Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Covid-19 Crowd Detection, Mustafa Ibrahim, Aly M. Zeineldin, Yameen Khan, Ayman Elmesalami, Soad Ibrahim Jan 2023

Covid-19 Crowd Detection, Mustafa Ibrahim, Aly M. Zeineldin, Yameen Khan, Ayman Elmesalami, Soad Ibrahim

OUR Journal: ODU Undergraduate Research Journal

Object detection was introduced by researchers for face detection. Researchers explain how the detected face is divided into minor frames to be recognized by the algorithm. Due to COVID-19 and government regulations, many people face problems going to shopping centers and shop safely. It has been very hard for both the government and the people to manage social distancing. In our study, we developed a system using Raspberry Pi-4 that will detect the distance between people along with counting the number of distance and mask violations. An error message will appear on the screen in red, showing the total number …


Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads, Stephanie K. Trusty, Gabriel Del Razo, Nathan Potter, Soad Ibrahim, Ayman Elmesalami Jan 2022

Odu Undergraduate Students Addressing The Societal Problems Of Parking Control, Classroom Seating, And Flood Monitoring In Hampton Roads, Stephanie K. Trusty, Gabriel Del Razo, Nathan Potter, Soad Ibrahim, Ayman Elmesalami

OUR Journal: ODU Undergraduate Research Journal

During the summer of 2021, ODU undergraduate computer science students undertook image processing research projects. These projects focused on utilizing the Raspberry Pi computer and camera module to address three real-world problems concerning parking control, classroom seating, and flood monitoring. The parking lot occupancy project aimed to develop a system that monitors the occupancy of parking spaces in a lot and communicates the status of the lot of drivers and the lot attendants. The COVID-19 classroom occupancy project sought to enforce social distancing protocols in a classroom environment by detecting seating violations and notifying the instructor and the impacted students …


Understanding The Use Of Malware And Encryption, Eva M. Castillo Jan 2020

Understanding The Use Of Malware And Encryption, Eva M. Castillo

OUR Journal: ODU Undergraduate Research Journal

The main objective of this research project is understanding malware and encryption.


Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice Jan 2020

Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice

OUR Journal: ODU Undergraduate Research Journal

The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …


Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell Jan 2020

Study Of The Feasibility Of A Virtual Environment For Home User Cybersecurity, Sean Powell

OUR Journal: ODU Undergraduate Research Journal

This research focuses on the average home computer user’s ability to download, install and manage a virtual machine software program. The findings of this research is to be used as a foundation to the possibility of using a virtual machine software program as another form of defense for the home user’s computer. Virtual machines already have various uses, some in the cybersecurity field; this possibility could add another useful application for the software program. This research is conducted by monitoring volunteers’ ability to download, install, set up, and perform basic instructions on the virtual environment. It was from the volunteers’ …