Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (3)
- Computer Engineering (2)
- Education (2)
- Information Security (2)
- Programming Languages and Compilers (2)
-
- Systems Architecture (2)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Criminology and Criminal Justice (1)
- Data Science (1)
- Digital Communications and Networking (1)
- Digital Humanities (1)
- Electrical and Computer Engineering (1)
- Environmental Monitoring (1)
- Environmental Sciences (1)
- Gifted Education (1)
- Higher Education (1)
- History (1)
- Legal Studies (1)
- Natural Resources and Conservation (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Other Education (1)
- Other Legal Studies (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Theory and Algorithms (1)
- Institution
- Keyword
-
- Admissions procedures (1)
- Artificial intelligence (1)
- Big data (1)
- Bitemporal lidar (1)
- Computer Science (1)
-
- Computer processing (1)
- Computer science (1)
- Data Analysis (1)
- Data analysis (1)
- Digital Humanities (1)
- Eclipse Integrated Development Environment (1)
- Ethics (1)
- Exchange Traded Fund (1)
- Forest (1)
- Forest growth (1)
- History (1)
- Hyper-segmentation (1)
- Implied volatility (1)
- Investing (1)
- Java (1)
- Lidar (1)
- Mass Incarceration (1)
- Midcoast Maine (1)
- Modular scheduling (1)
- Punch cards (1)
- Scheduling algorithms (1)
- Security (1)
- Silver (1)
- Source code security auditor (1)
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Databases and Information Systems
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Honors Theses
In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …
Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause
Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause
Honors Theses
This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …
Choosing Isds As A Major: Predictive Analysis, Sarah Johnson
Choosing Isds As A Major: Predictive Analysis, Sarah Johnson
Honors Theses
No abstract provided.
Stem Teacher Database, Veronica Buss
Stem Teacher Database, Veronica Buss
Honors Theses
The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …
School District Boundaries Map, Nick Huffman
School District Boundaries Map, Nick Huffman
Honors Theses
The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …
Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger
Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger
Honors Theses
In recent years, lidar has proven itself as a forestry tool capable of accurate, large- scale inventories. Lidar has even shown utility in multitemporal analysis and growth assessment, given high-resolution or small-scale point clouds. However, lidar’s efficacy as a multitemporal tool with relatively low-resolution, large-scale datasets is comparatively unknown. In this study, I compared forest in Midcoast Maine bitemporally, with publicly available datasets from the years 2007 and 2012. Specifically, I compared differences in growth characteristics of riparian, wetland, and upland forests. Although the 2007 dataset (created for geomorphological research) and the 2012 dataset (statewide, general-purpose) possess varying point densities …
Implementation Considerations For The Digital Bronco Id, Bryan Gilginas
Implementation Considerations For The Digital Bronco Id, Bryan Gilginas
Honors Theses
This paper aims to discuss the conditions and preferences of students that Western Michigan University should take if they ever implement a Digital Bronco ID. These conditions are found via an anonymous survey given to random students. These students were prompted to answer questions based on their preference and possible uses of the Digital Bronco ID. It was found that the respondents were significantly diverse in their answers. However, things such as gender, major, and age range played a significant role in patterns in which students chose their preferences. Within the paper, these patterns are interpreted and discussed for the …
Modular Scheduling System For Westside School District, Tyler Bienhoff
Modular Scheduling System For Westside School District, Tyler Bienhoff
Honors Theses
Westside School district offers a modular scheduling system for their high school that is more similar to a college schedule than the typical high school system. Due to the complexity of their master schedule each semester, there are no commercially available products that can assist in creating a schedule. Hence, this thesis discusses a scheduling algorithm and management system that was built specifically for Westside High School with the potential to be expanded for use by other interested schools. The first part of the paper is focused on gathering input from students and faculty for which courses and how many …
Investigating Volatility Trends Of Silver Through An Analysis Of Stock Options Prices, Dylan Houston
Investigating Volatility Trends Of Silver Through An Analysis Of Stock Options Prices, Dylan Houston
Honors Theses
Volatility is a statistical measure that describes the amount of fluctuation in prices for a given investment; generally, the higher the volatility for an investment, the riskier it is perceived to be. Traders study volatility history so that they can make informed decisions on how to invest capital. The purpose of this article is to analyze implied volatility values, which are derived from the investment's price and are considered the market's estimate of the investment's actual volatility, for silver electronically traded fund (ETF) options in periods of both high and low price movement. In doing so, we desired to see …
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Honors Theses
Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.
Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.
This void is what inspired JeSS, Java …
Services Available To Admissions Office From Data Processing, Shirley Grant
Services Available To Admissions Office From Data Processing, Shirley Grant
Honors Theses
By using computer technology, such as punch cards, college admissions work flow can be better managed.