Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Megordle: A Wdolre Usclnbaermr, Meg Arney Apr 2024

Megordle: A Wdolre Usclnbaermr, Meg Arney

Undergraduate Research Conference

Our goal was to make a dynamic word unscrambler app based on the random generation of words from a database. The original database contains 4,320 of the most common words in the English language. This project was originally designed in Visual Studio Code in java and takes input from the terminal. The project was later translated into C# and transferred into Unity to provide a visual and dynamic interface for users.


No Generation Without Representation: Solving Ai Art Attribution With Sno-E, Sadie Campbell Apr 2024

No Generation Without Representation: Solving Ai Art Attribution With Sno-E, Sadie Campbell

Undergraduate Research Conference

Artificial intelligence has sparked a new-age debate about its ethical implications, specifically in the world of art. The Signature Neural Operative- Environment (SNO-E) is a multidisciplinary solution that draws on computer science, statistics, and art. It addresses the issue of proper attribution for Al-generated artworks through a Convolution Neural Network that adopts signature checks to cite artists whose works are sampled by Al. This novel approach ensures proper recognition and compensation for artists in the Al-generated era.


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey May 2023

Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey

Electronic Theses and Dissertations

Exoplanets represent a young, rapidly advancing subfield of astrophysics where much is still unknown. It is therefore important to analyze trends among their parameters to learn more about these systems. More complexity is added to these systems with the presence of additional stellar companions. To study these complex systems, one can employ programming languages such as Python to parse databases such as those constructed by TESS and Gaia to bridge the gap between exoplanets and stellar companions. Data can then be analyzed for trends in these multi-star exoplanet systems and in juxtaposition to their single-star counterparts. This research was able …


Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero Dec 2022

Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero

Electronic Theses and Dissertations

Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets.

In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with …


The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker May 2021

The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker

Electronic Theses and Dissertations

Modeling our atmosphere and determining forecasts using numerical methods has been a challenge since the early 20th Century. Most models use a complex dynamical system of equations that prove difficult to solve by hand as they are chaotic by nature. When computer systems became more widely adopted and available, approximating the solution of these equations, numerically, became easier as computational power increased. This advancement in computing has caused numerous weather models to be created and implemented across the world. However a challenge of approximating these solutions accurately still exists as each model have varying set of equations and variables to …


Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark May 2020

Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark

Electronic Theses and Dissertations

Digital remote sensing and geographic information systems were employed in performing area and volume calculations on glacial landscapes. Characteristics of glaciers from two geographic regions, the Intermountain Region (between the Rocky Mountain and Cascade Ranges) and the Pacific Northwest, were estimated for the years 1985, 2000, and 2015. Glacier National Park was studied for the Intermountain Region whereas Mount Rainier National Park was representative of the glaciers in the Pacific Northwest. Within the thirty year period of the study, the glaciers in Glacier National Park decreased in area by 27.5 percent while those on Mount Rainier only decreased by 5.7 …


Interpretability Of Api Call Topic Models: An Exploratory Study, Puntitra Glendowne, Dae Glendowne Jan 2020

Interpretability Of Api Call Topic Models: An Exploratory Study, Puntitra Glendowne, Dae Glendowne

Faculty Publications

Topic modeling is an unsupervised method for discovering semantically coherent combinations of words, called topics, in unstructured text. However, the human interpretability of topics discovered from non-natural language corpora, specifically Windows API call logs, is unknown. Our objective is to explore the coherence of topics and their ability to represent the themes of API calls from malware analysts’ perspective. Three Latent Dirichlet Allocation (LDA) models were fit to a collection of dynamic API call logs. Topics, or behavioral themes, were manually evaluated by malware analysts. The results were compared to existing automated quality measures. Participants were able to accurately determine …


Surfaces Of Revolution In Virtual Reality, Joshua Harris Apr 2019

Surfaces Of Revolution In Virtual Reality, Joshua Harris

Undergraduate Research Conference

Why is this project needed?

❑ Surfaces of Revolution is many student’s first experience with three dimensional mathematical objects.

❑ The calculations required are not the inhibitor of the student’s understanding.

❑ Visualization of these solids along with the appropriate set up are the greatest hindrance to a deep under-standing of surfaces of revolution.

❑ Other tools that create computer generated visualizations of surfaces and curves in space render them as two-dimensional projections of a three dimensional object.

