{"response":{"docs":[{"system_create_dtsi":"2020-06-22T18:47:22Z","system_modified_dtsi":"2020-07-10T14:54:00Z","has_model_ssim":["StudentWork"],"id":"xk81jm78f","accessControl_ssim":["7484f8da-0989-4bb9-8414-8a2de6cf420b"],"hasRelatedMediaFragment_ssim":["41687j75h"],"hasRelatedImage_ssim":["41687j75h"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Vigil - Security Console and Network Scanner"],"date_uploaded_dtsi":"2020-06-22T18:47:21Z","date_modified_ssi":"Fri Jul 10 10:53:59 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Tyler"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Jones, Maurice","Cooley, Matthew","Vaive, Austin"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to mediapost.com, the average American will own 13 internet connected devices by 20211. That means a family of 4 will have close to 50 devices connected to their home network. In the current climate of large-scale vulnerabilities, ransomware, and other digital threats, how can we protect our devices, and those of their family members, when we may not even know exactly what is connected to our network? Vigil is a home network sentry that constantly monitors and scans every device connected to your wireless network and sends an alert when it detects an outdated or vulnerable device and when a new, unrecognized device connects to the network. Vigil allows its users complete transparency into the devices on their network, and also offers easy to understand, actionable information to non-technical users. This paper summarizes the process and technical details for the development of Vigil and its real-world usage data"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/downloads/41687j75h?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["41687j75h","8k71nj51c"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["41687j75h","8k71nj51c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIGIL SECURITY CONSOLE AND NETWORK SCANNER","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/xk81jm78f"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124955490091008,"timestamp":"2021-04-15T16:34:41.783Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:42:30Z","system_modified_dtsi":"2020-07-10T14:54:02Z","has_model_ssim":["StudentWork"],"id":"pn89d800s","accessControl_ssim":["81b57ba3-4f0f-497f-9e68-081d917a452b"],"hasRelatedMediaFragment_ssim":["qz20st917"],"hasRelatedImage_ssim":["qz20st917"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Iris - Mobile Application for the Blind"],"date_uploaded_dtsi":"2020-06-22T18:42:29Z","date_modified_ssi":"Fri Jul 10 10:54:01 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Guckenberger, Tristan","Anderson, William"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to the International Agency for the Prevention of Blindness, an estimated 36 \r\nmillion people are blind and an additional 217 million have moderate to severe visual \r\nimpairment. This means that a total of 253 million individuals must rely on their four \r\navailable senses, primarily touch, in order to perceive their surroundings. One major \r\nlimitation of this is that the individual must be within arm’s reach (or cane’s reach) in order \r\nto determine what is in front of them. Iris changes this by providing a mobile application with \r\na voice-controlled user interface to improve environmental awareness for the blind. With \r\nIris, users are able to take a picture and have the application describe it to them with \r\nadditional information on specific entities within the picture if requested. Through \r\naccessibility features and the power of machine learning, Iris is an extension to the user’s \r\nsenses."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/qz20st917?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["qz20st917","cf95jd047"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["qz20st917","cf95jd047"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IRIS MOBILE APPLICATION FOR THE BLIND","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/pn89d800s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124953188466688,"timestamp":"2021-04-15T16:34:39.588Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:40:12Z","system_modified_dtsi":"2020-07-10T14:54:03Z","has_model_ssim":["StudentWork"],"id":"w37638277","accessControl_ssim":["7a756346-1fb0-4eb8-8ed0-74a1c6151f26"],"hasRelatedMediaFragment_ssim":["cr56n2369"],"hasRelatedImage_ssim":["cr56n2369"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Cyber Range SCADA Scenario"],"date_uploaded_dtsi":"2020-06-22T18:40:11Z","date_modified_ssi":"Fri Jul 10 10:54:02 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Lindquist, Chase","Alghalayani, Feras","Barton, Nate"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Critical infrastructure are the systems deemed necessary to live with our current modern standards. These systems require a combination of support systems and SCADA systems that control the machinery to provide us our essentials we take for granted such as power and water. Qualified cybersecurity professionals are becoming increasingly more difficult to find to defend these networks. We created a learning tool to help facilitate college student’s knowledge of defending critical infrastructure, and as we know, the best way to defend is to learn how the attacker will think. This tool consists of a series of virtual machines within two sub scenarios, a water treatment plant and a power plant. Students will be able to conduct penetration tests of these in a simulated environment in order to learn more about critical infrastructure and how to defend it. "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/cr56n2369?