Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Physical Sciences and Mathematics

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark May 2023

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark

Senior Honors Projects, 2020-current

This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …


Analyzing Motivation And Sense Of Belonging Belonging In Cs1 Review Sessions, Cory Longenecker May 2023

Analyzing Motivation And Sense Of Belonging Belonging In Cs1 Review Sessions, Cory Longenecker

Senior Honors Projects, 2020-current

The Computer Science Department at James Madison University has a Teaching Assistant program which aims to help students succeed in early-level Computer Science courses. Part of this program is a review session, the Fourth Hour, which provides students extra help on the concepts taught each week in class. Historically, attendance at this review session has been low. Because of this, the study aimed to increase attendance by motivating students through interventions, primarily offering quiz retakes to students who attended. Additionally, this study looked at the reported sense of belonging for participants who attended.

We made three conclusions from survey data …


Heuristically Secure Threshold Lattice-Based Cryptography Schemes, James D. Dalton May 2021

Heuristically Secure Threshold Lattice-Based Cryptography Schemes, James D. Dalton

Masters Theses, 2020-current

In public-key encryption, a long-term private key can be an easy target for hacking and deserves extra protection. One way to enhance its security is to share the long-term private key among multiple (say n) distributed servers; any threshold number (t, t ≤ n) of these servers are needed to collectively use the shared private key without reconstructing it. As a result, an attacker who has compromised less than t servers will still not be able to reconstruct the shared private key.

In this thesis, we studied threshold decryption schemes for lattice-based public-key en- cryption, which is one of the …


Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio Dec 2020

Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio

Masters Theses, 2020-current

The recent advancements made in Internet of Things (IoT) devices have brought forth new opportunities for technologies and systems to be integrated into our everyday life. In this work, we investigate how edge nodes can effectively utilize 802.11 wireless beacon frames being broadcast from pre-existing access points in a building to achieve room-level localization. We explain the needed hardware and software for this system and demonstrate a proof of concept with experimental data analysis. Improvements to localization accuracy are shown via machine learning by implementing the random forest algorithm. Using this algorithm, historical data can train the model and make …


A Pilot Study On The Impact Of Teaching Assistant Led Cs1 Study Sessions Using Peer Instruction, Megan E. Gilbert May 2020

A Pilot Study On The Impact Of Teaching Assistant Led Cs1 Study Sessions Using Peer Instruction, Megan E. Gilbert

Senior Honors Projects, 2020-current

James Madison University’s Computer Science program strives to be a student-centered learning environment with a focus on creating a community for undergraduate success. National data reveals computer science has the lowest student retention rate compared to other STEM majors. The National Center for Women and Information Technology (NCWIT) has compiled a list of ways to retain students in Computer Science. In particular, NCWIT calls for collaboration indicate that “a sense of belonging, or a feeling of fit, is important for supporting student interest and persistence.” One aspect of creating community is the department’s longstanding commitment to provide undergraduate teaching assistants …


Detecting Credit Card Fraud: An Analysis Of Fraud Detection Techniques, William Lovo May 2020

Detecting Credit Card Fraud: An Analysis Of Fraud Detection Techniques, William Lovo

Senior Honors Projects, 2020-current

Advancements in the modern age have brought many conveniences, one of those being credit cards. Providing an individual the ability to hold their entire purchasing power in the form of pocket-sized plastic cards have made credit cards the preferred method to complete financial transactions. However, these systems are not infallible and may provide criminals and other bad actors the opportunity to abuse them. Financial institutions and their customers lose billions of dollars every year to credit card fraud. To combat this issue, fraud detection systems are deployed to discover fraudulent activity after they have occurred. Such systems rely on advanced …


A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii May 2020

A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii

Masters Theses, 2020-current

Code stylometry is applying analysis techniques to a collection of source code or binaries to determine variations in style. The variations extracted are often used to identify the author of the text or to differentiate one piece from another.

