Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Engineering

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum Dec 2023

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum

Honors Theses

Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …


Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods May 2023

Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods

Honors Theses

This thesis aims to identify timestamps of rats’ neuronal activity that best determine behavior using a machine learning model. Neuronal data is a complex and high-dimensional dataset, and identifying the most informative features is crucial for understanding the underlying neuronal processes. The Lasso regularization technique is employed to select the most relevant features of the data to the model’s prediction. The results of this study provide insights into the key activity indicators that are associated with specific behaviors or cognitive processes in rats, as well as the effect that stress can have on neuronal activity and behavior. Ultimately, it was …


On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers Jan 2023

On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers

Honors Theses

Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …


Investigation Of Python Variable Privacy, Joshua Bartholomew May 2022

Investigation Of Python Variable Privacy, Joshua Bartholomew

Honors Theses

This study looks at the relative security of Python regarding private variables and functions used in most other programming languages. Python has only grown in popularity due to its simple syntax and developing capabilities. However, little research has been published about how secure Python code and programs compiled from Python code actually are. This research seeks to expose vulnerabilities in Python code and determine what must be done for these vulnerabilities to be exploited by hackers to abuse potentially sensitive information contained within the program.

The proposed methodology includes examining the private variable concept in other programming languages and conducting …


Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines Apr 2022

Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines

Honors Theses

No abstract provided.


90snet:, Seth Richard Mar 2022

90snet:, Seth Richard

Honors Theses

No abstract provided.


Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu Jan 2022

Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu

Honors Theses

The entrainment map, developed by Dr.Diekman and Dr.Bose, is claimed to be a 1-dimensional map that produces a better prediction for phase-locking than methods than the phase response curve for circadian models. In his paper, he constructs the entrainment map for the two-dimensional circadian model, the Novak-Tyson model, and the other two higher-dimensional circadian models. For this thesis, we concentrate on exploring if it is viable to construct the entrainment map for other circadian models that are not included in his paper: the Becker-Weimann model and the Relogio model. In addition, we discuss the challenges of constructing the entrainment map …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Perceptually Improved Medical Image Translations Using Conditional Generative Adversarial Networks, Anurag Vaidya Jan 2021

Perceptually Improved Medical Image Translations Using Conditional Generative Adversarial Networks, Anurag Vaidya

Honors Theses

Magnetic resonance imaging (MRI) can help visualize various brain regions. Typical MRI sequences consist of T1-weighted sequence (favorable for observing large brain structures), T2-weighted sequence (useful for pathology), and T2-FLAIR scan (useful for pathology with suppression of signal from water). While these different scans provide complementary information, acquiring them leads to acquisition times of ~1 hour and an average cost of $2,600, presenting significant barriers. To reduce these costs associated with brain MRIs, we present pTransGAN, a generative adversarial network capable of translating both healthy and unhealthy T1 scans into T2 scans. We show that the addition of non-adversarial …


Stem Teacher Database, Veronica Buss Dec 2020

Stem Teacher Database, Veronica Buss

Honors Theses

The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …


Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson Jun 2020

Human Facial Emotion Recognition System In A Real-Time, Mobile Setting, Claire Williamson

Honors Theses

The purpose of this project was to implement a human facial emotion recognition system in a real-time, mobile setting. There are many aspects of daily life that can be improved with a system like this, like security, technology and safety.

There were three main design requirements for this project. The first was to get an accuracy rate of 70%, which must remain consistent for people with various distinguishing facial features. The second goal was to have one execution of the system take no longer than half of a second to keep it as close to real time as possible. Lastly, …


Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji Jun 2019

Exploring The Behavior Repertoire Of A Wireless Vibrationally Actuated Tensegrity Robot, Zongliang Ji

Honors Theses

Soft robotics is an emerging field of research due to its potential to explore and operate in unstructured, rugged, and dynamic environments. However, the properties that make soft robots compelling also make them difficult to robustly control. Here at Union, we developed the world’s first wireless soft tensegrity robot. The goal of my thesis is to explore effective and efficient methods to explore the diverse behavior our tensegrity robot. We will achieve that by applying state-of-art machine learning technique and a novelty search algorithm.


Peerra: An Extensible And Structured Web Service For Peer-To-Peer Assistance, Drake Lambert Mar 2019

Peerra: An Extensible And Structured Web Service For Peer-To-Peer Assistance, Drake Lambert

Honors Theses

No abstract provided.


2018 Ieee Signal Processing Cup: Forensic Camera Model Identification Challenge, Michael Geiger Jun 2018

2018 Ieee Signal Processing Cup: Forensic Camera Model Identification Challenge, Michael Geiger

Honors Theses

The goal of this Senior Capstone Project was to lead Union College’s first ever Signal Processing Cup Team to compete in IEEE’s 2018 Signal Processing Cup Competition. This year’s competition was a forensic camera model identification challenge and was divided into two separate stages of competition: Open Competition and Final Competition. Participation in the Open Competition was open to any teams of undergraduate students, but the Final Competition was only open to the three finalists from Open Competition and is scheduled to be held at ICASSP 2018 in Calgary, Alberta, Canada. Teams that make it to the Final Competition will …


An Application Programming Interface For Parliamentary Procedure, Grant David Bourque Nov 2016

An Application Programming Interface For Parliamentary Procedure, Grant David Bourque

Honors Theses

No abstract provided.


A Graph Based Departmental Spoken Dialogue System, Julia Isaac Jun 2016

A Graph Based Departmental Spoken Dialogue System, Julia Isaac

Honors Theses

Spoken dialogue systems are automatic, computer based systems that are a great way for people to receive important information. In this project, I created a spoken dialogue system that people can use to learn about the Computer Science Department at Union College. The system was built by populating an open source dialogue system using a graph based dialogue manager. I improved upon a previous working dialogue system by making the conversations sound more natural, improving the flexibility of the system and making the system more robust. To help with this process a corpus was created using about 200 different dialogues …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Distributed Augmented Reality Communications And Interactions, Mitchell Mason Apr 2015

Distributed Augmented Reality Communications And Interactions, Mitchell Mason

Honors Theses

No abstract provided.


Evolving Soft Robots With Vibration Based Movement, Andrew Danise Jun 2014

Evolving Soft Robots With Vibration Based Movement, Andrew Danise

Honors Theses

Creating effective designs for soft robots is extremely difficult due to the large number of different possibilities for shape, material properties, and movement mechanisms. Due to the lack of methods to design soft robots, previous research has used evolutionary algorithms to tackle this problem of overwhelming options. A popular technique is to use generative encodings to create designs using evolutionary algorithms because of their modularity and ability to induce large scale coordinated change. The main drawback of generative encodings is that it is difficult to know where along the ontogenic trajectory resides the phenotype with the highest fitness. The two …


Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg Dec 2013

Design And Development Of A Low-Cost Handheld Picoammeter, Malcolm Stagg

Honors Theses

No abstract provided.


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Creating A Video Device Application, Kevin Septor Jan 2004

Creating A Video Device Application, Kevin Septor

Honors Theses

A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …