Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

C-Day Computing Showcase

Conference

2022

Articles 1 - 30 of 90

Full-Text Articles in Physical Sciences and Mathematics

Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise Dec 2022

Gc-311 Singsingmarketplace.Com: E-Commerce Marketplace For Remote Vendors, Daniel K. Tor, Ebikela Ogegbene-Ise

C-Day Computing Showcase

American residents in the (Nigerian, Liberian, Indian, Ghanaian, etc.) Diaspora have strong ties back home and as such support loved ones, back home, on a regular basis, by sending cash remittances through Western Union, MoneyGram, etc. Remittances are expensive. Remitters have no control over how funds are spent once received. Remitters cannot send small amounts because the fees cannot be justified. We built a marketplace platform that allows the Diaspora to remit goods and services, instead of sending money to relatives back home in. The objectives are to remove or greatly reduce the cost of remittances, give more control to …


Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin Dec 2022

Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin

C-Day Computing Showcase

Data networking is a complex field. Designing networks is a complex task. Simulators have been developed to create hypothetical designs with configuration settings for evaluating architectures and settings. At least 2 simulators are freely available to IT professionals and students. This project involves researching the landscape of free network design simulators to determine how many there are, then downloading, testing, evaluating, and documenting the features of each by designing, on each, a network with multiple routers, switches, and host devices using IPv4 and IPv6, defining features appropriate for classroom use in a university, and finally determining which solution fits the …


Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson Dec 2022

Uc-249 Hemorrhage, Daniel M. Respess, Antonio S. Brewer, Kenny Tran, Sandy Li, Rick B. Watson

C-Day Computing Showcase

Hemorrhage is a fast-paced FPS action game with a focus on risky gameplay and dodging enemy attacks. Fight your way through hordes of grotesque creatures and make it to the end! The player starts with limited health but can steal more from killing enemies. Then, you can unleash this stored-up health to deal massive damage to your foes! Will you choose to be an unkillable tank? Or a brutal glass cannon?


Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson Dec 2022

Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson

C-Day Computing Showcase

Blockchain is a growing technology that utilizes a decentralized public record of transactions. It is not only used for cryptocurrency, but also IoT, financial systems, healthcare, supply chain, etc. Although blockchain is quite robust, it is not invulnerable. This project will explain and demonstrate several weaknesses of blockchain and how to prevent them. We will demonstrate the following attacks and how to prevent them using Solidity: Transaction Order Dependence, Denial of Service, Replay Attack, Writing of Arbitrary Storage Address Attack, Weak Randomness, and Honeypot Attack.


Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury Dec 2022

Uc-276 Akwaaba Web Server Security Project, Jayland Vann, Ty G. Rogers, Cody Reese, Ronald W. Southern, Taiyeb Choudhury

C-Day Computing Showcase

Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecurity consultants and to secure a mock business website. Afterwards, we were to engage in the active defense of the site from another team, while perpetuating attacks on another team's site. Goals: -Secure a business website and then engage in it's active defense. -Perform a successful attack(s) on another team's website. Outcomes: -Developed a comprehensive security policy -Documented site risk and vulnerabilities -Implemented security and configuration changes


Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga Dec 2022

Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga

C-Day Computing Showcase

This overarching project would be web development, which would entail coding both the back end and the front end. The use of libraries is encouraged, but we must be cautious about licensing and ensure that this project remains as open-source as possible (a good open-source license ensures people can use, modify, redistribute, and sell without worry). This is a free and open-source project.


Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry Dec 2022

Uc-248 Gtri: It Management Web Application, Joshua D. Oliver, Teryn Bryant, Renate M. Hamrick, Kendra Hansford-Bellamy, Terrell B. Mcgilberry

C-Day Computing Showcase

This application was part of an industry Capstone project with Georgia Tech Research Institute, with Mr. Matthew Pinkston as the industry sponsor, Ms. Allison Boyle as the industry Capstone coordinator, and Mr. Donald Privitera as the Capstone professor. Our team worked on creating the framework for an opensource, web-based IT management application that future developers can add various features and sub-applications onto for purposes such as asset and budget management. The application is PHP-based with its backend, utilizing the Laravel framework and several of its built-in features for routing, database management, login authentication with bcrypt hash security, and session tracking. …


Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen Dec 2022

Uc-268 Buggy - Price Scraper Application, David W. Fitzgerald, John Blake, Anderson F. Guse, Jessica Zardoya, Paul Allen

C-Day Computing Showcase

Buggy is a desktop price scraper application that finds the best deals for users across several major retailers. Retailers include Amazon, Costco, Target, Walmart, and eBay. It simplifies bargain hunting by condensing product information from multiple websites into one, convenient place. Users can save products for future access, track search history, and compare search results with tabs for navigation. When they are ready to buy, they can simply click on the buy button and are directed to the vendor's page to check out.


Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda Dec 2022

Gr-303 Dempster-Shafer Theory Of Computation, Dhanunjai Bandi, Sandeep Eadara, Sri Manju Nannapaneni, Jayanth Kumar Rayavarapu, Taraka Vishnu Yarlagadda

C-Day Computing Showcase

To implement the Dempster-Shafer Theory algorithm as well as check the prediction accuracy using this mentioned algorithm in the iris dataset. The actual aim of this paper is to understand and implement the Dempster-Shafer Theory using the python programming language. To reflect doubt and inaccuracies in the evidence, one might use a belief structure that is defined as a set function m that satisfies. The conjecture of this report is to get the closable prediction accuracy that can help to understand future improvement as well as the gap of the applied implementation techniques


Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis Dec 2022

Gc-243 - Analysis Of Alternatives Of Workstation Deployment Solutions, Mohammed S. Alam, Rahima Daino, Brittany Davis

C-Day Computing Showcase

Best suited for IT students who are able to use on-site (@ KSU) testing environment Perform a market survey of the best reviewed and used workstation deployment solutions Determine a set of requirements the business needs the solution to meet Determine metrics based off the requirements to measure the tools against each other Test the top 3 tools and provide a recommendation to the organization for which tool and its instructions for its basic initial setup


Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua Dec 2022

Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua

C-Day Computing Showcase

According to Taylor & Francis Group, LLC (2015), in the National Library of Medicine“Traumatic brain injury (TBI) impacts the lives of 1.5 to 2 million new individuals each year; 75,000 to 100,000 of these are classified as severe and will suffer enduring severe spasticity in addition to cognitive”. This game follows and respect basic and fundamental rules of brain and muscles recovery process and will help patients in their process of rehabilitation and by extension will improve their cognitive abilities.


Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna Dec 2022

Gr-267 Churn Prediction, Manoj Kumar Dasari, Nikhil Thota, Dinesh Kumar Thota, Rishi Sai Basava, Prudhvi Kalyan Sai Sugguna

C-Day Computing Showcase

Employee churn is a situation where people leave the organization voluntarily or involuntarily. This has become a serious problem in recent times. We have also seen that attrition rates in several industries are going high. So, it is very much required to understand and analyze the reason behind attrition and why this is happening. We must conduct an analysis to know what the factors affecting employee churn are. It will create a huge impact on the organization if the attrition rate goes high. In order to resolve this issue, we are trying to take up this issue and find the …


Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura Dec 2022

Uc-240 Gone Fishin' Vr, Donovan E. Lott, Richard Halbert, Tanner M. Peters, Joseph B. Hancock, Anthony L. Polidura

C-Day Computing Showcase

Gone Fishing is a VR game that allows the player to fish from the comfort of their own home. This take on a fishing simulator has creative and playful designs that are sure to surprise the players. With this game, we intend to invoke different comedic aspects found in other games such as designs, descriptions, and possible voiceovers in order to give the players a good time. This isn’t the average fishing simulator.


Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton Dec 2022

Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton

C-Day Computing Showcase

The U.S. Army Corp of Engineers in Carters Lake required a game that attempts to educate on the principles of both prescribed and non-prescribed fires. They request that the game be playable on an android device housed in a HOLOFIL holographic display. Additionally, it needed to be created in the mirrored format as the projection flips everything. We decided to use Unity Real-Time Development Platform to complete the game’s development. Unity is a set of tools to give content creators an all-in-one development environment that helps content creators develop games and applications. “Unity is royalty-free and does not charge on …


Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon Dec 2022

Uc-253 Sp12 - Studio Buddy - Mobile Application, Alejandro Zicavo, Tubatsi Moloi, Elmiche Kinmakon

C-Day Computing Showcase

This application is a collaboration between the Computer Science department and the Music department. The Music department has a use case for a Mobile Application and we will be able to use the capstone project to build this solution. Studio Buddy is a mobile application that will allow teachers and students to connect for coaching sessions. Teachers will be able to post practice material [hands-on and musical in nature] and assign the material to students. Teachers will be able to track progress for their students and better tailor each students practice exercises. This is not a replacement for any existing …


Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George Dec 2022

Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George

C-Day Computing Showcase

Red Pepper IT is an application developed for Georgia Tech Research Institute. The conception of this project arose from the lack of IT management tools that can address all the needs of an IT department. Furthermore, with the currently available tools, they are either poorly designed or have a high licensing cost. This project seeks to solve the need for such applications by building an open-source application that can be deployed internally by any business seeking a management tool for its IT department.


Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima Dec 2022

Uc-277 Cosmic Cookoff, Milo D. Wilson, Aidan Fushimi, Wade G. Parham, Miller Anderson, Kosi M. Chima

C-Day Computing Showcase

A cooking rogue-like game where you cook the weapons you fight with.


Uc-304 A Web Application Developed In Collaboration Between The Cs 4850 Senior Project Course And The Ksu Dept Of History And Philosopy, Leafy Wilson, Alexa Garcia Ortiz, Mae B. Morella, Braxton M. Meyer Dec 2022

Uc-304 A Web Application Developed In Collaboration Between The Cs 4850 Senior Project Course And The Ksu Dept Of History And Philosopy, Leafy Wilson, Alexa Garcia Ortiz, Mae B. Morella, Braxton M. Meyer

C-Day Computing Showcase

The Vada Project is is an upgrade to an existing web application for a collaborative debate platform used to facilitate good faith argumentation and evidence based reasoning using classical Indian theories of knowledge sources (pramāṇa vada). This web application is designed for classroom use to facilitate critical thinking, debating, and archiving arguments and counterarguments as structured by an Indian philosophical debate style known as Vada. The goals of this project are to design an intuitive and usable interface (HTML+CSS), a stable back-end (PHP+MySQL), and a maintainable codebase managed using static-analysis tools and continuous integration (GitHub Actions).


Ur-280 Speech Recognition, Rachnicha Rojjhanarittikorn Dec 2022

Ur-280 Speech Recognition, Rachnicha Rojjhanarittikorn

C-Day Computing Showcase

This project makes use of speech recognition in Python libraries from Google, such as Google Speech-to-Text. The program first installs the dependencies that are required to run the program. The program then asks the user for their input. The user has the option of either exit the program, having the text read back to them, or responding to the conversation. If the user decides to have the text read back to them, the program will use the Google Text-to-Speech library to convert the text to speech. The purpose of this project is to understand how to implement speech recognition in …


Ur-294 A Quantum Arithmetic Logic Unit, Ethan Butler, Bryson Phillip, Benjamin G. Ulrich, David Carroll Dec 2022

Ur-294 A Quantum Arithmetic Logic Unit, Ethan Butler, Bryson Phillip, Benjamin G. Ulrich, David Carroll