In this research, we were able to create a multi-input deep learning model that could accurately categorize and group code from multiple projects. The deep learning model took as input word-based tokenization for code comments, character-based tokenization for the source code text, and the metadata features described by A. Caliskan-Islam et al. Using these three inputs, we were able to achieve …


Generating Acoustic Projections Using 3d Models, Jake A. Brazelton May 2020

Generating Acoustic Projections Using 3d Models, Jake A. Brazelton

Senior Honors Projects, 2020-current

Raytracing is used in commercial graphics engines most commonly for lighting effects, but it also has many uses when it comes to acoustic simulation. Adopted directly from these computer graphics programs, the formulas presented herein enable the visualization of acoustic intensity levels throughout a 3D space using Python 3 and the OpenGL library. In addition to visualization, they also provide the ability to calculate the reverberation time and critical distance of an enclosed space in relation to its size and material makeup. The described application bundles all of these components together in a Qt5 application that allows users to view …


Towards Natural Language Understanding In Text-Based Games, Anthony Snarr May 2020

Towards Natural Language Understanding In Text-Based Games, Anthony Snarr

Senior Honors Projects, 2020-current

Text-based games are a very promising space for language-focused machine learning. Within them are huge hurdles in machine learning, like long-term planning and memory, interpretation and generation of natural language, unpredictability, and more. One problem to consider in the realm of natural language interpretation is how to train a machine learning model to understand a text-based game’s objective. This work considers treating this issue like a machine translation problem, where a detailed objective or list of instructions is given as input, and output is a predicted list of actions. This work also explores how a supervised learning system might learn …


Mitigating Real-Time Relay Phishing Attacks Against Mobile Push Notification Based Two-Factor Authentication Systems, Casey Silver May 2020

Mitigating Real-Time Relay Phishing Attacks Against Mobile Push Notification Based Two-Factor Authentication Systems, Casey Silver

Masters Theses, 2020-current

This paper explores how existing push notification based two-factor authentication systems are susceptible to real-time man-in-the-middle relay attacks and proposes a system for mitigating such attacks. A fully functional reference system of the proposed mitigation was built and compared to an existing push notification two-factor authentication system while undergoing a real-time man-in-the-middle relay attack. The reference systems used cloud infrastructure for hosting, an Apple iPhone as the notification receiver, and Apple’s push notification service to send notifications. A publicly available tool for conducting real-time man-in-the-middle relay attacks was used to conduct the attacks. The results of the tests were recorded …


Modeling A Chaotic Billiard: The Bunimovich Stadium, Randal Shoemaker May 2019

Modeling A Chaotic Billiard: The Bunimovich Stadium, Randal Shoemaker

Senior Honors Projects, 2010-2019

The Bunimovich stadium is a chaotic dynamical system in which a single particle, known as a billiard, moves indefinitely within a barrier without loss of momentum. Mathematicians and physicists have been interested in its properties since it was discovered to be chaotic in the 1970’s [5] [3] [4]. The Bunimovich stadium is actively researched [9]. This thesis and its accompanying software, the Bunimovich Stadia Evolution Viewer (BSEV), present a novel visual representation of the the chaotic dynamical system. The goal for the software is to provide insights into the stadium’s properties to aid researchers. This tool allows one to visualize …


The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild May 2019

The Effects Of Finite Precision On The Simulation Of The Double Pendulum, Rebecca Wild

Senior Honors Projects, 2010-2019

We use mathematics to study physical problems because abstracting the information allows us to better analyze what could happen given any range and combination of parameters. The problem is that for complicated systems mathematical analysis becomes extremely cumbersome. The only effective and reasonable way to study the behavior of such systems is to simulate the event on a computer. However, the fact that the set of floating-point numbers is finite and the fact that they are unevenly distributed over the real number line raises a number of concerns when trying to simulate systems with chaotic behavior. In this research we …


A Study Of The Effect Of Memory System Configuration On The Power Consumption Of An Fpga Processor, Adam Blalock May 2019

A Study Of The Effect Of Memory System Configuration On The Power Consumption Of An Fpga Processor, Adam Blalock

Senior Honors Projects, 2010-2019

With electrical energy being a finite resource, feasible methods of reducing system power consumption continue to be of great importance within the field of computing, especially as computers proliferate. A victim cache is a small fully associative cache that “captures” lines evicted from L1 cache memory, thereby reducing lower memory accesses and compensating for conflict misses. Little experimentation has been done to evaluate its effect on system power behavior and consumption. This project investigates the performance and power consumption of three different processor memory designs for a sample program using a field programmable gate array (FPGA) and the Vivado Integrated …


Using Data Science To Detect Fake News, Eliza Shoemaker May 2019

Using Data Science To Detect Fake News, Eliza Shoemaker

Senior Honors Projects, 2010-2019

The purpose of this thesis is to assist in automating the detection of Fake News by identifying which features are more useful for different classifiers. The effectiveness of different extracted features for Fake News detection are going to be examined. When classifying text with machine learning algorithms features have to be extracted from the articles for the classifiers to be trained on. In this thesis, several different features are extracted: word counts, ngram counts, term frequency-inverse document frequency, sentiment analysis, lemmatization, and named entity recognition to train the classifiers. Two classifiers are used, a Random Forest classifier and a Naïve …


Intrusion-Tolerant Order-Preserving Encryption, John Huson May 2019

Intrusion-Tolerant Order-Preserving Encryption, John Huson

Masters Theses, 2010-2019

Traditional encryption schemes such as AES and RSA aim to achieve the highest level of security, often indistinguishable security under the adaptive chosen-ciphertext attack. Ciphertexts generated by such encryption schemes do not leak useful information. As a result, such ciphertexts do not support efficient searchability nor range queries.

Order-preserving encryption is a relatively new encryption paradigm that allows for efficient queries on ciphertexts. In order-preserving encryption, the data-encrypting key is a long-term symmetric key that needs to stay online for insertion, query and deletion operations, making it an attractive target for attacks.

In this thesis, an intrusion-tolerant order-preserving encryption system …


A Snowball's Chance: Debt Snowball Vs. Debt Avalanche, Evan Mcallister Dec 2018

A Snowball's Chance: Debt Snowball Vs. Debt Avalanche, Evan Mcallister

Senior Honors Projects, 2010-2019

Traditional mathematical analysis states that the most efficient way to pay off interest-bearing consumer debt is to pay the individual debts in order from largest to smallest interest rate. In doing this, the debtor will eliminate the largest sources of interest first, thus shortening the overall time-to-pay. This method is known as the “Debt Avalanche.” The “Debt Snowball” method, popularized in large part by investor-author David Ramsey, recommends that consumers pay debts in order from smallest to largest, regardless of interest rate. In this paper, I conduct an empirical analysis of the Federal Reserve’s Survey of Consumer Finance (SCF), calculating …


The Evolution Of Computational Propaganda: Trends, Threats, And Implications Now And In The Future, Holly Schnader Dec 2018

The Evolution Of Computational Propaganda: Trends, Threats, And Implications Now And In The Future, Holly Schnader

Senior Honors Projects, 2010-2019

Computational propaganda involves the use of selected narratives, social networks, and complex algorithms in order to develop and conduct influence operations (Woolley and Howard, 2017). In recent years the use of computational propaganda as an arm of cyberwarfare has increased in frequency. I aim to explore this topic to further understand the underlying forces behind the implementation of this tactic and then conduct a futures analysis to best determine how this topic will change over time. Additionally, I hope to gain insights on the implications of the current and potential future trends that computational propaganda has.

My preliminary assessment shows …


Less-Java, More Learning: Language Design For Introductory Programming, Zamua Nasrawt May 2018

Less-Java, More Learning: Language Design For Introductory Programming, Zamua Nasrawt

Senior Honors Projects, 2010-2019

Less-Java is a new procedural programming language with static, strong, and inferred typing, native unit testing, and support for basic object-oriented constructs. These features make programming in Less-Java more intuitive than traditional introductory languages, which will allow professors to dedicate more class time to overarching computer science concepts and less to syntax and language-specific quirks.