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["cr56n2369","v118rf85x"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["cr56n2369","v118rf85x"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CYBER RANGE SCADA SCENARIO","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/w37638277"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124954651230208,"timestamp":"2021-04-15T16:34:40.983Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:32:52Z","system_modified_dtsi":"2020-07-10T14:54:05Z","has_model_ssim":["StudentWork"],"id":"6t053h162","accessControl_ssim":["317a8022-ec90-4712-b226-6d9ca6393f58"],"hasRelatedMediaFragment_ssim":["c821gm283"],"hasRelatedImage_ssim":["c821gm283"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Thunder Cloud"],"date_uploaded_dtsi":"2020-06-22T18:32:52Z","date_modified_ssi":"Fri Jul 10 10:54:04 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Varker, Cameron","Sherman, Alexious","Ward, Sean"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Amazon Web Services (AWS) and Microsoft Azure are the two leading cloud solution services in a market worth $18.2 billion in 2016, and it is expected to worth $40 billion by the end of 2018. Microsoft’s Azure market share has grown from 8.7% in 2016 to 29.4% in 2018 thanks, in large part, to their cloud-first strategy in recent years. Many enterprises have been left cloudlocked, leaving them stuck working with either AWS or Azure due to budget and time restrictions, while some larger enterprises utilize both AWS and Azure. Being able to securely and cheaply switch between cloud services today will save companies time and money, as well as keep their options open if one works better for them than the other. Thunder Cloud will help solve this cloud lock issue between AWS and Azure for companies by taking data from one service, converting it the format of the other, and then uploading it to that platform"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/c821gm283?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["b2773w95m","c821gm283"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["b2773w95m","c821gm283"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"THUNDER CLOUD","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/6t053h162"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124953784057856,"timestamp":"2021-04-15T16:34:40.156Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:26:26Z","system_modified_dtsi":"2020-07-10T14:54:07Z","has_model_ssim":["StudentWork"],"id":"gt54kp68x","accessControl_ssim":["c0006b0e-3c16-4792-b257-0bc8807dd0c4"],"hasRelatedMediaFragment_ssim":["d504rm92j"],"hasRelatedImage_ssim":["d504rm92j"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["OneFit Fitness App Report"],"date_uploaded_dtsi":"2020-06-22T18:26:26Z","date_modified_ssi":"Fri Jul 10 10:54:06 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Lim, Ivan","Lieser, Anthony","Bertke, Michael","Hardwick, Adele"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to the CDC, the prevalence of obesity was 39.8% and affected about 93.3 million of US adults in 2015-2016. Our team wants to make an impact and tackle this obesity epidemic in America. Our fitness application, OneFit, will take one stride closer to finding a solution. Our objective with this application is to create an application that consolidates all health tools into one resource while providing an accessible and engaging user experience for all ages. Our team will use critical fitness data analysis and provide thorough measurable results for our end users. We will utilize custom planning, personalized work out strategy, and overall health monitoring technology to critique a wholesome health plan for each person. This application will create a fitness network to connect and build a more collaborative workout environment. We envision that this application will inspire people and progress society overall towards a healthier lifestyle."