Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (58740)
- Computer Sciences (57958)
- Environmental Sciences (52389)
- Engineering (40245)
- Life Sciences (39782)
-
- Physics (36535)
- Chemistry (34529)
- Geology (29717)
- Mathematics (27387)
- Social and Behavioral Sciences (24567)
- Oceanography and Atmospheric Sciences and Meteorology (16425)
- Statistics and Probability (13261)
- Education (12809)
- Computer Engineering (12808)
- Soil Science (11978)
- Medicine and Health Sciences (11808)
- Plant Sciences (11182)
- Natural Resources and Conservation (10269)
- Arts and Humanities (9726)
- Astrophysics and Astronomy (9207)
- Electrical and Computer Engineering (8897)
- Sustainability (8693)
- Natural Resources Management and Policy (8570)
- Artificial Intelligence and Robotics (8518)
- Water Resource Management (8292)
- Applied Mathematics (7997)
- Environmental Health and Protection (6879)
- Science and Mathematics Education (6761)
- Databases and Information Systems (6720)
- Institution
-
- University of Nebraska - Lincoln (24230)
- Western Michigan University (19508)
- Selected Works (16838)
- University of Kentucky (12002)
- TÜBİTAK (10319)
-
- Singapore Management University (7454)
- Utah State University (7341)
- Missouri University of Science and Technology (6056)
- Old Dominion University (5954)
- University of Wollongong (4868)
- William & Mary (4602)
- University of South Florida (3859)
- Wright State University (3840)
- Portland State University (3798)
- University of Nevada, Las Vegas (3640)
- Louisiana State University (3417)
- China Simulation Federation (3382)
- City University of New York (CUNY) (3219)
- Brigham Young University (2906)
- Purdue University (2813)
- Air Force Institute of Technology (2678)
- Claremont Colleges (2640)
- California Polytechnic State University, San Luis Obispo (2568)
- Western Washington University (2456)
- University of Arkansas, Fayetteville (2433)
- University of Texas Rio Grande Valley (2419)
- Department of Primary Industries and Regional Development, Western Australia (2357)
- University of Texas at El Paso (2316)
- Chinese Chemical Society | Xiamen University (2294)
- Chulalongkorn University (2268)
- Keyword
-
- Machine learning (1691)
- Climate change (1680)
- Western Australia (1581)
- Mathematics (1369)
- Chemistry (1157)
-
- Sustainability (1141)
- Physics (1068)
- Water quality (983)
- Deep learning (892)
- Geology (858)
- Groundwater (851)
- Machine Learning (828)
- Simulation (824)
- Research and Technical Reports (797)
- Water (780)
- United States (759)
- Education (756)
- Management (746)
- Nebraska (744)
- Agriculture (718)
- Artificial intelligence (709)
- Climate (702)
- GIS (699)
- Statistics (685)
- Security (681)
- Grains and field crops (674)
- Environment (672)
- Computer Science (667)
- Ecology (658)
- Optimization (656)
- Publication Year
-
- 2024 (7929)
- 2023 (12584)
- 2022 (18310)
- 2021 (27884)
- 2020 (15208)
-
- 2019 (15927)
- 2018 (13646)
- 2017 (12521)
- 2016 (12690)
- 2015 (12617)
- 2014 (12299)
- 2013 (11462)
- 2012 (12196)
- 2011 (10325)
- 2010 (8620)
- 2009 (7616)
- 2008 (7321)
- 2007 (6758)
- 2006 (5872)
- 2005 (5573)
- 2004 (4447)
- 2003 (3876)
- 2002 (3435)
- 2001 (3030)
- 2000 (2919)
- 1999 (2555)
- 1998 (2574)
- 1997 (2472)
- 1996 (2437)
- 1995 (2193)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Theses and Dissertations (8341)
- IGC Proceedings (1993-2023) (7001)
- Research Collection School Of Computing and Information Systems (6891)
- Thin Sections (5745)
-
- Electronic Theses and Dissertations (4195)
- Faculty Publications (3797)
- Journal of System Simulation (3382)
- Nebraska Tractor Tests (3348)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Masters Theses (2634)
- Turkish Journal of Chemistry (2628)
- Turkish Journal of Mathematics (2494)
- Journal of Electrochemistry (2294)
- Honors Theses (2160)
- Faculty of Informatics - Papers (Archive) (2013)
- Physics Faculty Publications (1942)
- Bulletin of the Mineral Research and Exploration (1893)
- Doctoral Dissertations (1882)
- Dissertations, Theses, and Masters Projects (1876)
- Reports (1835)
- Dissertations (1816)
- Physics Faculty Research & Creative Works (1762)
- Department of Computer Science Technical Reports (1721)
- USF Tampa Graduate Theses and Dissertations (1607)
- School of Natural Resources: Faculty Publications (1586)
- United States Department of Agriculture Wildlife Services: Staff Publications (1529)
- Australian Institute for Innovative Materials - Papers (1524)
- Electronic Thesis and Dissertation Repository (1478)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1427)
- Publication Type
Articles 60211 - 60240 of 302619
Full-Text Articles in Physical Sciences and Mathematics
Adhering Homogeneous Molecular Electrocatalysts Entrapped In Micelles To Electrode Surfaces, Emily Kuhlmann
Adhering Homogeneous Molecular Electrocatalysts Entrapped In Micelles To Electrode Surfaces, Emily Kuhlmann
Honors Theses
Heterogeneous catalysts are important to industrial use; however, mechanistic studies are difficult because they lack the easy tunability of homogeneous catalysts. One solution could be to immobilize homogeneous catalysts using micelles while maintaining catalytic properties and activities.
