Spring 2016 C-Day Program
April 26, 2016
Location: S1 Recreation and Wellness Center
|4:00 pm - 5:00 pm||Set-up (presenters only)|
|5:00 pm - 5:05 pm||Welcome from Dean Park and Introduction of Keynote Speaker|
|5:05 pm - 5:20 pm||
Keynote Speaker - Flavio Villanustra, LexisNexis
|5:20 pm - 5:30 pm||
Introduction of Judges by Dean Park
|5:30 pm - 6:45 pm|
|6:45 pm - 7:30 pm||
Refreshments and Browsing
|7:30 pm - 8:00 pm||
Presentation of Awards:
- Ray Albert - Consulting Systems Eng/Mgr, LexisNexis
- Paul Bartlett - GGDA Atlanta Chapter Co-President, Georgia Game Developer's Association
- Donny Bridgemohan - Senior Talent Acquisition Consultant , Fiserv
- Frank Cardillo - Application Lead, Georgia-Pacific
- Steve Cavanaugh - Director, Information Technology, Printpack, Inc.
- Keith Deininger - Sr Security Analyst , Independent contractor
- Sheryl Duggins - Professor, KSU, Department of Software Engineering and Game Design
- Chase Elliott - UITS - Infrastructure Support Services Engineer, Kennesaw State University
- Andrew Greenberg - Executive Director, GGDA/HDI
- Nathan Haas - Business Support Services Manager, Shaw Industries Group, Inc
- Sheila Haugen - IT Manager, Georgia-Pacific, LLC
- Wes Hogarth - Research Technologist & IT Manager, Georgia Tech Research Institute
- Michael Hug - Linux Systems Administrator, Staff, Fiserv.
- John Johnston - Senior Solutions Architect, ProArch - Microsoft
- Daniel Jones - Sr Systems Analyst, Georgia-Pacific LLC
- Zachary Kennel - Software Engineer, LexisNexis
- Dean Matthews - Director, Learning & Development, InComm
- Suneel Mendiratta - Vice President - Product Development, ADP
- Matt North - Security Engineer, FORTINET
- Michael Phillips - Director of Talent Acquisition, InComm
- Trevor Sands - Data Scientist
- Foster A. Scotland - IT Systems Support Professional V , Kennesaw State University
- Bruce Skillin - Mobile Lead - Consumer Products IT Innovation Team, Georgia-Pacific Consumer Products
- David Van Brackle - Senior Software Engineer
- Matthew Williams - Business Intelligence Developer, Georgia-Pacific
- Frank Ziller - CIO, Intelliteach
Capstone/ Undergraduate/Graduate Research scale 1 - 5 with 1 representing "Poor" and 5 representation "exceeds expectations"
- Presentation: visual and verbal (1-5)
- Methodology/Approach: All required elements are clearly visible, organized, and articulated (1-5)
- Significance of Contribution: This project adds to the field of study (1-5)
Games scale 0 - 10 with 0 representing "Poor" and 10 representation "Awesome"
- TECHNICAL: Technically sound with appropriate visual & audio fidelity(0-10)
- GAMEPLAY: Engaging & Fun, with an intuitive UI. Rules of play are clear. Includes a win/lose state(0-10)
- ORIGINALITY: Sound, Art, Design, or Code(0-10)
- GM-01 Apotheosis
by Joseph DuBois, Mike Grimshaw, Jake Howard
Department: SWECGDD Advisor: Allan FowlerGame
- GM-02 Horizon
by Jason Bourn , Jaylin Ferguson-Gillam
Department: SWECGDD Advisor: Allan Fowler
- GM-03 Lights Out
by Anthony Barrett , Brandon Seals
Department: SWECGDD Advisor: Allan Fowler
- GM-04 Open the gates
by Preston Waters
Department: SWECGDD Advisor: Allan Fowler
- GM-05 Patrons
by Anthony Barrett
Department: SWECGDD Advisor: Allan Fowler
- GM-06 Potion Panic
by Trevor Love
Department: SWECGDD Advisor: Allan Fowler
- GM-07 Slow Poke
by Michael Isaza
Department: SWECGDD Advisor: Allan Fowler
- GM-08 Playstation VR Project
by Jason Bourn , Robert Kowalchuk, Robert Jimenez, Kevin Friddle
Department: SWECGDD Advisor: Chao Mei
PSVR - PlayStation Virtual Reality is the latest VR device recently released by Sony. We built interactive games on PSVR, which will provide the players with fully immersive game experiences. The players will make real time strategies and use their body motions to play the game, which is pretty engaging. Please come and be the first group of players on the earth to experience a virtual environment built by CCSE students and generated with the top tier game console - PlayStation 4.
