Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (10)
- Engineering (6)
- Chemistry (5)
- Other Computer Sciences (5)
- Information Security (4)
-
- Artificial Intelligence and Robotics (3)
- Computer Engineering (3)
- Earth Sciences (3)
- OS and Networks (3)
- Arts and Humanities (2)
- Business (2)
- Digital Communications and Networking (2)
- Environmental Sciences (2)
- Geology (2)
- Graphics and Human Computer Interfaces (2)
- Life Sciences (2)
- Materials Chemistry (2)
- Materials Science and Engineering (2)
- Music (2)
- Other Materials Science and Engineering (2)
- Software Engineering (2)
- Statistics and Probability (2)
- Applied Statistics (1)
- Automotive Engineering (1)
- Biochemistry (1)
- Biochemistry, Biophysics, and Structural Biology (1)
- Biology (1)
- Biology and Biomimetic Materials (1)
- Business Analytics (1)
- Keyword
-
- 1 (4)
- Cybersecurity (3)
- Machine Learning (3)
- AI (2)
- Penetration Testing (2)
-
- 3D Printing (1)
- API (1)
- Akron (1)
- Aluminum (1)
- Artificial Intelligence (1)
- Audio Analysis (1)
- Bedrock (1)
- Bifactor Measurement Model (1)
- Biology (1)
- Black Hills (1)
- Bot (1)
- California (1)
- Computer Networking (1)
- Computer Science (1)
- Computer information systems (1)
- Computing (1)
- Confirmatory Factor Analysis (1)
- Control Systems (1)
- Corrosion (1)
- Cuyahoga river (1)
- Data Mining (1)
- Deep Learning (1)
- Digital (1)
- Discord (1)
- Elbaite (1)
Articles 1 - 19 of 19
Full-Text Articles in Physical Sciences and Mathematics
A Qualitative Analysis Of Construct Measurement Techniques Used In Industrial/Organizational Research, Benjamin Michael, Andrea F. Snell, Katie Rosneck
A Qualitative Analysis Of Construct Measurement Techniques Used In Industrial/Organizational Research, Benjamin Michael, Andrea F. Snell, Katie Rosneck
Williams Honors College, Honors Research Projects
This project aims to challenge the appropriateness of the methodological strategies and tools utilized within psychological research. We will look at the types of statistical modeling used and the context in which they are used, such as measurement modeling, confirmatory factor analysis, and bifactor analysis within survey development, as well as the use of psychological constructs such as extraversion and leadership. The objective of this research is to search for and recognize patterns from the content of some of the top journal articles in the field of industrial and organizational psychology. The information gained from analyzing the content of the …
The Affect Of Dha Concentration On Lipid Membrane Fluidity, Elise Rezabeck
The Affect Of Dha Concentration On Lipid Membrane Fluidity, Elise Rezabeck
Williams Honors College, Honors Research Projects
My proposed project will be creating large unilaminar vesicles with varying concentrations of DHA in the vesicles. The diffusion in and out of these vesicles will be tracked by using singular lipid molecules. These singular lipid molecules will be tagged with fluorescence and viewed using an internal reflection fluorescence microscope. The data collected over the course of this project will then be analyzed using Matlab. The result of the project will be to find the specific lipid diffusion constant of these unilaminar vesicles. The relationship between the concentration of DHA and lipid diffusion and membrane fluidity will be found as …
Defense Of A Small Network, Isabella Adkins
Defense Of A Small Network, Isabella Adkins
Williams Honors College, Honors Research Projects
A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.
Small Business Office Network, Michael Gerome
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Exploration Of Digital Synthesis, Angelo Indre
Exploration Of Digital Synthesis, Angelo Indre
Williams Honors College, Honors Research Projects
“An Exploration of Digital Synthesis” is a comprehensive investigation into the world of digital audio and music production. The paper explores the fundamental concepts of sound synthesis, including MIDI, virtual instruments (VSTs), and the JUCE framework. The central focus of the paper is the implementation of a custom synthesizer, which serves as a case study for the practical application of digital synthesis. The paper addresses the key question of how to create a functioning synthesizer from scratch, providing detailed insights into the programming and design process. Overall, the paper represents a significant contribution to the fields of digital audio and …
Liquid Tab, Nathan Hulet
Liquid Tab, Nathan Hulet
Williams Honors College, Honors Research Projects
Guitar transcription is a complex task requiring significant time, skill, and musical knowledge to achieve accurate results. Since most music is recorded and processed digitally, it would seem like many tools to digitally analyze and transcribe the audio would be available. However, the problem of automatic transcription presents many more difficulties than are initially evident. There are multiple ways to play a guitar, many diverse styles of playing, and every guitar sounds different. These problems become even more difficult considering the varying qualities of recordings and levels of background noise.
