Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

48,097 Full-Text Articles 58,804 Authors 18,956,363 Downloads 350 Institutions

All Articles in Computer Sciences

Faceted Search

48,097 full-text articles. Page 4 of 1672.

Gc-258 Heart Disease Prediction Using Machine Learning, Devin Jackson, Richard Stupka, Trinadh Chigurupati, Demontae Moore 2022 Kennesaw State University

Gc-258 Heart Disease Prediction Using Machine Learning, Devin Jackson, Richard Stupka, Trinadh Chigurupati, Demontae Moore

C-Day Computing Showcase

Research has shown that the early detection of Heart Disease is critical to treating and understanding the causes. Through the use of advanced machine learning models and com- prehensive data sets collected on patients of varying backgrounds and health statuses, this research shows the listed correlations between attributes of data points and positive identification of the disease. This research uses 1026 unique records and 14 attributes including the classifier of Heart Disease. These attributes range from simple (cholesterol level) to more complex and subjective (chest pain type) but each attribute presents an opportunity to improve each of the analyzed models …


Uc-261 Grocery Application, Quin’dariu A. Lyles-Woods, Adam Maksymczuk, Aidan Le-Beard, Jeetu Sharma, Danny Sor 2022 Kennesaw State University

Uc-261 Grocery Application, Quin’Dariu A. Lyles-Woods, Adam Maksymczuk, Aidan Le-Beard, Jeetu Sharma, Danny Sor

C-Day Computing Showcase

This project is being completed for Kennesaw State University’s CS 4850 - Computer Science Senior Project undergraduate capstone course. This project as described is a dynamic grocery list mobile app that updates all members when items are added. The app then must contain groups that the user is able to join, have a list that is shared between that group, and have the ability for all users in the group to add and remove items from the list. To notify the users, push notifications are likely to be used. In addition to having a shared list, it makes sense that …


Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua 2022 Kennesaw State University

Gc-279 Geometry Matching Task For Improving The Cognitive Ability In Rehabilitation Process, Samuel Owoade, Ravi Teja Chamarthi, Jeevana Kalipindi, Ghislain Dongbou Temgoua

C-Day Computing Showcase

According to Taylor & Francis Group, LLC (2015), in the National Library of Medicine“Traumatic brain injury (TBI) impacts the lives of 1.5 to 2 million new individuals each year; 75,000 to 100,000 of these are classified as severe and will suffer enduring severe spasticity in addition to cognitive”. This game follows and respect basic and fundamental rules of brain and muscles recovery process and will help patients in their process of rehabilitation and by extension will improve their cognitive abilities.


Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga 2022 Kennesaw State University

Gc-312 Gtri It Service Desk System, Koranna Nwago, Venkata Emani, Venkata Naga Rishita Gopi, Bhavishya Chatrathi, Siphiwindoda Msimanga

C-Day Computing Showcase

This overarching project would be web development, which would entail coding both the back end and the front end. The use of libraries is encouraged, but we must be cautious about licensing and ensure that this project remains as open-source as possible (a good open-source license ensures people can use, modify, redistribute, and sell without worry). This is a free and open-source project.


Ur-269 Towards Bounding The Behavior Of Deep Neural Networks, Richard Borowski 2022 Kennesaw State University

Ur-269 Towards Bounding The Behavior Of Deep Neural Networks, Richard Borowski

C-Day Computing Showcase

Advances in Artificial Intelligence (AI), particularly in the form of deep neural networks, have revolutionized a diverse range of fields. As neural networks become more pervasive, the need to understand the boundaries of their behavior is becoming increasingly important. For example, can we formally guarantee that an autonomous vehicle will not violate traffic laws, such as reaching excessive speeds? Towards the goal of bounding the behavior of a neural network, we propose how to bound the behavior of individual neurons by incrementally tightening formal bounds on it. We further provide a case study on classifying handwritten digits to illustrate the …


