Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Undergraduate Honors Theses

Theses/Dissertations

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor May 2023

Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor

Undergraduate Honors Theses

Systems like Google Home, Alexa, and Siri that use voice-based authentication to verify their users’ identities are vulnerable to voice replay attacks. These attacks gain unauthorized access to voice-controlled devices or systems by replaying recordings of passphrases and voice commands. This shows the necessity to develop more resilient voice-based authentication systems that can detect voice replay attacks.

This thesis implements a system that detects voice-based replay attacks by using deep learning and image classification of voice spectrograms to differentiate between live and recorded speech. Tests of this system indicate that the approach represents a promising direction for detecting voice-based replay …


Bias In Artificial Intelligence: The Morality And Motivation Behind The Algorithm, Avery Freeman May 2022

Bias In Artificial Intelligence: The Morality And Motivation Behind The Algorithm, Avery Freeman

Undergraduate Honors Theses

More than 180 cognitive biases have been identified in humans, and these biases relate to feelings towards a person or a group based on perceived group membership (Dilmegani, 2020). The development of artificial intelligence has fallen into the hands of engineers and statisticians, people who work within fields that have well-established race and gender diversity disparities (Panch et al., 2019). Thus, it is no surprise that the aforementioned biases have made their way into the algorithms behind artificial intelligence. The current study explored how participants’ pre-existing biases and level of outgroup contact have the potential to affect their decision-making pertaining …


Performance Implications Of Memory Affinity On Filesystem Caches In A Non-Uniform Memory Access Environment, Jacob Adams May 2021

Performance Implications Of Memory Affinity On Filesystem Caches In A Non-Uniform Memory Access Environment, Jacob Adams

Undergraduate Honors Theses

Non-Uniform Memory Access imposes unique challenges on every component of an operating system and the applications that run on it. One such component is the filesystem which, while not directly impacted by NUMA in most cases, typically has some form of cache whose performance is constrained by the latency and bandwidth of the memory that it is stored in. One such filesystem is ZFS, which contains its own custom caching system, known as the Adaptive Replacement Cache. This work looks at the impact of NUMA on this cache via sequential read operations, shows how current solutions intended to reduce this …


Appointment Scheduling System, Guzaloi Noori Jan 2021

Appointment Scheduling System, Guzaloi Noori

Undergraduate Honors Theses

Appointment Scheduling System designed for universities so that students can schedule appointments with their university’s faculty and staff regarding academic, employment, immigration, or personal issues. The scheduling system has the ability of being embedded to the Computer Science Capstone project iAcademic, which I took part in as a front-end developer.


Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter May 2018

Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter

Undergraduate Honors Theses

A web app was developed which allows any internet-connected device to remotely monitor a roadway intersection’s state over HTTP. A mapping simulation was enhanced to allow researchers to retroactively track the location and the ad-hoc connectivity of vehicle clusters. A performance analysis was conducted on the utilized network partitioning algorithm. This work was completed under and for the utility of ETSU’s Vehicular Networking Lab. It can serve as a basis for further development in the field of wireless automobile connectivity.