Machine learning has proven itself to be a flexible tool …
How Akron Affects The Water Quality Of The Cuyahoga River, Allyson Darst
How Akron Affects The Water Quality Of The Cuyahoga River, Allyson Darst
Williams Honors College, Honors Research Projects
The purpose of this study was to analyze whether the city of Akron had negative effects on the Cuyahoga river, and determine if the Cuyahoga River was naturally able to remediate these effects downstream. The pollutants measured in this study include hardness, bromine, residual chlorine, iron, copper, lead, nitrate, nitrite, ammonium chloride, total chlorine, fluoride, carbonate, pH, total alkalinity and cyanuric acid. This study was done using water testing strips (JNW Direct) to test the water at four different locations along the Cuyahoga River downstream (North) of Akron. This study found that the city of Akron does have a negative …
Discord Api Wrapper, Joshua Brown
Discord Api Wrapper, Joshua Brown
Williams Honors College, Honors Research Projects
Discordwrap is a Python library that abstracts the Discord API so that developers can easily integrate their existing projects with Discord. This paper outlines Discordwrap's creation, from start to finish, including implementation as well as key design decisions, such as the decision to provide a functional library interface rather than an object-oriented one.
Impacts Of Covid-19 On Industrial Growth In The United States, Emily G. Warthman, Charles J. Landis
Impacts Of Covid-19 On Industrial Growth In The United States, Emily G. Warthman, Charles J. Landis
Williams Honors College, Honors Research Projects
COVID-19 has caused massive ramifications on all parts of life in the world and industry growth/decline is not immune to it. This report will analyze nine different industries’ profit and revenue from quarterly data during the years 2009-2022. Forecast models will be generated using various methods and different techniques of validating to predict the values from Q2 2020- Q4 2022 based on historical data. After which, a comparison will be conducted between those predicted values to the actual average revenue and profit generated by order of greatest error percentage made. Thorough research will then be completed to determine if there …
Wetting Transition Of Texturized Surfaces, Jenna Stephens
Wetting Transition Of Texturized Surfaces, Jenna Stephens
Williams Honors College, Honors Research Projects
Building on previous research, this project aims to continue the investigation of the wettability of various liquids on a uniform, texturized surface. Different surface energies can impact the wettability of a surface. The surface can be hydrophilic, hydrophobic, or in between. The goal of this project is to research how features of texturized surfaces affect the wetting transition of water, oil, and a mixture of both. Additionally, this project aims to improve the quality of the 3D printed surfaces. The surfaces that will be studied are constructed using UV cured resin 3D printing and are made up of an array …
Global Minimum Search For The Largest Ge Cage Stabilized By A Single Interstitial Metal Atom, Alexis Kiefer
Global Minimum Search For The Largest Ge Cage Stabilized By A Single Interstitial Metal Atom, Alexis Kiefer
Williams Honors College, Honors Research Projects
Recent joint experimental and theoretical studies showed that the largest Ge cage-like cluster features 14 Ge atoms that encapsulate a single transition metal atom in the [Nb@Ge14]3- cluster. The next larger experimentally confirmed Ge cluster exhibiting a cage-like geometry was found to be viable only when stabilized by two transition metal atoms in the [Co2@Ge16]4- cluster. So, as of now, it is not clear whether a cage-like cluster made out of 15 Ge atom stabilized by a single transition metal is viable. Hence, the aim of this project is to find the …
A Different Way To Penetrate Nba Defenses, Trey Trucksis
A Different Way To Penetrate Nba Defenses, Trey Trucksis
Williams Honors College, Honors Research Projects
This project proposal will document the design, configuration, and penetration testing of a network consisting of three routers (labeled as Lakers, Celtics, Cavaliers), one switch (labeled as NBA), and three end devices (labeled as Kali, Windows 10, and Ubuntu) each connected to one of three routers present on the network. Each router will be attached to a different subnet on the network. The network will be secured using encrypted passwords on the router interfaces, OSPF MD5 authentication between the routers, port security on the switch, as well as Access Control Lists to to control the privileges of each subnetwork accordingly. …
Intergranular And Pitting Corrosion Mechanisms Of Sensitized Aluminum Alloy Aa5083, Clayton Egleston
Intergranular And Pitting Corrosion Mechanisms Of Sensitized Aluminum Alloy Aa5083, Clayton Egleston
Williams Honors College, Honors Research Projects
The motivation and objectives of this project is to examine the mechanisms of intergranular corrosion (IGC) and pitting corrosion of sensitized AA5083. In this regard, different characterization techniques were used, including optical analysis of microstructure, cyclic potentiodynamic polarization with Tafel fitting, electrochemical impedance spectroscopy with electrical equivalent circuit (EEC) fitting, and potentiostatic current transient monitoring. The transition from IGC to pitting corrosion occurs when the grain boundaries become saturated with the β-phase (Mg2Al3). It was found that AA5083 becomes more vulnerable to pitting corrosion as the degree of sensitization increases.
