Follow

Reports

PDF

Templates for Supporting Sequenced Temporal Semantics in Pig Latin, Dhaval Deshpande

PDF

Terminal Emulation System, Chun-Fu Lee

PDF

The Space Plug-and-Play Architecture Services Manager and Its Relevance in Diverse Plug-and-Play Software Systems, Brandon Holdaway

PDF

Utah Preschool Outcomes Data System, Sandeep Venigalla

PDF

Visualization and 3D printing of a 3D Solar Tracker Model using Mayavi and POV-Ray, Aditya Mehra

PDF

Web Based Virtual Environment For Education - S'cape, Atul Thapliyal

PDF

Wordpress Plugins for Symbiota2, Venkatesh Kadali

Theses

PDF

3-Way Test Suite Prioritization and Fault Detection: A Case Study, Arjun Roy Chaudhuri

PDF

Achieving a Sequenced, Relational Query Language with Log-Segmented Timestamps, M. A. Manazir Ahsan

PDF

Achieving Hate Speech Detection in a Low Resource Setting, Peiyu Li

PDF

A Computational Geometry Approach to Digital Image Contour Extraction, Pedro J. Tejada

PDF

A Computer Programming Intervention for Second Grade Math Students, Eric B. Bagley

PDF

Adaptive Re-Segmentation Strategies for Accurate Bright Field Cell Tracking, Nare Hayrapetyan

PDF

A Deep Learning Approach to Recognizing Bees in Video Analysis of Bee Traffic, Astha Tiwari

PDF

Advanced Caching and Streaming for Large Scale Point Cloud Data Visualization on the Web, Pravin Poudel

PDF

Advancing Game Development and AI Integration: An Extensible Game Engine With Integrated AI Support for Real-World Deployment and Efficient Model Development, Ryan Anderson

PDF

Adversarially Reweighted Sequence Anomaly Detection With Limited Log Data, Kevin Vulcano

PDF

Adversarial Swarming: A Groundwork for Multi-Drone Independent Interception Exercises Through MA-POCA in Unity, Johnathan D. Kunz

PDF

A Framework That Explores the Cognitive Load of CS1 Assignments Using Pausing Behavior, Joshua O. Urry

PDF

A Generative Neural Network for Discovering Near Optimaldynamic Inductive Power Transfer Systems, Md Shain Shahid Chowdhury Oni

PDF

Agent-Organized Network Coalition Formation, Levi L. Barton

PDF

Algorithms for Covering Barrier Points by Mobile Sensors With Line Constraint, Princy Jain

PDF

A Localized Geometric-Distortion Resilient Digital Watermarking Scheme Using Two Kinds of Complementary Feature Points, Jiyuan Wang

PDF

A Model for Bioaugmented Anaerobic Granule, Amitesh Mahajan

PDF

Analysis of Case Histories by Markov Chains Using Juvenile Court Data of State of Utah, Soo-Hong Uh

PDF

Analysis of Student Behavior and Score Prediction in Assistments Online Learning, Aswani Yaramala

PDF

An Analysis of Syntax Exercises on the Performance of CS1 Students, Shelsey B. Sullivan

PDF

An Empirical and Theoretical Investigation of Random Reinforced Forests and Shallow Convolutional Neural Networks, Nikhil Ganta

PDF

An Evaluation of Truncated Sequential Test, Ryh-Thinn Chang

PDF

An Evolutionary Approach to Image Compression in the Discrete Cosine Transform Domain, Benjamin E. Banham

PDF

An Evolutionary Approach to Optimization of Compound Stock Trading Indicators Used to Confirm Buy Signals, Allan W. Teeples

PDF

An In-Depth Look at Learning Computer Language Syntax in a High-Repetition Practice Environment, Stephanie Gonzales

PDF

An Original Computer Game Incorporating Optical Illusions, Jacob Butterfield

PDF

A Novel Authentication and Validation Mechanism for Analyzing Syslogs Forensically, Steena D.S. Monteiro