Enhancing The Learning Experience- Use Of Video Game Technology For Teaching Japanese Language, Craig A. Decampli May 2017

Enhancing The Learning Experience- Use Of Video Game Technology For Teaching Japanese Language, Craig A. Decampli

Senior Honors Projects, 2010-2019

The Japanese language is challenging to learn, especially for native speakers of Indo- European languages. The three components of written Japanese -- Hiragana, Katakana, and Kanji – include 2,136 Kanji characters, and 46 each for Katakana and Hiragana. Teaching Japanese – generally through repetition – can lead to student boredom and affect success. Research shows that video games can at least provide a more enjoyable learning experience. Despite this fact, there are a lack of video games for teaching Japanese characters. Using the Unity game engine and the C# programming language, a video game for enhancing the learning of students …


An Affordable Vr Environment, Matthew R. Petty May 2017

An Affordable Vr Environment, Matthew R. Petty

Senior Honors Projects, 2010-2019

Virtual Reality is a powerful technology with the ability to affect our senses in powerful ways. Traditionally used for entertainment, we argue that it can be used for educational purposes as well. In order to get virtual reality into the classroom, we must address its cost and portability, as well as improve the interaction that users experience with the virtual environment. Our solution, a Unity program installed on an iPhone and a Mac, attempts to solve these issues. A technical demo was created that functions and can be interfaced with. While this solution is a proof of concept, its consequences …


Software Development For Home Energy Audits: Reducing Energy Consumption In Harrisonburg Through Technology, Brantley E. Gilbert May 2017

Software Development For Home Energy Audits: Reducing Energy Consumption In Harrisonburg Through Technology, Brantley E. Gilbert

Senior Honors Projects, 2010-2019

Fossil fuels play a vital role in our daily lives. Oil, natural gas, and coal powers our cars, heats our homes and water, and are used by power companies to generate the massive amounts of electricity used every day by the United States. However, this reliance on a finite source of energy is not sustainable. Fossil fuels such as these are non-renewable resources whose production will eventually be unable to keep up with the rate of consumption. Furthermore, the extraction of the stored energy in these fuels through combustion releases harmful substances into the environment, including toxins and greenhouse gases …


Homesafe: A Mobile Application Utilizing Encryption And Access Control, Kenneth Trumpoldt May 2015

Homesafe: A Mobile Application Utilizing Encryption And Access Control, Kenneth Trumpoldt

Senior Honors Projects, 2010-2019

Our society is becoming more virtual and mobile everyday. The purpose of this application is to transform a physical card system into a virtual card system that meets the demands of a technologically-oriented society. Parents will be able to create their own child identification cards more quickly and cost efficiently. Cards can be easily edited instead of having to order an updated replacement. Immediate and frequent alteration of cards allows for information to be more accurate. Cards can be shared globally and instantly via the Internet or shared connections such as Bluetooth. The fast access to and virtual duplication of …


Analysis Of Real-World Passwords For Social Media Sites, Mark J. Quinn May 2015

Analysis Of Real-World Passwords For Social Media Sites, Mark J. Quinn

Masters Theses, 2010-2019

Textual passwords have dominated all other entity authentication mechanisms since they were introduced in the early 1960’s. Despite an inherent weakness against social engineering, keylogging, shoulder surfing, dictionary, and brute-force attacks, password authentication continues to grow as the Internet expands. Existing research on password authentication proves that dictionary attacks are successful because users make poor choices when creating passwords. To make passwords easier to remember, users select character strings that are shorter in length and contain memorable content, like personal identity information, common words found in a dictionary, backward spellings of common words, recognizable sequences, and easily guessed mnemonic phrases. …


Automated Snort Signature Generation, Brandon Rice May 2014

Automated Snort Signature Generation, Brandon Rice

Masters Theses, 2010-2019

Network intrusion systems work on many models, but at their core they rely on algorithms to process data and determine if the network traffic is malicious in nature. Snort is the most widely-used open source network based Intrusion Prevention System / Intrusion Detection System (IPS/IDS) system. It works by comparing network traffic to a list or lists of rules to determine if and what action should be taken. These rules are referred to as signatures, since they are intended to identify a single pattern of network traffic just like a physical signature identifies a single author. I have developed an …


