Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

California Polytechnic State University, San Luis Obispo

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 66

Full-Text Articles in Other Computer Sciences

Legislative Language For Success, Sanjana Gundala Jun 2022

Legislative Language For Success, Sanjana Gundala

Master's Theses

Legislative committee meetings are an integral part of the lawmaking process for local and state bills. The testimony presented during these meetings is a large factor in the outcome of the proposed bill. This research uses Natural Language Processing and Machine Learning techniques to analyze testimonies from California Legislative committee meetings from 2015-2016 in order to identify what aspects of a testimony makes it successful. A testimony is considered successful if the alignment of the testimony matches the bill outcome (alignment is "For" and the bill passes or alignment is "Against" and the bill fails). The process of finding what …


Comparing Learned Representations Between Unpruned And Pruned Deep Convolutional Neural Networks, Parker Mitchell Jun 2022

Comparing Learned Representations Between Unpruned And Pruned Deep Convolutional Neural Networks, Parker Mitchell

Master's Theses

While deep neural networks have shown impressive performance in computer vision tasks, natural language processing, and other domains, the sizes and inference times of these models can often prevent them from being used on resource-constrained systems. Furthermore, as these networks grow larger in size and complexity, it can become even harder to understand the learned representations of the input data that these networks form through training. These issues of growing network size, increasing complexity and runtime, and ambiguity in the understanding of internal representations serve as guiding points for this work.

In this thesis, we create a neural network that …


Patterns Of Academic Help-Seeking In Undergraduate Computing Students, Augie Doebling Mar 2022

Patterns Of Academic Help-Seeking In Undergraduate Computing Students, Augie Doebling

Master's Theses

Knowing when and how to seek academic help is crucial to the success of undergraduate computing students. While individual help-seeking resources have been studied, little is understood about the factors influencing students to use or avoid certain re- sources. Understanding students’ patterns of help-seeking can help identify factors contributing to utilization or avoidance of help resources by different groups, an important step toward improving the quality and accessibility of resources. We present a mixed-methods study investigating the help-seeking behavior of undergraduate computing students. We collected survey data (n = 138) about students’ frequency of using several resources followed by one-on-one …


Analysis Of The Slo Bay Microbiome From A Network Perspective, Lien Viet Nguyen Jul 2021

Analysis Of The Slo Bay Microbiome From A Network Perspective, Lien Viet Nguyen

Master's Theses

Microorganisms are key players in the ecosystem functioning. In this thesis, we developed a framework to preprocess raw microbiome data, build a correlation network, and analyze co-occurrence patterns between microbes. We then applied this framework to a marine microbiome dataset. The dataset used in this study comes from a year-long time-series to characterize the microbial communities in our coastal waters off the Cal Poly Pier. In analyzing this dataset, we were able to observe and confirm previously discovered patterns of interactions and generate hypotheses about new patterns. The analysis of co-occurrences between prokaryotic and eukaryotic taxa is relatively novel and …


Pilltank, Lucas Chang, Hayden Tam, Aaron Teh, Krista Round Jun 2021

Pilltank, Lucas Chang, Hayden Tam, Aaron Teh, Krista Round

Electrical Engineering

Imagine an elderly family member, going through their daily routine of taking their pills. They find their pill box; however, they are having trouble identifying all the pills in there. Is there a name on the tablet? Can they read what it says? Do they just trust that the medication in their box is correct? How can they properly take care of themselves if they can not even confirm that what they are taking is the right medication? To combat this issue that many face, we present PillTank.

To decrease the risk of consuming the wrong medication, PillTank identifies the …


A Survey Of Computer Graphics Facial Animation Methods: Comparing Traditional Approaches To Machine Learning Methods, Joseph A. Johnson Jun 2021

A Survey Of Computer Graphics Facial Animation Methods: Comparing Traditional Approaches To Machine Learning Methods, Joseph A. Johnson

Master's Theses

Human communications rely on facial expression to denote mood, sentiment, and intent. Realistic facial animation of computer graphic models of human faces can be difficult to achieve as a result of the many details that must be approximated in generating believable facial expressions. Many theoretical approaches have been researched and implemented to create more and more accurate animations that can effectively portray human emotions. Even though many of these approaches are able to generate realistic looking expressions, they typically require a lot of artistic intervention to achieve a believable result. To reduce the intervention needed to create realistic facial animation, …


