Organizational Unit:
Undergraduate Research Opportunities Program

Research Organization Registry ID
Description
Previous Names
Parent Organization
Parent Organization
Organizational Unit
Includes Organization(s)

Publication Search Results

Now showing 1 - 7 of 7
  • Item
    Designing a character avatar model for the Mermaids MMO
    (Georgia Institute of Technology, 2010-12-20) Ead, Samer Omar
    This paper describes the technique formed for the creation of an efficient, simply rigged, customizable mermaid avatar model for the Mermaids massively multiplayer online game (MMOG). Our goal was to improve the in game customization of the player s 3D mermaid model, while maintaining rendering efficiency. We devised a procedure that utilizes the iterative nature of design without sacrificing the scientific and technical aspects of the project. Our procedure begins by a method known as Partitioning where we break down the model s body into distinct sub-models. During development, this partitioning allowed us to focus on smaller concise areas of interest, whereas during game-play this change granted the player greater strands of customization freedom. Since the model relied on a skeleton for its animations, it s partitioning required Skeletal Reformations to reassess the control scheme of the rig over the sub-models. In this method, individual sub-skeletons were designed to provide increased local control over their respective sub-models in contrast to the global control that the previous rig allowed. The sub-skeletons were then joined together forming a combined and complete skeletal rig for the mermaid model. We iterated through the previous methods refining their procedures in efforts of Balancing Customizability with Efficiency , which in turn provided us with the results of our novel technique. Our technique utilizes innovative methods that localize skeletal control over respective sub-models in a novel way, which allows increased customizability with limited costs to efficiency.
  • Item
    Director in a box: learning cinematic rhetoric for camera shot selection
    (Georgia Institute of Technology, 2010-12-20) Munro, John Burnet
    Automatic generation of cinematic content has been a goal for both the military and the entertainment industry to allow more diverse plot structures so that a trainee or player may have a scenario tailored to their personal needs and desires. We approach this problem from a traditional view of story as being appropriately broken into two parts: plot and discourse. We focus on the rhetorical aspects of discourse, specifically selecting coherent and aesthetically pleasing shot and blocking constraints for a virtual cinematographer. In the past, selection has been solved using a decompositional planning approach. Unfortunately, each decompositional unit corresponding to a single film idiom must be hand-authored by an expert cinematographer, resulting in an intractable knowledge acquisition problem, prone to error and subjectivity. We show that this problem can instead be solved by reinforcement learning techniques, which train on features from existing sitcom and movie scenes. We will evaluate the precision of our method by running 10-fold cross validation on our training sets.
  • Item
    The Online Community Grid Volunteer Grid Computing with the Web Browser
    (Georgia Institute of Technology, 2010-05-12) Miller, Daniel Menachem
    Current community grid projects, such as IBM's World Community Grid (www.worldcommunitygrid.org), have successfully developed standalone applications to connect thousands of clients to one huge network of users. Each client donates their machine's idle time to compute mathematical operations to help solve multiple humanitarian projects requiring massive amounts of data to be computed (examining tissue microarrays, human proteome folding, ect). These projects have been relatively successful; however, there are multiple design problems that hinder a multitude of users to join the network. These problems include yet are not limited to: ● Required user registration and email verification ● Once a user registers, a large standalone application to transmit and receive data from a central server is required to be downloaded and installed ● The program runs as a background process and is only active when a user's computer is idle ● The program may not work due to firewall restrictions on the client machine This research, as shown by prototype, eliminates all of these barriers. No registration, no installation, no required idleness, and no firewall issues. According to Adobe/Macromedia, roughly 96-98% of all home computers have the Flash Player installed. This figure is greater than any operating system, browser, program, or other virtual machine (including Java). The purpose of this research project is to determine whether it is possible to create a grid community on the Internet utilizing browser technologies such as Flash and or AJAX technology.
  • Item
    Towards developing an intelligent graph restructuring algorithm for graph based stories using Google Maps
    (Georgia Institute of Technology, 2010-05-12) Hajarnis, Sanjeet Uday