Electronic Voting: Methods And Protocols, Christopher Andrew Collord May 2013

Electronic Voting: Methods And Protocols, Christopher Andrew Collord

Masters Theses, 2010-2019

The act of casting a ballot during an election cycle has been plagued by a number of problems, both intrinsic and extraneous. The old-fashioned paper ballot solves a number of problems, but creates its own. The clear 21st Century solution is the use of an automated electronic system for collection and tallying of votes, but the attitude of the general populace towards these systems has been overwhelmingly negative, supported in some cases by fraud and abuse. The purpose of this thesis is to do a broad survey of systems available on the market now (both in industry and academia) and …


Class Control: An Adaptable And Self Configuring Classroom Control System, Thomas Grimes May 2013

Class Control: An Adaptable And Self Configuring Classroom Control System, Thomas Grimes

Masters Theses, 2010-2019

Class Control is a tool that was created at the University of St Andrews to allow a teacher to not only view all of the screens in a classroom at once but also take control of them and broadcast the teacher’s screen to them. Existing software wouldn’t allow the scalability to meet the demands of the size of the classroom so Class Control was developed and is still used by the school today.%0d%0aHowever, this tool was created to be used in one classroom just running the Mac OS. This thesis project aimed to add the ability to move this tool …


Data Carving Parser Generation, Benjamin Nathaniel Kelley May 2013

Data Carving Parser Generation, Benjamin Nathaniel Kelley

Masters Theses, 2010-2019

As our day to day interaction with technology continues to grow, so does the amount of data created through this interaction. The science of digital forensics grew out of the need for specialists to recover, analyze, and interpret this data. When events or actions, either by accident or with criminal intent create, delete or manipulate data, it is the role of a digital forensics analyst to acquire this data and draw conclusions about the discovered facts about who or what is responsible for the event. This thesisidentifies a gap in the research between data analysis and interpretation. Current research and …


Fingerprint Fuzzy Vault: Security Analysis And A New Scheme, Patrick J.B. Perry May 2013

Fingerprint Fuzzy Vault: Security Analysis And A New Scheme, Patrick J.B. Perry

Masters Theses, 2010-2019

A fingerprint fuzzy vault uses a fingerprint A to lock a strong secret k and only a close fingerprint from the same finger can be used to unlock k. An attacker who has stolen the vault will not be able to get useful information about A or k.%0d%0a In this research, we shall study the security of a major fingerprint fuzzy vault developed by Nandakumar et al. through investigating the security implication of helper data, which are stored in the fuzzy vault for fingerprint alignment. We will show that helper data leak information about fingerprints and thus compromise the security …


Methodology And Automated Metadata Extraction From Multiple Volume Shadow Copies, Henri Michael Van Goethem Dec 2012

Methodology And Automated Metadata Extraction From Multiple Volume Shadow Copies, Henri Michael Van Goethem

Masters Theses, 2010-2019

Modern day digital forensics investigations rely on timelines as a principal method for normalizing and chronologically categorizing artifacts recovered from computer systems. Timelines provide investigators with a chronological representation of digital evidence so they can depict altered and unaltered digital forensics data in-context to drive conclusions about system events and/or user activities. While investigators rely on many system artifacts such as file system time/date stamps, operating system artifacts, program artifacts, logs, and/or registry artifacts as input for deriving chronological representations, using only the available or most recent version of the artifacts may provide a limited picture of historical changes on …


Forensic Analysis Of Linux Physical Memory: Extraction And Resumption Of Running Processes., Ernest D. Mougoue May 2012

Forensic Analysis Of Linux Physical Memory: Extraction And Resumption Of Running Processes., Ernest D. Mougoue

Masters Theses, 2010-2019

Traditional digital forensics’ procedures to recover and analyze digital data were focused on media-type storage devices like hard drives, hoping to acquire evidence or traces of malicious behavior in stored files. Usually, investigators would image the data and explore it in a somewhat “safe” environment; this is meant to reduce as much as possible the amount of loss and corruption that might occur when analysis tools are used. Unfortunately, techniques developed by intruders to attack machines without leaving files on the disks and the ever dramatically increasing size of hard drives make the discovery of evidence difficult. These increased interest …