Filtering by
- Creators: Department of Psychology
- Creators: Computer Science and Engineering Program
Mayer-Rokitansky-Küster-Hauser (MRKH) is a rare Disorder of Sexual Development (DSD) that results in the lack of a uterus and vagina in women. Receiving this diagnosis during adolescence can cause various forms of psychological distress in patients and families.<br/>Specifically, this condition could affect a women’s gender identity, body image, romantic relationships, family relationships, and psychological wellbeing. Parents are also put in a stressful<br/>position as they now have to navigate the healthcare system, disclosure, and the relationship with their child. This study aims to expand the knowledge of psychosocial adjustment by studying body<br/>image, gender identity, and mental health in individuals living with MRKH as well as parental disclosure, parental support systems, and parental perceptions of their child’s mental health.
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.
The goal of this project was to design and create a genetic construct that would allow for <br/>tumor growth to be induced in the center of the wing imaginal disc of Drosophila larvae, the <br/>R85E08 domain, using a heat shock. The resulting transgene would be combined with other <br/>transgenes in a single fly that would allow for simultaneous expression of the oncogene and, in <br/>the surrounding cells, other genes of interest. This system would help establish Drosophila as a <br/>more versatile and reliable model organism for cancer research. Furthermore, pilot studies were <br/>performed, using elements of the final proposed system, to determine if tumor growth is possible <br/>in the center of the disc, which oncogene produces the best results, and if oncogene expression <br/>induced later in development causes tumor growth. Three different candidate genes were <br/>investigated: RasV12, PvrACT, and Avli.
Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.