Effectiveness Of Plastic Ordinances In Santa Monica, Ca: Do Regulations At The Municipal Level Reduce Plastic Waste?, John W. Hayes
Effectiveness Of Plastic Ordinances In Santa Monica, Ca: Do Regulations At The Municipal Level Reduce Plastic Waste?, John W. Hayes
School of Public Policy Capstones
Plastic is a cheap, robust and versatile material with numerous practical uses that contribute to the convenience of modern day life. However the very same properties that make it uniquely diverse and hardy also contribute to the hazards it poses to the ecosystems and human health. If current consumption and manufacturing practices remain unchanged, there will be hundreds of millions of additional tons of plastic introduced into the environment over the coming decades. To mitigate this issue, some cities, such as Santa Monica, have implemented ordinances and policies directly aimed at this growing problem, albeit with ambiguous results. To better …
Equation Of State For Natural Almandine, Spessartine, Pyrope Garnet: Implications For Quartz-In-Garnet Elastic Geobarometry, Suzanne R. Mulligan, Elissaios Stavrou, Stella Chariton, Oliver Tschauner, Ashkan Salamat, Michael Wells, Alexander G. Smith, Thomas D. Hoisch, Vitali Prakapenka
Equation Of State For Natural Almandine, Spessartine, Pyrope Garnet: Implications For Quartz-In-Garnet Elastic Geobarometry, Suzanne R. Mulligan, Elissaios Stavrou, Stella Chariton, Oliver Tschauner, Ashkan Salamat, Michael Wells, Alexander G. Smith, Thomas D. Hoisch, Vitali Prakapenka
Geoscience Faculty Research
The equation of state (EoS) of a natural almandine74spessartine13pyrope10grossular3 garnet of a typical composition found in metamorphic rocks in Earth’s crust was obtained using single crystal synchrotron X-ray diffraction under isothermal room temperature compression. A third-order Birch-Murnaghan EoS was fitted to P-V data and the results are compared with published EoS for iron, manganese, magnesium, and calcium garnet compositional end-members. This comparison reveals that ideal solid solution mixing can reproduce the EoS for this intermediate composition of garnet. Additionally, this new EoS was used to calculate geobarometry on a garnet sample from the same rock, which was collected from the …
Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams
Uc-20 Analyzing Concentration Levels In Online Education Using Machine Learning, Gray Daugherty, Rachel W Lawson, Kyle C. Ensley, Michael Chann, Tobi Adams
C-Day Computing Showcase
These past few years have introduced the most important time in history to study new faucets of online learning. Due to COVID's impact, online learning became a staple in millions of homes across the country. Guided by the research question, “Can a machine learning model be created and trained to detect student concentration level based on eye and facial data?”, we set out to contribute to society’s understanding of online learning under the guidance of Dr. Ying Xie and Dr. Linh Le. Our process involved recording ourselves participating in online classes to garnish eye and facial data. Each student recorded …
Uc-57 Cultiva- The Plant Companion, Travis R Hescox, Kat Branham, Ahsan Jamal, Joseph Henggeler, Erick Reyes, Andy Alcaraz, Momodou Mbye
Uc-57 Cultiva- The Plant Companion, Travis R Hescox, Kat Branham, Ahsan Jamal, Joseph Henggeler, Erick Reyes, Andy Alcaraz, Momodou Mbye
C-Day Computing Showcase
The goal of this project is to improve the lives of gardeners or everyday people with a green thumb by providing them with a planter that will not only hold their plant of choice, but also give them information about the health and growth of their plant without them having to interact with it directly. This project will provide the user with a planter containing sensors that communicate with an application from which the user can monitor the environment of the plant. This project can serve a wide range of people from first-time gardeners to seasoned veterans. Users will no …
Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang
Uc-14 Teleclinic, Jay P Bhatt, Lucius Burch, Zekai Fei, Bijoy Shah, Hao Zhang
C-Day Computing Showcase
TeleClinic is a telemedicine web application that provides ease of access and a medium for interaction between patients and their respective doctors and administrators. In particular, this web portal includes a chat feature, an area for medical reports, an area for appointment requests, and an area for video recordings. Additionally, TeleClinic meets the requirements prescribed by the Health Insurance Portability and Accountability Act (H.I.P.A.A.) via upholding data privacy and safeguarding medical information. To maximize its overall utility, TeleClinic utilizes the React and React Redux libraries for its front-end and a NoSQL database in Google Firebase for its back-end.Advisors(s): Dr. Ken …
Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk
Gr-53 An Investigation On Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset And Its Effectiveness, Md Jobair Hossain Faruk
C-Day Computing Showcase
Neurotechnology describes as one of the focal points of today’s research around the domain of Brain-Computer Interfaces (BCI). The primary attempts of BCI research are to decoding human speech from brain signals and controlling neuro-psychological patterns that would benefit people suffering from neurological disorders. In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a …
Gc-47 Key Professional Dataset - Dataspider, Janell Westmoreland, Vy Duong, Nyong Nkereuwem, Kajal S Vaghani, Ritu Choudhary
Gc-47 Key Professional Dataset - Dataspider, Janell Westmoreland, Vy Duong, Nyong Nkereuwem, Kajal S Vaghani, Ritu Choudhary
C-Day Computing Showcase
The purpose of this project is to build a Web Crawler to extract personal information from a public website like Reddit and LinkedIn. We completed the Instagram crawling as a bonus for the project. The team will be using MySQL or any other open source relational database to organize the data and conduct a quantitative data analysis on it.Advisors(s): Dr. Han - Professor IT7993 Capstone Jing Wang -Project SponsorTopic(s): Data/Data AnalyticsIT7993
Gr-1 Compare Two Off Angle Normalization, Emily Ehrlich
Gr-1 Compare Two Off Angle Normalization, Emily Ehrlich
C-Day Computing Showcase
This work investigates different iris normalization techniques to compare their performance including elliptical normalization and circular normalization after frontal projection of off-angle iris recognition. Elliptical normalization samples the iris texture using elliptical segmentation parameters. For circular unwrapping, we first estimate the gaze deviation using ellipse parameters and the image will be projected back to frontal view using perspective transformation. Then, we segment the transformed image and normalize using circular parameters. We further investigate if: (i) elliptical normalization or circular unwrapping recognition performance is higher, and (ii) the two segmentations methods in circular unwrapping increase the recognition efficiency. Based on the …
Gr-23 Machine Learning Techniques For Malware Network Traffic Detection, Jermaine Cameron
Gr-23 Machine Learning Techniques For Malware Network Traffic Detection, Jermaine Cameron
C-Day Computing Showcase
Persistent malware variants are a constant threat to computing infrastructure across all regions and business sectors. Traditional detection systems focus primarily on signature-based analysis but this approach cannot adequately keep pace with the velocity and volume of new malware variants that are continuously deployed onto the internet. Most network traffic detection techniques are focused on analyzing raw packets and have not deterred the surge of persistent malware. Therefore, it is important to develop new research techniques that are focused on optimized metadata from malware network traffic to effectively identify an ever-increasing expanse of malicious software. Recent research efforts by Letteri …
Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka
Gr-38 Energy Cost And Efficiency On Edge Computing: Challenges And Vision, Kousalya Banka
C-Day Computing Showcase
The Internet of Things (IoT) has been the key for many advancements in next-generation technologies for the past few years. With a conceptual grouping of ecosystem elements such as sensors, actuators, and smart objects connected to perform complex operations to perform environmental monitoring, intelligent transport system, smart building, smart cities, and endless other possibilities. Edge computing helps the IoT’s reach even further and be more robust by connecting multiple censored devices through the internet and forming powerful computational capabilities. Unfortunately, this computation level comes at a cost as the devices are constantly being used to communicate and perform specific actions. …
Gr-45 Framework For Collecting Data From Specialized Iot Devices., Md Saiful Islam
Gr-45 Framework For Collecting Data From Specialized Iot Devices., Md Saiful Islam
C-Day Computing Showcase
The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …
Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa
Gr-50 Predicting Users' Engagement During Interviews With Biofeedback, Voice, And Supervised Machine Learning, Thaide Huichapa
C-Day Computing Showcase