Gr-307 Eeg Classification Using Neural Network – An Application Of Machine Learning In Classification Of Attention Deficiency, To Measure The Effect Of Chakramarmakosha Meditation-Ii, Sreekanth Gopi 2022 Kennesaw State University

Gr-307 Eeg Classification Using Neural Network – An Application Of Machine Learning In Classification Of Attention Deficiency, To Measure The Effect Of Chakramarmakosha Meditation-Ii, Sreekanth Gopi

C-Day Computing Showcase

Stress reduces attention span and is a common problem that impacts students’ academic performance as well as their self-efficacy in handling challenging situations. Meditation techniques have been proven to help manage stress levels. In the previous research, the author used Heart Coherence as the metric to show the impact of ChakraMarmaKosha Meditation (CM), a meditation on human energy centers, on reducing the stress level. In this research we apply a new version of CM which is CM-II as a guided psychotherapy and cognitive therapy meditation, to analyze its impact on reducing attention deficiency among students. This study uses Electroencephalography (EEG) …


Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee 2022 Kennesaw State University

Gr-288 Comparative Performance Analysis Of Hybrid Quantum Machine Learning Algorithm To Assess Post Stroke Rehabilitation Exercises, Manohar Murikipudi, Abm. Adnan Azmee

C-Day Computing Showcase

Due to the advancements in technology, data is growing exponentially. With this increased dataset size, the computation to process the generated information is rising sequentially. And the currently available classical computational tools and learning algorithms will not work due to the limitations of Moore's law. To overcome the computational issues, we have to switch to Quantum Computing which works based on the laws of Quantum Mechanics. Quantum Machine Learning (QML), a subset of Quantum Computing, is faster and more capable of doing complex calculations that a classical computer can't. Classical Computers work on bits - 0 or 1, whereas a …


Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton 2022 Kennesaw State University

Uc-247 Wild Fire: Friend Or Foe, Christian R. Henderson, Revian C. Jennings, Kwentin Shelton

C-Day Computing Showcase

The U.S. Army Corp of Engineers in Carters Lake required a game that attempts to educate on the principles of both prescribed and non-prescribed fires. They request that the game be playable on an android device housed in a HOLOFIL holographic display. Additionally, it needed to be created in the mirrored format as the projection flips everything. We decided to use Unity Real-Time Development Platform to complete the game’s development. Unity is a set of tools to give content creators an all-in-one development environment that helps content creators develop games and applications. “Unity is royalty-free and does not charge on …


Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota 2022 Kennesaw State University

Gc-308 Heart Disease Prediction And Analysis By Machine Learning, Venkata Sabarinath Nekkalapu, Venkata Anusha Yammada, Mrinal Kapoor, Sai Sindhu Ponugoti, Suman Pudota

C-Day Computing Showcase

The heart is the most crucial part of the Human body. The organ circulates blood out of the circulatory system’s blood vessels. Any disease or failure of this organ causes death. Heart disease is one of the primary sources of death in the cutting-edge world. There are 2,380 deaths from heart disease each day, based on 2018 data. Also, heart disease causes the highest number of deaths globally, with approximately 18 million people dying yearly, meaning around 31This prediction can be made using Machine Learning techniques. With machine learning. Combining a prediction model with machine learning correctly classified results for …


Gr-283 Chatbot, Vamsi Krishna Dhulipalla 2022 Kennesaw State University

Gr-283 Chatbot, Vamsi Krishna Dhulipalla

C-Day Computing Showcase

Mental health issue are the most common issue facing in human society. These issues are mostly in impact negatively on working peoples, on the individual, his/her family, workplace, community, and the economy. Our project is based on mental health chat bot of natural language processing with deep learning models .We have a structure data set of Mental Health. In the data set we have nine columns. We use neural networks to create our models .We use another method call scratch in which we create a model by our self and use it so our project we create a layer with …


Gr-287 Natural Disaster Prediction, Sravya Sabbu, Aishwarya Turlapati, SuryaPraveen Adivi 2022 Kennesaw State University

