Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

260,632 Full-Text Articles 328,427 Authors 78,898,844 Downloads 442 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

260,632 full-text articles. Page 4 of 8402.

Uc-274 Restful Robots, Jack I. Young, Derek M. Comella, Sarah Thomas, Andrew Loveless 2022 Kennesaw State University

Uc-274 Restful Robots, Jack I. Young, Derek M. Comella, Sarah Thomas, Andrew Loveless

C-Day Computing Showcase

The UXA-90 Robots have been sitting idle at Kennesaw State University for years. The only documentation provided were factory manuals, and there was nothing additional found online. The first step was to conduct a risk assessment and report the results to Professor Perry and Dr. Pei. The objective of the risk assessment was to determine the viability of the robots and the feasibility of three different senior project teams using them for a project. Once the risk assessment was completed and reported it was determined that all three teams could proceed with their senior projects. However, it was recommended that ...


Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury 2022 Kennesaw State University

Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury

C-Day Computing Showcase

Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecurity consultants and to secure a mock business website. Afterwards, we were to engage in the active defense of the site from another team, while perpetuating attacks on another team's site. Goals: -Secure a business website and then engage in it's active defense. -Perform a successful attack(s) on another team's website. Outcomes: -Developed a comprehensive security policy -Documented site risk and vulnerabilities -Implemented security and configuration changes


Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson 2022 Kennesaw State University

Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson

C-Day Computing Showcase

Blockchain is a growing technology that utilizes a decentralized public record of transactions. It is not only used for cryptocurrency, but also IoT, financial systems, healthcare, supply chain, etc. Although blockchain is quite robust, it is not invulnerable. This project will explain and demonstrate several weaknesses of blockchain and how to prevent them. We will demonstrate the following attacks and how to prevent them using Solidity: Transaction Order Dependence, Denial of Service, Replay Attack, Writing of Arbitrary Storage Address Attack, Weak Randomness, and Honeypot Attack.


Uc-296 Cybersecurity Park, Neil E. Weingarten, JaDante Hendrick, Kylie Nowokunski, Tyler Crawford 2022 Kennesaw State University

Uc-296 Cybersecurity Park, Neil E. Weingarten, Jadante Hendrick, Kylie Nowokunski, Tyler Crawford

C-Day Computing Showcase

Cybersecurity Park is an educational VR game intended for middle-school-age children that aims to demonstrate a wide range of cybersecurity concepts to the players. Such concepts include hacking ethics and types of hackers, cryptography, Trojan Horse / ransomware viruses, and authentication and authorization. These concepts are split into various mini-games that the player can freely navigate to from the hub they spawn in. For example, in the mini-game showcasing the Trojan Horse concept, players play as a knight defending a castle from evildoers. Visitors will approach the castle and ask access into the castle, and, based on the actions by the ...


Ur-280 Speech Recognition, Rachnicha Rojjhanarittikorn 2022 Kennesaw State University

Ur-280 Speech Recognition, Rachnicha Rojjhanarittikorn

C-Day Computing Showcase

This project makes use of speech recognition in Python libraries from Google, such as Google Speech-to-Text. The program first installs the dependencies that are required to run the program. The program then asks the user for their input. The user has the option of either exit the program, having the text read back to them, or responding to the conversation. If the user decides to have the text read back to them, the program will use the Google Text-to-Speech library to convert the text to speech. The purpose of this project is to understand how to implement speech recognition in ...


Ur-285 Operation Enduring Freedom: Improving Mission Effectiveness By Identifying Trends In Successful Terrorism, Dalton A. Shaver 2022 Kennesaw State University

Ur-285 Operation Enduring Freedom: Improving Mission Effectiveness By Identifying Trends In Successful Terrorism, Dalton A. Shaver

C-Day Computing Showcase

This research examines how the characteristics of terrorist attacks predict the chance of an attack succeeding, where an attack is defined as successful if the intended attack type is carried out. Data was analyzed across three geographical missions within Operation Enduring Freedom: Trans-Sahara, Horn of Africa, and the Philippines. Using predicted probabilities of success obtained from logistic regression models, the medians were plotted to compare the characteristics of terrorist attacks across missions. By determining the specific features of attacks that produce the highest probabilities of success, the effectiveness of Operation Enduring Freedom can be improved by focusing counter-terrorism training and ...


