黑料不打烊

Mathematics and Computer Science

2009 Senior Theses

2009 Senior Projects

Fall 2008
Monday, October 13, MCRey 315
4:00Don Bennett,听Four-Dimensional Tetris
4:30Kyaw Soe Han,听Color Recognition in Scanned Pages
5:00Justin Whorton,听Adaptive Artificial Intelligence for the Game of Checkers
Tuesday, October 14, MCRey 315
4:00Justin Vance,听Black Box GUI Builder
4:30Joshua Franklin,听Wire Realignment in Toves
5:00Eric Robbins,听Data Synchronization from Multiple Independent Sources
Tuesday, November 25, MCRey 315
9:00Brad Payne,听Poker Analysis with a New Deck of Cards
Spring 2009
Monday, March 23, MCRey 315
3:10Aditya Oza,听Inferring the Presence of Firewalls Through ICMP Messages
3:40Joseph Utecht,听Modeling Large-Scale Erosion
Tuesday, March 24, MCRey 315
4:10Colby Christopher,听Two Algorithms for Correcting Common Bad Programming Practices Using Jigsaw
4:40Wheeler Gnat,听Feasibility of Broadcast Amplification Attacks
Wednesday, March 25, MCRey 315
3:10Adrian Parreiras Horta,听Analysis of the Kaminsky Bug and Its Effectiveness on Local Nameservers
3:40Adam Jacobs,听Implementation and Analysis of a Simple Cluster
4:10Christopher Schulze,听Simulation and Comparison of Traffic Control Algorithms
Friday, April 24, MCRey 315
2:30Greg Potter,听Computer Graphics: Particle Systems
3:00Richard Hinson,听Word Sense Disambiguation

Abstracts

Presenter:Don Bennett
Title:Four-Dimensional Tetris
Presentation:Mon 13 Oct, 4:00pm, MCRey 315
Advisor:Dr. Bill Wood & Dr. Gabe Ferrer

Abstract:听The goal of this project is to provide a tool that any person, with or without a strong mathematical background, could use to quickly gain an understanding of what the fourth dimension is and how it works. The theory is that people learn complex sets of rules much faster when they are associated with goals. The programming portion of my project is a game that requires the player to play by the rules of linear algebra in four dimensions, thus teaching the player to learn to predict how an object in this space will behave.


Presenter:Colby Christopher
Title:Two Algorithms for Correcting Common Bad Programming Practices Using Jigsaw
Presentation:Tue 24 Mar, 4:10pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract:听The goal in this project is to alert the users of Jigsaw when they make very specific mistakes that can not be caught simply from the specification of the language. It is necessary to analyze the data flow of the code, a method called Data Flow Analysis. The first problem that is addressed is that of writing to a variable that will never be read again. The second problem is identifying variables which should not be instance variables when they are instance variables.


Presenter:Josh Franklin
Title:Wire Realignment in Toves
Presentation:Tue 14 Oct, 4:30pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract:听Toves is a logic circuit simulator that allows a user to place inputs, outputs, gates, and wires and replicate properties of logic circuits. In this program, if one has created a connection between two objects, if one of those objects are later moved, the connection will be lost. The user then must manually re-route the wires between these objects to restore the connection. In this project, I implemented an algorithm to automatically re-route connections as a user moves objects within the program, making Toves a more user-friendly environment.


Presenter:Wheeler Gnat
Title:Feasibility of Broadcast Amplification Attacks
Presentation:Tue 24 Mar, 4:40pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract:听The focus of my project is to research how likely Broadcast Amplification Attacks are. This involves researching this type of attack as well as attempting to locate broadcast addresses that can be abused using this technique. I attempted to locate these addresses using information collected by Professor Derek Leonard during his scans of the internet, with the goal of determining if these attacks are currently possible.


Presenter:Kyaw Soe Han
Title:Color Recognition in Scanned Pages
Presentation:Mon 13 Oct, 4:30pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract:听Recognition of primary colors that appear on a scanned color image plays an important role in data mining since color related information is used for image analysis purposes. But it can be a challenging task as the appearances of colors are affected by various factors such as paper quality, print quality, bleaching, noise during both scanning process and printing process. To address these concerns, we presents the methods and implementations that recognize the primary colors that appear on a scanned page while differentiating noises from useful information. Our algorithm uses the RGB and CMYK color models.


Presenter:Richard Hinson
Title:Word Sense Disambiguation
Presentation:Fri 24 Apr, 3:00pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract:None


Presenter:Adam Jacobs
Title:Implementation and Analysis of a Simple Cluster
Presentation:Wed 25 Mar, 3:40pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract:听Efficient, rapid computation is crucial to research in a broad spectrum of fields rooted in scientific investigation: from economics to physics. Clusters offer a powerful means of attaining superb computational efficiency. A cluster consists of a network of computers, connected through a fast, local connection. Computations are distributed across this network. Clusters are highly popular in both academic and industrial research. In light of the computational challenges involved in developing a cluster and the central role they play in research, I investigated the details of cluster design by implementing and analyzing a very simple cluster.