- GM-01 Apotheosis
Capstone Projects (29)
by Weston Ford, Derek Maier, David NelsonDepartment: CS Advisor: Amber WagnerThe Lambda-Machine platform is a distributed computing framework that is both easy to use and easy to deploy. The mission of this project is to create a tool that computer savvy individuals, such as systems administrators, would find effective, yet intuitive enough that researchers from other fields could harness its distributed computing capability. These are the driving principles behind the Lambda-Machine project. The Lambda-Machine describes a software mechanism for distributing scripts across nodes in a local area network or virtual private network. The script algorithm will be parallelized and concurrently computed by the nodes on the subnet. The platform features a web-based interface that will allow users to drag and drop scripts to be distributed across nodes within a subnet. The nodes that receive the script will begin executing the script as a local Linux process, all while sending their process information back to the user. This methodology will allow a user to control multiple computers from a central control point that is accessible from a web browser.
by Mayima Clark, Jacob Ertell, John EllisonDepartment: CS Advisor: Amber WagnerMany activation switches for accessible doors may be concealed, hard to reach, or found a far distance from the door. This is a complication that needs to be addressed, and we propose AccessibilityRF: a piece of hardware that allows users to operate accessibility doors remotely. Remote accessible door openers can be developed by reverse engineering radio frequencies activation switches use to open the door when pressed. Signals emitted from the activation switch will be recorded, demodulated, and stored to transmit whenever the developed device is used in front of the door in question. The device will increase accessibility for everyone with mobility impairments and provide a solution to a need that was not addressed previously. In addition to a remote door opener, a companion mobile application was developed to assist Kennesaw State University students in locating accessible doors to educational buildings efficiently on campus.
- CP-02 AccessibilityRF
by Alleyne, Kerwin Shaun , Barahona, Christian Alejandro , Seymour, Alan Garrett , Abdulhadi, Mulk , Guarnieri, Kyla MarieDepartment: IT Advisor: Jack Zheng, Mickey DesaiThe Atlanta Community ToolBank, a nonprofit organization, stewards an inventory of tools for lending to charitable organizations to increase the impact of their mission-related efforts in the community. Atlanta ToolBank is in need of a member-facing app (or mobile friendly web pages) to automate the tool-lending reservation and confirmation process.
- CP-03 Atlanta Toolbank Tool Reservation
by Jacob Davidson, Christopher Rene, Michael VanderbiltDepartment: CS Advisor: Amber WagnerAutoMD is an application, which is aimed at helping people determine what caused their car trouble. The application features a system, much like WebMD, which will use feedback from the user to diagnose potential solution to automotive breakdowns and general problems. Many times people have no idea what caused the vehicle breakdown and may or may not know what to do in these times. Our application provides a way for even the most inexperienced person to figure out what is wrong and what to do next when their car breaks down.
- CP-04 AutoMD
by Jonathan Gascoigne, Nathaniel Jean, Shelby SilcoxDepartment: CS Advisor: Amber WagnerWe present "Chocolate Soup: Quest for the Compiler," an educational video game geared toward middle school students to adult learners to teach basic programming skills. "Chocolate Soup: Quest for the Compiler" is an interactive, third person adventure game that is able to meet the educational needs of the student by providing multiple levels that reinforce the lessons taught from previous levels.
- CP-05 Chocolate Soup: Quest for the Compiler
by Bilal Abdullah, Eric Brovont, Samir Dave, Andrew WalkerDepartment: CS Advisor: Amber WagnerWe have created an automated course substitution management system to be used in higher education. Our system was designed to render course substitution paper forms obsolete. The current system in place at many universities, including Kennesaw State University, is one that requires a form to be filled out by hand and then submitted to a Program Coordinator and Department Chair for approval. There are some issues that can arise from this procedure. Many times forms get lost or are ineligible for submission. Our system is digitally accessible through an OWL Express type system. This makes it easier and more efficient as a process. The system automatically checks to see if the class the student wants to substitute is a valid substitution. A valid substitution entails that the student has taken the prerequisites and fulfills the requirements. If the student does not meet the requirements, our system will raise a red flag and display the reason(s). After the student fulfills the requirements, the student will submit the form, which then automatically goes to the advisor. After an advisor approves, it will then be sent to the Program Coordinator and Department Chair for the last approval.
- CP-06 Course Substitution Management System
by Nedko Nedev, Danette Sweat, Maria Vassileva, Mitchell VegaDepartment: CS Advisor: Amber WagnerThe Department of Instructional Technology at Kennesaw State University is conducting research, which requires analyzing curriculum standards from all over the world based on several criteria to determine a reliability score which can be used to assess one's own curriculum for improvements, or to compare with other curricula. To resolve this issue, we have created a web application with a SQL Server database that allows users to store curriculum information in a centralized location. The system allows multiple researchers to enter curriculum standards and evaluate them at the same time.
