Search Constraints

Filtering by: Department Computer Science Remove constraint Department: Computer Science Collection Thesis Remove constraint Collection: Thesis

Search Results

  • Rr172178s?file=thumbnail
    Kirdey, Stanislav
    In this thesis project we look at ways to utilize neural networks and computational frameworks to perform automatic image and video colorization, with the focus on one kind of deep neural network architecture – pix2pix. The project is aimed at modelin . . .
  • P8418r940?file=thumbnail
    Dunford, Stephen James
    Network Optimization for Beginners (NOB) is a Computer Aided Instruction (CAI) package of programs that utilizes graphics, graph theory and networking algorithms to demonstrate network optimization. NOB is designed to aid beginning or advanced student . . .
  • 5h73q046k?file=thumbnail
    Lu, David
    In most games today there is some sort of artificial intelligence involved. Some of these artificial intelligent Non-Playable Characters (NPCs) [8] require memory structures to store locations of objects in their virtual environment. The type of memor . . .
  • 8910jz13m?file=thumbnail
    Sia, Siew Don
    Energy harvesting is a technique to obtain energy directly from the environment to power devices. Solar radiation is one source of ambient energy that can be used for powering motes in distributed embedded sensor systems. In this thesis, I propose a n . . .
  • 2227mt45s?file=thumbnail
    Baraghimian, Gregory Anthony, I.
    This report describes the design and implementation of a demonstration system called the SIMulation of Finite Automata and Regular Expression recognition (SIMFARE). This software system provides the user with a method of comparing Finite State Machine . . .
  • Z890rx83k?file=thumbnail
    Duckworth, Ryan
    Designing, implementing, and testing different user interface (UI) design variants in a virtual reality application (VR), informs best practices regarding the VR space. While there exists some overlap with traditional UI design standards, the VR space . . .
  • Ht24wn85n?file=thumbnail
    Belchev, Stanimir Bogomilov
    Intrusion Detection Systems (IDSs) have become an indispensable tool for recognizing and responding to suspicious activities targeted at computing resources. They are responsible for analyzing the network traffic and identifying potentially malicious . . .
  • Kw52jc58m?file=thumbnail
    Haurat, Adrian
    This thesis introduces a web-based community engagement tool named "Helpfull". Helpfull connects people who need help to willing members of their community who can assist them through the use of targeted messaging. The app connects those in need of he . . .
  • Work
    Karandikar, Nikita
    This work is an implementation of the Christofides Algorithm for the travelling salesman problem in an application. Consider, a person running errands. If they go about it in an intuitive manner, it may happen that the person may find themselves going . . .
  • 9p290f00t?file=thumbnail
    Lee, Mei-Yu
    The goal of the Visible Algorithms Project at California State University, Northridge is to develop a series of CAI packages that simulate walkthroughs of common algorithms. Initially these CAI packages were developed in a "terminal/machine dependent" . . .
  • Rr172175z?file=thumbnail
    Nande, Akshay
    Finding a job that perfectly matches with your strong skills and field of interest is a very challenging job for the job seekers. It is very difficult and time consuming to find a desired job in desired area near by the job seeker’s residence or withi . . .
  • Jw827g333?file=thumbnail
    Azadian, Nelson
    Envolution is an encryption algorithm which makes use of both convolution and deconvolution to encrypt and decrypt data. The initial idea for Envolution occurred to me back in October 2016. Originally, Envolution was developed to be both a public key . . .
  • 4t64gr82d?file=thumbnail
    Hartzman, Leslie Drew
    This paper involves the design of a Computer-Aided Instruction package for the Computervision (CV) Graphics System. This idea was brought about by the need for an alternate method for teaching the basic graphics commands to new users of the Computervi . . .
  • Cv43p121b?file=thumbnail
    Quan, Alan G.
    This report describes the design and implementation of KNAP, a knowledge-based expert system that can serve as an automated parliamentarian (i.e., an advisor for parliamentary procedure in a deliberative assembly). The expert knowledge of the system i . . .
  • Dz010t615?file=thumbnail
    Rimbey, Laura W.
    A three-dimensional bin-packing problem is considered using the heuristically-controlled search methods of artificial intelligence. The problem is stated as follows: Given a set of n three-dimensional rectangular boxes, where each dimension is in the . . .
  • 3b591d252?file=thumbnail
    Abbasi, Shafagh
    Detecting user’s emotional status is one of the most effective aspects that can improve human-computer interaction. In most of the prior emotion detection studies, the focus was on facial expression, speech signal and body language analysis for affect . . .
