Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Life Sciences (506)
- Earth Sciences (383)
- Plant Sciences (373)
- Soil Science (373)
- Computer Sciences (219)
-
- Engineering (137)
- Medicine and Health Sciences (108)
- Environmental Sciences (93)
- Sustainability (73)
- Environmental Monitoring (66)
- Applied Mathematics (65)
- Chemistry (65)
- Environmental Indicators and Impact Assessment (62)
- Mechanical Engineering (59)
- Information Security (58)
- Oil, Gas, and Energy (57)
- Energy Systems (55)
- Materials Science and Engineering (55)
- Mining Engineering (55)
- Structural Materials (55)
- Statistics and Probability (53)
- Mathematics (46)
- Physics (39)
- Social and Behavioral Sciences (36)
- Education (29)
- Ordinary Differential Equations and Applied Dynamics (26)
- Business (25)
- Applied Statistics (24)
- Law (21)
- Institution
-
- University of Kentucky (433)
- Kennesaw State University (133)
- Virginia Commonwealth University (89)
- Utah State University (82)
- Old Dominion University (38)
-
- Western University (38)
- Illinois State University (32)
- University of Northern Iowa (17)
- Roseman University of Health Sciences (16)
- University of Nebraska at Omaha (16)
- Coastal Carolina University (14)
- Embry-Riddle Aeronautical University (14)
- Portland State University (14)
- Winona State University (12)
- Northwestern College, Iowa (10)
- Nova Southeastern University (8)
- Stephen F. Austin State University (7)
- Harrisburg University of Science and Technology (6)
- Ohio Northern University (6)
- Seattle University School of Law (6)
- Southern Adventist University (6)
- Loyola University Chicago (5)
- Purdue University (5)
- East Tennessee State University (4)
- Murray State University (4)
- Ouachita Baptist University (4)
- South Dakota State University (4)
- Liberty University (3)
- Lindenwood University (3)
- Ohio Wesleyan University (3)
- Keyword
-
- And Energy; Structural Materials; Sustainability (55)
- Energy Systems; Environmental Indicators and Impact Assessment; Environmental Monitoring; Mining Engineering; Oil (55)
- Gas (55)
- Epidemiology (21)
- Medicine (19)
-
- Grassland (14)
- Grazing (11)
- Nitrogen (11)
- Ecology (10)
- Neuroscience (10)
- Pastoralism (10)
- Forage (9)
- Grasslands (9)
- Biodiversity (8)
- Climate change (8)
- Livestock (8)
- Nutritive value (8)
- Pasture (8)
- Alfalfa (7)
- Grazing management (7)
- Legumes (7)
- Other (7)
- Phosphorus (7)
- Ecosystem services (6)
- Model (6)
- Remote sensing (6)
- Sustainability (6)
- Drought (5)
- Extension (5)
- Grazing systems (5)
- Publication
-
- IGC Proceedings (1997-2023) (359)
- C-Day Computing Showcase (90)
- Biology and Medicine Through Mathematics Conference (89)
- World of Coal Ash Proceedings (55)
- Student Research Symposium (47)
-
- Utah Space Grant Consortium (42)
- Undergraduate Student Research Internships Conference (38)
- Annual Symposium on Biomathematics and Ecology Education and Research (32)
- Cybersecurity Undergraduate Research Showcase (30)
- Symposium of Student Scholars (24)
- Annual Research Symposium (16)
- Summer Undergraduate Research Program (SURP) Symposium (14)
- Undergraduate Research Competition (14)
- Ramaley Celebration (12)
- Computer Science Graduate Research Workshop (11)
- KSU Proceedings on Cybersecurity Education, Research and Practice (11)
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- Celebration of Research (10)
- Mathematics Colloquium Series (8)
- Kentucky Alfalfa and Stored Forage Conference (7)
- Kentucky Water Resources Annual Symposium (7)
- Undergraduate Research Conference (7)
- African Conference on Information Systems and Technology (6)
- Campus Research Day (6)
- Conference on Applied Statistics in Agriculture and Natural Resources (6)
- Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity (6)
- ONU Student Research Colloquium (6)
- SITIE Symposiums (6)
- Undergraduate Research Symposium (6)
- Computer Science Research Seminars and Symposia (5)
Articles 1 - 30 of 1054
Full-Text Articles in Physical Sciences and Mathematics
Federated Learning And Applications In Cybersecurity, Ani Sreekumar
Federated Learning And Applications In Cybersecurity, Ani Sreekumar
Cybersecurity Undergraduate Research Showcase
Machine learning is a subfield of artificial intelligence that focuses on making predictions about some outcome based on information from a dataset. In cybersecurity, machine learning is often used to improve intrusion detection systems and identify trends in data that could indicate an oncoming cyber attack. Data privacy is an extremely important aspect of cybersecurity, and there are many industries that have more demanding laws to ensure the security of user data. Due to these regulations, machine learning algorithms can not be widely utilized in these industries to improve outcomes and accuracy of predictions. However, federated learning is a recent …
Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma
Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma
Cybersecurity Undergraduate Research Showcase
With technology growing, there has been an increase in cybercrime. Because of this, private and public sectors face global problems, i.e., phishing, security breaches, and identity theft. With cybersecurity software available on the internet, anyone can access it. As technology advances, cybersecurity experts must answer the tough question of, “is cybersecurity training practical or not”?
