{"response":{"docs":[{"system_create_dtsi":"2020-06-22T19:26:08Z","system_modified_dtsi":"2020-07-10T14:53:41Z","has_model_ssim":["StudentWork"],"id":"qv33rz30g","accessControl_ssim":["226db53b-1789-498f-9c2a-266c8ae8826d"],"hasRelatedMediaFragment_ssim":["ng451j961"],"hasRelatedImage_ssim":["ng451j961"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Citrix Tactical Tool Belt - A Kroger Utility"],"date_uploaded_dtsi":"2020-06-22T19:26:08Z","date_modified_ssi":"Fri Jul 10 10:53:40 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Scott, Jim"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Ayers, Jeffrey","Hibbs, John","Burden, Erin"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["With over 250,000 unique logins per day, Kroger Citrix requires significant administrative resources. Ticket counts periodically exceed the capacity of the Kroger Support Center (KSC) - most issues are simple but have time consuming fixes. To reduce overhead, this team intends to implement a tool for KSC members that will streamline functions such as: (1) resetting Citrix users’ profiles, (2) verifying Citrix entitlements, and (3) viewing user Active Directory information. An additional goal is to enable KSC members to resolve an increased number of tickets without the need for escalation. This team predicts a recovery of approximately ten to fifteen minutes per incident, providing significant cost and time savings. Reduced overhead will allow more resources for investigating potential access violations and improving account controls."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/ng451j961?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["76537283z","ng451j961"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["76537283z","ng451j961"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CITRIX TACTICAL TOOL BELT A KROGER UTILITY","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/qv33rz30g"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124946171396096,"timestamp":"2021-04-15T16:34:32.896Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:22:53Z","system_modified_dtsi":"2020-07-10T14:53:44Z","has_model_ssim":["StudentWork"],"id":"3n204055w","accessControl_ssim":["797281b5-e48f-40c8-af7f-17a58d6f375e"],"hasRelatedMediaFragment_ssim":["47429b60c"],"hasRelatedImage_ssim":["47429b60c"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Hometown Bazaar"],"date_uploaded_dtsi":"2020-06-22T19:22:53Z","date_modified_ssi":"Fri Jul 10 10:53:42 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Meyer, Justin","Helton, Katya","Paul, Jason"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Since early 1800s, yard sales and sale types alike have been a great way to declutter your house, discover rare items, and find a good deal. According to the poll conducted by Statistic Brain Research Institute, the average number of self-arranged sales held weekly in the USA is 165,000. However, the method of advertising and promoting these sales has not kept up with modern technology. Introducing: Hometown Bazaar! This sophisticated, mobile-responsive web application allows buyers and sellers to take advantage of modern technology. It saves time and effort, maximizes profits while still promoting the small-town person-to-person interaction of personal item sales. Hometown Bazaar offers advanced search features and filtering, communication with the seller, customization, feedback options, and a community event organizational system. All of this is free of charge while providing functional performance, easy navigation and eye-appealing design, as well as ensuring high security of all transactions and personal information. "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/47429b60c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gf06g4259","47429b60c"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["gf06g4259","47429b60c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HOMETOWN BAZAAR","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/3n204055w"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124947580682240,"timestamp":"2021-04-15T16:34:34.240Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:21:22Z","system_modified_dtsi":"2020-07-10T14:53:46Z","has_model_ssim":["StudentWork"],"id":"b2773w96w","accessControl_ssim":["9a6ec8be-2694-43d0-a770-5699174e64f4"],"hasRelatedMediaFragment_ssim":["7m01bn02t"],"hasRelatedImage_ssim":["7m01bn02t"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["TagIT: The Checked Item Solution"],"date_uploaded_dtsi":"2020-06-22T19:21:22Z","date_modified_ssi":"Fri Jul 10 10:53:44 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Slusher, James","Westermeyer, Aaron","Santen, George"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Current claim-check technology relies on a numbered, two-part paper ticket. But, according to the New York Times, anywhere from 5 to 20 percent of patrons who check items, lose their tickets (Bruni, 2018). TagIT will replace these fragile paper tickets and streamline the item check-in process using common handheld devices and wireless access to cloud computing. With TagIT, an attendant will create a unique record for each patron, adding images of the checked items using a smartphone or tablet’s onboard camera. The attendant will select the item image and scan the storage bin Quick Response Code, or QR code, in which the item is stored. When all items have been imaged and added to the record, the patron will receive an E-mail with a Web link to the record. The images, QR codes, and bin identification are now part of the patron’s record and can be viewed and verified using the link. The link will also provide a means to request the return of the checked items. And if a patron forgets to retrieve an item, TagIT will provide the means to contact the patron with retrieval instructions.  