Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences
Computer Science and Computer Engineering Undergraduate Honors Theses
- Keyword
-
- Service learning (3)
- Autonomous Vehicles (1)
- Capacitive-sensing (1)
- ChipWhisperer (1)
- Classifier (1)
-
- Cloud Computing (1)
- Computer (1)
- Computer Science (1)
- Computing (1)
- Development (1)
- Edge Computing (1)
- Emotion analysis (1)
- Fake news (1)
- Fog Computing (1)
- Gender (1)
- Gesture recognition (1)
- Hardware Security (1)
- IC Design (1)
- Latency Problems (1)
- Leakage assessment (1)
- MSP430 (1)
- Machine learning (1)
- Masking (1)
- Oscilloscope (1)
- PCB design (1)
- Post-Quantum Cryptography (1)
- Science (1)
- Service Learning (1)
- Sex (1)
- Side-channel Analysis (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France
Computer Science and Computer Engineering Undergraduate Honors Theses
The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague
Computer Science and Computer Engineering Undergraduate Honors Theses
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …
Malicious Hardware & Its Effects On Industry, Gustavo Perez
Malicious Hardware & Its Effects On Industry, Gustavo Perez
Computer Science and Computer Engineering Undergraduate Honors Theses
In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other …
Identifying Fake News Using Emotion Analysis, Brady Gilleran
Identifying Fake News Using Emotion Analysis, Brady Gilleran
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper presents research applying Emotional Analysis to “Fake News” and “Real News” articles to investigate whether or not there is a difference in the emotion used in these two types of news articles. The paper reports on a dataset for Fake and Real News that we created, and the natural language processing techniques employed to process the collected text. We use a lexicon that includes predefined words for eight emotions (anger, anticipation, disgust, fear, surprise, sadness, joy, trust) to measure the emotional impact in each of these eight dimensions. The results of the emotion analysis are used as features …
Applications Of Fog Computing In Video Streaming, Kyle Smith
Applications Of Fog Computing In Video Streaming, Kyle Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …
Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin
Prototyping A Capacitive Sensing Device For Gesture Recognition, Chenglong Lin
Computer Science and Computer Engineering Undergraduate Honors Theses
Capacitive sensing is a technology that can detect proximity and touch. It can also be utilized to measure position and acceleration of gesture motions. This technology has many applications, such as replacing mechanical buttons in a gaming device interface, detecting respiration rate without direct contact with the skin, and providing gesture sensing capability for rehabilitation devices. In this thesis, an approach to prototype a capacitive gesture sensing device using the Eagle PCB design software is demonstrated. In addition, this paper tested and evaluated the resulting prototype device, validating the effectiveness of the approach.
Generation And Analysis Of A Social Network: Hamlet, Preston Evans
Generation And Analysis Of A Social Network: Hamlet, Preston Evans
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper examines the generation and analysis of a social network produced from Shakespeare’s play Hamlet. An XML file of Hamlet was parsed to extract the characters within the play and also identify when the characters appeared within the same scene. After parsing the speakers and the connections between characters, a network graph was generated that displayed all the characters in Hamlet, represented by nodes, and edges that represented the connections between characters as measured by their scene co-appearance. The results of the network graph were then compared to a published social network for Hamlet created by hand. The two …