Studies show that the quality of the information collected during an elicitation interview, and consequently the quality of the software product that needs to be developed, highly depends on the interviewee's engagement. Because of social expectations, interviewees tend to hide if they are bored or not engaged. To overcome this problem and support the analyst during the interviews, this research uses biometric data and voice features, together with supervised machine learning algorithms, to predict the interviewee's engagement. We built our solution on an experiment consisted of interviewing 31 participants. We collected the data using an Empatica wristband and a default …
Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali
Uc-16 Understanding The Drivers Of Medication Nonadherence In The United States, Roman A Schwieterman, Austin Poole, Austin Kay, Muhammad Usman Mustafa, Issifou Ali
C-Day Computing Showcase
Medication nonadherence is generally defined as a patient’s inability to take their medications correctly as prescribed by their doctors. Medication nonadherence adversely affects patient outcomes and increases healthcare costs. Prior research found that health system-, condition-, patient- (older age is one factor), therapy- and social/economic-related factors have been identified to show effect on non-adherence. Our goal is to analyze the NHIS data to understand the sociodemographic and health causes of medication nonadherence, as well as answer the following questions about our selected topic: What variables are the most relevant drivers of nonadherence? Does the direction and strength of the associations …
Uc-37 Interactive Pdf File Editing For Online Classes, David J Hall, Chris J Stubbs, Justin Masters, Dalton G Parker, Rosendo Lopez
Uc-37 Interactive Pdf File Editing For Online Classes, David J Hall, Chris J Stubbs, Justin Masters, Dalton G Parker, Rosendo Lopez
C-Day Computing Showcase
This system aims to create an interactive environment for teachers to view/grade/edit student submission in virtual classes. Objectives for this project are to create independent component or logic model that includes the following functions. This component should be integrated with a .net core application easily. -Upload pdf files to the system and save files to the server; -Record audio online and save audio to the system; also, the audio can be played online; -Upload and play video or video link (YouTube); -Split file. When uploading a PDF file, the system will allow to split or crop the file (partial file …
Uc-56 Rendeview, James C Noltimier, Gyasi Igyan, Barrett Rose, Niyi Adekunle, Ashley Lowe
Uc-56 Rendeview, James C Noltimier, Gyasi Igyan, Barrett Rose, Niyi Adekunle, Ashley Lowe
C-Day Computing Showcase
Rendeview is a mobile application designed to allow users to find a physical meeting location equitable for 3+ people, taking into account drive time and traffic conditions.Advisors(s): Dr. Reza PariziTopic(s): Software EngineeringSWE 4724
Uc-6 Covid-19 Data Analysis - Regression, Noah Druss
Uc-6 Covid-19 Data Analysis - Regression, Noah Druss
C-Day Computing Showcase
Covid-19 has been arguably the most impactful event in the past century. SARS-Cov-2 is a viral respiratory illness discovered in late 2019 that has spread to almost every country in the world. It has directly or indirectly affected just about everybody in the world greatly, causing over 117 million cases and 2.59 million deaths as of March 2021. This project has focused on the use of different types of linear regression to both analyze and predict Covid-19 infection data based on different features. First, simple linear regression was used to predict total deaths based on infections both globally and by …
Uc-69 Team 10b Bchain, Jonathan D Lashgari, Carlos A Diaz, Jeffery Erhunse, Caleb T Goff, Giang T Nguyen
Uc-69 Team 10b Bchain, Jonathan D Lashgari, Carlos A Diaz, Jeffery Erhunse, Caleb T Goff, Giang T Nguyen
C-Day Computing Showcase
BChain is a new P2P file sharing system that is fully private, anonymous, globally self-verifying, and utilizes an automatic peer-maintained network of trust in data, accomplished through new methods of routing content over the whole network, encrypted, rather than per torrent download. Verification is done by adding file metadata to a blockchain giving the network consistent knowledge of each file it can transfer, and how to verify file received against the network. This enables a policy of zero trust against peers. This system is implemented by an app that interfaces with the network using the protocol, using it for upload, …
Uc-7 Software Engineer – Clarity Llc, Amy Mullins
Uc-7 Software Engineer – Clarity Llc, Amy Mullins
C-Day Computing Showcase