- CP-07 Curriculum Analysis
by Daniel, Timothy Scott , Griffin, Andrew John , Green, Caleb Reid, Kramer, Kristien T , Huff, Timothy DavidDepartment: IT Advisor: Zhigang Li, Jack ZhengThe Distance Learning Center provides faculty training programs for online faculty at KSU. One of the programs targets new hires. Often times, faculty members, especially part-time faculty members are hired right before the semester starts. While they are going through the HR process, they will need to access the training program to get familiarized with the learning environment and be ready to teach when the HR process is done. However, they will not be assigned with a KSU NetID and have access to various campus resources until the HR process is complete. Currently, the DLC uses D2L Brightspace to deliver its training programs. Due to limited access, the D2L system cannot be used in the situation stated above. Therefore, the DLC is looking for an alternative in addition to D2L to deliver its training programs. Being one of the most popular open-source learning management systems, Moodle is considered as the primary alternative. However, the DLC is open to other recommendations upon the research findings.
- CP-08 DLC training system
by Thompson Wiley, Noor Masood, Ethan Mitchell, Alvaro Ruiz, John TyburskiDepartment: SWE Advisor: Hassan PournaghshbandDAMP is a reddit bot designed to perform moderator tasks and automatically respond to posts and comments based on user specified keywords or phrases.
- CP-09 Domo Arigato, Mr. POSTbotto
by Daniel Heimann, Dylan VollrathDepartment: CS Advisor: Amber WagnerFrigID is an ingredient tracking and management tool that can be used to make informed decisions. FrigID will use your current inventory and ingredients that are no longer available to create shopping lists. Many people live busy lives and this can make it difficult for shoppers to keep track of which ingredients they currently have or what they need for the meal for which they are shopping. FrigID's implementation aims to solve both of these problems with one solution. By using an Android application with NFC enabled and a Raspberry Pi, we will be able to allow users to keep track of all of the ingredients in their refrigerator or pantry. FrigID will also be able to create personalized shopping lists based on the ingredients that are currently missing. Users will have to scan the ingredient's barcode as they add and remove items from their refrigerator or pantry. When the user wants to update their shopping list all they need to do is tap their NFC enabled Android device to their fridge or pantry. As an added enhancement, we will also enable our users to add all of their ingredients by taking a picture of their grocery receipt, this way shoppers will not have to worry about scanning individual items. Not only will FrigID include a grocery list, but a running list of what is still in stock in your refrigerator will also be available. Our goal is to be able to also have the ability to give users recommendations on recipes to cook using their current inventory.
- CP-10 FrigID
by Enrique PenalozaDepartment: CS Advisor: Amber WagnerWhile there are other apps that focus on what and where a person should go to eat, those apps still leave the user with the frustration of trying to make a decision that they eventually decide on the closest restaurant to avoid wasting more time. "You Pick" benefits the user by helping him or her speed up the decision-making process and shortening the "Pou pick! No, you pick" conversation.
- CP-11 You Pick!
by In Cho, Michael Clapper, Payne Patzke, James Pyle, Drake Rocker, Josh SaxtonDepartment: CS Advisor: Amber WagnerSince 1998, 690 children have died of heatstroke as a result of being left in a hot car, and many more children were injured. These deaths and injuries are completely preventable. There are many situations that may lead to a child being stuck in a hot car, and we are looking to combat those various situations. In order to accomplish this, we have designed a prototype of an inexpensively produced device in hopes of preventing future tragedies from occurring.
- CP-12 Heat Beep
by Musab Ahmed, Misti Watkins, Niles O'Keeffe, Jordan Woodman, Shravani YelakantiDepartment: SWE Advisor: Hassan PournaghshbandA system that automatically detects and responds to Reddit comments based on phrases defined and configured by the client.
- CP-13 K.R.A.B. (Keyword-Response Auto-Bot)
by Yeojin Kim, Jean-Jeacques Mutekeke, Nidhi Shah, Shiva Voruganti, Junan ZhaoDepartment: CS Advisor: Amber WagnerThe KSU Course Substitution Web System (CSWS) is a tool that streamlines the process of course substitution requests. The main goal of CSWS is to reduce the amount of paperwork required to approve a course substitution and generate output electronically. Our solution resolves the issues of the current system (i.e., performance, time, and flexibility) in an efficient way using web technologies incorporated with OWL Express.