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood
Cybersecurity Undergraduate Research Showcase
While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …
Investigating Privacy Policies Using Policylint Tool, Tricia Camaya
Investigating Privacy Policies Using Policylint Tool, Tricia Camaya
Cybersecurity Undergraduate Research Showcase
Organizations essentially inform clients about data collection and sharing practices through privacy policies. Recent research has proposed tools to help users better comprehend these lengthy and intricate legal documents that summarize collection and sharing. However, these instruments have a significant flaw. They overlook the possibility of contradictions within a particular policy. This paper introduces PolicyLint, a tool for analyzing privacy policies that simultaneously considers negation and varying semantic levels of data objects and entities. PolicyLint accomplishes this by using sentence-level natural language processing to automatically create ontologies from a large corpus of privacy policies and capturing both positive and negative …
Ethical Concerns In Self-Driving Cars, Victoria Shand
Ethical Concerns In Self-Driving Cars, Victoria Shand
Cybersecurity Undergraduate Research Showcase
Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.
When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
Cybersecurity Undergraduate Research Showcase
Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …
Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer
Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer
Symposium of Student Scholars
When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …
Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study, Gracie Smith, Martina Kaledin
Hydrogen Bonding In Small Model Peptides; The Dft And Mp2 Study, Gracie Smith, Martina Kaledin
Symposium of Student Scholars
Formamide is a small model compound for the study of the peptide bond. The peptide bond links amino acids together, specifies rigidity to the protein backbone, and includes the essential docking sites for hydrogen-bond-mediated protein folding and protein aggregation, namely, the C=O acceptor and the N-H donor parts. Therefore, the infrared C=O (amide-I) and N-H (amide-A) vibrations provide sensitive and widely used probes into the structure of peptides. This computational chemistry work, we study hydrogen bonds in formamide dimer isomers. We evaluate the accuracy of the density functional theory (DFT) and many-body perturbation theory to the 2nd order (MP2) …
Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez
Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez
Symposium of Student Scholars
The Software Supply chain or SSC is the backbone of the logistics industry and is crucial to a business's success and operation. The surge of attacks and risks for the SSC has grown in coming years with each attack's impact becoming more significant. These attacks have led to the leaking of both client and company sensitive information, corruption of the data, and having it subject to malware and ransomware installation, despite new practices implemented and investments into SSC security and its branches that have not stopped attackers from developing new vulnerabilities and exploits. In our research, we have investigated Software …
Investigating The Electrochemical Behavior Of Dihydropyrrolopyroles For Use As Anodically Coloring Electrochromes, Perry Skiouris, Ally Kisiel, Valentino Sorto, Julia Mauro, Graham Collier
Investigating The Electrochemical Behavior Of Dihydropyrrolopyroles For Use As Anodically Coloring Electrochromes, Perry Skiouris, Ally Kisiel, Valentino Sorto, Julia Mauro, Graham Collier
Symposium of Student Scholars
Electrochromic materials have found widespread use in consumer electronics, energy saving windows, and military applications. They contain unique electronic properties allowing them to undergo a color change in a redox reaction. One classification of these molecules is known as anodically coloring electrochromes (ACEs). When in solution, these compounds are transmissive in the neutral (ground) state and absorb visible light upon oxidation, by the formation of a radical cation, thus making them colored. The focus of this study is the electronic transitions of this radical cation and how chemical modifications to the structures produce a variable color profile. To design prospective …
Usa Air Quality, Teja S
Usa Air Quality, Teja S
Symposium of Student Scholars
What are the goals or purpose of your maps/poster? The goal is to explain the air quality has been effected by major pollutants and how one person can make a difference. In other words, why are you doing this topic? What are you trying to accomplish or learn? I am trying to learn how to not contribute to pollution. What is the importance? Could help our planet with global warming. Why this map and not another? I feel like this is an urgent matter. What is special/unique about this? Recycling could possibly help to our air quality
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore
Symposium of Student Scholars