Clarity makes an app called CaptionMate that does closed captions for phone calls.. During the internship, a website was made to visualize metrics that are collected on users such as calls made, minutes used, time active, region, age, theme, font, and platform used. Bar charts are used to show minutes and calls used on days of the week. 100% bar charts are used to show how much a day contributes to the usage of the app; a user contributes to minutes, calls and platform usage; and show calls incoming vs. outgoing. Line graphs were created to show growth in app …
Ur-48 Using Semantic Segmentation In A Convoluted Neural Network For Vocal Localization In Music, Trevor E Stanca, Trinite, Noah
Ur-48 Using Semantic Segmentation In A Convoluted Neural Network For Vocal Localization In Music, Trevor E Stanca, Trinite, Noah
C-Day Computing Showcase
I. PROJECT OVERVIEW A. Research Question In this project, the question was asked: ”Is there an easier way to extract vocals from music?” Many other works are able to extract vocals with Deep Neural Networks using Multitask Learning, which are large and take a long time to train. To rival this, we wish to present a method to identify vocals with a Convolutional U-Network (U-Net) for Semantic Segmentation of audio files. B. Project Description This project differs from other works by identifying vocal locations by converting audio files in Short Time Fourier Transforms(STFT), and treating them as images in the …
Ur-66 Image Segmentation With Machine Learning, Kedar A Johnson
Ur-66 Image Segmentation With Machine Learning, Kedar A Johnson
C-Day Computing Showcase
An experiment-based analysis of the performance of machine learning algorithms in image segmentation. The experiment is organized to test three experimental groups representing supervised, unsupervised and reinforcement machine learning. The three experimental groups are exposed to three datasets of images for training and testing. They’re performance results are recorded and compared for a statistically significant difference in mean performance values. These results are assumed to identify a trend in differences in performance if a statistically significant difference in performance statistics is discovered between any of the three groups. This experiment will follow a quasi-experimental design because of the absence of …
Gc-54 Covid-19 Mortality Prediction Using Machine Learning Techniques, Lindsay Schirato, Kennedy Makina, Dwayne Flanders
Gc-54 Covid-19 Mortality Prediction Using Machine Learning Techniques, Lindsay Schirato, Kennedy Makina, Dwayne Flanders
C-Day Computing Showcase
In late 2019, SARS-CoV2 also known as COVID-19 was first identified in the city of Wuhan, China. This virus can infect a person and without showing any signs of sickness, can spread of COVID-19 unknowingly. The World Health Organization declared it a global pandemic in March 2020 because of its far-reaching effects in every part of the world. Scientists have been working to leverage technology to prevent spread, detection and vaccine development. With machine learning, models can predict which patient will most likely have a higher mortality rate. Using WEKA, a machine learning tool and a data set based on …
Gr-29 Wrist Intent Recognition For Stroke Rehabilitation, Suman Bharti
Gr-29 Wrist Intent Recognition For Stroke Rehabilitation, Suman Bharti
C-Day Computing Showcase
Abstract Hand mentor robotic device is beneficial for stroke patients . This is rehabilitation technique used in stroke therapy. It strengthens and improves the range of motion which ultimately improves the quality of life for severely impaired stroke patients. It is easy to use without assistance and most importantly stroke survivors able to use independently. Usage of hand mentor device is quite expensive for stroke patients on hourly basis . Coming up with most efficient deep learning algorithm for sensor data is motivation to cut down the cost and easy availability usage for stroke patients. EMG signal is recorded using …
Gr-34 Defensive Neural Network, Hongkyu Lee
Gr-34 Defensive Neural Network, Hongkyu Lee
C-Day Computing Showcase
Machine learning (ML) algorithms require a massive amount of data. Firms such as Google and Facebook exploit user's data to deliver a more precise ML-based service. However, collecting users' data is a risky action because their private data can be leaked through the transmission. As a remedy, federated learning is introduced. In federated learning, a central server distributes a machine learning model to users. Each user trains the model to its data, and send the model back. Later the models are aggregated and distributed again. Federated learning is more secure in that it emancipates users from the risk of sending …
Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis
