Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Car Image Classification Using Deep Neural Networks, Mingchen Li Jan 2019

Car Image Classification Using Deep Neural Networks, Mingchen Li

Honors Theses

Image classification is widely used in many fields of study. Deep neural networks are proven to be effective classifier structure due to its massive parameters and training capability. This paper outlines the development of Deep Neural Network in recent years and applied them on a Car image data set in order to compare their performances.


Follow Me Robot, Victoria M. Edwards Jan 2016

Follow Me Robot, Victoria M. Edwards

Honors Theses

The idea of a personal robotic assistant, while once made up the tales of science fiction, is now moving closer and closer to reality. It is easy for two humans to walk together where one person knows the directions and the other person follows along. However, it is not a trivial problem for a robot to recognize a human, and follow side by side along with them. There are three key parts to this problem: 1.) Detection of a human, 2.) Tracking the human, and 3.) the robot's Motion strategy. Using baseline assumptions, I can simplify the detection process allowing …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Creating A Video Device Application, Kevin Septor Jan 2004

Creating A Video Device Application, Kevin Septor

Honors Theses

A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …