Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Predicting Flux Data For Exoplanet Detection., Ronald Kroening May 2023

Predicting Flux Data For Exoplanet Detection., Ronald Kroening

Honors College Theses

This paper will focus on utilizing five different methods of machine learning models to properly classify celestial bodies orbiting a star as an exoplanet or a false positive. We will be utilizing a recurrent neural network (RNN), a logistical regression model (LR), and a Random Forest Classifier (RF). The focus of the data set was to improve access to balanced data in the form of extracted features and time series graphs, as well as looking into potential solutions for previous shortcomings outlined in prior work, specifically relating to logistical regression models. Training data was assembled from Astronet, a pipeline that …


Exploring The Antikythera Mechanism Through Augmented Reality., Tiffany Hatzidimitriu May 2023

Exploring The Antikythera Mechanism Through Augmented Reality., Tiffany Hatzidimitriu

Honors College Theses

The Antikythera mechanism is the oldest known analogue computer. Discovered off the coast of the Greek island of Antikythera, the Antikythera mechanism predicts and displays the position of astronomical bodies as well as astronomical phenomena. Due to its complexity, visualization of the gears movement can be very difficult. For my project I created an interactive Augmented Reality (AR) model of the Antikythera mechanism using Unity game engine. I hope this AR application exposes people to the Antikythera mechanism and its inner workings.


Investigating 9-1-1 Call Experience For Medical Emergencies For Future Design, Leanna Machado Dec 2022

Investigating 9-1-1 Call Experience For Medical Emergencies For Future Design, Leanna Machado

Honors College Theses

Emergency calling services have continued to use the 9-1-1 phone number to share information about a medical emergency for around 60 years. However, there are limitations to the current emergency call services that can have improved communication, speed, and accuracy with the implementation of advancing technology. By examining the experience and opinions of 9-1-1 medical emergency callers, we are able to investigate the design of 9-1-1 services to enhance the call experience. The major challenges found in the study are difficulty in verbally explaining the emergency situation and difficulty in describing the location of the emergency. Technologies such as location …


The Effect Of User Interface, User Experience And Design On Mobile E-Commerce Applications In The Fashion Industry, Debra Perlman May 2021

The Effect Of User Interface, User Experience And Design On Mobile E-Commerce Applications In The Fashion Industry, Debra Perlman

Honors College Theses

This study aims to explore elements of the user experience, and how those with the user interface and design of mobile apps in the e-commerce and fashion industries affect the user experience and customer behavior with online shopping. In this area, other work has been done in evaluating the user experience, and its effects on components of the user interface and design, however, this study offers a more specific look into these features in a niche industry, namely in the frame of e-commerce and the fashion industry. This fits into the context of the field of the user experience as …


Cyber Security’S Influence On Modern Society, Nicholas Vallarelli May 2020

Cyber Security’S Influence On Modern Society, Nicholas Vallarelli

Honors College Theses

The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab …


Overrepresentation Of The Underrepresented: Gender Bias In Wikipedia, Anna Marinina Dec 2019

Overrepresentation Of The Underrepresented: Gender Bias In Wikipedia, Anna Marinina

Honors College Theses

The goal of our research is to determine if gender bias exists in Wikipedia. Wikipedia is a very large dataset that has been used to train artificial intelligence models. If a dataset that is being used for this purpose is biased, then the artificial intelligence model that was trained with it will be biased as well, therefore making biased decisions. For this reason, it is important to explore large datasets for any potential biases before they are used in machine learning. Since Wikipedia is ontologically structured, we used graph theory to create a network of all of the website’s categories …


Building Of Mira’S Ghost Cleansing Services, Ashley Vargas May 2019

Building Of Mira’S Ghost Cleansing Services, Ashley Vargas

Honors College Theses

In this thesis, I built a PC game called Mira’s Cleansing Services. It is a sidescroller game that follows the story of a female exorcist for-hire who is also a high school student. Using ABC Scrum, a modified version of Scrum for game development, I developed the game using Game Maker. Additionally, I created all the art and music in different software. Because of time constraints and because I was working alone, I only developed the first level of the game. However, I plan to continue developing the game after this semester to eventually complete and publish it. My ultimate …


Deep Learning Vs Markov Model In Music Generation, Jeffrey Cruz May 2019

Deep Learning Vs Markov Model In Music Generation, Jeffrey Cruz

Honors College Theses

Artificial intelligence is one of the fastest growing fields at the moment in Computer Science. This is mainly due to the recent advances in machine learning and deep learning algorithms. As a result of these advances, deep learning has been used extensively in applications related to computerized audio/music generation. The main body of this thesis is an experiment. This experiment was based on a similar experiment done by Mike Kayser of Stanford University in 2013 for his thesis “Generative Models of Music” where he used Hidden Markov Models and tested the quality/accuracy of the music he generated using a music …


Analysis Of Lte Network Rf Performance In A Dense Urban Environment, Nicholas Krawczeniuk Jan 2019

Analysis Of Lte Network Rf Performance In A Dense Urban Environment, Nicholas Krawczeniuk

Honors College Theses

No abstract provided.


Drawing Parallels Between Heuristics And Dynamic Programming, Margarita M. Dominguez Jan 2019

Drawing Parallels Between Heuristics And Dynamic Programming, Margarita M. Dominguez

Honors College Theses

No abstract provided.


Isharine: Python Code Examples, Matthew Sokolovsky Jan 2019

Isharine: Python Code Examples, Matthew Sokolovsky

Honors College Theses

No abstract provided.


Applying Text Analytics To Derive Value From Blog Posts, Ivan Tang Jan 2019

Applying Text Analytics To Derive Value From Blog Posts, Ivan Tang

Honors College Theses

No abstract provided.


A Com Parison Of Classical And Quantum Implement Ations Of A Random Number Generator: An Introduction To Quantum Computing, Charlotte Coffin Dec 2018

A Com Parison Of Classical And Quantum Implement Ations Of A Random Number Generator: An Introduction To Quantum Computing, Charlotte Coffin

Honors College Theses

Quantum computers have potential to contribute to advancements in many disciplines including chemistry, material science, and artificial intelligence. As quantum computers become more accessible, there is a greater need for people to understand quantum computation to spearhead such advancements. This thesis discusses the basics of quantum computing, including fundamental concepts and a literature review. In order to demonstrate how quantum computation works, a random number generator is implemented on a quantum computer simulator and compared to a random number generator implemented on a classical computer. The results of the two experiments are compared. The results show that a quantum random …


Conceptualizing Financial Loses As A Result Of Advanced Persistent Threats, Christopher Levine May 2013

Conceptualizing Financial Loses As A Result Of Advanced Persistent Threats, Christopher Levine

Honors College Theses

Advanced Persistent Threat (APT) attacks are the biggest threat in the computing world. Currently, there is ample information available on how these attacks occur and who supports these attacks. However, there is dearth of information available that adequately describes the potentiality for financial losses. These losses are a direct result of the attacks themselves, however these attacks could only operate with the support of well-funded groups, such as nation states. Therefore, it is important to understand this relationship to conceptualize how these losses occur. In exploring the results of both Operation Aurora and Stuxnet, two famous APT attacks, it is …


The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine Aug 2005

The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine

Honors College Theses

No abstract is available.