- CP-14 KSU Course Substitution Web System
by Quyunh Dao Do, Josh Darby, Barry Oliver, Olutoni OluyideDepartment: CS Advisor: Amber WagnerIn today's day and age it can be difficult for professors to keep their work secure from students, while being able to share them with other professors in their department. Not only that, but it can be difficult for some of them to get accustomed to new systems, even to the extent that it isn't unheard of for professors to refuse making a Google account in order to access Google drive. While there are many file sharing software applications, there isn't utilized by Kennesaw State University for the purpose of sharing course materials. We plan to change this by introducing a system that can share documents from the department head to all the employees of the department, can allow professors teaching the same classes to compare lecture notes and other documents, as well as allows professors to leave notes or comments about certain documents in a type of discussion board area. All of this will only be
- CP-15 KSU File Transfer System
by Stephen Ajetomobi, David Guidry, Farid Khan, Daniel Louis, Rachael OkogieDepartment: CS Advisor: Amber WagnerOver the course of a college student's academic career, there are a myriad of extracurricular activities and events available for them to attend. These activities vary in nature and range from small-scale events such as a bible study attendance to large-scale events such as a college music festival. There is, however, an issue with choosing an event to attend if a student has multiple or no interests. Students that have no set event to attend become curious about how fun a particular event might be and this causes them to resort to the host's text description of the event, which provides little help. Other students are simply indecisive, and this indecisiveness varies depending on the student; however, from experience, we can infer that environmental and personal factors (e.g., increase in the volume of the student's academic work, an acquisition of a job to aid with school expenses, distance away from campus) play a significant role in their choice to stay in or go out. With an understanding of the factors that guide a student's decision to attend an event, we have come to the basic conclusion that their time is of value and their interest in attending a given event can be influenced if there were some way to relay the state of the event before the student steps foot at the event's location. This is the problem that our application attempts to solve, and our approach to addressing it revolves around providing a feed of videos that are pseudo real-time and that correspond to the events in which the student has a vested interest. The goal of this Android application is to increase the participation of students at an event by providing videos posted by other users at the event to those on the edge of attending.
- CP-16 Live Interactive Technology (L.I.T.)
by Marc Ducharme, Justin Fortin, Lawson WelbornDepartment: CS Advisor: Amber WagnerMelody Bank is an independent, downloadable application for Windows OS, which allows users to collaboratively identify and document recurring musical patterns found in songs. Our application provides an easy and fun way to track down frequently used patterns across unrelated pieces of music as well as to document known leitmotif (recurring musical themes intentionally used by a composer over the course of a sound track or album). As any user is able to report information (e.g., the song name, author, pattern time, and pattern relationship), our application can be considered a sort of Wikipedia for the niche purpose of recording these relationships.
- CP-17 Melody Bank
by Patel, Anish , Spradlin, Jeffrey Allen , Garcia, Mytee , Davis, Jared S , Goulart, Anne ElizabethDepartment: IT Advisor: Lei Li, Jack ZhengNew data management systems beyond SQL (NoSQL, or Not Only SQL) have been developed to handle semi-structure and unstructured data. They also post new security challenges that may be different from RDBMS. In this project, a team of students will investigate the security issues of MongoDB, and implement the security settings on an existing MongoDB database.
- CP-18 MongoDB Security
by Dan Bellamy, Ryan Coughlan, Scott Lewis, Steven Mints, Sara Rico-LarmerDepartment: IT Advisor: Hossain Shahriar, Jack ZhengWe set up a virtual machine with two different operating systems, such as Windows XP and Windows 7, and attacked the two systems using Metasploitable and Kali Linux. Additionally, we capture and log the files during the attacks using Wireshark and other log file processing tools.
- CP-19 Network Traffic Pattern Analysis Based on Armitage Exploits
by Zachery Cox, Kyle McLendon, Farah Obaidullah, Mohini PatelDepartment: CS Advisor: Amber WagnerCurrently, the way Student Engagement events are presented make it difficult for students and faculty to effectively attend and/or volunteer at the many events presented from the Department of Student Engagement at Kennesaw State University. To better organize the myriad of events, something similar to a Google Calendar app specifically tailored to Student Engagement events was created: Owlendar. All of the events can be seen in a way similar to a physical calendar that you would have on your wall. This calendar is accessible via an application for mobile devices. Using this application will allow students and faculty to see the current and future events, register for volunteer opportunities like blood drives, and a myriad of other events.
- CP-20 Owlendar
by Chris Deakin, Charles DriverDepartment: CS Advisor: Amber WagnerCurrently, the professors at Kennesaw State University do not have a centralized location where they can share and collaborate on course work. Our project is a secure system that allows professors to share their course materials with one another. This system will eliminate the need for professors to email their course materials or use portable storage in order to share them with other professors. Instead, this system will give professors a centralized location to keep any lecture materials that on which they wish to collaborate. Also, the system will provide version control to the documents, which will make it easier for course materials to be improved upon. Other features our system will offer include: browser interface, security, and a document viewer.
- CP-21 ProfShare
by Dan Aviles, Clinton Flowers, Justin Jennings, Jun NguyenDepartment: CS Advisor: Amber WagnerProject Tallulah engineered and refined a prototype of a combined communications platform, leveraging the capabilities afforded on technologies like low-cost Android tables in order to provide dedicated information dashboards and software-defined home automation in every room. The project involves mostly browser-based software configured to continuously run on various off-the-shelf hardware devices, with additional platform-specific code for room automation as necessary.
- CP-22 Project Tallulah
by Benhamin Cubitt, Steven Jolly, Jonathan ReaganDepartment: CS Advisor: Amber WagnerMajor VOIP programs have sat on either side of a fence: they either over allocate network resources, or is not an ad-hoc network. Our goal was to create a VOIP program that can provide a better service that is both an ad-hoc network and does not over allocate network resources. We utilize users' own machines to store their profiles and settings, the rooms are hosted by an individual user with host swapping when necessary, and it is a lightweight program that does not hinder processing. In order to provide a clear signal at all times, we have the program dynamically swap hosts to the host with the best connection. To minimize the effect of packet loss during switching, switching will only occur once the original host's connection drops below a certain threshold where quality is already an issue and swapping to a new host is a clear improvement.
- CP-23 Project Yodel
by Ousmane Kore, Fekadu Abebe, Dal Rai, Anil ThakuriDepartment: SWE Advisor: Hassan PournaghshbandThe Skype Bot application is built to automatically respond to a user inquiry. The Skype bot application shall be able to detect user comments and to respond back with the appropriate answer. Moreover it shall allow the administrator to configure the responses.
- CP-24 Skype Bot application
by Alyssa Cohen, Stanislav Kolev, James Patterson, Sharmell Smith, Steven St. AmandDepartment: CS Advisor: Amber WagnerOver the past years, technology users have constantly shared files and important data through the Internet with almost no acknowledgement of security of their information. This leaves their materials open to those who might use it incorrectly. With this in mind, team SSSAJ has developed an encrypted file sharing system. Our goal for this project was to closely look into methods for encryption along with analyzing algorithms that can help perform encryption and decryption in a reasonable set time.
- CP-25 SSSAJ
by Perrin, Jonathan Luke , Scent, Bailey Aaron , Chaney, Matthew Ryan , Elder, Jacob EdwardDepartment: IT Advisor: Jack ZhengThe Technology Association of Georgia is seeking proposals from qualified firms and/or Universities that are interested in preparing research data to be used to provide insight and trending information on Georgia's technology industry. The results should be accessible by TAG through some form of digital dashboard (example: http://tagstateoftheindustry.com/2016/key-findings/key-finding-1.html). We (KSU researchers) is preparing a proposal and need to investigate and recommend a data visualization and dashboard solution to TAG. The team is charged with research and implementation sample solutions and recommend one.
- CP-26 TAG Survey Report
by Jeswin Abraham, Alex Bates, Phillip Bouie, Naga GattupalliDepartment: CS Advisor: Amber WagnerMany current systems for monitoring parking space usage is very hardware heavy and often not worth the effort of setting up for smaller areas. Instead of tracking parking spaces with hardware in or around each lot, a camera can be used to track multiple spaces at once. This would allow for simpler setup and will assist in pointing out parking issues such as a full lot or long-term over/under use. To accomplish this, we used a deep learning framework to recognize the difference between a parked car and an empty parking space.
- CP-27 Using Deep Learning to Monitor Parking Spaces
by Amber Cunningham, Shannon Dye, Nick Fenton, Justen McLean, Charlotte NadaudDepartment: CS Advisor: Amber Wagner"VRoooom!" is a virtual reality kart racing game. It is designed to be played using the HTC Vive. Some of the game's features include four karts to choose from, each having different attributes and at least four computer controlled karts for the player to race against. There will be at least one playable environment (racetrack), and we will also incorporate at least five "powerups," which the player will be able to use against his/her opponents. "VRoooom!" was developed using the Unity Engine along with the Steam VR SDK for Unity.
