top of page
solid color in mustard yellow with tech-like circuit board  overlay

Tech Core Projects
by Jaclyn Fisher
Student
DeVry University

These projects laid the groundwork for applying theory to practice to both engineering and physics fundamentals. I designed a Virtual Traffic Light Controller to apply logic and coding concepts, used a circuit simulator to explore electrical systems, and carried out physics projects that measured motion, energy, and real-world forces. Together, these projects developed my problem-solving skills, strengthened my technical foundation, and showed how theory connects to practical, measurable results.

Circuit Simulation

This is a smart home automation and security system prototype. Programmed using a virtual emulator, this project covered the fundamental concept of the IoT by integrating hardware, software, and networks into an entire system.

Black background with binary code falling down in white lettering

Virtual Traffic Light Controller 

This is a practical device application developed and prototyped as a possible real world device solution in the Internet of Things (IoT)
 

blurry keyboard picture taken from a distance in pink, orange, and cream hues.

Physics in Action

A Sensor-based Exploration Of Motion, Energy, And Magnetism

This project proves that physics is not just crunching numbers. I got to explore how physics shows up in real life: from dropping objects to test gravity, to proving that energy really does transform but never disappears, to seeing how magnets can flip polarity through the Hall Effect. Along the way, I worked with data, graphs, and calculations to back up the theory with evidence. The end result was a project that made abstract ideas like motion, energy, and electromagnetism feel practical and connected to the world around us.

red physics math.jpg
circuit board faded coloring in golden yellow.jpg

Applied Network Defense and Threat Analysis

This project demonstrates practical cybersecurity experience in securing network infrastructures and analyzing threats across multiple layers of defense using the following:

  • Intrusion Analysis using Wireshark

  • OpenSSL Encryption and Certificate Management

  • Snort Intrusion Detection Configuration

  • Live Memory Analysis

  • Firewall Design and Implementation

bottom of page