Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Honors Theses

Discipline
Institution
Keyword
Publication Year
Publication Type

Articles 1 - 12 of 12

Full-Text Articles in Databases and Information Systems

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum Dec 2023

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum

Honors Theses

Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …


Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson May 2023

Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson

Honors Theses

In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …


Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause Mar 2021

Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause

Honors Theses

This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …


Choosing Isds As A Major: Predictive Analysis, Sarah Johnson Mar 2021

Choosing Isds As A Major: Predictive Analysis, Sarah Johnson

Honors Theses

No abstract provided.


Stem Teacher Database, Veronica Buss Dec 2020

Stem Teacher Database, Veronica Buss

Honors Theses

The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …


School District Boundaries Map, Nick Huffman Dec 2020

School District Boundaries Map, Nick Huffman

Honors Theses

The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …


Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger Jan 2020

Measuring Differential Forest Growth In The Sheepscot River Headwaters With Bitemporal Lidar, Soren Denlinger

Honors Theses

In recent years, lidar has proven itself as a forestry tool capable of accurate, large- scale inventories. Lidar has even shown utility in multitemporal analysis and growth assessment, given high-resolution or small-scale point clouds. However, lidar’s efficacy as a multitemporal tool with relatively low-resolution, large-scale datasets is comparatively unknown. In this study, I compared forest in Midcoast Maine bitemporally, with publicly available datasets from the years 2007 and 2012. Specifically, I compared differences in growth characteristics of riparian, wetland, and upland forests. Although the 2007 dataset (created for geomorphological research) and the 2012 dataset (statewide, general-purpose) possess varying point densities …


Implementation Considerations For The Digital Bronco Id, Bryan Gilginas Apr 2019

Implementation Considerations For The Digital Bronco Id, Bryan Gilginas

Honors Theses

This paper aims to discuss the conditions and preferences of students that Western Michigan University should take if they ever implement a Digital Bronco ID. These conditions are found via an anonymous survey given to random students. These students were prompted to answer questions based on their preference and possible uses of the Digital Bronco ID. It was found that the respondents were significantly diverse in their answers. However, things such as gender, major, and age range played a significant role in patterns in which students chose their preferences. Within the paper, these patterns are interpreted and discussed for the …


Modular Scheduling System For Westside School District, Tyler Bienhoff Apr 2018

Modular Scheduling System For Westside School District, Tyler Bienhoff

Honors Theses

Westside School district offers a modular scheduling system for their high school that is more similar to a college schedule than the typical high school system. Due to the complexity of their master schedule each semester, there are no commercially available products that can assist in creating a schedule. Hence, this thesis discusses a scheduling algorithm and management system that was built specifically for Westside High School with the potential to be expanded for use by other interested schools. The first part of the paper is focused on gathering input from students and faculty for which courses and how many …


Investigating Volatility Trends Of Silver Through An Analysis Of Stock Options Prices, Dylan Houston Dec 2012

Investigating Volatility Trends Of Silver Through An Analysis Of Stock Options Prices, Dylan Houston

Honors Theses

Volatility is a statistical measure that describes the amount of fluctuation in prices for a given investment; generally, the higher the volatility for an investment, the riskier it is perceived to be. Traders study volatility history so that they can make informed decisions on how to invest capital. The purpose of this article is to analyze implied volatility values, which are derived from the investment's price and are considered the market's estimate of the investment's actual volatility, for silver electronically traded fund (ETF) options in periods of both high and low price movement. In doing so, we desired to see …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Services Available To Admissions Office From Data Processing, Shirley Grant Oct 1973

Services Available To Admissions Office From Data Processing, Shirley Grant

Honors Theses

By using computer technology, such as punch cards, college admissions work flow can be better managed.