Uc-30 Malware Analysis Using Reverse Engineering, William K Pharr, Kelton Reid, Icyss M Strong, Michael R Lewis
C-Day Computing Showcase
Cybercrimes are a billion-dollar industry that is rapidly growing by the day. One of the biggest threats faced by companies is the infection of malware. New forms of malware are created daily and ever evolving to evade detection methods. Understanding how malware infects your system and how it eludes detection is crucial to keeping a company's network and devices safe. During this project we will be using reverse engineering methods to better understand the functionality of malware, as well as how it eludes detection. We will be using IDAPro and WiDbg to perform the reverse engineering. Using this knowledge, we …
Uc-59 Analyzing Concentration Levels In Online Learning With Facial Values, Elliott J Witherell, Jakeira Askew, Jonathan R Dicks, Steven C Mcguire, Jacob A Walton
Uc-59 Analyzing Concentration Levels In Online Learning With Facial Values, Elliott J Witherell, Jakeira Askew, Jonathan R Dicks, Steven C Mcguire, Jacob A Walton
C-Day Computing Showcase
Can deep learning models accurately predict whether an individual is focused or distracted on a task in order to improve learning efficiency? In the context of online learning with the use of a webcam, this project is aimed at detecting concentration levels of students to potentially assist with improving learning efficiency. Machine learning technologies have been utilized to evaluate students’ facial expression and eye movements to identify whether a student is focused or distracted. The machine learning branch that is employed is a supervised learning model. This supervised learning model makes predictions based on given input features. A total of …
Ur-41 The Accessibility Of The Mobile Gaming Platform For The Visually Impaired, Christian Thomas Jansen
Ur-41 The Accessibility Of The Mobile Gaming Platform For The Visually Impaired, Christian Thomas Jansen
C-Day Computing Showcase
The motivation for this project is to research mobile gaming interfaces with the goal of conceptualizing practices in game design that would create more accessible interfaces for the visual impairment community. Thus far, the project has focused on practices that mobile game designers can use to make their games more accessible to the visually impaired. These includes the use of plain text rather than graphics to be scannable by screen readers, the inclusion of audio-oriented support and instruction, the use of contrasting colors to make options more recognizable to those with partial visual impairments, and the implementation of game mechanics …
Ur-46 Breastnet;, Cora L Meador, Ryan Deem
Ur-46 Breastnet;, Cora L Meador, Ryan Deem
C-Day Computing Showcase
In the United states, 13% of women are diagnosed with breast cancer in their lifetime, and it is the second leading cause of death by cancer in women. Early detection and screening can result in an increase of life expectancy by 10 years on average. Unfortunately, breast cancer can be challenging to detect, since it can appear anywhere in the breast. Cancer that is detected in its early stages can give patients more options and save thousands of dollars in medical costs. Some of the most recent developments in computer science and machine learning are in the biomedical field, especially …
Ur-65 Cnn Cifar Image Identification, Matteo L Staciarine
Ur-65 Cnn Cifar Image Identification, Matteo L Staciarine
C-Day Computing Showcase
Reducing the learning rate of a CNN can positively affect the validation accuracy of a machine learning model. Dropping out nodes from different layers can further delay overfitting from happening. Validation loss decreases over more epochs, but it must be cut when it reaches its minimum value.Advisors(s): Dr. Dan LoTopic(s): Artificial Intelligence
Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse
Uc-11 Information Recall For Kids With Autism, Alex J Bechke, Elizabeth Burnside, Haiden Gembinski, Ross Murphy, Ryan Taylor, Henok Demisse
C-Day Computing Showcase
Description: Our project "Information Recall For Kids With Autism" also known as the product name given by the client "Safe Kid" is an app to help children with autism understand basic contact information such as phone numbers, addresses, and names. This app is being created for our client Spectrum Behavioral Associates who specialize in helping kids and young adults who have autism, learning development delays, or other behavioral challenges. Motivation: To teach kids who have autism basic contact information in case of an emergency. Materials and Methods: The app we are creating is a local based app made within Unity. …