PDF

A Novel Technique of Network Auditability with Managers in the Loop, Rian Shelley

PDF

A Parallel Genetic Algorithm for Optimizing Multicellular Models Applied to Biofilm Wrinkling, Christopher Douglas Johnson

PDF

Applying Information Visualization to Computer Security Applications, Robert Bruce Whitaker

PDF

Approaches, Techniques, and Tools for Identifying Important Code Changes to Help Code Reviewers, Maneesh M. Mohanavilasam

PDF

A Publish-Subscribe System for Data Replication and Synchronization Among Integrated Person-Centric Information Systems, Xiangbin Qiu

PDF

A Qualitative and Evaluative Study on Recruiting and Retaining Students in College Computer Science Programs, Matthew Gardner

PDF

A Review of Student Attitudes Towards Keystroke Logging and Plagiarism Detection in Introductory Computer Science Courses, Caleb Syndergaard

PDF

A Singular-Value-Based Semi-Fragile Watermarking Scheme for Image Content Authentication with Tampering Localization, Xing Xin

PDF

A Study of Four Statistics, Used in Analysis of Contingency Tables, in the Presence of Low Expected Frequencies, Jane R. Post

PDF

Automated Circulation Control for the Utah State University Library, Richard M. Montgomery

PDF

Automated Data Type Identification and Localization Using Statistical Analysis Data Identification, Sarah Jean Moody

PDF

Automated Reverse Engineering of Malware to Develop Network Signatures to Match with Known Network Signatures, Dan Sinema

PDF

Automating and Analyzing Whole-Farm Carbon Models, Aditi Maheshwari

PDF

Automation of Feature Selection and Generation of Optimal Feature Subsets for Beehive Audio Sample Classification, Aditya Bhouraskar

PDF

A Vision-Based Bee Counting Algorithm for Electronic Monitoring of Langsthroth Beehives, Sai Kiran Reka

PDF

Bee Shadow Recognition in Video Analysis of Omnidirectional Bee Traffic, Laasya Alavala

PDF

Cluster-Based Salient Object Detection Using K-Means Merging and Keypoint Separation with Rectangular Centers, Robert Buck

PDF

Clustering Educational Digital Library Usage Data: Comparisons of Latent Class Analysis and K-Means Algorithms, Beijie Xu

PDF

Coding Bootcamps - Perceptions and Outcomes, Logan L. Hendricks

PDF

Collaborative Task Completion for Simulated Hexapod Robots Using Reinforcement Learning, Tayler Don Baker

PDF

Combinatorial-Based Prioritization for User-Session-Based Test Suites, Schuyler Manchester

PDF

Comparative Study of Clustering Techniques on Eye-Tracking in Dynamic 3D Virtual Environments, Scott Johnson

PDF

Comparative Study of Machine Learning Models on Solar Flare Prediction Problem, Nikhil Sai Kurivella

PDF

Comparison of Transition Matrices Between Metropolitan and Non-Metropolitan Areas in the State of Utah Using Juvenile Court Data, Sung-Ik Song

PDF

Constrained Route Optimization With Fleet Considerations for Electrified Heavy-Duty Freight Vehicles, Zarin Subah Shamma

PDF

Coping with the Curse of Dimensionality by Combining Linear Programming and Reinforcement Learning, Scott H. Burton

PDF

Covert Botnet Design and Defense Analysis, Brandon Lyle Shirley

PDF

Covert Botnet Implementation and Defense Against Covert Botnets, Lokesh Babu Ramesh Babu

PDF

Creating a Virtual Hierarchy From a Relational Database, Yucong Mo

PDF

Database Auto Awesome: Enhancing Database-Centric Web Applications through Informed Code Generation, Jonathan Adams

PDF

Data-Driven Recommendation of Academic Options Based on Personality Traits, Aashish Ghimire

PDF

Decision Making Using Trust and Risk in Self-Adaptive Agent Organization, Kamilia Ahmadi