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/7m01bn02t?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["hh63sx446","7m01bn02t"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["hh63sx446","7m01bn02t"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"TAGIT THE CHECKED ITEM SOLUTION","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/b2773w96w"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124946696732672,"timestamp":"2021-04-15T16:34:33.397Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:18:12Z","system_modified_dtsi":"2020-07-10T14:53:47Z","has_model_ssim":["StudentWork"],"id":"3j3333576","accessControl_ssim":["36695309-3747-4e2a-b71f-5e240ee4606d"],"hasRelatedMediaFragment_ssim":["j3860836f"],"hasRelatedImage_ssim":["j3860836f"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Phishing Audit System"],"date_uploaded_dtsi":"2020-06-22T19:18:12Z","date_modified_ssi":"Fri Jul 10 10:53:46 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Tyler"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Hampton, James","Combs, James","Stevens, Tyler","Woody, Joshua"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["The use of Phishing Audit System has the potential to train and educate organizations and their employees to be more proactive when dealing with phishing emails. Phishing is the leading cause of cyber-attacks around the world and is increasing each year. Phishing comes in the form of an email that is made to look like it’s coming from a trusted source but contains malware or takes you to an illegitimate website to steal personal information. Our solution to reduce the number of attacks is to create the Phishing Audit System. This system creates a customized, scheduled, and automated phishing simulation. This allows you to track the progress of users understanding and interacting with phishing emails. Additionally, this system provides users with the necessary training material to identify the phishing attacks."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/j3860836f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["9p290b694","j3860836f"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["9p290b694","j3860836f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PHISHING AUDIT SYSTEM","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/3j3333576"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124949869723648,"timestamp":"2021-04-15T16:34:36.423Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:11:00Z","system_modified_dtsi":"2020-07-10T14:53:49Z","has_model_ssim":["StudentWork"],"id":"44558f893","accessControl_ssim":["886d59f0-d81b-4398-beb0-801ca1dc50f9"],"hasRelatedMediaFragment_ssim":["4b29b750n"],"hasRelatedImage_ssim":["4b29b750n"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Employees Becoming Neighbors"],"date_uploaded_dtsi":"2020-06-22T19:10:59Z","date_modified_ssi":"Fri Jul 10 10:53:48 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Johnson,Micah","Goodwin, Zach","Allen, James"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Fortune 500 companies need a simple, single solution to help them track their progress towards their Social Responsibility goals.  To make the social responsibility value come to life, companies allow their employees to take paid time off to volunteer. Companies also sponsor community outreach events via employee-led Business Resource Groups (BRGs).  Today, most companies don’t have a single solution or single source of truth that tracks where the company’s money or employee volunteer time is going.  To solve that problem, our team created Employees Becoming Neighbors.  Our product is a “one-stop shop” for companies to track their employees’ paid volunteer time off and give their BRGs a tool to manage their community events.  Our product also gives company Executives one place to run reports to see how their company is meeting their goals.  We are doing this because we wanted to make a product that meets a real-world need and applies to the private sector. "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/4b29b750n?