  • 37720h00p?file=thumbnail
    Krestyn, George Vaclav
    Ultrasonic imaging is a technique which uses ultrasound waves to allow objects not naturally visible (such as internal anatomical structures) to be visualized. It is an important diagnostic method in medicine. One application is the detection of ather . . .
  • M900nz08h?file=thumbnail
    Hossain, Kazi
    Abstract TOOL FOR GENERATION OF DATABASE APPLICATION TEST CASES By Kazi Shahdat Hossain Master of Science in Computer Science There are many safety critical applications out there which require a great amount of verification and validation. This is a . . .
  • V405sf04k?file=thumbnail
    Pandey, Ankit
    In this thesis, we propose a distributed memory parallel computer-testing tool called the sandbox. The evaluation of parallel programs runs in the controlled environment with cloud computing instances, where a single instance is used to monitor and co . . .
  • 9k41zj05j?file=thumbnail
    Garcia, Ted
    Querying large datasets has become easier with Big Data technologies such as Hadoop's MapReduce. Large public datasets are becoming more available and can be found on the Amazon Web Service (AWS) Cloud. In particular, Web Data Commons (Web Data Common . . .
  • 0v8383947?file=thumbnail
    Asadorian, Sevak
    Software projects today are increasing in size and complexity. Planning and leading software projects can be challenging and require staff planning, monitoring and controlling. Software organizations can have multiple projects executed at one time and . . .
  • Fq977z12k?file=thumbnail
    Moore, Kevin
    The goal of this project is to create a prototype application to represent server metrics in 3D space within a browser. This project consists of three major components: the metric monitoring framework Sensu, the historical data publisher and web servi . . .
  • Cn69m774w?file=thumbnail
    Patel, Bhavisha Dakubhai
    In recent years, Cloud computing has been touted as the next great development in the information technology business [1]. Cloud computing provides organizations around the world with the opportunity to focus on expanding their business and leave the . . .
  • Rf55zc51f?file=thumbnail
    Schaafsma, Nick
    The objective of this project is to measure the accuracy of using a high decibel sound as a reference for synchronizing audio recordings in a system composed of mobile devices and cloud technologies. The implementation is compared with one that only r . . .
  • 2z10wt74b?file=thumbnail
    Gordon, Mark Frank
    A design of an electronic mail system for picking up messages and delivering them among outside client systems is presented. The mail system was designed to permit users not connected by existing networks to exchange messages and/or files. The report . . .
  • Dn39x506m?file=thumbnail
    Hsu, Rin-Rin P.
    This project report encompasses the specification, design and implementation of a prototype CAI (Computer Aided Instruction) package for binary-tree operations. It includes five lessons. The lessons are: INTRODUCTION, TRAVERSAL, RETRRIEVAL, INSERTION . . .
  • Kk91fp961?file=thumbnail
    Rosenfeld, Gary Alan
    This thesis discusses the design and development of a real-time High Order Language (HOL) program. The function of the program is to control, test, and calibrate an inertial reference system built by Teledyne Systems Company. This project evolved out . . .
  • 9593tz62x?file=thumbnail
    Dasari, Saikishan
    Machine Translation and Natural Language Processing are two key fields of technology that are bringing the world together. Machine Translation eliminates the barrier for communicating with people who speak a different tongue. The roots of Machine Tran . . .
  • Jw827g308?file=thumbnail
    Lo, Chi-Shing Austin
    There is interest in making the relational data model to employ more meaningful concepts in its usage. This project intends to allow the user to retrieve data in data dependency form such that the relationships among attributes are transparent to user . . .
  • 2514nq39w?file=thumbnail
    Delmer, Dustin
    In this thesis, a comparison of GPU and CPU based computation using consumer grade hardware and parallel programming languages in a raytracer is presented. The raytracers presented make use of C++, Intel's SIMD CPU language and compiler: ISPC, and Nvi . . .
  • V692t971f?file=thumbnail
    Choi, Sang Min
    This project presents the prototype implementation of the database compiler (DB_Compiler) which is to be embedded as one of database tools of Computer Aided Design Information System (CADIS) in SARA/IDEAS Tool Building System (TBS). The SARA/IDEAS TBS . . .
  • 9z9033298?file=thumbnail
    Nielsen, David Beers
    The search for factoring algorithms has been ongoing for about 300 years. Still there does not exist any method that can practically decompose general integers of 100 digits or more. The problem is so intractable that large composite integers have bee . . .
  • 4b29b9235?file=thumbnail
    Kirth, Paul
    Modern networks are built and engineered on the premise that all traffic within the net- work is treated with the same set of uniform rules. Many of our networking protocols, security measures, and measurements rely on this paradigm. Over time ISPs, a . . .
