Reports
Templates for Supporting Sequenced Temporal Semantics in Pig Latin, Dhaval Deshpande
Terminal Emulation System, Chun-Fu Lee
The Space Plug-and-Play Architecture Services Manager and Its Relevance in Diverse Plug-and-Play Software Systems, Brandon Holdaway
Utah Preschool Outcomes Data System, Sandeep Venigalla
Visualization and 3D printing of a 3D Solar Tracker Model using Mayavi and POV-Ray, Aditya Mehra
Web Based Virtual Environment For Education - S'cape, Atul Thapliyal
Wordpress Plugins for Symbiota2, Venkatesh Kadali
Theses
3-Way Test Suite Prioritization and Fault Detection: A Case Study, Arjun Roy Chaudhuri
Achieving a Sequenced, Relational Query Language with Log-Segmented Timestamps, M. A. Manazir Ahsan
Achieving Hate Speech Detection in a Low Resource Setting, Peiyu Li
A Computational Geometry Approach to Digital Image Contour Extraction, Pedro J. Tejada
A Computer Programming Intervention for Second Grade Math Students, Eric B. Bagley
Adaptive Re-Segmentation Strategies for Accurate Bright Field Cell Tracking, Nare Hayrapetyan
A Deep Learning Approach to Recognizing Bees in Video Analysis of Bee Traffic, Astha Tiwari
Advanced Caching and Streaming for Large Scale Point Cloud Data Visualization on the Web, Pravin Poudel
Adversarially Reweighted Sequence Anomaly Detection With Limited Log Data, Kevin Vulcano
Adversarial Swarming: A Groundwork for Multi-Drone Independent Interception Exercises Through MA-POCA in Unity, Johnathan D. Kunz
A Framework That Explores the Cognitive Load of CS1 Assignments Using Pausing Behavior, Joshua O. Urry
A Generative Neural Network for Discovering Near Optimaldynamic Inductive Power Transfer Systems, Md Shain Shahid Chowdhury Oni
Agent-Organized Network Coalition Formation, Levi L. Barton
Algorithms for Covering Barrier Points by Mobile Sensors With Line Constraint, Princy Jain
A Model for Bioaugmented Anaerobic Granule, Amitesh Mahajan
Analysis of Case Histories by Markov Chains Using Juvenile Court Data of State of Utah, Soo-Hong Uh
Analysis of Student Behavior and Score Prediction in Assistments Online Learning, Aswani Yaramala
An Analysis of Syntax Exercises on the Performance of CS1 Students, Shelsey B. Sullivan
An Empirical and Theoretical Investigation of Random Reinforced Forests and Shallow Convolutional Neural Networks, Nikhil Ganta
An Evaluation of Truncated Sequential Test, Ryh-Thinn Chang
An Evolutionary Approach to Image Compression in the Discrete Cosine Transform Domain, Benjamin E. Banham
An Evolutionary Approach to Optimization of Compound Stock Trading Indicators Used to Confirm Buy Signals, Allan W. Teeples
An In-Depth Look at Learning Computer Language Syntax in a High-Repetition Practice Environment, Stephanie Gonzales
An Original Computer Game Incorporating Optical Illusions, Jacob Butterfield
A Novel Authentication and Validation Mechanism for Analyzing Syslogs Forensically, Steena D.S. Monteiro
A Novel Technique of Network Auditability with Managers in the Loop, Rian Shelley
A Parallel Genetic Algorithm for Optimizing Multicellular Models Applied to Biofilm Wrinkling, Christopher Douglas Johnson
Applying Information Visualization to Computer Security Applications, Robert Bruce Whitaker
Approaches, Techniques, and Tools for Identifying Important Code Changes to Help Code Reviewers, Maneesh M. Mohanavilasam
A Publish-Subscribe System for Data Replication and Synchronization Among Integrated Person-Centric Information Systems, Xiangbin Qiu
A Qualitative and Evaluative Study on Recruiting and Retaining Students in College Computer Science Programs, Matthew Gardner
A Review of Student Attitudes Towards Keystroke Logging and Plagiarism Detection in Introductory Computer Science Courses, Caleb Syndergaard
A Study of Four Statistics, Used in Analysis of Contingency Tables, in the Presence of Low Expected Frequencies, Jane R. Post
Automated Circulation Control for the Utah State University Library, Richard M. Montgomery
Automated Data Type Identification and Localization Using Statistical Analysis Data Identification, Sarah Jean Moody
Automating and Analyzing Whole-Farm Carbon Models, Aditi Maheshwari
Automation of Feature Selection and Generation of Optimal Feature Subsets for Beehive Audio Sample Classification, Aditya Bhouraskar
A Vision-Based Bee Counting Algorithm for Electronic Monitoring of Langsthroth Beehives, Sai Kiran Reka
Bee Shadow Recognition in Video Analysis of Omnidirectional Bee Traffic, Laasya Alavala