Ur-294 A Quantum Arithmetic Logic Unit, Ethan Butler, Bryson Phillip, Benjamin G. Ulrich, David Carroll 2022 Kennesaw State University

Ur-294 A Quantum Arithmetic Logic Unit, Ethan Butler, Bryson Phillip, Benjamin G. Ulrich, David Carroll

C-Day Computing Showcase

This paper demonstrates that a quantum version of a classical Arithmetic Logic Unit (ALU) can be implemented on a quantum circuit. It would perform the same functions as the classical ALU, with the possibility of adding quantum functions in conjunction. To create the quantum ALU, we utilized IBM’s Qiskit Python package and JuypterLab. We also used the IBM Quantum Lab to run the circuit. We believe that a quantum ALU has the potential to be faster than its classical counterpart and the ability to calculate quantum specific operations. The simple classical functions translated to a quantum circuit show a ...


Gc-244 Msit Capstone Project Fall 2022, Megen Cochran, Skylar Story, Tatiana Brown, Simisola Babatunde 2022 Kennesaw State University

Gc-244 Msit Capstone Project Fall 2022, Megen Cochran, Skylar Story, Tatiana Brown, Simisola Babatunde

C-Day Computing Showcase

Computer network system administrators need to inspect and analyze network traffic and detect malicious communications, monitor system performance, and provide operational services. However, identifying threats contained within encrypted network traffic, which has become increasingly prevalent, poses a unique set of challenges. It is imperative to monitor this traffic or threats and malware but do so in a way that maintains privacy. This project aims to develop a machine learning-based system that can accurately detect malware communication in this setting.


Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua 2022 Kennesaw State University

Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua

C-Day Computing Showcase

According to Taylor & Francis Group, LLC (2015), in the National Library of Medicine“Traumatic brain injury (TBI) impacts the lives of 1.5 to 2 million new individuals each year; 75,000 to 100,000 of these are classified as severe and will suffer enduring severe spasticity in addition to cognitive”. This game follows and respect basic and fundamental rules of brain and muscles recovery process and will help patients in their process of rehabilitation and by extension will improve their cognitive abilities.


Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota 2022 Kennesaw State University

Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota

C-Day Computing Showcase

The heart is the most crucial part of the Human body. The organ circulates blood out of the circulatory system’s blood vessels. Any disease or failure of this organ causes death. Heart disease is one of the primary sources of death in the cutting-edge world. There are 2,380 deaths from heart disease each day, based on 2018 data. Also, heart disease causes the highest number of deaths globally, with approximately 18 million people dying yearly, meaning around 31This prediction can be made using Machine Learning techniques. With machine learning. Combining a prediction model with machine learning correctly classified ...


Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga 2022 Kennesaw State University

Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga

C-Day Computing Showcase

This overarching project would be web development, which would entail coding both the back end and the front end. The use of libraries is encouraged, but we must be cautious about licensing and ensure that this project remains as open-source as possible (a good open-source license ensures people can use, modify, redistribute, and sell without worry). This is a free and open-source project.


Gr-252 Solving Multiple Traveling Salesman Problem Using K Means Clustering And Mixed Integer Programming - An Integrated Approach, Navneet Verma 2022 Kennesaw State University

Gr-252 Solving Multiple Traveling Salesman Problem Using K Means Clustering And Mixed Integer Programming - An Integrated Approach, Navneet Verma

C-Day Computing Showcase

In this research paper, we explore an efficient algorithm for multiple Traveling Salesman Problem (m-TSP) using an approach which combines K Means clustering algorithm and Mixed Integer Programming (MIP). The Traveling Salesman problem is an NP hard problem which relates to generation of minimum cost round trip tours for multiple salesmen visiting several cities in their territory. Our novel approach has the promise of reaching closer to the optimal solution as compared to heuristics-based approaches such as genetic algorithms.


Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna 2022 Kennesaw State University

Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna

C-Day Computing Showcase

Employee churn is a situation where people leave the organization voluntarily or involuntarily. This has become a serious problem in recent times. We have also seen that attrition rates in several industries are going high. So, it is very much required to understand and analyze the reason behind attrition and why this is happening. We must conduct an analysis to know what the factors affecting employee churn are. It will create a huge impact on the organization if the attrition rate goes high. In order to resolve this issue, we are trying to take up this issue and find the ...


Gr-273 Building A Chatbot, Varun Gottam, Sathwik Chepyala, Sai Mohit Saimpu, Venkata Sai krishna Yalavarthi, Nikhil Sai Buddiga 2022 Kennesaw State University

Gr-273 Building A Chatbot, Varun Gottam, Sathwik Chepyala, Sai Mohit Saimpu, Venkata Sai Krishna Yalavarthi, Nikhil Sai Buddiga

C-Day Computing Showcase

A chatbot is now a part of many online applications like Health Care, Education, E-commerce, etc. It made the conversation between the customers and the service providers much more convenient as the chatbot can answer most of the queries without human intervention from the website side. This saves a lot of time and work.


