequency at which the uncanny valley versus fears of replacement and/or a “technology takeover” arise in online discourse based on the robot’s appearance. Here we found that, consistent with Masahiro Mori’s theory of the uncanny valley, people’s commentary reflected an aversion …


Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian Aug 2006

Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian

Theses and Dissertations - UTB/UTPA

Image up-sampling is an effective technique, useful in today's digital image processing applications and rendering devices. In image up-sampling, an image is enhanced from a lower resolution to a higher resolution with the degree of enhancement depending upon application requirements. It is known that the traditional interpolation based approaches for up-sampling, such as the Bilinear or Bicubic interpolations, blur the resultant images along edges and image features. Furthermore, in color imagery, these interpolation-based up-sampling methods may have color infringing artifacts in the areas where the images contain sharp edges and fine textures. We present an interesting up-sampling algorithm based on …


Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan Dec 2005

Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan

Theses and Dissertations - UTB/UTPA

This thesis studies the properties of distance-based outliers and a better detection method for large multi-dimensional datasets. Outlier detection is an important task to find out the objects that deviate in a high ratio from the rest of the objects. The proposed algorithm breaks the data set into divisions and sets the area of access for each division, thus reducing the unnecessary access for a major set of elements. This algorithm reduces the run time of the existing algorithm by using separators. Datasets of varying sizes have been tested to analyze the empirical values of these procedures. Effective data structures …


An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier Dec 2005

An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier

Theses and Dissertations - UTB/UTPA

The algorithm most often used for the problem of interpolating sparse multivariate polynomials from their values is Zippel's probabilistic algorithm (1988). The algorithm evaluates the function to be interpolated at a significant number of points, and for many problems of interest processing evaluations dominates the running time. This thesis presents an improvement of Zippel's algorithm, which decreases the number of evaluations needed for an interpolation by using transposed Vandermonde systems for the univariate interpolation step of Zippel's algorithm. The technique also allows a more general form of the algorithm: it becomes possible to interpolate more than one variable within a …


Naboh System: Gathering Intelligence From Traffic Patterns, Angelica M. Delgado Aug 2005

Naboh System: Gathering Intelligence From Traffic Patterns, Angelica M. Delgado

Theses and Dissertations - UTB/UTPA

Network traffic anomalies are important indicators of problematic traffic over a network. Network activity has patterns associated with it depending on the applications running on the local hosts connected to the network. There are traffic parameters into which network traffic of a local host can be divided: bandwidth usage, number of remote hosts that a local host is connecting to and vice versa, and number of ports used by the local host. This thesis develops a system for detecting and profiling network anomalies by analyzing traffic parameters using intelligent computational techniques. The developed system gathers intelligence by examining only the …


Entropy-Based 2d Image Dissimilarity Measure, Meng-Hung Wu Aug 2005

Entropy-Based 2d Image Dissimilarity Measure, Meng-Hung Wu

Theses and Dissertations - UTB/UTPA

Traditional histogram or statistics based 2D image similarity/dissimilarity metrics fail to handle conjugate pair of black and white images, due to the lack of spatial information in the measurement. Recently proposed Compression-based Dissimilarity Measure (CDM) [1] based on the concept of Kolmogorov complexity has provided a different paradise for similarity measurement. However, without a clear definition how to “concatenate” two 2D images, CDM has difficulties to directly apply with 2D images. In this thesis, an entropy -based 2D image dissimilarity measure is proposed within the same Kolmogorov complexity paradise. The spatial relationship between images is embedded in our metric, and …


Compensation For Automatic White Balance Correction With Histogram Equalization, David D. Kirtley May 2005

Compensation For Automatic White Balance Correction With Histogram Equalization, David D. Kirtley

Theses and Dissertations - UTB/UTPA

Histogram equalization rather than hard scaling can be used as an effective technique to counter automatic white balance correction in video processing to facilitate motion detection in video sequences. Benefits of this method are less user interaction needed by not needing to preview the image to select a scaling area and reduction of the non-focused changes in the video caused by using a scaling area. Reduced interaction lends itself to data mining of video.


Empirical Performance Analysis Of Two Algorithms For Mining Intentional Knowledge Of Distance-Based Outliers, Enbamoorthy Prasanthi May 2005

Empirical Performance Analysis Of Two Algorithms For Mining Intentional Knowledge Of Distance-Based Outliers, Enbamoorthy Prasanthi

Theses and Dissertations - UTB/UTPA

This thesis studies the empirical analysis of two algorithms, Uplattice and Jumplattice for mining intentional knowledge of distance-based outliers [19]. These algorithms detect strongest and weak outliers among them. Finding outliers is an important task required in major applications such as credit-card fraud detection, and the NHL statistical studies. Datasets of varying sizes have been tested to analyze the empirical values of these two algorithms. Effective data structures have been used to gain efficiency in memory-performance. The two algorithms provide intentional knowledge of the detected outliers which determines as to why an identified outlier is exceptional. This knowledge helps the …