Presenter:Aditya Oza
Title:Inferring the Presence of Firewalls Through ICMP Messages
Presentation:Mon 23 Mar, 3:10pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract:听In my project, I analyzed ICMP messages that were collected as a result of Professor Leonards scan of all routable IP addresses on the Internet. I determined the number of unique firewalls on the Internet, analyzed the network sizes of the firewalls, and analyzed the number of networks that each firewall protected.


Presenter:Adrian Parreiras Horta
Title:Analysis of the Kaminsky Bug and Its Effectiveness on Local Nameservers
Presentation:Wed 25 Mar, 3:10pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract:听The recently discovered cache poisoning technique known as the Kaminsky Bug was discovered by computer security researcher Dan Kaminsky in June of 2008. The vulnerability targets the Domain Name System protocol, mainly used to translate human-readable host names into Internet Protocol IP addresses, and makes it possible to "poison" the records kept by DNS resolvers to contain falsified information about host name to IP mappings. Because the Kaminsky bug is a vulnerability in the design of the DNS protocol, it is not limited by vendor implementation or configuration, and remains unpatched as of this publication. My paper seeks to explain how the Kaminsky bug takes advantage of the current architecture of DNS, and also to assess the vulnerability of several local nameservers.


Presenter:Brad Payne
Title:Poker Analysis with a New Deck of Cards
Presentation:Tue 25 Nov, 9:00am, MCRey 315
Advisor:Dr. Duff Campbell

Abstract:听A new deck of 96 cards is created, using six suits in two different colors, and sixteen ranks. The ranks are partially ordered, not totally ordered; they are subsets of the set {伪, 尾, 蟺, 纬}.The goal of this project is to find probabilities and strategies in dealing with a certain combination of hands given this newly created deck. This new deck of cards will have different hand rankings and probabilities than does a normal deck of 52 cards. This project analyzes the similarities and differences between a normal deck of cards and this newly created deck in dealing with draw poker and Texas Hold'em. A system is also created to help determine the expected value of a certain hand. In turn this system can better determine the strength of your hand to help decide on whether or not to continue the hand and try to win or to fold and get rid of your cards.


Presenter:Greg Potter
Title:Computer Graphics: Particle Systems
Presentation:Fri 24 Apr, 2:30pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract:None


Presenter:Eric Robbins
Title:Data Synchronization from Multiple Independent Sources
Presentation:Tue 14 Oct, 5:30pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract:听In large data processing companies, multiple sources of information are typically used. However, these sources do not always provide reliable data, which results in inconsistencies existing between the sources. In this case, there exist two choices: manipulate the individual sources to maximize results or synchronize the different inputs into a unified input. This project details the process of attempting to optimize such a system utilizing OCR (Optical Character Recognition) technology, with focus on the benefits and problems associated with several different algorithms. These algorithms cover both individual source manipulation and synchronization.


Presenter:Christopher Schulze
Title:Simulation and Comparison of Traffic Control Algorithms
Presentation:Wed 25 Mar, 4:10pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract:听In order to test the efficiencies of a variety of traffic control algorithms, I have created a simulation of a city block, populated with simulated automobiles following randomly determined routes. Utilizing this simulation, I simulated the traffic control algorithms in question for predetermined metrics in order to gauge efficiency.


Presenter:Joseph Utecht
Title:Modeling Large Scale Erosion
Presentation:Mon 23 Mar, 3:40pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract:听Traditional terrain generation methods have a flaw of creating random landscapes that will rarely be mistaken for the real thing. I designed and implemented an algorithm that simulates hydraulic erosion, with the goal of creating more realistic landscapes.


Presenter:Justin Vance
Title:Black Box GUI Builder
Presentation:Tue 14 Oct, 4:00pm, MCRey 315
Advisor:Dr. Gabe Ferrer

Abstract:听By way of its own graphical user interface, this utility allows for the rapid construction and modification of graphical user interfaces, which can be exported in comprehensibly formatted, stand-alone Java files for use in other projects. The Builder also provides an interface for associating black boxes from Dr. Ferrer's Black Box Editor with each GUI component, and with the GUI as a whole. This integration offers a convenient and robust environment for Cleanroom analysis and testing of whether the specification for a constructed GUI has accounted for all potential inputs.


Presenter:Justin Whorton
Title:Adaptive Artificial Intelligence for the Game of Checkers
Presentation:Mon 13 Oct, 5:00pm, MCRey 315
Advisor:Dr. Gabe Ferrer

Abstract:听With the proper programming, computers can often play board games such as chess or checkers at a skill level beyond the average human player. So, the question arises: How can an artificial intelligence be adapted to seem to naturally match the skill level of its current opponent? Using an artificial intelligence designed to play checkers, this project explores three methods to adapt such an artificial intelligence to the skill of its current opponent.