Mathematics and Computer Science

2009 Senior Theses

2009 Senior Projects

Fall 2008
Monday, October 13, MCRey 315
4:00Don Bennett, Four-Dimensional Tetris
4:30Kyaw Soe Han, Color Recognition in Scanned Pages
5:00Justin Whorton, Adaptive Artificial Intelligence for the Game of Checkers
Tuesday, October 14, MCRey 315
4:00Justin Vance, Black Box GUI Builder
4:30Joshua Franklin, Wire Realignment in Toves
5:00Eric Robbins, Data Synchronization from Multiple Independent Sources
Tuesday, November 25, MCRey 315
9:00Brad Payne, Poker Analysis with a New Deck of Cards
Spring 2009
Monday, March 23, MCRey 315
3:10Aditya Oza, Inferring the Presence of Firewalls Through ICMP Messages
3:40Joseph Utecht, Modeling Large-Scale Erosion
Tuesday, March 24, MCRey 315
4:10Colby Christopher, Two Algorithms for Correcting Common Bad Programming Practices Using Jigsaw
4:40Wheeler Gnat, Feasibility of Broadcast Amplification Attacks
Wednesday, March 25, MCRey 315
3:10Adrian Parreiras Horta, Analysis of the Kaminsky Bug and Its Effectiveness on Local Nameservers
3:40Adam Jacobs, Implementation and Analysis of a Simple Cluster
4:10Christopher Schulze, Simulation and Comparison of Traffic Control Algorithms
Friday, April 24, MCRey 315
2:30Greg Potter, Computer Graphics: Particle Systems
3:00Richard Hinson, Word Sense Disambiguation


Presenter:Don Bennett
Title:Four-Dimensional Tetris
Presentation:Mon 13 Oct, 4:00pm, MCRey 315
Advisor:Dr. Bill Wood & Dr. Gabe Ferrer

Abstract: The goal of this project is to provide a tool that any person, with or without a strong mathematical background, could use to quickly gain an understanding of what the fourth dimension is and how it works. The theory is that people learn complex sets of rules much faster when they are associated with goals. The programming portion of my project is a game that requires the player to play by the rules of linear algebra in four dimensions, thus teaching the player to learn to predict how an object in this space will behave.

Presenter:Colby Christopher
Title:Two Algorithms for Correcting Common Bad Programming Practices Using Jigsaw
Presentation:Tue 24 Mar, 4:10pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract: The goal in this project is to alert the users of Jigsaw when they make very specific mistakes that can not be caught simply from the specification of the language. It is necessary to analyze the data flow of the code, a method called Data Flow Analysis. The first problem that is addressed is that of writing to a variable that will never be read again. The second problem is identifying variables which should not be instance variables when they are instance variables.

Presenter:Josh Franklin
Title:Wire Realignment in Toves
Presentation:Tue 14 Oct, 4:30pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract: Toves is a logic circuit simulator that allows a user to place inputs, outputs, gates, and wires and replicate properties of logic circuits. In this program, if one has created a connection between two objects, if one of those objects are later moved, the connection will be lost. The user then must manually re-route the wires between these objects to restore the connection. In this project, I implemented an algorithm to automatically re-route connections as a user moves objects within the program, making Toves a more user-friendly environment.

Presenter:Wheeler Gnat
Title:Feasibility of Broadcast Amplification Attacks
Presentation:Tue 24 Mar, 4:40pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract: The focus of my project is to research how likely Broadcast Amplification Attacks are. This involves researching this type of attack as well as attempting to locate broadcast addresses that can be abused using this technique. I attempted to locate these addresses using information collected by Professor Derek Leonard during his scans of the internet, with the goal of determining if these attacks are currently possible.

Presenter:Kyaw Soe Han
Title:Color Recognition in Scanned Pages
Presentation:Mon 13 Oct, 4:30pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract: Recognition of primary colors that appear on a scanned color image plays an important role in data mining since color related information is used for image analysis purposes. But it can be a challenging task as the appearances of colors are affected by various factors such as paper quality, print quality, bleaching, noise during both scanning process and printing process. To address these concerns, we presents the methods and implementations that recognize the primary colors that appear on a scanned page while differentiating noises from useful information. Our algorithm uses the RGB and CMYK color models.

Presenter:Richard Hinson
Title:Word Sense Disambiguation
Presentation:Fri 24 Apr, 3:00pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract: None

Presenter:Adam Jacobs
Title:Implementation and Analysis of a Simple Cluster
Presentation:Wed 25 Mar, 3:40pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract: Efficient, rapid computation is crucial to research in a broad spectrum of fields rooted in scientific investigation: from economics to physics. Clusters offer a powerful means of attaining superb computational efficiency. A cluster consists of a network of computers, connected through a fast, local connection. Computations are distributed across this network. Clusters are highly popular in both academic and industrial research. In light of the computational challenges involved in developing a cluster and the central role they play in research, I investigated the details of cluster design by implementing and analyzing a very simple cluster.

