Download CS 363 Comparative Programming Languages

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

The Shockwave Rider wikipedia , lookup

Human–computer interaction wikipedia , lookup

Human-Computer Interaction Institute wikipedia , lookup

Wizard of Oz experiment wikipedia , lookup

Philosophy of artificial intelligence wikipedia , lookup

History of artificial intelligence wikipedia , lookup

Computer vision wikipedia , lookup

Artificial intelligence in video games wikipedia , lookup

Genetic algorithm wikipedia , lookup

Computer Go wikipedia , lookup

Transcript
Computer Systems Lab
TJHSST
Current Projects
In-House, pt 7
Current Projects, pt. 7
In-House
•
•
•
•
•
Comparison of AI Types of Various Strengths
Developing an AI Player for Guess Who
Techniques of Asymmetric File Encryption
Computer Vision: Edge Detections
Projects from Previous Years
2
A Comparison of AI
Types of Various
Strengths
Many different methods of Artificial
Intelligence in games exist in todays
world, such as a min-max search or goaldirected reasoning. By using a game
that is less complex than chess, the standard
game for testing AI's, I intend
to compare various AI methods and their
strengths in the game of Othello.
3
Developing an AI
Player for Guess Who
My project is to create a computerized
version of the game "Guess Who?" complete
with an AI player. This involves two
research areas: Game AI and Data Mining.
Data mining is the analysis of data and the
use of software techniques for finding
patterns and regularities in sets of data. My
AI's strategy algorithm will formulate
questions that eliminate 50% of the suspects,
which is the optimal percentage.
4
Techniques of
Asymmetric File
Encryption
Encryption programs have been created
to protect privacy during a transfer of
files and to make sure that sensitive files
will be protected. My project is to create
an asymmetric file encryption program.
This means that encrypted files will need
a pass-key to open that will be different
from the key used to encrypt. This
program could be applied practically to
protect files during
transfers.
5
Computer Vision: Edge Detections
Vertical diff., Roberts, Sobels
6
Computer Vision: Edge Detections
Sobels – Red, Green, Blue
7
Computer Vision: Edge Detections
Sobels – No Red/Green/Blue
8
Projects from previous years
• Computer Simulation and Modeling,
Computational Computer Science
– Evolution of Darwin's Finches: Simulation
using Genetic Algorithms
• This project uses genetic algorithms to simulate the
process of the evolutionary changes that gave rise to the
varying species of the finches. Factors including
theabundance of food, probability of mutation, and size of
the initial results of this project demonstrate the drastically
different evolutionary paths the finches could have
followed depending on varying environmental conditions.
Projects from previous years
• Computer Algorithms
– The Use of Polynomial-time Reducibility to
Improve Approximations to NP-complete
Problems
• NP-complete problems are thought, though not proven, to be
intractable. Because they are commonly encountered by
programmers in situations where an exponential -time solution
will be too slow, efficient approximations based on greedy or
random approximation algorithms are necessary. By reducing
one NP-complete problem to another, some aspect of it that was
not immediately obvious but that can be exploited to produce a
superior greedy algorithm may be revealed.
Projects from previous years
• Computer Graphics
– Implementation of Ray Tracing to Create a
Virtual Underwater Environment
• The realistic rendering of a scene beneath the water's surface
allows users to experience and learn about the underwater
surroundings. Students are able to "travel" underwater with this
education tool.
Projects from previous years
• Encryption
– Encryption and Decryption Using Character
Manipulation, Twist and Flip, and RSA
• The project will combine three methods of encryption already
used in various levels of security. Character (bit) manipulation
provides the least amount of security, but combined with a
modified Twist and Flip algorithm and RSA, the most advanced
encryption method in use, there is the possiblity of a nearly
unbreakable code.
Projects from previous years
• Database, Expert Systems
– Online Bleeding Logs for Hemophiliacs:
Simplifying Data Collection and Analysis
• The objective of this project is to simplify for doctors of
hemophiliacs the process of collecting, compiling, searching, and
viewing information contained in their patients' bleeding logs.
Projects from previous years
• Computer Music
– The Stravinsky Project : Using Genetic
Algorithms to Compose Music
• This program will use artificial intelligence and user input to
compose original music using midi output from the computer.
The AI will use genetic algorithms based on music theory to
determine the "quality" of any given phrase, and the type of
music will gravitate towards the preference of the user.
Projects from previous years
• Computer Graphics, Grid Computing
– SETI Visualizations: Development of
Graphical Utilities for Explaining SETI
• The SETI (Search for Extra-Terrestrial Intelligence) program
has been active since 1960. It publicises itself well with many
text-based sites. However, few graphical utilities exist to explain
the program. The purpose of this project is to develop such
utilities using OpenGL.
Projects from previous years
• AI, Cellular Automata – with GMUComputer
Science Dept.
– Solving the Majority Classification Problem
and Cellular Automata
• Creation of an algorithm that will solve the Majority
Classification Problem in an efficient and successful manner.
Projects from previous years
• Linux Educational Applications
– The Luminance Open Source Educational
Desktop
• The Luminance Desktop aims to be the premier open source
educational desktop. It will be comprised of many other open
source projects. The Luminance desktop does not aim to reinvent
the wheel and rewrite every single application. Rather its goals is
to create uniformity and ease of use to the a small subset of
users, students and teachers. All software forming the luminance
desktop will be Open Source, in order to promote the Open
Source philosophy.
Projects from previous years
• Portal to the Past - a Virtual Museum Tour
• Three-Dimensional Network Structure Visualization
Using OpenGL Graphics and TCP/IP
• Creation of an Intelligent Traffic Light System
• Exploration of Software Defined Radio
• Investigation of Methods of Computer Music
Generation
• Random Terrain and Non-fractal Urban
Environment Generation
Projects from previous years
• Terrain Generation in OpenGL
• Polak-Ribiere conjugate gradient method for
function minimization, Quantum Computing
• New Quantum Mechanical Model of Lossy
Information Propagation and Transmission
• Parameter Defined Polygon Modification
• Artificial Intelligence Techniques in Dots and Boxes
•Modular Tank Simulation
Thanks and have fun computing!