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage are the reasons for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Designing And Synthesizing A Warhead-Fragment Inhibitory Ligand For Ivyp1 Through Fragment-Based Drug Discovery, Samuel Moore
Designing And Synthesizing A Warhead-Fragment Inhibitory Ligand For Ivyp1 Through Fragment-Based Drug Discovery, Samuel Moore
Symposium of Student Scholars
Fragment-based drug discovery (FBDD) is a powerful tool for developing anticancer and antimicrobial agents. Within this, magnetic resonance spectroscopy (NMR) provides a comprehensive qualitative and quantitative approach to screening and validating weak and robust binders with targeted proteins, making NMR among the most attractive strategies in FBDD. Inhibitor of vertebrate lysozyme (Ivyp1) of P. aeruginosa serves as an excellent target because of its active cellular location and implications in clinical prognosis for cystic fibrosis and immunocompromised patients. This study uses current NMR and biophysical techniques to develop a covalent, fragment-linked warhead inhibitor for Ivyp1 through synthetic methods, warhead linking, and …
Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise
Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise
C-Day Computing Showcase
American residents in the (Nigerian, Liberian, Indian, Ghanaian, etc.) Diaspora have strong ties back home and as such support loved ones, back home, on a regular basis, by sending cash remittances through Western Union, MoneyGram, etc. Remittances are expensive. Remitters have no control over how funds are spent once received. Remitters cannot send small amounts because the fees cannot be justified. We built a marketplace platform that allows the Diaspora to remit goods and services, instead of sending money to relatives back home in. The objectives are to remove or greatly reduce the cost of remittances, give more control to …
Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin
Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin
C-Day Computing Showcase
Data networking is a complex field. Designing networks is a complex task. Simulators have been developed to create hypothetical designs with configuration settings for evaluating architectures and settings. At least 2 simulators are freely available to IT professionals and students. This project involves researching the landscape of free network design simulators to determine how many there are, then downloading, testing, evaluating, and documenting the features of each by designing, on each, a network with multiple routers, switches, and host devices using IPv4 and IPv6, defining features appropriate for classroom use in a university, and finally determining which solution fits the …
Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson
Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson
C-Day Computing Showcase
Hemorrhage is a fast-paced FPS action game with a focus on risky gameplay and dodging enemy attacks. Fight your way through hordes of grotesque creatures and make it to the end! The player starts with limited health but can steal more from killing enemies. Then, you can unleash this stored-up health to deal massive damage to your foes! Will you choose to be an unkillable tank? Or a brutal glass cannon?
Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson
Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson
C-Day Computing Showcase
Blockchain is a growing technology that utilizes a decentralized public record of transactions. It is not only used for cryptocurrency, but also IoT, financial systems, healthcare, supply chain, etc. Although blockchain is quite robust, it is not invulnerable. This project will explain and demonstrate several weaknesses of blockchain and how to prevent them. We will demonstrate the following attacks and how to prevent them using Solidity: Transaction Order Dependence, Denial of Service, Replay Attack, Writing of Arbitrary Storage Address Attack, Weak Randomness, and Honeypot Attack.
Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury
Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury
C-Day Computing Showcase
Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecurity consultants and to secure a mock business website. Afterwards, we were to engage in the active defense of the site from another team, while perpetuating attacks on another team's site. Goals: -Secure a business website and then engage in it's active defense. -Perform a successful attack(s) on another team's website. Outcomes: -Developed a comprehensive security policy -Documented site risk and vulnerabilities -Implemented security and configuration changes
Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga
Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga
C-Day Computing Showcase
This overarching project would be web development, which would entail coding both the back end and the front end. The use of libraries is encouraged, but we must be cautious about licensing and ensure that this project remains as open-source as possible (a good open-source license ensures people can use, modify, redistribute, and sell without worry). This is a free and open-source project.
Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry
Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry
C-Day Computing Showcase
This application was part of an industry Capstone project with Georgia Tech Research Institute, with Mr. Matthew Pinkston as the industry sponsor, Ms. Allison Boyle as the industry Capstone coordinator, and Mr. Donald Privitera as the Capstone professor. Our team worked on creating the framework for an opensource, web-based IT management application that future developers can add various features and sub-applications onto for purposes such as asset and budget management. The application is PHP-based with its backend, utilizing the Laravel framework and several of its built-in features for routing, database management, login authentication with bcrypt hash security, and session tracking. …
Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen
Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen
C-Day Computing Showcase
Buggy is a desktop price scraper application that finds the best deals for users across several major retailers. Retailers include Amazon, Costco, Target, Walmart, and eBay. It simplifies bargain hunting by condensing product information from multiple websites into one, convenient place. Users can save products for future access, track search history, and compare search results with tabs for navigation. When they are ready to buy, they can simply click on the buy button and are directed to the vendor's page to check out.
Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda
Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda
C-Day Computing Showcase
To implement the Dempster-Shafer Theory algorithm as well as check the prediction accuracy using this mentioned algorithm in the iris dataset. The actual aim of this paper is to understand and implement the Dempster-Shafer Theory using the python programming language. To reflect doubt and inaccuracies in the evidence, one might use a belief structure that is defined as a set function m that satisfies. The conjecture of this report is to get the closable prediction accuracy that can help to understand future improvement as well as the gap of the applied implementation techniques
Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis
Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis
C-Day Computing Showcase
Best suited for IT students who are able to use on-site (@ KSU) testing environment Perform a market survey of the best reviewed and used workstation deployment solutions Determine a set of requirements the business needs the solution to meet Determine metrics based off the requirements to measure the tools against each other Test the top 3 tools and provide a recommendation to the organization for which tool and its instructions for its basic initial setup
Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua
Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua
C-Day Computing Showcase
According to Taylor & Francis Group, LLC (2015), in the National Library of Medicine“Traumatic brain injury (TBI) impacts the lives of 1.5 to 2 million new individuals each year; 75,000 to 100,000 of these are classified as severe and will suffer enduring severe spasticity in addition to cognitive”. This game follows and respect basic and fundamental rules of brain and muscles recovery process and will help patients in their process of rehabilitation and by extension will improve their cognitive abilities.
Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna
Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna
C-Day Computing Showcase
Employee churn is a situation where people leave the organization voluntarily or involuntarily. This has become a serious problem in recent times. We have also seen that attrition rates in several industries are going high. So, it is very much required to understand and analyze the reason behind attrition and why this is happening. We must conduct an analysis to know what the factors affecting employee churn are. It will create a huge impact on the organization if the attrition rate goes high. In order to resolve this issue, we are trying to take up this issue and find the …
Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura
Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura
C-Day Computing Showcase
Gone Fishing is a VR game that allows the player to fish from the comfort of their own home. This take on a fishing simulator has creative and playful designs that are sure to surprise the players. With this game, we intend to invoke different comedic aspects found in other games such as designs, descriptions, and possible voiceovers in order to give the players a good time. This isn’t the average fishing simulator.
Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton
Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton
C-Day Computing Showcase
The U.S. Army Corp of Engineers in Carters Lake required a game that attempts to educate on the principles of both prescribed and non-prescribed fires. They request that the game be playable on an android device housed in a HOLOFIL holographic display. Additionally, it needed to be created in the mirrored format as the projection flips everything. We decided to use Unity Real-Time Development Platform to complete the game’s development. Unity is a set of tools to give content creators an all-in-one development environment that helps content creators develop games and applications. “Unity is royalty-free and does not charge on …
Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon
Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon
C-Day Computing Showcase
This application is a collaboration between the Computer Science department and the Music department. The Music department has a use case for a Mobile Application and we will be able to use the capstone project to build this solution. Studio Buddy is a mobile application that will allow teachers and students to connect for coaching sessions. Teachers will be able to post practice material [hands-on and musical in nature] and assign the material to students. Teachers will be able to track progress for their students and better tailor each students practice exercises. This is not a replacement for any existing …
Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George
Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George
C-Day Computing Showcase
Red Pepper IT is an application developed for Georgia Tech Research Institute. The conception of this project arose from the lack of IT management tools that can address all the needs of an IT department. Furthermore, with the currently available tools, they are either poorly designed or have a high licensing cost. This project seeks to solve the need for such applications by building an open-source application that can be deployed internally by any business seeking a management tool for its IT department.
Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima
Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima
C-Day Computing Showcase
A cooking rogue-like game where you cook the weapons you fight with.