Cluster-Based Salient Object Detection Using K-Means Merging and Keypoint Separation with Rectangular Centers, Robert Buck
Coding Bootcamps - Perceptions and Outcomes, Logan L. Hendricks
Collaborative Task Completion for Simulated Hexapod Robots Using Reinforcement Learning, Tayler Don Baker
Combinatorial-Based Prioritization for User-Session-Based Test Suites, Schuyler Manchester
Comparative Study of Clustering Techniques on Eye-Tracking in Dynamic 3D Virtual Environments, Scott Johnson
Comparative Study of Machine Learning Models on Solar Flare Prediction Problem, Nikhil Sai Kurivella
Constrained Route Optimization With Fleet Considerations for Electrified Heavy-Duty Freight Vehicles, Zarin Subah Shamma
Coping with the Curse of Dimensionality by Combining Linear Programming and Reinforcement Learning, Scott H. Burton
Covert Botnet Design and Defense Analysis, Brandon Lyle Shirley
Covert Botnet Implementation and Defense Against Covert Botnets, Lokesh Babu Ramesh Babu
Creating a Virtual Hierarchy From a Relational Database, Yucong Mo
Database Auto Awesome: Enhancing Database-Centric Web Applications through Informed Code Generation, Jonathan Adams
Data-Driven Recommendation of Academic Options Based on Personality Traits, Aashish Ghimire
Decision Making Using Trust and Risk in Self-Adaptive Agent Organization, Kamilia Ahmadi
Deep Q Learning Applied to Stock Trading, Agnibh Dasgupta
Design and Evaluation of Convolutional Networks for Video Analysis of Bee Traffic, Prateek Vats
Design of Environment Aware Planning Heuristics for Complex Navigation Objectives, Carter D. Bailey
Detecting Experts on Quora: By their Activity, Quality of Answers, Linguistic Characteristics and Temporal Behaviors, Sumanth Kumar Reddy Nagarur Patil
Detecting Malicious Campaigns in Crowdsourcing Platforms, Hongkyu Choi
Development of a Machine Learning-Based Financial Risk Control System, Zhigang Hu
Direct Simulation from a Model Specification Language, Richard Pimentel
Empowering Graphics: A Distributed Rendering Architecture for Inclusive Access to Modern GPU Capabilities, Taylor Anderson
Energy Management System for Renewable Energy, Ashish R. Derhgawen
Enhancing Monthly Streamflow Prediction Using Meteorological Factors and Machine Learning Models in the Upper Colorado River Basin, Saichand Thota
Exact Generalized Voronoi Diagram Computation using a Sweepline Algorithm, Daniel Marsden
Expanding the Horizons of Educational Pair Programming: A Methodological Review of Pair Programming in Computer Science Education Research, Keith B. Rimington
Exploiting Self-Organization in Bioengineered Systems: A Computational Approach, Delin Davis
Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media, Meet Rajdev
Fake Likers Detection on Facebook, Prudhvi Ratna Badri Satya
Feature Selection and Analysis for Standard Machine Learning Classification of Audio Beehive Samples, Chelsi Gupta
Fishing Vessel Detection in Exclusive Economic Zones From Low Earth Orbit Satellites With Power and Computational Constraints, Kyler E. Nelson
Fitting Cell-Based Biomechanical Models from Spatiotemporal Data: A Gradient Descent Approach, Namita Raghuvanshi
Fixed Pattern Noise Non-Uniformity Correction Through K-Means Clustering, Andres Imperial
Forensic and Anti-Forensic Techniques for Object Linking and Embedding 2 (OLE2)-Formatted Documents, Jason M. Daniels
Generalizing Deep Learning Methods for Particle Tracing Using Transfer Learning, Shubham Gupta
Generative Neural Network Approach to Designing and Optimizing Dynamic Inductive Power Transfer Systems, Andrew Pond Curtis
Hidden History: A Mobile Application for Discovering Surrounding Landscapes, Sri Ram Ramineni
Identifying Criticality in Market Sentiment: A Data Mining Approach, Vaibhav Sahu
Image Blur Detection with Two-Dimensional Haar Wavelet Transform, Sarat Kiran Andhavarapu
Impact Analysis of System and Network Attacks, Anupama Biswas
Improving Accuracy of the Edgebox Approach, Kamna Yadav
Improving the Scalability and Usability of the Public Information Officer Monitoring Application, Rohan D. Shah
Inferring a Hierarchical Input Type for an SQL Query, Santosh Aryal
Information and Hardness Quantification of Graphs: A Computational Study, Brent Dutson
Informed Intervention Design, Deployment, And Analysis for the Computer Science Classroom, Jaxton J. Winder
In Situ Detection of Road Lanes Using Raspberry Pi, Ashwani Chahal