Matthew Maxwell and Dr. Ken Rodham, Computer Science In the Western United States and other arid regions of the world, careful water management is crucial. As part of this process, data must be collected, analyzed, and manipulated before it is used to support real-time water management decisions. To facilitate this complex data dissemination, I developed […]
A Customer Loyalty Program for the BYU Bookstore
Steven Hulet and Dr. Sean Warnick, Computer Science Because of its relationship with Brigham Young University, the BYU Bookstore is in a position to know more about its customers on an individual basis than possible for the average firm operating in the free market. Such in-depth knowledge of a customer base allows a firm to […]
A Real-time 3D Engine for Students
Joshua Gustafson and Dr. Robert P. Burton, Computer Science A real-time 3D engine is a software system which allows a computer to generate and display three-dimensional graphics at interactive speeds. Faster, more capable, and less expensive video hardware has encouraged improvement in real-time engines and a diversification of their applications. They have been used traditionally […]
IMAGE ORIGAMI
Eric Sokolowsky and Dr. Parris Egbert, Computer Science Virtual reality, or the exploration of a virtual (computer-generated) environment, is an interesting field in computer science. However, building the virtual environment is a difficult task because of several factors. First, a realistic-looking object is very difficult to describe to a computer. The most common approach is […]
Approximation Algorithms for Factory Optimization in Parallel Manufacturing
David West and Dr. Sean Warnick, Computer Science Many industrial companies, especially ones that produce chemicals, use a batch manufacturing process to make their product. In a batch manufacturing process, a sequence of machines take “batches” of material and progressively perform actions until the final product is produced. One goal of managers of these companies […]
Obstacle Avoidance in Multidimensional Time
Luther Tychonievich and Dr. Robert P. Burton, Computer Science Hypertime, or nT research, is a relatively unexplored field. Like its sister field of hyperspace, or nD research, hypertime extends the universe by considering additional dimensions. Where hyperspace extends the universe by considering four or more spatial dimensions, hypertime considers universes characterized by two or more […]
A Data Mining Approach to Market Power Analysis
Nghia Tran and Dr. Sean Warnick, Computer Science Department The question about market power is interesting both for business managers and market regulators. Market regulators are interested in maximizing total social welfare in a market by protecting market competition. Business managers want to know the power of different firms or parts of a firm to […]
Demand Forecast Modeling A Water Resources Application
Matthew Maxwell and Dr. Sean Warnick, Computer Science The Sevier River Basin is located in rural south-central Utah. It covers approximately 12.5 percent of the state of Utah and is managed by the Sevier River Water Users Association (SRWUA). The majority of water in the basin is used for irrigation purposes. The basin is divided […]
Synonymity of Memorized Patterns: Considering Patterns and Word Order in Unsupervised Language Learning
Steve Hulet and Dr. Sean Warnick, Computer Science Despite the ever-increasing abilities of computers, natural language analysis is still a challenge. The intricacies of natural language are far too many to enumerate, giving rise to automated algorithms which learn how the language is used from large text corpora. Many current methods use complex statistical approaches […]
Selective Disclosure of Digitally-signed XML Documents
Richard Todd Carlson and Dr. Kent Seamons, Computer Science The Internet and related technologies allow for the transmission and consumption of electronic data with ease. Such transactions often involve the exchange of sensitive information so security and privacy concerns often limit the extent to which these technologies are used. Systems that aim to protect security […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- 9
- Next Page »