Fridge Tracker And Recipe Provider : Fridgechamp, Matt Dudek
Fridge Tracker And Recipe Provider : Fridgechamp, Matt Dudek
Williams Honors College, Honors Research Projects
FridgeChamp is a website to allow people to track their fridge/pantry contents while providing them recipes they can make with said ingredients. Currently there are few ingredient trackers and recipe matchers that exist as websites, and of those many lack simplistic recipes that a home chef would use. In addition to lacking some recipes, many tracker/recipe apps do not have a function to remove from your stock what a recipe requires, making you tediously update the stock every time you cook/use something.
Predicting Housing Prices Using Ai, Eric Sconyers
Predicting Housing Prices Using Ai, Eric Sconyers
Williams Honors College, Honors Research Projects
I have created an AI model that can predict housing prices with 70 percent accuracy in Ames Iowa. I was able to use data from a website called Kaggle.com which is a website that provides datasets to the public so they can create AI models with the data. I found the dataset pertaining to housing prices in Ames Iowa. With this data, I was able to create an AI model that can predict the housing price of these homes. The technology I used in this project was Python as the programming language, and I used the scikit-learn library which has …
Human Tracking Function For Robotic Dog, Andrew Sharkey
Human Tracking Function For Robotic Dog, Andrew Sharkey
Williams Honors College, Honors Research Projects
With the increase the increase in automation and humans and robots working side by side, there is a need for a more organic way of controlling robots. The goal of this project is to create a control system for Boston dynamics robotic dog Spot that implements human tracking image software to follow humans using computer vision as well as using hand tracking image software to allow for control input through hand gestures.
Using Soil And Forest Type To Map Bedrock In Nemo, South Dakota, Madison R. Isaac
Using Soil And Forest Type To Map Bedrock In Nemo, South Dakota, Madison R. Isaac
Williams Honors College, Honors Research Projects
Bedrock mapping can be used to locate economic deposits, assess natural disaster (e.g., mass wasting) risk, and decipher the geologic history of a region. This study examines a site at Nemo, South Dakota to assess whether two contrasting types of bedrock produce different soil that result in different types of forest cover. Although bedrock varied, other soil forming factors were uniform. Within an approximately 1 km2 area, quartzite and metagabbro bedrock, ponderosa pine and quaking aspen forests were mapped. The soil above the quartzite bedrock is thinner and sandier and is dominated by ponderosa pine (Pinus ponderosa). …
Textural And Mineral Analysis Of Pegmatites From The Pala And Mesa Grande Districts In San Diego, California, Gabrielle Potter
Textural And Mineral Analysis Of Pegmatites From The Pala And Mesa Grande Districts In San Diego, California, Gabrielle Potter
Williams Honors College, Honors Research Projects
San Diego pegmatites of the Pala and Mesa Grande mining districts are world renowned for their gem-quality minerals and their Li-bearing mineral phases. Pegmatite genesis, especially in San Diego mines, has been a debated topic since the 1900’s (Morgan and London, 2012). Pegmatite genesis is caused by partial melting processes and fractional crystallization that form granitic melts with high concentrations of rare earth elements (REE), such as lithium. Assessing the exact mineralogy and determining the overall textures can provide insight into the crystallization history of pegmatites. In the San Diego pegmatites, lithium-bearing phases, such as lepidolite and pink elbaite (a …
The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio
The Future Between Quantum Computing And Cybersecurity, Daniel Dorazio
Williams Honors College, Honors Research Projects
Quantum computing, a novel branch of technology based on quantum theory, processes information in ways beyond the capabilities of classical computers. Traditional computers use binary digits [bits], but quantum computers use quantum binary digits [qubits] that can exist in multiple states simultaneously. Since developing the first two-qubit quantum computer in 1998, the quantum computing field has experienced rapid growth.
Cryptographic algorithms such as RSA and ECC, essential for internet security, rely on the difficulty of complex math problems that classical computers can’t solve. However, the advancement of quantum technology threatens these encryption systems. Algorithms, such as Shor’s, leverage the power …