Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan May 2023

The Effects Of Social Media On Mental Health And Career Planning, Spencer A. Rowan

Honors Theses

Social media use is prevalent and necessary in society—nearly anything can be accomplished with a mobile device or smartphone. Among the US population, two thirds of American adults admit to using social media (Perrin, 2015) and in 2022, Georgiev (2023) found Americans spent an average of two and a half hours daily on social media. Furthermore, social media use is tied to mental well-being, work confidence levels, and feelings of being an imposter (Johnson et al., 2020; Uram & Skalski, 2022; Hernandez & Chalk, 2021; Myers, 2021; Ramm, 2019).

This project examined the role of social media use among college …


The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten Dec 2022

The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten

Honors Theses

Mental health issues have become increasingly important in today's society. With that being said, researchers and consumers are looking for new ways to manage and treat mental health using new technologies in labs and the consumer space. This innovation has led to the presence of mobile self-help mental health applications, applications for peoples’ phones that are used to manage symptoms of mental health problems, such as depression and anxiety, track goals, meditate, and more. However, mobile mental health applications, and mobile applications in general, have a problem concerning user satisfaction and overall user retention – studies have shown that 95% …


Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen May 2022

Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen

Honors Theses

This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …


Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha May 2022

Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha

Honors Theses

The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …


Wearables And Wearable Data In Tele-Health Applications, Jack Mazza May 2021

Wearables And Wearable Data In Tele-Health Applications, Jack Mazza

Honors Theses

With the sudden emergence of Covid-19, Tele-Health has been forced into the forefront of healthcare. With no human contact, regular in-person doctor or clinic visits could not be made. Unfortunately, there is a gap in patient data for healthcare professionals when making diagnoses remotely. Fortunately, many users are constantly collecting some primary health data through wearables that have become commonplace in users' homes. Tapping into this unused data could provide healthcare professionals with a better picture of patients' health remotely. In this thesis, I will determine whether this wearable data can be a viable addition to Tele-Health applications, providing additional …


Evaluation Of State-Of-The-Art Nlp Deep Learning Architectures On Commonsense Reasoning Task, Guo Rui (Justin) Lee Apr 2021

Evaluation Of State-Of-The-Art Nlp Deep Learning Architectures On Commonsense Reasoning Task, Guo Rui (Justin) Lee

Honors Theses

The goal of this project was to explore modern neural network technology in the application of discerning and generating statements that are ‘reasonable’, in what is known as commonsense reasoning. We built off of the work of Saeedi et al. In their work on the 2020 SemEval task, Commonsense Validation and Explanation (ComVE). SemEval is a workshop that creates a variety of semantic evaluation tasks to examine the state of the art in the practical application of natural language processing. This particular task involved three sections: task A, Validation, in which a program tries to select which of two statements …


Non-Linear Dimensionality Reduction Using Auto-Encoder For Optimized Malaria Infected Blood Cell Classifier, Aayush Dhakal Apr 2021

Non-Linear Dimensionality Reduction Using Auto-Encoder For Optimized Malaria Infected Blood Cell Classifier, Aayush Dhakal

Honors Theses

Neural Networks have been widely used in the problem of Medical Image Analysis. However, when dealing with large images, deep networks easily exhaust computer resources, which in turn hinders training. This paper shows the efficacy of using Auto-Encoders as a dimensionality reduction tool to increase the efficiency of a Malaria Infected Blood Cell Image classifier. We show that using an autoencoder, we can reduce the dimensionality of large blood cell images effectively such that the features in the new space retain all the essential information from the original input. Then we show that the new features obtained from the autoencoder …


Determination Of Hydrogel Degradation By Passive Mechanical Testing, Avery Rosh-Gorsky Jan 2021

Determination Of Hydrogel Degradation By Passive Mechanical Testing, Avery Rosh-Gorsky

Honors Theses

This paper details a new technique to measure the mechanical properties of ETTMP PEGDA hydrogels using Hertz Contact Theory and simultaneously analyze both the model drug release and gel erosion in situ. This method involves curing a drug loaded hydrogel in a standard cuvette and placing a glass bead and phosphate buffer solution (PBS). Over time, the cross-linked network of the hydrogel breaks down, and, as a result, the ball sinks into the hydrogel. This method provides a macroscopic and inexpensive way to continuously and passively measure properties of the hydrogel as the hydrogel degrades. By plotting both the …


Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook Dec 2020

Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook

Honors Theses

Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …


Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson Jun 2020

Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson

Honors Theses

The purpose of this project was to implement a human facial emotion recognition system in a real-time, mobile setting. There are many aspects of daily life that can be improved with a system like this, like security, technology and safety.

There were three main design requirements for this project. The first was to get an accuracy rate of 70%, which must remain consistent for people with various distinguishing facial features. The second goal was to have one execution of the system take no longer than half of a second to keep it as close to real time as possible. Lastly, …


Sunseeker Solar Car Display And Driver Unit, Conner Mccarthy Apr 2020

Sunseeker Solar Car Display And Driver Unit, Conner Mccarthy

Honors Theses

Digital dashboard displays with critical driver information are found in all modern vehicles. Examples of such information available to the driver include a speedometer, odometer, engine RPM, fuel gauge and more. The current 2016 Sunseeker solar car already has numerous displays that can show critical information to the driver, however, there are several problems that exist. Each display itself is less than two inches in size, the text on the screens is difficult to read, and the measurements have no units. Furthermore, these displays were made by a company that no longer exists, thus preventing the solar car team from …


Car Image Classification Using Deep Neural Networks, Mingchen Li Jan 2019

Car Image Classification Using Deep Neural Networks, Mingchen Li

Honors Theses

Image classification is widely used in many fields of study. Deep neural networks are proven to be effective classifier structure due to its massive parameters and training capability. This paper outlines the development of Deep Neural Network in recent years and applied them on a Car image data set in order to compare their performances.


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …