Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers Jan 2023

On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers

Honors Theses

Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …


Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu Jan 2022

Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu

Honors Theses

The entrainment map, developed by Dr.Diekman and Dr.Bose, is claimed to be a 1-dimensional map that produces a better prediction for phase-locking than methods than the phase response curve for circadian models. In his paper, he constructs the entrainment map for the two-dimensional circadian model, the Novak-Tyson model, and the other two higher-dimensional circadian models. For this thesis, we concentrate on exploring if it is viable to construct the entrainment map for other circadian models that are not included in his paper: the Becker-Weimann model and the Relogio model. In addition, we discuss the challenges of constructing the entrainment map …


Artificial Reefs: A History, A Science, A Technology, Mairead D. Farrell Jan 2021

Artificial Reefs: A History, A Science, A Technology, Mairead D. Farrell

Honors Theses

Over the past 60 years, artificial reefs have expanded beyond the definition of a technology, and in turn have developed into a unique branch of marine science. To better emphasize this growth and separation, a brief history of artificial reef development and usage in chapter two shows some of the key shifts over time in this technology’s purpose and the materials used to achieve that goal. Likewise, to indicate the scientific development of artificial reefs as a branch of marine science, their usage for discovery and research is recorded in chapter three, along with the exponential increase in published scientific …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Creating A Video Device Application, Kevin Septor Jan 2004

Creating A Video Device Application, Kevin Septor

Honors Theses

A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …