* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download CS 363 Comparative Programming Languages
The Shockwave Rider wikipedia , lookup
Human–computer interaction wikipedia , lookup
Human-Computer Interaction Institute wikipedia , lookup
Wizard of Oz experiment wikipedia , lookup
Philosophy of artificial intelligence wikipedia , lookup
History of artificial intelligence wikipedia , lookup
Computer vision wikipedia , lookup
Artificial intelligence in video games wikipedia , lookup
Computer Systems Lab TJHSST Current Projects In-House, pt 7 Current Projects, pt. 7 In-House • • • • • Comparison of AI Types of Various Strengths Developing an AI Player for Guess Who Techniques of Asymmetric File Encryption Computer Vision: Edge Detections Projects from Previous Years 2 A Comparison of AI Types of Various Strengths Many different methods of Artificial Intelligence in games exist in todays world, such as a min-max search or goaldirected reasoning. By using a game that is less complex than chess, the standard game for testing AI's, I intend to compare various AI methods and their strengths in the game of Othello. 3 Developing an AI Player for Guess Who My project is to create a computerized version of the game "Guess Who?" complete with an AI player. This involves two research areas: Game AI and Data Mining. Data mining is the analysis of data and the use of software techniques for finding patterns and regularities in sets of data. My AI's strategy algorithm will formulate questions that eliminate 50% of the suspects, which is the optimal percentage. 4 Techniques of Asymmetric File Encryption Encryption programs have been created to protect privacy during a transfer of files and to make sure that sensitive files will be protected. My project is to create an asymmetric file encryption program. This means that encrypted files will need a pass-key to open that will be different from the key used to encrypt. This program could be applied practically to protect files during transfers. 5 Computer Vision: Edge Detections Vertical diff., Roberts, Sobels 6 Computer Vision: Edge Detections Sobels – Red, Green, Blue 7 Computer Vision: Edge Detections Sobels – No Red/Green/Blue 8 Projects from previous years • Computer Simulation and Modeling, Computational Computer Science – Evolution of Darwin's Finches: Simulation using Genetic Algorithms • This project uses genetic algorithms to simulate the process of the evolutionary changes that gave rise to the varying species of the finches. Factors including theabundance of food, probability of mutation, and size of the initial results of this project demonstrate the drastically different evolutionary paths the finches could have followed depending on varying environmental conditions. Projects from previous years • Computer Algorithms – The Use of Polynomial-time Reducibility to Improve Approximations to NP-complete Problems • NP-complete problems are thought, though not proven, to be intractable. Because they are commonly encountered by programmers in situations where an exponential -time solution will be too slow, efficient approximations based on greedy or random approximation algorithms are necessary. By reducing one NP-complete problem to another, some aspect of it that was not immediately obvious but that can be exploited to produce a superior greedy algorithm may be revealed. Projects from previous years • Computer Graphics – Implementation of Ray Tracing to Create a Virtual Underwater Environment • The realistic rendering of a scene beneath the water's surface allows users to experience and learn about the underwater surroundings. Students are able to "travel" underwater with this education tool. Projects from previous years • Encryption – Encryption and Decryption Using Character Manipulation, Twist and Flip, and RSA • The project will combine three methods of encryption already used in various levels of security. Character (bit) manipulation provides the least amount of security, but combined with a modified Twist and Flip algorithm and RSA, the most advanced encryption method in use, there is the possiblity of a nearly unbreakable code. Projects from previous years • Database, Expert Systems – Online Bleeding Logs for Hemophiliacs: Simplifying Data Collection and Analysis • The objective of this project is to simplify for doctors of hemophiliacs the process of collecting, compiling, searching, and viewing information contained in their patients' bleeding logs. Projects from previous years • Computer Music – The Stravinsky Project : Using Genetic Algorithms to Compose Music • This program will use artificial intelligence and user input to compose original music using midi output from the computer. The AI will use genetic algorithms based on music theory to determine the "quality" of any given phrase, and the type of music will gravitate towards the preference of the user. Projects from previous years • Computer Graphics, Grid Computing – SETI Visualizations: Development of Graphical Utilities for Explaining SETI • The SETI (Search for Extra-Terrestrial Intelligence) program has been active since 1960. It publicises itself well with many text-based sites. However, few graphical utilities exist to explain the program. The purpose of this project is to develop such utilities using OpenGL. Projects from previous years • AI, Cellular Automata – with GMUComputer Science Dept. – Solving the Majority Classification Problem and Cellular Automata • Creation of an algorithm that will solve the Majority Classification Problem in an efficient and successful manner. Projects from previous years • Linux Educational Applications – The Luminance Open Source Educational Desktop • The Luminance Desktop aims to be the premier open source educational desktop. It will be comprised of many other open source projects. The Luminance desktop does not aim to reinvent the wheel and rewrite every single application. Rather its goals is to create uniformity and ease of use to the a small subset of users, students and teachers. All software forming the luminance desktop will be Open Source, in order to promote the Open Source philosophy. Projects from previous years • Portal to the Past - a Virtual Museum Tour • Three-Dimensional Network Structure Visualization Using OpenGL Graphics and TCP/IP • Creation of an Intelligent Traffic Light System • Exploration of Software Defined Radio • Investigation of Methods of Computer Music Generation • Random Terrain and Non-fractal Urban Environment Generation Projects from previous years • Terrain Generation in OpenGL • Polak-Ribiere conjugate gradient method for function minimization, Quantum Computing • New Quantum Mechanical Model of Lossy Information Propagation and Transmission • Parameter Defined Polygon Modification • Artificial Intelligence Techniques in Dots and Boxes •Modular Tank Simulation Thanks and have fun computing!