Site-wide links

Scholar Works

Graduate Admissions - RIT Scholar Works

Selfies have become an easy and instantaneous form of self-expression and communication. Posting selfies to various social media platforms has become wildly popular and socially accepted in the digital age. This study investigated the motivation behind posting selfies to Facebook, Instagram, and Snapchat using the... READ MORE
The introduction of dynamic electricity pricing structures such as Time of Use (TOU) rates and Day Ahead Pricing (DAP) in residential markets has created the possibility for customers to reduce their electric bills by using energy storage systems for load shifting and/or peak load... READ MORE
The miniaturization trend in electronics has spurred the development of efficient thermal management solutions. Single phase techniques are reliable but are limited by large fluid temperature differences and pressure drop. Two phase cooling has very little pressure drop with large heat absorption capacity. Boiling... READ MORE
The study of history is one way of preserving human culture. In China, a country with thousands of years long history, a vast number of historical events have been recorded in different literary works, including history books, fictions, biographies, and so on. However, we... READ MORE
The teaching of introductory computer science can benefit from the use of real-world context to ground the abstract programming concepts. We present the domain of pencil puzzles as a context for a variety of introductory CS topics. Pencil puzzles are puzzles typically found in... READ MORE
Low latency anonymity systems, like Tor and I2P, support private online communications, but offer limited protection against powerful adversaries with widespread eavesdropping capabilities. It is known that general-purpose communications, such as web and file transfer, are difficult to protect in that setting. However, online instant... READ MORE
Recent work has demonstrated that self-propagating worms are a real threat to sensor networks. Since worms can enable an adversary to quickly compromise an entire sensor network, they must be detected and stopped as quickly as possible. To meet this need, we propose a worm... READ MORE
The mechanism for picking guards in Tor suffers from security problems like guard fingerprinting and from performance issues. To address these issues, Hayes and Danezis proposed the use of guard sets, in which the Tor system groups all guards into sets, and each client... READ MORE
Older users (aged 55 and over) are generally thought to have limited knowledge in online security; additionally, their declining cognitive and perceptive abilities can further expose them to digital attacks. Despite these risks and the growing older population, little has been studied about older users’... READ MORE
The Uncommon Press Project was a cross-departmental, multi-disciplinary capstone project by students from the Kate Gleason College of Engineering and the College of Liberal Arts at Rochester Institute of Technology which aimed to create a historically accurate reconstruction of a circa 1790 English common... READ MORE
When walking into museums, visitors already have expectations about what they will encounter inside. Whether they are there to see a specific object or exhibit everyone expects to confront an artifact and learn about it. What visitors might not think about is how they... READ MORE
Peter Thiel, in his book Zero to One, mentioned the importance of going from zero to one over one to infinity. The value of innovation and creating a unique product will always hold a higher value than doing something that has already been done.... READ MORE
HfO2-based ferroelectric tunnel junctions (FTJs) represent a unique opportunity as both a next-generation digital non-volatile memory and as synapse devices in braininspired logic systems, owing to their higher reliability compared to filamentary resistive random-access memory (ReRAM) and higher speed and lower power consumption compared... READ MORE
Synchronous serial interfaces provide economical on-board communication between the processor, digital to analog and analog to digital converters, memory, and other building blocks on the chip. A number of Integrated Circuit (IC) manufacturers develop and produce components that are compatible with serial interfaces. The... READ MORE
This paper discusses the design and implementation of an automatic protein shake freestyle vending machine. This machine is capable of providing protein shakes as per the customer’s requirement. Customers are able to decide what kind of protein supplement they want according to their fitness needs,... READ MORE
Processors have evolved and grown more complex to serve enormous computational needs. Even though modern-day processors share same dna with processors half century ago, verifying them today is the huge wall to scale. Verification dominates production cycle even with advances both in software (programming as... READ MORE
High speed computation is the need of today’s generation of Processors. To accomplish this major task, many functions are implemented inside the hardware of the processor rather than having software computing the same task. Majority of the operations which the processor executes are Arithmetic operations... READ MORE
For a number of years, the hardware industry has seen a drastic rise in embedded applications. Thanks to the Internet of Things (IoT) revolution, a majority of these embedded applications are shifting towards the usage of simple hardware capable of running on batteries, while... READ MORE
One of the indispensable aspects of digital image processing is the requirement of varied image resolutions. To achieve varied resolution, scaling comes into picture. Two important applications of scaling is good pictorial quality for human interpretation and processing of digital images for storage, transmission and... READ MORE
Arithmetic Square Root is one of the most complex but nevertheless widely used operations in modern computing. A primary reason for the complexity is the irrational nature of the square root for non-perfect numbers and the iterative behavior required for square root computation. A... READ MORE
This thesis project explores Social Anxiety Disorder, by showing emotions and feelings of the person who suffers from social phobia to help his/her friends and classmates to understand them. The symptoms of a person with social phobia can be seen as being afraid of communicating... READ MORE
Artificial Neural Network (ANN), a computational model based on the biological neural networks, has a recent resurgence in machine intelligence with breakthrough results in pattern recognition, speech recognition, and mapping. This has led to a growing interest in designing dedicated hardware substrates for ANNs... READ MORE
The demand for lossless data at a low cost has lead its way to use fiber optic in field of RADIO FREQUENCY. This research proposes the automation technique which can be used in RF-overfiber measurements. All other automation technique used visual basic or Labview as... READ MORE
This thesis examines the concept of incorporating daylight into a school using a heliodon device and Illuminance Rendering in Cloud for Revit software to create a physical and computer model of how the building will function in its given location as a tool to... READ MORE