- CP-28 VRoooom!
by Anderson, Philip Caleb , Brown, Ryan Daniel , McDonald, Logan M , Weinrich, Paul JDepartment: IT Advisor: Jack Zheng, Wes Hogarth (GTRI)The Georgia Tech Research Institute Electronic Systems Laboratory (GTRI-ELSYS) is an applied research organization that provides technical solutions to a variety of sponsors and supports about 450 researchers and staff. The computer support department develops, maintains, and supports the Information Technology (IT) systems used within GTRI-ELSYS, including servers, workstations, printers, networks, and storage devices. This department is largely responsible for ensuring researchers have the tools necessary to conduct their work. The computer support department currently uses Kayako's eSupport, version 3.70, a web application for submitting trouble tickets. The software uses PHP 5.2, MySQL 5.6, and IIS 7.5 to host the service. This version is rather outdated and Kayako has completely re-engineered their currently offered ticket software. GTRI-ELSYS would like to either get this system upgraded to the latest version Kayako provides or purchase a new system and migrate the tickets over. The tickets must be retained to meet purchasing and ISO 9001 requirements. The new system will need to support multiple departments for submitting both trouble tickets and purchasing requests.
- CP-29 GTRI ticket system
Undergraduate Research and HS (6)
by Virinchi PuligundlaDepartment: CS Advisor: Dr. Chih Cheng HungThe objective of this work is to design a convolutional neural network that will provide the Nao robot with image classification capabilities.
- UR-01HS Convolutional Neural Networks for Image Classification With the Nao Robot
by Armand MarinoDepartment: CS Advisor: Selena HeGame
- UR-02HS Picturade
by Nishant SethunathDepartment: CS Advisor: Dan LoThis project studies user influence, activity over time, and longevity of Twitter trends as characteristics of Twitter hashtags. The aim is to see if one or more of these variables is associated with Twitter hashtags.
- UR-03HS User Influence, Peak Activity Intervals, and Longevity as Characteristics of Twitter Hashtags
by Joel Kamdem TetoDepartment: CS Advisor: Dan LoThis study creates learning materials that allow students to avoid common security defects, to analyze the relationship between defensive programming and confidentiality, integrity and availability, and to write a secure program. Topics include defensive programming, Secure input validation and output handling, buffer overflow attack and prevention, vulnerabilities in mobile programming, access control and confidential information, mobile malware, restriction on access to components, and isolation of file system and database, injection and inclusion, accessibility and extensibility, mutability, and serialization and deserialization. Another focus in this study is to teach students to create a security-aware application, and tamper resistant software, in which obfuscation is commonly employed.
- UR-04 Defensive Programming
- UR-06 Hopper's Fables: A Mathematical Storytelling Adventure
by Zane JohnstonDepartment: CS Advisor: Amber WagnerGraphical user interfaces (GUIs) allow users to perform complex tasks through the manipulation of on screen graphical elements. However, the GUI's dependence on traditional inputs (e.g., mouse and keyboard) requiring a certain level of dexterity bars users with mobility impairments from using applications that make use of GUIs. One method for allowing users with mobility impairments to have access to more applications that utilize GUIs is to create a vocal user interface (VUI) mapped to the underlying GUI, allowing the user to perform actions normally achieved through physical input by using voice. Unfortunately, the process of mapping a VUI to a GUI is not always straightforward. In the case of the Myna VUI, which is mapped to the block-based language development environment Scratch, there are three problems in particular that have proven difficult: scaling up and down with different screen resolutions, handling scrollbars, and navigating through dialogs. My work presents general solutions to these three problems in addition to user study results.
- UR-07 One Size Doesn't Fit All
Graduate Research (20)
by Darren O'Neale, Jerome Lester, Devan PatelDepartment: CS Advisor: Rongkai GuoInitial research plan describing the use of software to enable visually impaired persons to become independent in dynamic, unknown environments. A 3D audio-driven UI demo will be showcased.
- GR-01 3D User Interfaces for the Visually Impaired
by Sarah TippensDepartment: CS Advisor: Selena HeWhen a student comes to class, they sit for an hour and a half, sometimes more, to listen to a professor lecture to the class. With this model of teaching, it is hard to keep student attention and therefore a student may not learn the material as well. This project will focus on an Internet of Things system that will be used in a Smart Classroom environment to gauge a student's attentiveness, boredom, and stress in real-time. The system is a student desk that has built-in sensors to gather a student's physiological responses such as body language, eye-tracking, body temperature, etc. The goal is to create a way for teachers to easily determine how attentive their student's are in class whether it is one student or the entire class. Data will be sent to a mobile application where a teacher will be alerted when students are not attentive in class. This should hopefully help teachers understand the classroom dynamic at any given point during a class. The poster for this project will represent the beginning stages of this research project from background research to a proposed system architecture and plan.