A Study On The Mental Health Of Women In The Csse Department Of California Polytechnic State University, Sophia Lao, Gabriella Garcia Nobili Jun 2019

A Study On The Mental Health Of Women In The Csse Department Of California Polytechnic State University, Sophia Lao, Gabriella Garcia Nobili

Computer Science and Software Engineering

The goal of this paper is to explore the perceived effect that the Computer Science Curriculum has on the mental health of female students. To discover these effects we conducted 50 interviews over a period of several months with the female students of the Computer Science and Software Engineering (CSSE) department at California Polytechnic State University in San Luis Obispo. The total amount of Computer Science (CSC) majors at this institution is approximately 680, with 150 of them being female, so we were able to gather responses from 33.3% of the female CSC students from our interviews. It is worth …


Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves Jun 2019

Grammar-Based Procedurally Generated Village Creation Tool, Kevin Matthew Graves

Computer Engineering

This project is a 3D village generator tool for Unity. It consists of three components: a building, mountain, and river generator. All of these generators use grammar-based procedural generation in order to create a unique and logical village and landscape each time the program is run.


Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt Jun 2019

Identifying Hourly Traffic Patterns With Python Deep Learning, Christopher L. Leavitt

Computer Engineering

This project was designed to explore and analyze the potential abilities and usefulness of applying machine learning models to data collected by parking sensors at a major metro shopping mall. By examining patterns in rates at which customer enter and exit parking garages on the campus of the Bellevue Collection shopping mall in Bellevue, Washington, a recurrent neural network will use data points from the previous hours will be trained to forecast future trends.


Evaluating Projections And Developing Projection Models For Daily Fantasy Basketball, Eric C. Evangelista Jun 2019

Evaluating Projections And Developing Projection Models For Daily Fantasy Basketball, Eric C. Evangelista

Master's Theses

Daily fantasy sports (DFS) has grown in popularity with millions of participants throughout the world. However, studies have shown that most profits from DFS contests are won by only a small percentage of players. This thesis addresses the challenges faced by DFS participants by evaluating sources that provide player projections for NBA DFS contests and by developing machine learning models that produce competitive player projections.

External sources are evaluated by constructing daily lineups based on the projections offered and evaluating those lineups in the context of all potential lineups, as well as those submitted by participants in competitive FanDuel DFS …


Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu Dec 2018

Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu

Master's Theses

Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …


Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase Jun 2018

Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase

Computer Science and Software Engineering

In this project, I sought to develop and prove new algorithms to create spanning trees on general graphs with per-vertex degree constraints. This means that each vertex in the graph would have some additional value, a degree constraint d. For a spanning tree to be correct, every vertex vi in the spanning tree must have a degree exactly equal to a degree constraint di. This poses an additional constraint on what would otherwise be a trivial spanning tree problem. In this paper, two proofs related to my studies will be discussed and analyzed, leading to my algorithm …


Topographic Maps: Image Processing And Path-Finding, Calin Washington Jun 2018

Topographic Maps: Image Processing And Path-Finding, Calin Washington

Master's Theses

Topographic maps are an invaluable tool for planning routes through unfamiliar terrain. However, accurately planning routes on topographic maps is a time- consuming and error-prone task. One factor is the difficulty of interpreting the map itself, which requires prior knowledge and practice. Another factor is the difficulty of making choices between possible routes that have different trade-offs between length and the terrain they traverse.

To alleviate these difficulties, this thesis presents a system to automate the process of finding routes on scanned images of topographic maps. The system allows users to select any two points on a topographic map and …


Acceleration Of Jaccard's Index Algorithm For Training To Tag Damage On Post-Earthquake Images, Kyle John Mulligan Jun 2018

Acceleration Of Jaccard's Index Algorithm For Training To Tag Damage On Post-Earthquake Images, Kyle John Mulligan

Master's Theses

There are currently different efforts to use Supervised Neural Networks (NN) to automatically label damages on images of above ground infrastructure (buildings made of concrete) taken after an earthquake. The goal of the supervised NN is to classify raw input data according to the patterns learned from an input training set. This input training data set is usually supplied by experts in the field, and in the case of this project, structural engineers carefully and mostly manually label these images for different types of damage. The level of expertise of the professionals labeling the training set varies widely, and some …


Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson May 2018

Improving Swarm Performance By Applying Machine Learning To A New Dynamic Survey, John Taylor Jackson

Master's Theses

A company, Unanimous AI, has created a software platform that allows individuals to come together as a group or a human swarm to make decisions. These human swarms amplify the decision-making capabilities of both the individuals and the group. One way Unanimous AI increases the swarm’s collective decision-making capabilities is by limiting the swarm to more informed individuals on the given topic. The previous way Unanimous AI selected users to enter the swarm was improved upon by a new methodology that is detailed in this study. This new methodology implements a new type of survey that collects data that is …


Detecting Speakers In Video Footage, Michael Williams Apr 2018

Detecting Speakers In Video Footage, Michael Williams

Master's Theses

Facial recognition is a powerful tool for identifying people visually. Yet, when the end goal is more specific than merely identifying the person in a picture problems can arise. Speaker identification is one such task which expects more predictive power out of a facial recognition system than can be provided on its own. Speaker identification is the task of identifying who is speaking in video not simply who is present in the video. This extra requirement introduces numerous false positives into the facial recognition system largely due to one main scenario. The person speaking is not on camera. This paper …


Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto Jun 2017

Underwater Computer Vision - Fish Recognition, Spencer Chang, Austin Otto

Computer Engineering

The Underwater Computer Vision – Fish Recognition project includes the design and implementation of a device that can withstand staying underwater for a duration of time, take pictures of underwater creatures, such as fish, and be able to identify certain fish. The system is meant to be cheap to create, yet still able to process the images it takes and identify the objects in the pictures with some accuracy. The device can output its results to another device or an end user.


Procedurally Generating Genetic Keys, Adam A. Levasseur Jun 2017

Procedurally Generating Genetic Keys, Adam A. Levasseur

Computer Engineering

This project presents a method for creating multi-part models based on input keys to generate new, variant models via genetic algorithms. By utilizing 3D models as modular parts, this method allows for the generation of a unique, compound model based on one or multiple input keys. This paper explains the process of creating and testing such generation styles using simple geometry to create more complex, compound models.


Automated Grading Of Handwritten Numerical Answers, Mark T. Brown Jun 2017

Automated Grading Of Handwritten Numerical Answers, Mark T. Brown

Computer Engineering

The objective of this project was to automate the process of grading handwritten numerical answers in a classroom setting. The final program accepts a scanned answer sheet completed by the student along with a description of the correct answers and produces a detailed report describing the confidence of correctness for each answer.

Computer vision techniques are used to automatically locate the locations of the answers in the scan. Each digit is then passed through a convolutional neural network to predict what was written by the student. The individual probabilities of each digit produced by the network are aggregated into a …


Iota Pi Application For Ios, Deborah Newberry Mar 2017

Iota Pi Application For Ios, Deborah Newberry

Computer Science and Software Engineering

Kappa Kappa Psi is a national honorary fraternity for college band members. They meet every Sunday night, and during these meetings they plan events (both internal and external) that aim to meet our goal of making sure that the Cal Poly band programs have their social, financial, material, and educational needs satisfied. This paper details the steps I took to create an application for them to use internally to help ease organizational processes.


Gpumap: A Transparently Gpu-Accelerated Map Function, Ivan Pachev Mar 2017

Gpumap: A Transparently Gpu-Accelerated Map Function, Ivan Pachev

Master's Theses

As GPGPU computing becomes more popular, it will be used to tackle a wider range of problems. However, due to the current state of GPGPU programming, programmers are typically required to be familiar with the architecture of the GPU in order to effectively program it. Fortunately, there are software packages that attempt to simplify GPGPU programming in higher-level languages such as Java and Python. However, these software packages do not attempt to abstract the GPU-acceleration process completely. Instead, they require programmers to be somewhat familiar with the traditional GPGPU programming model which involves some understanding of GPU threads and kernels. …


Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan Dec 2016

Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan

Computer Science and Software Engineering

The goal of this senior project centered around improving the quality of student and teacher experiences when visiting the library. The task of finding a book amongst the shelves is an arduous one, which I felt could be improved upon through implementation and testing of a Book Lookup system for the Cal Poly Robert E. Kennedy Library. Development for this project was done using a Python framework. Testing and earlier designs were also created using JavaScript and PHP. Repeated tests were conducted on the accuracy of the software and its ability to decrease user search-time when compared to conventional methods.


Optimization And Coding Of A Lcls Control Program, Tanner M. Worden Sep 2016

Optimization And Coding Of A Lcls Control Program, Tanner M. Worden

STAR Program Research Presentations

SLAS’s, Linac Coherent Light Source (LCLS) also known as X-ray free-electron laser (XFEL) is the first X-ray laser of its kind. It gave Scientist from around the world the unique ability to observe the world at a subatomic level. Allowing for major advancements in the field of biological chemistry, drug science, material science and many more. Since the LCLS is a fairly unique scientific instrument, the demand for its use by the scientific community has always been high since it turned on back in 2009. This means that any and all time that the laser is not being used for …


Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline Jul 2016

Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline

STAR Program Research Presentations

The Monterey Bay Aquarium Research Institute routinely deploys remotely operated underwater vehicles equipped with high definition cameras for use in scientific studies. Utilizing a video collection of over 22,000 hours and the Video Annotation and Reference System, we have set out to automate the detection and classification of deep-sea animals. This paper serves to explore the pitfalls of automation and suggest possible solutions to automated detection in diverse ecosystems with varying field conditions. Detection was tested using a saliency-based neuromorphic selective attention algorithm. The animals that were not detected were then used to tune saliency parameters. Once objects are detected, …


Whisk: Web Hosted Information Into Summarized Knowledge, Jiewen Wu Jul 2016

Whisk: Web Hosted Information Into Summarized Knowledge, Jiewen Wu

Master's Theses

Today’s online content increases at an alarmingly rate which exceeds users’ ability to consume such content. Modern search techniques allow users to enter keyword queries to find content they wish to see. However, such techniques break down when users freely browse the internet without knowing exactly what they want. Users may have to invest an unnecessarily long time reading content to see if they are interested in it. Automatic text summarization helps relieve this problem by creating synopses that significantly reduce the text while preserving the key points. Steffen Lyngbaek created the SPORK summarization pipeline to solve the content overload …


Musictrakr, Benjamin Lin Jun 2016

Musictrakr, Benjamin Lin

Computer Engineering

MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …


Real-Time, Non-Contact Heart Rate Monitor, Daniel Blike Jun 2016

Real-Time, Non-Contact Heart Rate Monitor, Daniel Blike

Computer Engineering

No abstract provided.


Raspberry Pi Radio Scanner Control Web Application, Jackson Marshall Strand Jun 2016

Raspberry Pi Radio Scanner Control Web Application, Jackson Marshall Strand

Computer Science and Software Engineering

In this senior project I design and develop software for the Raspberry Pi which allows the user to listen to and control a scanner radio anywhere in their home. The solution involves utilizing a Raspberry Pi 2 interfaced with the radio, a software package to communicate directly with the radio, and a web app hosting a web client providing the interface for user control. Audio streaming is achieved through the use of FFmpeg. Listening on the client is achieved by using an external software such as Video Lan (VLC) to open the audio stream. We provide an operable proof-of-concept with …


Raspberry Pi Vpn Travel Router, Daniel S. Pierson Jun 2016

Raspberry Pi Vpn Travel Router, Daniel S. Pierson

Computer Science and Software Engineering

Consumers are increasingly relying on public wireless hotspots to access the internet from a growing number of devices. Usage of these hotspots has expanded from just laptops to everything from iPhones to tablets, which are expected to be internet-connected for full functionality. It has become common for one to check if there’s an open wireless hotspot connection available at places like coffee shops, hotels, restaurants, or even a doctor’s waiting room. The issue that arises is that these public connections present an inherent security risk, as anyone can connect and gain access to the network. For increased security, the use …


The Elder Scrolls V: Skyrim Stamina Combat Overhaul, Richard Rattner Jun 2016

The Elder Scrolls V: Skyrim Stamina Combat Overhaul, Richard Rattner

Liberal Arts and Engineering Studies

No abstract provided.