    Location-based games are gaining popularity because of their unique feature of having the players move in their environment. This feature serves dual purpose (i) of allowing the players to stay fit by walking outside while playing their location based game and (ii) of separating them from their routine desk work usually sedentary work. Unfortunately, scalability becomes a huge concern for location based games because a particular (location-specific) game involves various landmarks and checkpoints in the vicinity of the current location. Thus, in order to cater to a sizeable audience and variety of locals, location based mobile games must be available for all or most playable locations. Having a database of games for all possible locations that players would wish to play in seems extremely infeasible and unreasonable. To overcome the above mentioned problem, this thesis proposes a solution that would attempt to eliminate pre-storing all the location specific games. The solution intelligently translates stories from their original locations into new locations by finding similarities between the locations. Thus, every time a user requests a game for a new location, restructure one of the previously written games for different locations to match and map to the new location the users intends to play in via a web-based authoring tool. The translation algorithm restructures original story into new story using analogical reasoning, heuristic hill-climbing and dynamic programming. Analogical reasoning is performed with the location-specific information obtained from Google Maps. This thesis uses heuristic hill-climbing algorithm to obtain the optimal mapping between the original and new location by searching through the space of similar checkpoints/landmarks between the two locations and dynamic programming and memorization optimizes the algorithm s performance by avoiding excessive re-computation. This thesis attempts to analyze the effects and success of using analogical reasoning with hill-climbing and dynamic programming in restructuring stories from original location to new location.
  • Item
    Community Mosaic: Finding Ways to Eat More Healthfully in a Low-Income African American Community
    (Georgia Institute of Technology, 2010-05-12) Sharma, Mansi
    Community Mosaic is a system to promote healthy eating amongst low-income African American people. This thesis analyzes a study I conducted that encourages people to talk about what they think are the barriers against as well as the resources for trying to eat healthfully. The results of this study will be useful for the low income African American community as well as the HCI (Human Computer Interaction) community. More specifically, the results will facilitate towards finding ways to eat more healthily due to the correct understanding of the barriers against and available resources for eating healthfully in a community. The African American community is known to have more diet-related health problems than other ethnic communities in the US; by understanding the reasons behind these problems the goal is to help minimize them.
  • Item
    A Distributed Voice over Internet Protocol and Public Switched Telephone Network Honeynet Framework
    (Georgia Institute of Technology, 2010-05-12) Hanif, Zachary D.
    Because of the recent advent of Voice over Internet Protocol technologies, security researchers have had difficulty keeping up with the rapid increase in such electronic spam and related security threats. As a response, Lightning Dog was conceived to provide researchers with the tools and framework needed to gather immediate data from the wild, produced by the spammers themselves. As spammers have repeatedly demonstrated that they will attempt to utilize all possible mediums of communication to contact others, the advent of VoIP has provided them with numerous new avenues of propagating their unwanted messages to legitimate users of the communication system. Lightning Dog is based on a three part system which incorporates baited websites, multiple gathering nodes and a centralized collection and analysis machine for dissecting and cataloging the captured telephonic spam and attack data. This project is particularly notable because it allows researchers to gather and analyze both Voice over Internet Protocol and Public Switched Telephone Network captured telephony spam, thereby allowing researchers to correlate any links between the two mediums of spam publication. As researchers are having difficulty quickly capturing data that accurately reflects either of these two areas of telephonic spam, it is the goal of this project to provide an accessible method to resolve that issue. Lightning Dog proposes a honeynet dedicated to capturing and recording VoIP and PSTN specific data, allowing researchers easy access to recent attacks that are constructed by telephonic attackers, as opposed to having to rely on out-of-date, third-party, or unreliable information. In this paper, the system is introduced, its specific motivations are explained, the specific goals and the final design of the system are presented. Finally, proposed usage and deployment scenarios are presented, along with a review of published related literature and works, and a discussion of the implications and possible future work for this system.
  • Item
    A Conjunctive Middleware Adaptation of Active and Passive RFID Techonologies
    (Georgia Institute of Technology, 2010-05-11) Rowswell, Brent
    RFID technology has been split into two branches. Active RFID and passive RFID behave in very different manners, yet the theory behind them is practically the same. If the two branches were able to be merged into use under a single software system, then a number of use cases can be made that mitigate each technology's weakness with the other. The only major obstacle to using them interchangeably is the lack of a standard messaging system. Since we can't create a standard for industry, we plan on using a middleware to translate to our own standard.