❑ Other tools typically do not have the capabilities of guided instruction, exploration of concepts on carefully chosen examples, and the ability …


Data Parsing For Optimized Molecular Geometry Calculations, Luke Rens Apr 2019

Data Parsing For Optimized Molecular Geometry Calculations, Luke Rens

Undergraduate Research Conference

The purpose of this project is to optimize and streamline to process of using ADF and ReaxFF. There is no efficient way to effectively add constraints to a compound and run it through ADF, take the ADF output and create a file that can be run through Reaxff, then take that Reaxff output and come to conclusions on it. To streamline this process, scripts were developed using Python to parse information out of data generated by ADF.


Exploration Of Web Technologies: A Real World Application, Andrew Ballard, James Francis, Sam Jentsch Mar 2016

Exploration Of Web Technologies: A Real World Application, Andrew Ballard, James Francis, Sam Jentsch

Undergraduate Research Conference

Our team created a web application for a photography studio. In addition to a portfolio for the studio, the application required the ability to manage photographer schedules, handle and organize orders and provide secure user accounts with different access levels for the site.


Advances In Documentation, Digital Curation, Virtual Exhibition, And A Test Of 3d Geometric Morhpometrics: A Case Study Of The Vanderpool Vessels From The Ancestral Caddo Territory, Robert Z. Selden Jr., Timothy K. Perttula, Michael J. O'Brien Jan 2014

Advances In Documentation, Digital Curation, Virtual Exhibition, And A Test Of 3d Geometric Morhpometrics: A Case Study Of The Vanderpool Vessels From The Ancestral Caddo Territory, Robert Z. Selden Jr., Timothy K. Perttula, Michael J. O'Brien

CRHR: Archaeology

Three-dimensional (3D) digital scanning of archaeological materials is typically used as a tool for artifact documentation. With the permission of the Caddo Nation of Oklahoma, 3D documentation of Caddo funerary vessels from the Vanderpool site (41SM77) was conducted with the initial goal of ensuring that these data would be publicly available for future research long after the vessels were repatriated. A digital infrastructure was created to archive and disseminate the resultant 3D datasets, ensuring that they would be accessible by both researchers and the general public (CRHR 2014a). However, 3D imagery can be used for much more than documentation. To …


Geographic Information Systems And Cloud Computing, James Hearn Apr 2012

Geographic Information Systems And Cloud Computing, James Hearn

Undergraduate Research Conference

No abstract provided.


Testing The Effectiveness Of Lecture Capture Technology Using Prior Gpa As A Performance Indicator, Michael D. Stroup, Michael M. Pickard, Korey E. Kahler Jan 2012

Testing The Effectiveness Of Lecture Capture Technology Using Prior Gpa As A Performance Indicator, Michael D. Stroup, Michael M. Pickard, Korey E. Kahler

Faculty Publications

This empirical study examines whether making lecture capture technology available in a face-to-face lecture environment can improve students’ ability to learn the course material. We examine student performance in undergraduate principles courses in computer science and economics. However, rather than simply comparing average course grades between lecture capture and non-lecture capture classes, we use student grade point average (GPA) as a predictor of course grades earned in non-lecture capture classes and lecture capture classes taught by the same professors using the same course materials. Our results imply that making lecture capture technology available in face-to-face lectures does not appear to …


The Librarian As Hacker, Getting More From Google, R Philip Reynolds Nov 2007

The Librarian As Hacker, Getting More From Google, R Philip Reynolds

Librarian and Staff Publications

This paper will cover four areas. First it will discuss the research habits of search engine users and some of the problems with these habits. Then it will discuss librarians' use of search engines. Here we encounter the real question: Do we do much better? Can we use a search engines to their full potential? When needed, can we hack an engine to make it perform beyond its intended function? Can we use a clever workaround to solve a problem? Or are we on a level playing field with our patrons once we get outside traditional database searching? Google currently …


Search And Recovery Of The Space Shuttle Columbia: A Geospatial 1st Responder Perspective, Jeffrey M. Williams Apr 2003

Search And Recovery Of The Space Shuttle Columbia: A Geospatial 1st Responder Perspective, Jeffrey M. Williams

Faculty Publications

A first person account of the Texas geospatial volunteers and their efforts to recover the remains of the Space Shuttle Columbia and her crew lost over eastern Texas and western Louisiana on February 1st, 2003.