Presenter:Aditya Oza
Title:Inferring the Presence of Firewalls Through ICMP Messages
Presentation:Mon 23 Mar, 3:10pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract: In my project, I analyzed ICMP messages that were collected as a result of Professor Leonards scan of all routable IP addresses on the Internet. I determined the number of unique firewalls on the Internet, analyzed the network sizes of the firewalls, and analyzed the number of networks that each firewall protected.

Presenter:Adrian Parreiras Horta
Title:Analysis of the Kaminsky Bug and Its Effectiveness on Local Nameservers
Presentation:Wed 25 Mar, 3:10pm, MCRey 315
Advisor:Prof. Derek Leonard

Abstract: The recently discovered cache poisoning technique known as the Kaminsky Bug was discovered by computer security researcher Dan Kaminsky in June of 2008. The vulnerability targets the Domain Name System protocol, mainly used to translate human-readable host names into Internet Protocol IP addresses, and makes it possible to "poison" the records kept by DNS resolvers to contain falsified information about host name to IP mappings. Because the Kaminsky bug is a vulnerability in the design of the DNS protocol, it is not limited by vendor implementation or configuration, and remains unpatched as of this publication. My paper seeks to explain how the Kaminsky bug takes advantage of the current architecture of DNS, and also to assess the vulnerability of several local nameservers.

Presenter:Brad Payne
Title:Poker Analysis with a New Deck of Cards
Presentation:Tue 25 Nov, 9:00am, MCRey 315
Advisor:Dr. Duff Campbell

Abstract: A new deck of 96 cards is created, using six suits in two different colors, and sixteen ranks. The ranks are partially ordered, not totally ordered; they are subsets of the set {α, β, π, γ}.The goal of this project is to find probabilities and strategies in dealing with a certain combination of hands given this newly created deck. This new deck of cards will have different hand rankings and probabilities than does a normal deck of 52 cards. This project analyzes the similarities and differences between a normal deck of cards and this newly created deck in dealing with draw poker and Texas Hold'em. A system is also created to help determine the expected value of a certain hand. In turn this system can better determine the strength of your hand to help decide on whether or not to continue the hand and try to win or to fold and get rid of your cards.

Presenter:Greg Potter
Title:Computer Graphics: Particle Systems
Presentation:Fri 24 Apr, 2:30pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract: None

Presenter:Eric Robbins
Title:Data Synchronization from Multiple Independent Sources
Presentation:Tue 14 Oct, 5:30pm, MCRey 315
Advisor:Dr. Dwayne Collins

Abstract: In large data processing companies, multiple sources of information are typically used. However, these sources do not always provide reliable data, which results in inconsistencies existing between the sources. In this case, there exist two choices: manipulate the individual sources to maximize results or synchronize the different inputs into a unified input. This project details the process of attempting to optimize such a system utilizing OCR (Optical Character Recognition) technology, with focus on the benefits and problems associated with several different algorithms. These algorithms cover both individual source manipulation and synchronization.

Presenter:Christopher Schulze
Title:Simulation and Comparison of Traffic Control Algorithms
Presentation:Wed 25 Mar, 4:10pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract: In order to test the efficiencies of a variety of traffic control algorithms, I have created a simulation of a city block, populated with simulated automobiles following randomly determined routes. Utilizing this simulation, I simulated the traffic control algorithms in question for predetermined metrics in order to gauge efficiency.

Presenter:Joseph Utecht
Title:Modeling Large Scale Erosion
Presentation:Mon 23 Mar, 3:40pm, MCRey 315
Advisor:Dr. Carl Burch

Abstract: Traditional terrain generation methods have a flaw of creating random landscapes that will rarely be mistaken for the real thing. I designed and implemented an algorithm that simulates hydraulic erosion, with the goal of creating more realistic landscapes.

Presenter:Justin Vance
Title:Black Box GUI Builder
Presentation:Tue 14 Oct, 4:00pm, MCRey 315
Advisor:Dr. Gabe Ferrer

Abstract: By way of its own graphical user interface, this utility allows for the rapid construction and modification of graphical user interfaces, which can be exported in comprehensibly formatted, stand-alone Java files for use in other projects. The Builder also provides an interface for associating black boxes from Dr. Ferrer's Black Box Editor with each GUI component, and with the GUI as a whole. This integration offers a convenient and robust environment for Cleanroom analysis and testing of whether the specification for a constructed GUI has accounted for all potential inputs.

Presenter:Justin Whorton
Title:Adaptive Artificial Intelligence for the Game of Checkers
Presentation:Mon 13 Oct, 5:00pm, MCRey 315
Advisor:Dr. Gabe Ferrer

Abstract: With the proper programming, computers can often play board games such as chess or checkers at a skill level beyond the average human player. So, the question arises: How can an artificial intelligence be adapted to seem to naturally match the skill level of its current opponent? Using an artificial intelligence designed to play checkers, this project explores three methods to adapt such an artificial intelligence to the skill of its current opponent.