C-Day Computing Showcase

This paper demonstrates that a quantum version of a classical Arithmetic Logic Unit (ALU) can be implemented on a quantum circuit. It would perform the same functions as the classical ALU, with the possibility of adding quantum functions in conjunction. To create the quantum ALU, we utilized IBM’s Qiskit Python package and JuypterLab. We also used the IBM Quantum Lab to run the circuit. We believe that a quantum ALU has the potential to be faster than its classical counterpart and the ability to calculate quantum specific operations. The simple classical functions translated to a quantum circuit show a promising …


Gc-244 Msit Capstone Project Fall 2022, Megen Cochran, Skylar Story, Tatiana Brown, Simisola Babatunde Dec 2022

Gc-244 Msit Capstone Project Fall 2022, Megen Cochran, Skylar Story, Tatiana Brown, Simisola Babatunde

C-Day Computing Showcase

Computer network system administrators need to inspect and analyze network traffic and detect malicious communications, monitor system performance, and provide operational services. However, identifying threats contained within encrypted network traffic, which has become increasingly prevalent, poses a unique set of challenges. It is imperative to monitor this traffic or threats and malware but do so in a way that maintains privacy. This project aims to develop a machine learning-based system that can accurately detect malware communication in this setting.


Gc-258 Heart Disease Prediction Using Machine Learning, Devin Jackson, Richard Stupka, Trinadh Chigurupati, Demontae Moore Dec 2022

Gc-258 Heart Disease Prediction Using Machine Learning, Devin Jackson, Richard Stupka, Trinadh Chigurupati, Demontae Moore

C-Day Computing Showcase

Research has shown that the early detection of Heart Disease is critical to treating and understanding the causes. Through the use of advanced machine learning models and com- prehensive data sets collected on patients of varying backgrounds and health statuses, this research shows the listed correlations between attributes of data points and positive identification of the disease. This research uses 1026 unique records and 14 attributes including the classifier of Heart Disease. These attributes range from simple (cholesterol level) to more complex and subjective (chest pain type) but each attribute presents an opportunity to improve each of the analyzed models …


Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota Dec 2022

Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota

C-Day Computing Showcase

The heart is the most crucial part of the Human body. The organ circulates blood out of the circulatory system’s blood vessels. Any disease or failure of this organ causes death. Heart disease is one of the primary sources of death in the cutting-edge world. There are 2,380 deaths from heart disease each day, based on 2018 data. Also, heart disease causes the highest number of deaths globally, with approximately 18 million people dying yearly, meaning around 31This prediction can be made using Machine Learning techniques. With machine learning. Combining a prediction model with machine learning correctly classified results for …


Gr-241 On Training Explainable Neurons, Lance Kennedy Dec 2022

Gr-241 On Training Explainable Neurons, Lance Kennedy

C-Day Computing Showcase

Neural networks have become increasingly powerful and commonplace tools for guiding decision-making. However, due to the black-box nature of many of these networks, it is often difficult to understand exactly what guides them to a certain prediction, making them dangerous to use for sensitive decision making, and making it difficult to ensure confidence in their output. For instance, a network which classifies images of dogs and cats may turn out to be flawed with little consequence, but a neural network that diagnoses the presence of diseases should be assured to make sound predictions. By understanding why a network makes the …


Gr-283 Chatbot, Vamsi Krishna Dhulipalla Dec 2022

Gr-283 Chatbot, Vamsi Krishna Dhulipalla

C-Day Computing Showcase

Mental health issue are the most common issue facing in human society. These issues are mostly in impact negatively on working peoples, on the individual, his/her family, workplace, community, and the economy. Our project is based on mental health chat bot of natural language processing with deep learning models .We have a structure data set of Mental Health. In the data set we have nine columns. We use neural networks to create our models .We use another method call scratch in which we create a model by our self and use it so our project we create a layer with …


Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee Dec 2022

Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee

C-Day Computing Showcase

Due to the advancements in technology, data is growing exponentially. With this increased dataset size, the computation to process the generated information is rising sequentially. And the currently available classical computational tools and learning algorithms will not work due to the limitations of Moore's law. To overcome the computational issues, we have to switch to Quantum Computing which works based on the laws of Quantum Mechanics. Quantum Machine Learning (QML), a subset of Quantum Computing, is faster and more capable of doing complex calculations that a classical computer can't. Classical Computers work on bits - 0 or 1, whereas a …


Gr-307 Eeg Classification Using Neural Network – An Application Of Machine Learning In Classification Of Attention Deficiency, To Measure The Effect Of Chakramarmakosha Meditation-Ii, Sreekanth Gopi Dec 2022

Gr-307 Eeg Classification Using Neural Network – An Application Of Machine Learning In Classification Of Attention Deficiency, To Measure The Effect Of Chakramarmakosha Meditation-Ii, Sreekanth Gopi

C-Day Computing Showcase

Stress reduces attention span and is a common problem that impacts students’ academic performance as well as their self-efficacy in handling challenging situations. Meditation techniques have been proven to help manage stress levels. In the previous research, the author used Heart Coherence as the metric to show the impact of ChakraMarmaKosha Meditation (CM), a meditation on human energy centers, on reducing the stress level. In this research we apply a new version of CM which is CM-II as a guided psychotherapy and cognitive therapy meditation, to analyze its impact on reducing attention deficiency among students. This study uses Electroencephalography (EEG) …


Uc-238 Sp4-Dogem, Chloe Chung, Zane Atkinson, Melissa Iniestra, Deo Intshakal A Nzeng, Joshua K. Willson Dec 2022

Uc-238 Sp4-Dogem, Chloe Chung, Zane Atkinson, Melissa Iniestra, Deo Intshakal A Nzeng, Joshua K. Willson

C-Day Computing Showcase

The DogEm project's overarching objective is to produce a functional cross-platform mobile app that reliably sends a specific contact a series of calls, emails, and texts until the contact responds. To accomplish this goal, we have compiled preliminary research, produced a series of prototypes, and started the development process. Our preliminary research consists of research pertaining to our tech stack, our user base, our app's requirements, possibilities for messaging and calling features, UX/UI research, reading through React Native documentation, and constraints on the messaging and calling features on iOS vs. Android. Each member produced a DogEm app prototype to familiarize …


Uc-296 Cybersecurity Park, Neil E. Weingarten, Jadante Hendrick, Kylie Nowokunski, Tyler Crawford Dec 2022

Uc-296 Cybersecurity Park, Neil E. Weingarten, Jadante Hendrick, Kylie Nowokunski, Tyler Crawford

C-Day Computing Showcase

Cybersecurity Park is an educational VR game intended for middle-school-age children that aims to demonstrate a wide range of cybersecurity concepts to the players. Such concepts include hacking ethics and types of hackers, cryptography, Trojan Horse / ransomware viruses, and authentication and authorization. These concepts are split into various mini-games that the player can freely navigate to from the hub they spawn in. For example, in the mini-game showcasing the Trojan Horse concept, players play as a knight defending a castle from evildoers. Visitors will approach the castle and ask access into the castle, and, based on the actions by …


Ur-285 Operation Enduring Freedom: Improving Mission Effectiveness By Identifying Trends In Successful Terrorism, Dalton A. Shaver Dec 2022

Ur-285 Operation Enduring Freedom: Improving Mission Effectiveness By Identifying Trends In Successful Terrorism, Dalton A. Shaver

C-Day Computing Showcase

This research examines how the characteristics of terrorist attacks predict the chance of an attack succeeding, where an attack is defined as successful if the intended attack type is carried out. Data was analyzed across three geographical missions within Operation Enduring Freedom: Trans-Sahara, Horn of Africa, and the Philippines. Using predicted probabilities of success obtained from logistic regression models, the medians were plotted to compare the characteristics of terrorist attacks across missions. By determining the specific features of attacks that produce the highest probabilities of success, the effectiveness of Operation Enduring Freedom can be improved by focusing counter-terrorism training and …