- GR-02 An Internet-of-Things based System to Measure Student Physiological Responses That Indicate Stress, Boredom, and Attention
by Nidhi PatelDepartment: CS Advisor: Selena HeAn IoT-integrated system to convert the handwritting on the traditional blackboard to electronic texts, and make them sharable among students
- GR-03 An Internet-of-Things based System to share lecture notes via clouds
by Mahbubul IslamDepartment: IT Advisor: Hossain Shahriar, Hisham HaddadThe objective of this work is to develop a biometric authentication system based on both iris detection and pupillary response (pupil light reflex).
- GR-04 Authentication Using Iris Detection and Pupillary Response
by Lili ZhangDepartment: Analytics and Data Science Advisor: Mingon KangThe project is to predict claims severity for the chance to be part of Allstate's efforts to ensure a worry-free customer experience.
- GR-05 Automatic system for predicting severity of claims in an insurance company
by Priyanga ChandrasekarDepartment: CS Advisor: Kai Qian
- GR-06 Data Preprocessing for Big Data Analysis
by Carlos Mora CepedaDepartment: CS Advisor: Dan LoAfter analyzing the advance of technology, it is clear that use of the Internet, computers, smart phones and tablets has become ubiquitous and therefore, the creation and proliferation of cyber threats and attacks has grown exponentially. Consequently, Anti-Virus companies and researchers have developed new approaches for dealing with discovering and classifying malware. Among these, machine learning and Big Data technologies have been used for feature extraction, detection, and clustering of cyber threats. In this paper, we created and analyzed a dataset of malware and clean files (goodware) from the static and dynamic features provided by the online framework VirusTotal. The purpose is to select the smallest number of features that keep the classification accuracy as high as possible given that the training execution time increase in polynomial time with respect to the number of features. In this research, we found that "9" features are enough to distinguish malware from "goodware" files within an accuracy of 99.60%. Selecting the most representative features for malware detection relies on the possibility of creating an embedded program that monitors the processes executed by the OS looking for the characteristics that match malware behavior. Thus, feature selection was made taking the most important features that keep the accuracy high and allows the creation of monitoring malware detection programs with a low overhead cost. In addition, classification algorithms such as Random Forest (RF), Support Vector Machine (SVM) and Neural Networks (NN) were used in a novel combination that not only showed an increase in accuracy, but also in the training speed from hours to just minutes.
- GR-07 Feature Selection and Improving Classification Performance for Malware Detection
by Dhiraj GharanaDepartment: Analytics and Data Science Advisor: Mingon KangTo estimate gender/age from facial images by using deep learning
- GR-08 Gender/Age classification from Facial Image using Deep Learning
by Linda VuDepartment: CS Advisor:This poster reports initial research plan on Learning Abstract Mathematical Concepts/Standards on Technology with Interactive Learning Platforms that are Accessible to Students with Low Social Economic Status Without the Use of Internet
- GR-09 Learning Abstract Mathematical Concepts/Standards on Technology with Interactive Learning Platforms that are Accessible to Students with Low Social Economic Status Without the Use of Internet
by Srivarna Settisara Janney, Ishraq KarimDepartment: CS Advisor: Dr. Chih Cheng HungHighway Safety assessment has traditionally been relied on historical crash data and/or field conflict studies. The objective of this research study is to automatically extract conflict event data from the field cameras on the fly. Those conflict events data can be used to proactively diagnose safety issues, and formulate and implement proper countermeasures in a timely manner. It is expected to considerably reduce the number of crashes that could have occurred otherwise.
- GR-10 Monitoring and Assessing Traffic Safety Using Live Video Images
by Wenchan JiangDepartment: CS Advisor: Ming Yang, Ying XieHigh Efficiency Video Coding (HEVC) is the latest video coding standard developed by Joint Collaborative Team on Video Coding (JCT-VC). HEVC can support up to 50% bit-rate reduction for equal perceptual video quality. Experiments will be carried out in order to determine coding performance with different size coding units. The initial results will be further optimized with neural network deep learning techniques.
- GR-11 Next Generation of High Efficiency Video Coding Optimization with Deep Learning
- GR-12 NoSQL Injection Security Analysis and Defense Solution
by Anil Kumar SreedharalaDepartment: IT Advisor: Ming YangThis project is focused on object recognition and tracking via template matching. We utilized the OpenCV library to implement template matching. We investigated various methods of object searching. Optimization has also been implemented to reduce searching time and improve the performance. This project is implemented with Visual C++.