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["2227mq97x","4b29b750n"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["2227mq97x","4b29b750n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"EMPLOYEES BECOMING NEIGHBORS","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/44558f893"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124948065124352,"timestamp":"2021-04-15T16:34:34.702Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:06:43Z","system_modified_dtsi":"2020-07-10T14:53:51Z","has_model_ssim":["StudentWork"],"id":"z603qz98k","accessControl_ssim":["7f1e1cec-fdb4-497a-9c94-ba40f0f5d31d"],"hasRelatedMediaFragment_ssim":["ft848r88j"],"hasRelatedImage_ssim":["ft848r88j"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Campus Connect"],"date_uploaded_dtsi":"2020-06-22T19:06:43Z","date_modified_ssi":"Fri Jul 10 10:53:50 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Sinha. Nikhil","Polen, Harry"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Within the past five years, The University of Cincinnati hasn’t had a consistent Campus Link solution for managing student groups, none of which have had a mobile solution. The current University solution does not reach the expectations of students and organization leaders. Campus Connect provides an active and intuitive user experience with both web and mobile. The project aims on giving the users an all in one solution that allows them to actively see posts and meetings from the clubs or organizations they have joined through the application. Campus Connect will consist of a series of features that allow the user to search and join organizations of their choice. Organizations create and edit posts as well as their own personal organizational pages. Campus Connect allows for an easy communication between students and organizations."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/ft848r88j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ft848r88j","mg74qn67s"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["ft848r88j","mg74qn67s"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CAMPUS CONNECT","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/z603qz98k"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124952193368064,"timestamp":"2021-04-15T16:34:38.639Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:04:18Z","system_modified_dtsi":"2020-07-10T14:53:53Z","has_model_ssim":["StudentWork"],"id":"5138jg06z","accessControl_ssim":["abaedcbc-ffb7-4a2a-bcc8-befbc89ae6d9"],"hasRelatedMediaFragment_ssim":["jw827c95g"],"hasRelatedImage_ssim":["jw827c95g"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["SPCA Mobile App"],"date_uploaded_dtsi":"2020-06-22T19:04:17Z","date_modified_ssi":"Fri Jul 10 10:53:52 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abou"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["CECH Library"],"creator_tesim":["Bitter, Alex","Library Service, CECH","Buka, Randall","O'Leary, Connor"],"description_tesim":["85% of dogs in the local Society for the Prevention of Cruelty to Animals (SPCA) shelters are pit bulls or a pit bull mix and at any given time, all dog cages are filled with 2-3 dogs per cage. 100-150 animals, including cats and exotic pets, are adopted from these shelters weekly. We chose to do this project because one of us is a regular volunteer for the shelters as a dog walker. He sees many animals that don’t deserve to be locked up in cages and wanted to help adoptees find the perfect animal for them. The SPCA Mobile App, built with React Native and Java as its core technologies, is the solution to this problem. This app lists all adoptable pets from the convenience of a smart phone along with animal care information. The Find-A-Friend Score will assist in matching adoptees with an adoptable pet using an algorithm based on key animal traits. Animal Socialization Calendar and a dog distraction system will give volunteers at the shelters an easier time taking care of the animals. This app’s goal is to empty out all the cages and ensure that no animal is deprived of a loving home."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/jw827c95g?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["fn1070380","jw827c95g"],"file_set_ids_ssim":["fn1070380","jw827c95g"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SPCA MOBILE APP","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["5138jg06z"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697101828831838208,"timestamp":"2021-04-15T10:27:06.483Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T19:00:25Z","system_modified_dtsi":"2020-07-10T14:53:55Z","has_model_ssim":["StudentWork"],"id":"cc08hh03r","accessControl_ssim":["b1cb8135-c73e-4bbe-bbef-d9085b6edd4c"],"hasRelatedMediaFragment_ssim":["w3763828h"],"hasRelatedImage_ssim":["w3763828h"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Metaforge"],"date_uploaded_dtsi":"2020-06-22T19:00:24Z","date_modified_ssi":"Fri Jul 10 10:53:53 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Tyler"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Mockbee, Collin","Morris, Christopher"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Information about data ‒ known as Metadata, has the potential to provide a vast range of knowledge about data or a target in question. Metadata can provide information including the creation date, geolocation, software used to create the file and more ‒ which can be useful for many users in the information security field. We created Metaforge to fill the gap in the information gathering arsenal to provide the user with a clean and efficient program. The application includes a simple GUI that creates a dynamic HTML report with multiple pages that displays raw and filtered metadata and a useful statistics page. Current existing metadata tools are outdated and unmaintained which results in a difficult user experience. The capabilities Metaforge includes are detailed metadata analysis, a practical report, and efficient functionality with the final outcome of a positive user experience."