  • Pg15bj38d?file=thumbnail
    Anderson, Yvonne Laurane
    The purpose of this project is to: (1) design with discrete logic components a digital controller for a 4~phase stepper motor:, (2) write a software program to control a 4-phase stepper motor, and ( 3) compare the advantages and disadvantages of hardw . . .
  • Np193d702?file=thumbnail
    Burgess, Rayna
    This project implements a solution to the semester class scheduling problem faced by the CSUN Computer Science Department each term. I wrote a web application following typical Agile software development practices including project requirement elicita . . .
  • 7w62fc78b?file=thumbnail
    Zulauf, Roman Christoph
    In this thesis, problems are considered that arise in distributed computing environments, such as shared memory multiprocessor systems where memory is physically distributed amongst the processing nodes. Classic results in paging, file migration, file . . .
  • 028710313?file=thumbnail
    Chang, Yiana
    The purpose of this thesis is to examine the relationship of electroencephalogram (EEG) data using insight meditation techniques versus effects demonstrated using alternate nostril breathing techniques. The alternate nostril breathing technique consis . . .
  • Rf55zc459?file=thumbnail
    He, Kai
    The primary objective of this thesis is to study the accessibility of people with intellectual and developmental disabilities (IDDs) using telepresence robots. Through the research of telepresence robots and the in-depth study of IDDs, and analyzing t . . .
  • 1n79h793b?file=thumbnail
    McGhee, Ridge Crawford
    The Visible Algorithms project at California State University, Northridge (CSUN) was designed to provide students with a series of computer-assisted instruction packages which simulate common algorithms. A major objective of this project is to make su . . .
  • 0z709046t?file=thumbnail
    Garcia, Gladys
    In this thesis, an image-based non-obtrusive indoor navigation system for the visually impaired is presented. The system makes use of image processing algorithms to extract floor regions from images captured from a wearable eye-mounted heads-up displa . . .
  • 5425kd88w?file=thumbnail
    Wiltz., Francis Nolan
    Typically more than 50 percent of software development cost goes into software testing. Thus, there is a critical need for cost effective, easily used and reliable software verification and validation methodologies. This thesis contains a comparative . . .
  • 9w0326399?file=thumbnail
    Synott, Debra
    While medical records have been digitized and technology has benefited physicians and hospitals in the last decade, the general population continues to struggle with finding and maintaining their own medical records. This project is intended to be the . . .
  • 5d86p356k?file=thumbnail
    Romero, Alex
    Thanks to the dynamic and improved encoding structures of the AOMedia Video 1 (AV1) standard, considerably high rates of data compression efficiency have been achieved. Developed by the Alliance for Open Media, AV1 was designed to become an alternativ . . .
  • Pk02cf04t?file=thumbnail
    Jabagchourian, Vatche
    Visual impairments affect the way people live their lives, making it difficult or impossible for visually impaired people to accomplish certain everyday tasks that sighted people take for granted. Reading represents a significant example of one of the . . .
  • 3x816r07f?file=thumbnail
    Herschderfer, Allan
    A compiler generator is a system which accepts the formal description of a computer language and produces a compiler capable of translating sentences in the language into a usable form. The goal of this project was not to produce a system suitable for . . .
  • Wm117s54n?file=thumbnail
    Shad, Alireza Behrouzi
    Steganography is an ancient science and the art of hiding information. Its counterpart, steganalysis, on the other hand, is the skill of detecting the hidden information. The growth of the Internet in recent decades created a battle field for both ste . . .
  • Vt150n91p?file=thumbnail
    Toy, Andrew Berman
    The general-purpose computer-assisted instruction (GPCAI) program described in this report is a CAI lesson authoring language which was designed to reduce the complexity of creating CAI lessons. A brief look at the trends which preceded the present st . . .
  • 9s161959j?file=thumbnail
    Schindel, Cathy Jane
    This project involves the introduction of software engineering methods and accompanying automated tools to one software development organization. A survey of the literature on tool development and a description of the specific development environment . . .
  • R207tt042?file=thumbnail
    Debbiny, Ryan
    Abstract ClueSifter: A Clue-Managing Data-Sieve Software System for Law Enforcement Personnel By Ryan Debbiny Master of Science in Computer Science ClueSifter: A Clue-Managing Data-Sieve Software System for Law Enforcement Personnel is being completed . . .
  • P2676z99w?file=thumbnail
    Movagharian Pour, Veronika
    Assembly programming language is taught to the students with computer science major in COMP 122 Computer Architecture course. Since assembly programming languages are considered low level programming languages, it is pretty challenging to learn and us . . .