- GR-13 Optimisation of object searching techniques using visual C++
by Jhu-Sin Luo, Michael KranzleinDepartment: CS Advisor: Dan LoRecently, convolutional neural networks (CNNs) have been successfully applied to deep learning applications such as image and video processing and speech recognition due to the technology advancements in both hardware (e.g. more powerful GPUs) and software (e.g. deep learning models, open-source frameworks and supporting libraries). The short training time and high accuracy of CNNs come from the high cost of power consumption with energy lost in a data center, which has been largely ignored in previous CNN design. It is highly desirable to design deep learning frameworks and algorithms that are both accurate and energy efficient with optimal power consumption. In this study, we conduct a comprehensive study on the power consumption and energy efficiency of numerous well-known CNNs and training frameworks on CPUs and GPUs, and we provide a detailed dynamic management of CPU and GPU frequencies to facilitate the design of energy efficient deep learning solutions.
- GR-14 Performance Analysis on Deep Machine Learning on CPUs and GPUs
by Elliott Billy SaintilDepartment: SWE Advisor: Mingon KangThe project is to predict the median home values by using linear and ridge regression
- GR-15 Prediction of the median home values of owner-occupied homes in $1000's
by Yan WangDepartment: Analytics and Data Science Advisor: Mingon KangSeismic hazard is the hardest detectable and predictable of natural hazards. I aim to identify the mechanism of seismic hazard and predict it.
- GR-16 Prediction of the seismic hazard
by Zahra AlqubaitiDepartment: IT Advisor: Lei LiThe thesis explore the relationship between users' security perceptions and their actual behavior on social networking sites. We propose that protection motevation theory (PMT) can be adapted to explain and predict social media users' behaviors that have security implications. A web-based survey will be used to measure users' security awareness on social networking sites and collect data on their actual behavior.
- GR-17 The Paradox of Social Media Security: Users' Perceptions versus Behavior
by Shashank HebbarDepartment: Analytics and Data Science Advisor: Mingon KangThe project is to identify the important factors that contribute to the high school graduation rate of students in the United States
- GR-18 What contribuite high school graduation rate in the United States?
by Tala Emami, Oscar GarciaDepartment: CS Advisor: Dr. Chih-Cheng Hung, Dr. Jidong Yang, Dr. Ying WangThe main aim of dimensionality reduction technique is to find a minimal subset of the original hyperspectral image data without losing their physical meaning.
- GR-19 Dimensionality Reduction Techniques for Hyperspectral Images
by Sparsha Pearl EdduDepartment: IT Advisor: Ms. Jie HaoPerform Sentiment Analysis and Text Mining on Twitter Data(using R programming language) especially to analyze the sentiments of Twitter users on the results of Election 2016.Sentiment analysis is widely used to track attitudes and feeling on web especially for measuring performance of products,services,brands etc.The purpose of Text mining is to handle unstructured information and perform various data mining algorithms.
- GR-20 Sentiment Analysis and Text Mining of Twitter Data using R
Internships and Student Organizations (12)
by Zahra AlqubaitiDepartment: MSIT Advisor: Dawn TatumInternship experience
- OTHER-01 Graduate Internship Experience
by Armughan QaziDepartment: MSCS Advisor: Dawn TatumInternship experience
- OTHER-02 Graduate Internship Experience
by Michael YamashitaDepartment: CS Advisor: Dawn TatumInternship experience
- OTHER-03 Undergraduate Internship Experience
by Isaac EfikDepartment: CS Advisor: Dawn TatumInternship experience
- OTHER-04 Undergraduate Internship Experience
by Srija KukkadapuDepartment: CS Advisor: Dawn TatumInternship experience
- OTHER-05 Undergraduate Internship Experience
by Lisian AjroniDepartment: SWE Advisor: Dawn TatumInternship experience
- OTHER-06 Undergraduate Internship Experience
by Ilyas KureDepartment: Engineering Advisor:Internship experience
- OTHER-07 Graduate Internship Experience
by Alex Veselinovic, Taylor Blasingame, Alex Federico, Chris Brutofsky, William ParishDepartment: CS Advisor: Sarah NorthAssociation for Computing Machinery Student Chapter Activities Presentation
- OTHER-08 ACM Student Organization Showcase
by AITP BoardDepartment: IT Advisor: Dawn TatumPresentation of Club
- OTHER-09 Club Activities
by 3C BoardDepartment: CCSE Advisor: Dawn TatumPresentation of Club
- OTHER-10 Club Activities
by Victor Sahin, Justin Voorhees, Sanjoosh Akkineni, Nick Pierre, Carlos MoraDepartment: CS Advisor: Sarah NorthIEEE Computer Society Student Chapter Activities Presentation
- OTHER-11 IEEE Computer Scoiety Student Organization Showcase
by OOODepartment: CCSE Advisor: Amber WagnerWomen in computing student organizations
- OTHER-12 Object-Oriented Owls