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/downloads/w3763828h?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["w3763828h","7p88ch821"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["w3763828h","7p88ch821"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"METAFORGE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/cc08hh03r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124957029400576,"timestamp":"2021-04-15T16:34:43.251Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:57:00Z","system_modified_dtsi":"2020-07-10T14:53:56Z","has_model_ssim":["StudentWork"],"id":"mp48sf11p","accessControl_ssim":["5d32ba23-ffaa-490e-a1bd-30dc20b11d91"],"hasRelatedMediaFragment_ssim":["r494vm45w"],"hasRelatedImage_ssim":["r494vm45w"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["20SGX - Spam Detection over Encrypted Emails"],"date_uploaded_dtsi":"2020-06-22T18:57:00Z","date_modified_ssi":"Fri Jul 10 10:53:55 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bodgan","Wang, Boyang"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Efford, Reid","Welly, Jacob","Ciepichal, Brian"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Spam Detection over Encrypted Emails with Intel SGX Emails play a pivotal role in business and everyday communication. There are millions of email messages being sent each day that contain incredibly sensitive information. This sensitive data can be easily parsed by passive attackers on an email server. Leveraging Intel’s SGX we can mitigate this problem by using enclaves. These are private regions of memory that are protected from processes running at higher privilege levels. Decrypting emails using SGX on an Encrypted mail server makes it much more difficult for passive attackers to get any useful data. On top of that this solution takes into account that sender reputation filters are not very effective since it is quite easy for an email address to be compromised. Decrypting emails via Intel SGX improves the general security of Emails on servers where it is running."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/r494vm45w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ft848r878","r494vm45w"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["ft848r878","r494vm45w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000020SGX SPAM DETECTION OVER ENCRYPTED EMAILS","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/mp48sf11p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124951472996352,"timestamp":"2021-04-15T16:34:37.952Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:48:56Z","system_modified_dtsi":"2020-07-10T14:53:58Z","has_model_ssim":["StudentWork"],"id":"ht24wm136","accessControl_ssim":["ee0333c5-2fcb-4b7c-a7ec-83ae5d0a95ac"],"hasRelatedMediaFragment_ssim":["h702q767q"],"hasRelatedImage_ssim":["h702q767q"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Maneuvr VR"],"date_uploaded_dtsi":"2020-06-22T18:48:56Z","date_modified_ssi":"Fri Jul 10 10:53:57 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Seifker, Brandon","Powell, Caleb","Le, Jason"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["The training that is required in the manufacturing industry is costly and dangerous. When a new employee is hired, a senior, more experienced employee must take time to train them. This leads to slower production and an increased cost in labor. There are also significant risks when the new employee is interacting with heavy machinery. The new employee does not likely have the knowledge of how to use the machinery and is at a higher risk of injuring themselves or others. Maneuvr VR is a VR solution that solves these problems. It’s simulation can supplement job training in a way that other mediums cannot. This allows for the more skilled employees to spend more time in the production environment and reduces the risk compared to traditional training. The environment will feel familiar to the new employee and will result in a higher level of professional confidence."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/downloads/h702q767q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["df65v948z","h702q767q"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["df65v948z","h702q767q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MANEUVR VR","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/ht24wm136"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124956498821120,"timestamp":"2021-04-15T16:34:42.745Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4797,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":979,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":666,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1951,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12573,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":181,"next_page":182,"prev_page":180,"total_pages":1275,"limit_value":10,"offset_value":1800,"total_count":12744,"first_page?":false,"last_page?":false}}}