Gr-283 Chatbot, Vamsi Krishna Dhulipalla 2022 Kennesaw State University

Gr-283 Chatbot, Vamsi Krishna Dhulipalla

C-Day Computing Showcase

Mental health issue are the most common issue facing in human society. These issues are mostly in impact negatively on working peoples, on the individual, his/her family, workplace, community, and the economy. Our project is based on mental health chat bot of natural language processing with deep learning models .We have a structure data set of Mental Health. In the data set we have nine columns. We use neural networks to create our models .We use another method call scratch in which we create a model by our self and use it so our project we create a layer ...


Gr-287 Natural Disaster Prediction, Sravya Sabbu, Aishwarya Turlapati, SuryaPraveen Adivi 2022 Kennesaw State University

Gr-287 Natural Disaster Prediction, Sravya Sabbu, Aishwarya Turlapati, Suryapraveen Adivi

C-Day Computing Showcase

Natural disasters are events that are difficult to avoid. There are several ways of reducing the risks of natural disasters. One of them is implementing disaster reduction programs. There are already several developed countries that apply the concept of disaster reduction. In addition to disaster reduction programs, there are several ways to predict or reducing the risks using artificial intelligence technology. One of them is machine learning. By utilizing this method at the moment, it facilitates tasks in visualizing, analysing, and predicting natural disaster. This project will focus on conducting a review process and understanding the purpose of Machine learning ...


Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee 2022 Kennesaw State University

Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee

C-Day Computing Showcase

Due to the advancements in technology, data is growing exponentially. With this increased dataset size, the computation to process the generated information is rising sequentially. And the currently available classical computational tools and learning algorithms will not work due to the limitations of Moore's law. To overcome the computational issues, we have to switch to Quantum Computing which works based on the laws of Quantum Mechanics. Quantum Machine Learning (QML), a subset of Quantum Computing, is faster and more capable of doing complex calculations that a classical computer can't. Classical Computers work on bits - 0 or 1, whereas ...


Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda 2022 Kennesaw State University

Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda

C-Day Computing Showcase

To implement the Dempster-Shafer Theory algorithm as well as check the prediction accuracy using this mentioned algorithm in the iris dataset. The actual aim of this paper is to understand and implement the Dempster-Shafer Theory using the python programming language. To reflect doubt and inaccuracies in the evidence, one might use a belief structure that is defined as a set function m that satisfies. The conjecture of this report is to get the closable prediction accuracy that can help to understand future improvement as well as the gap of the applied implementation techniques


Gr-306 Improving Wildfire Propagation Simulations Using Cellular Automata To Help Emergency Management, Madeline Frank, Lokesh Meesala, Yagnasree Bollineni, Amrutha Venkatesh, Mujahid Shaheed Shaik 2022 Kennesaw State University

Gr-306 Improving Wildfire Propagation Simulations Using Cellular Automata To Help Emergency Management, Madeline Frank, Lokesh Meesala, Yagnasree Bollineni, Amrutha Venkatesh, Mujahid Shaheed Shaik

C-Day Computing Showcase

Discrete computational models known as cellular automata (CA) utilize discrete spatial cells, each existing in one of a set of possible states at any given moment. Transition rules specify how a given cell’s state evolves in subsequent time steps and is dependent on the states of the given cell’s neighborhood of surrounding cells. A cellular automaton model can also account for the influence of other external or physical factors on the evolution of a given cell’s state. These capabilities afforded by CA models make it an ideal tool to simulate the propagation of wildfires. One specific study ...


Uc-246 Spudify, Nathanial R. Bintliff, Jimmy V. Nguyen, Tyler Holmes, Alex M. Tawara, Addison Christian 2022 Kennesaw State University

Uc-246 Spudify, Nathanial R. Bintliff, Jimmy V. Nguyen, Tyler Holmes, Alex M. Tawara, Addison Christian

C-Day Computing Showcase

Spotify’s yearly wrapped report is extremely popular amongst its users. Unfortunately users must wait a year from every report to view statistics about their listening habits. Our app will allow users to generate reports displaying their top songs and artists whenever they want. Additionally, our app will allow users to generate recommendations for new music based on their favorite songs/artists. Users will also be able to generate advanced recommendations by inputting custom artists/genres/songs and customizing a variety of parameters such as the recommended song’s tempo, loudness, and danceability. Our app will give Spotify users the ...


Digital Commons powered by bepress