Matching Items (408)

137137-Thumbnail Image.png

The Emblems: Speech-Recognition in Games

Description

Speech recognition in games is rarely seen. This work presents a project, a 2D computer game named "The Emblems" which utilizes speech recognition as input. The game itself is a

Speech recognition in games is rarely seen. This work presents a project, a 2D computer game named "The Emblems" which utilizes speech recognition as input. The game itself is a two person strategy game whose goal is to defeat the opposing player's army. This report focuses on the speech-recognition aspect of the project. The players interact on a turn-by-turn basis by speaking commands into the computer's microphone. When the computer recognizes a command, it will respond accordingly by having the player's unit perform an action on screen.

Contributors

Created

Date Created
  • 2014-05

137149-Thumbnail Image.png

The Emblems: OpenGL

Description

The project, "The Emblems: OpenGL" is a 2D strategy game that incorporates Speech Recognition for control and OpenGL for computer graphics. Players control their own army by voice commands and

The project, "The Emblems: OpenGL" is a 2D strategy game that incorporates Speech Recognition for control and OpenGL for computer graphics. Players control their own army by voice commands and try to eliminate the opponent's army. This report focuses on the 2D art and visual aspects of the project. There are different sprites for the player's army units and icons within the game. The game also has a grid for easy unit placement.

Contributors

Agent

Created

Date Created
  • 2014-05

137357-Thumbnail Image.png

Software Solutions to Academic Resource Distribution and Management

Description

Academic resources at Arizona State University are vast and allow a student to maintain success through his/her university attendance. The distribution and management of these systems is arduous and manually

Academic resources at Arizona State University are vast and allow a student to maintain success through his/her university attendance. The distribution and management of these systems is arduous and manually done. A software solution for the distribution of academic resource information is a Dashboard system that utilizes information from the university, and is expandable. A solution for the management of academic centers utilizes a scheduling algorithm that allows quick scheduling of resources. Overall these solutions provide easier workflows than the current systems allow.

Contributors

Agent

Created

Date Created
  • 2013-12

137292-Thumbnail Image.png

Characterization and Phylogeny of Wolbachia Endosymbiont Infections in the Harvester Ant Genus Pogonomyrmex

Description

Wolbachia is a genus of obligately intracellular bacterial endosymbionts of arthropods and nematodes, infecting up to 66% of all such species. In order to ensure its transmission, it may modify

Wolbachia is a genus of obligately intracellular bacterial endosymbionts of arthropods and nematodes, infecting up to 66% of all such species. In order to ensure its transmission, it may modify host reproduction by inducing one of four phenotypes: cytoplasmic incompatibility, feminization of genetic males, killing of male embryos, and induction of thelytokous parthenogenesis. This investigation was a characterization of the so-far unexamined Wolbachia infection of Pogonomyrmex ants. Five main questions were addressed: whether Wolbachia infection rates vary between North and South America, whether infection rates are dependent on host range, whether Wolbachia affects the caste determination of P. barbatus, whether infection rates in Pogonomyrmex are similar to those of other ants, and whether Wolbachia phylogeny parallels the phylogeny of its Pogonomyrmex hosts. Using PCR amplification of the wsp, ftsZ, and gatB loci, Wolbachia infections were detected in four of fifteen Pogonomyrmex species (26.7%), providing the first known evidence of Wolbachia infection in this genus. All infected species were from South America, specifically Argentina. Therefore, Wolbachia has no role in the caste determination of the North American species P. barbatus. Additionally, while it appears that the incidence of Wolbachia in Pogonomyrmex may be limited to South America, host range did not correlate with infection status. The incidence of Wolbachia in Pogonomyrmex as a whole was similar to that of invasive Solenopsis and Linepithema species, but not to Wasmannia auropunctata or Anoplolepis gracilipes, which retain Wolbachia infection in non-native locations. This suggests that there may be a parallel in Wolbachia infection spread in certain short-term models of species colonization and long-term models of genus radiation. Finally, there was no congruity between host and parasite phylogeny according to maximum likelihood analyses, necessarily due to horizontal transfer of Wolbachia between hosts and lateral gene transfer between Wolbachia strains within hosts.

Contributors

Agent

Created

Date Created
  • 2014-05

137309-Thumbnail Image.png

Security Analysis of x86 Processor Microcode

Description

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.