Gr-287 Natural Disaster Prediction, Sravya Sabbu, Aishwarya Turlapati, Suryapraveen Adivi

C-Day Computing Showcase

Natural disasters are events that are difficult to avoid. There are several ways of reducing the risks of natural disasters. One of them is implementing disaster reduction programs. There are already several developed countries that apply the concept of disaster reduction. In addition to disaster reduction programs, there are several ways to predict or reducing the risks using artificial intelligence technology. One of them is machine learning. By utilizing this method at the moment, it facilitates tasks in visualizing, analysing, and predicting natural disaster. This project will focus on conducting a review process and understanding the purpose of Machine learning …


Gr-300 Azure Security Kql Query Builder, Navyapravalika Sabbula, Jeevana Kalipindi 2022 Kennesaw State University

Gr-300 Azure Security Kql Query Builder, Navyapravalika Sabbula, Jeevana Kalipindi

C-Day Computing Showcase

We produce and manage petabytes of data every day in today's culture when everything is digitally recorded, from our web surfing habits to our medical records. Big data will significantly alter all facets of existence. However, simply processing and interpreting data is insufficient; when data is presented visually, the human brain can identify patterns more quickly. In many different businesses, data analytics and visualization are essential decision-making tools. The visualization field is also opened up, displaying innovative thinking for visualizing the big-data dilemma. It is challenging to see such massive volumes of data in static or real-time formats. we explain …


Uc-246 Spudify, Nathanial R. Bintliff, Jimmy V. Nguyen, Tyler Holmes, Alex M. Tawara, Addison Christian 2022 Kennesaw State University

Uc-246 Spudify, Nathanial R. Bintliff, Jimmy V. Nguyen, Tyler Holmes, Alex M. Tawara, Addison Christian

C-Day Computing Showcase

Spotify’s yearly wrapped report is extremely popular amongst its users. Unfortunately users must wait a year from every report to view statistics about their listening habits. Our app will allow users to generate reports displaying their top songs and artists whenever they want. Additionally, our app will allow users to generate recommendations for new music based on their favorite songs/artists. Users will also be able to generate advanced recommendations by inputting custom artists/genres/songs and customizing a variety of parameters such as the recommended song’s tempo, loudness, and danceability. Our app will give Spotify users the freedom to view statistics regarding …


Uc-262 Gtri: It Web Management Project, Scott Duong, Vanessa Sunar, Firmin Ngappi, Meva Schmit, Stephan Mah 2022 Kennesaw State University

Uc-262 Gtri: It Web Management Project, Scott Duong, Vanessa Sunar, Firmin Ngappi, Meva Schmit, Stephan Mah

C-Day Computing Showcase

This project is meant to develop a baseline web application that will support development of future tools for managing an IT department (licensing, asset tracking, budget management, self-service software/configuration, issue management/tickets, etc.) As well as provide a free IT Management tool that an IT manager can easily access and use.  Having an IT management tool to aid with different things such as tracking, budget management and more is very essential to efficiently run an IT department. There are various tools to assist with that which exist today. However, as pointed out by our client GTRI, a lot of them are …


Uc-263 It4983 Cybersecurity Capstone, Jordan White, Stephen C. Woodman, Jenny Owens, Hector Gomez, Aaron Scott 2022 Kennesaw State University

Uc-263 It4983 Cybersecurity Capstone, Jordan White, Stephen C. Woodman, Jenny Owens, Hector Gomez, Aaron Scott

C-Day Computing Showcase

For the Cybersecurity capstone project, our team was given a webserver and website for the company Akwaaba. We were tasked to fix all vulnerabilities, keep the server up to date, and help maintain the site with uptime being the priority. After the first two milestones were complete, we were to attempt to hack another team’s server while they attempted to do the same to us. When the attack phase began on Wednesday 10/26, our team discovered the other team had not changed any of their original passwords, so we took control within thirty minutes and took it down soon after. …


Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George 2022 Kennesaw State University

Uc-270 Red Pepper It: It Web Management Application And Content Management System, Eun Kim, Bukky Adekunle, Caitlin Washington, Neha Dedani, Ivana George

C-Day Computing Showcase

Red Pepper IT is an application developed for Georgia Tech Research Institute. The conception of this project arose from the lack of IT management tools that can address all the needs of an IT department. Furthermore, with the currently available tools, they are either poorly designed or have a high licensing cost. This project seeks to solve the need for such applications by building an open-source application that can be deployed internally by any business seeking a management tool for its IT department.


Uc-272 Defunct To Funct: Expanding The Functionality Of Forgotten Robots, Thomas E. Stockdale, Khoa Ho, Johnny Huynh, Marcel Youri Nguiagaing Seuga 2022 Kennesaw State University

Uc-272 Defunct To Funct: Expanding The Functionality Of Forgotten Robots, Thomas E. Stockdale, Khoa Ho, Johnny Huynh, Marcel Youri Nguiagaing Seuga

C-Day Computing Showcase

The field of robotics is an expanding landscape, pushing the frontiers of engineering, machine vision, artificial intelligence and more. The robotics industry also has a foothold in many areas, such as consumer markets, scientific research, industrial and medical applications, and even exploration. With the growing interest in automated machines, individuals who can work with these machines are in demand, and providing a way to learn the skills to do so would be just as valuable. Kennesaw State University is currently in possession of two UXA-90 Humanoid robots; both of which have remained in storage for extended periods of time since …


Uc-274 Restful Robots, Jack I. Young, Derek M. Comella, Sarah Thomas, Andrew Loveless 2022 Kennesaw State University

Uc-274 Restful Robots, Jack I. Young, Derek M. Comella, Sarah Thomas, Andrew Loveless

C-Day Computing Showcase

The UXA-90 Robots have been sitting idle at Kennesaw State University for years. The only documentation provided were factory manuals, and there was nothing additional found online. The first step was to conduct a risk assessment and report the results to Professor Perry and Dr. Pei. The objective of the risk assessment was to determine the viability of the robots and the feasibility of three different senior project teams using them for a project. Once the risk assessment was completed and reported it was determined that all three teams could proceed with their senior projects. However, it was recommended that …


Uc-275 Network Simulation Software Analysis Of Alternatives, Justin McCannon, Nidhi Marsonia, Michael McInnis, Tiffany Nguyen, Azm Uddin 2022 Kennesaw State University

Uc-275 Network Simulation Software Analysis Of Alternatives, Justin Mccannon, Nidhi Marsonia, Michael Mcinnis, Tiffany Nguyen, Azm Uddin

C-Day Computing Showcase

Data networking is a complex field. Designing networks is a complex task. Simulators have been developed to create hypothetical designs with configuration settings for evaluating architectures and settings. At least 2 simulators are freely available to IT professionals and students. This project involves researching the landscape of free network design simulators to determine how many there are, then downloading, testing, evaluating, and documenting the features of each by designing, on each, a network with multiple routers, switches, and host devices using IPv4 and IPv6, defining features appropriate for classroom use in a university, and finally determining which solution fits the …


Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson 2022 Kennesaw State University

Uc-278 Cyber Security In Blockchain, Eric C. Weese, Eric G. Cooper, Alex Fortson

C-Day Computing Showcase

Blockchain is a growing technology that utilizes a decentralized public record of transactions. It is not only used for cryptocurrency, but also IoT, financial systems, healthcare, supply chain, etc. Although blockchain is quite robust, it is not invulnerable. This project will explain and demonstrate several weaknesses of blockchain and how to prevent them. We will demonstrate the following attacks and how to prevent them using Solidity: Transaction Order Dependence, Denial of Service, Replay Attack, Writing of Arbitrary Storage Address Attack, Weak Randomness, and Honeypot Attack.


Digital Commons powered by bepress