PDF

Deep Q Learning Applied to Stock Trading, Agnibh Dasgupta

PDF

Design and Evaluation of Convolutional Networks for Video Analysis of Bee Traffic, Prateek Vats

PDF

Design of Environment Aware Planning Heuristics for Complex Navigation Objectives, Carter D. Bailey

PDF

Detecting Experts on Quora: By their Activity, Quality of Answers, Linguistic Characteristics and Temporal Behaviors, Sumanth Kumar Reddy Nagarur Patil

PDF

Detecting Malicious Campaigns in Crowdsourcing Platforms, Hongkyu Choi

PDF

Development and Identification of Metrics to Predict the Impact of Dimension Reduction Techniques on Classical Machine Learning Algorithms for Still Highway Images, Wasim Akram Khan

PDF

Development of a Machine Learning-Based Financial Risk Control System, Zhigang Hu

PDF

Direct Simulation from a Model Specification Language, Richard Pimentel

PDF

Empowering Graphics: A Distributed Rendering Architecture for Inclusive Access to Modern GPU Capabilities, Taylor Anderson

PDF

Energy Management System for Renewable Energy, Ashish R. Derhgawen

PDF

Enhancing Monthly Streamflow Prediction Using Meteorological Factors and Machine Learning Models in the Upper Colorado River Basin, Saichand Thota

PDF

Exact Generalized Voronoi Diagram Computation using a Sweepline Algorithm, Daniel Marsden

PDF

Expanding the Horizons of Educational Pair Programming: A Methodological Review of Pair Programming in Computer Science Education Research, Keith B. Rimington

PDF

Exploiting Self-Organization in Bioengineered Systems: A Computational Approach, Delin Davis

PDF

Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media, Meet Rajdev

PDF

Fake Likers Detection on Facebook, Prudhvi Ratna Badri Satya

PDF

Feature Selection and Analysis for Standard Machine Learning Classification of Audio Beehive Samples, Chelsi Gupta

PDF

Fishing Vessel Detection in Exclusive Economic Zones From Low Earth Orbit Satellites With Power and Computational Constraints, Kyler E. Nelson

PDF

Fitting Cell-Based Biomechanical Models from Spatiotemporal Data: A Gradient Descent Approach, Namita Raghuvanshi

PDF

Fitting Physical Models to Spatiotemporal Observations: Discovering Developmental Regulatory Networks of Drosophila, DJ Holt

PDF

Fixed Pattern Noise Non-Uniformity Correction Through K-Means Clustering, Andres Imperial

PDF

Forensic and Anti-Forensic Techniques for Object Linking and Embedding 2 (OLE2)-Formatted Documents, Jason M. Daniels

PDF

Generalizing Deep Learning Methods for Particle Tracing Using Transfer Learning, Shubham Gupta

PDF

Generative Neural Network Approach to Designing and Optimizing Dynamic Inductive Power Transfer Systems, Andrew Pond Curtis

PDF

Hidden History: A Mobile Application for Discovering Surrounding Landscapes, Sri Ram Ramineni

PDF

Identifying Criticality in Market Sentiment: A Data Mining Approach, Vaibhav Sahu

PDF

Image Blur Detection with Two-Dimensional Haar Wavelet Transform, Sarat Kiran Andhavarapu

PDF

Impact Analysis of System and Network Attacks, Anupama Biswas

PDF

Improving Accuracy of the Edgebox Approach, Kamna Yadav

PDF

Improving the Scalability and Usability of the Public Information Officer Monitoring Application, Rohan D. Shah

PDF

Inferring a Hierarchical Input Type for an SQL Query, Santosh Aryal

PDF

Information and Hardness Quantification of Graphs: A Computational Study, Brent Dutson

PDF

Informed Intervention Design, Deployment, And Analysis for the Computer Science Classroom, Jaxton J. Winder

PDF

In Situ Detection of Road Lanes Using Raspberry Pi, Ashwani Chahal