Contributors

Created

Date Created
  • 2014-05

137389-Thumbnail Image.png

Enhancing Physical Learning Experiences Using Online Tools - Tutoring Center Management System

Description

This project explores the development of a Ruby on Rails web application to help supervisors manage the tutoring centers at Arizona State University. Each phase of the project's development is

This project explores the development of a Ruby on Rails web application to help supervisors manage the tutoring centers at Arizona State University. Each phase of the project's development is examined in detail, including the requirements analysis, system design, system implementation, test strategy, and deployment strategy. The application also includes a REST API for providing the tutoring center data to external applications. These external applications can then present the data, along with their own unique features, to students. This should allow students to have an easier time locating the academic resources they need.

Contributors

Agent

Created

Date Created
  • 2013-12

137392-Thumbnail Image.png

Integrating Online and Offline Learning Experiences: Determining Design Opportunities to enhance in-person experiences with academic resources on a college campus

Description

Despite the advancement of online tools for activities related to the core experience of taking classes on a college campus, there has been a relatively small amount of research into

Despite the advancement of online tools for activities related to the core experience of taking classes on a college campus, there has been a relatively small amount of research into implementing online tools for ancillary academic resources (e.g. tutoring centers, review sessions, etc.). Previous work and a study conducted for this paper indicates that there is value in creating these online tools but that there is value in maintaining an in-person component to these services. Based on this, a system which provides personalized, easily-accessible, simple access to these services is proposed. Designs for user-centered online-tools that provides access to and interaction with tutoring centers and review sessions are described and prototypes are developed to demonstrate the application of design principles for online tools for academic services.

Contributors

Agent

Created

Date Created
  • 2013-12

137085-Thumbnail Image.png

Designing Digital Textbooks: Personalized and Collaborative Learning

Description

Digital technologies are quickly being combined with and replacing teacher curriculums and student resource tools. This is particularly true with advances in digital textbooks as it provides a medium for

Digital technologies are quickly being combined with and replacing teacher curriculums and student resource tools. This is particularly true with advances in digital textbooks as it provides a medium for opportunity and growth in the nature of the textbook as it pertains to students in the classroom. Although great strides have been taken in intelligent tutoring systems personalized toward a student's needs there seems to be an overall disconnect between student needs in the classroom in not utilizing or adopting these technologies. In this paper I provide both conflicting and comparable needs of teachers and students surrounding the textbook to reveal the costs and benefits associated with technology adoption. Through 4 teacher interviews and 4 participatory prototyping sessions I found that students and teachers desire the following elements in technology: 1) Collaboration 2) Synchronicity 3) Adaptive 4) Automation. I discuss the implications of implementing such features and how they could be applied in integrated Q&A system to encourage collaborative learning.

Contributors

Agent

Created

Date Created
  • 2014-05

136615-Thumbnail Image.png

Exploration of Sea Ice Concentrations using Graph Metrics

Description

As an example of "big data," we consider a repository of Arctic sea ice concentration data collected from satellites over the years 1979-2005. The data is represented by a graph,

As an example of "big data," we consider a repository of Arctic sea ice concentration data collected from satellites over the years 1979-2005. The data is represented by a graph, where vertices correspond to measurement points, and an edge is inserted between two vertices if the Pearson correlation coefficient between them exceeds a threshold. We investigate new questions about the structure of the graph related to betweenness, closeness centrality, vertex degrees, and characteristic path length. We also investigate whether an offset of weeks and years in graph generation results in a cosine similarity value that differs significantly from expected values. Finally, we relate the computational results to trends in Arctic ice.

Contributors

Created

Date Created
  • 2015-05

136617-Thumbnail Image.png

Impromp2: An Event Searching Application

Description

We created an Android application, Impromp2, which allows users to search for and save events of interest to them in the Phoenix area. The backend, built on the Parse platform,

We created an Android application, Impromp2, which allows users to search for and save events of interest to them in the Phoenix area. The backend, built on the Parse platform, gathers events daily using Web services and stores them in a database. Impromp2 was designed to improve upon similarly-purposed apps available for Android devices in several key ways, especially in user interface design and data interaction capability. This is a full-stack software project that explores databases and their performance considerations, Web services, user interface design, and the challenges of app development for a mobile platform.

Contributors

Created

Date Created
  • 2015-05