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/d504rm92j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["d504rm92j","1z40kv20z"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["d504rm92j","1z40kv20z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ONEFIT FITNESS APP REPORT","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/gt54kp68x"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124952718704640,"timestamp":"2021-04-15T16:34:39.140Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:24:09Z","system_modified_dtsi":"2020-07-10T14:54:09Z","has_model_ssim":["StudentWork"],"id":"x920fz40r","accessControl_ssim":["16de8584-4105-4fce-8fc9-7eab820ff574"],"hasRelatedMediaFragment_ssim":["td96k411p"],"hasRelatedImage_ssim":["td96k411p"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["URide"],"date_uploaded_dtsi":"2020-06-22T18:24:09Z","date_modified_ssi":"Fri Jul 10 10:54:08 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Dhital, Robin","Majid, Abdul"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Carpooling is the sharing of car journeys so that more than one person can travel in the same car. Due to the increase in population and the rapid increase in urbanization, there are many problems in transportation. This tends to problems like an increase in the number of vehicles on the road, traffic, pollution, parking problems, and stress. To overcome these hurdles, we developed “Uride” a web-based car sharing application that will allow travelers to post and search if vehicles are available for carpool in their desired path. Uride is an alternative to existing services that aims to connect travelers in order to share transportation costs and reduce stress on their next scheduled trip. This will enable people using this application to share their everyday expenditure on traveling, not worry about hiring a cab."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/td96k411p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["td96k411p","v118rf84n"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["td96k411p","v118rf84n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"URIDE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/x920fz40r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124958218485760,"timestamp":"2021-04-15T16:34:44.384Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:20:47Z","system_modified_dtsi":"2020-07-10T14:54:11Z","has_model_ssim":["StudentWork"],"id":"qv33rz29q","accessControl_ssim":["bbde9dcc-0189-4cfd-bd90-9220185afa6a"],"hasRelatedMediaFragment_ssim":["pc289k47q"],"hasRelatedImage_ssim":["pc289k47q"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Dock Talk"],"date_uploaded_dtsi":"2020-06-22T18:20:46Z","date_modified_ssi":"Fri Jul 10 10:54:10 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bo"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Miller, Kyle","Jones, Tyler","Dhital, Tek"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Today we constantly use our phones to act as another form of verification. Unfortunately, this requires us to jump from device to device to prove that we have our phones. Dock Talk is a product that will communicate authentication codes, so the end user does not have to. This way, a user can set their phone down to charge and not have to worry about pesky authentication codes. By using NFC technology our dock will be able to receive authentication codes from the phone. If you are traveling and did not bring your dock with you, you will still be able to use old verification methods."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/pc289k47q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["fj236347q","pc289k47q"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["fj236347q","pc289k47q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DOCK TALK","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/qv33rz29q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124958816174080,"timestamp":"2021-04-15T16:34:44.955Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T18:15:22Z","system_modified_dtsi":"2020-07-10T14:54:13Z","has_model_ssim":["StudentWork"],"id":"pr76f503v","accessControl_ssim":["ec8fb04e-f7e4-4036-a880-9d93138ebc65"],"hasRelatedMediaFragment_ssim":["p8418p72j"],"hasRelatedImage_ssim":["p8418p72j"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["CareLine"],"date_uploaded_dtsi":"2020-06-22T18:15:22Z","date_modified_ssi":"Fri Jul 10 10:54:11 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Souders,Garrett","Thomas, Jeremy","Moore, Merideth"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["If a relative were placed in a long-term healthcare facility tomorrow, we would all love to be able to communicate frequently with them over the web, wouldn’t we? In many places, we simply cannot. According to the Centers for Disease Control and Prevention (CDC), over eight million people receive some form of long-term care annually. Whether at a nursing home, adult service center, or mental health institution, long-term care has great importance in our society. Yet these facilities mostly operate using dated technology and software. We built CareLine to bridge that communication gap between families, patients, and caretakers. CareLine provides an innovative solution that features a mobile friendly site, built-in office appointment-making, text and video chat, and email notifications with automated updates as a means to ease the anxiety that comes with long-term care. CareLine is a sleek and modern web application that features a built-in calendar for office appointments, text and video chat, and email notifications with automated\r\nupdates. It has a TypeScript front end with a NodeJS and Fastify back end and a Microsoft SQL Server database. Our app is HIPAA compliant and secured with modern authentication tools. CareLine is designed to increase the amount of communication between not only the family and their relatives in long-term care situations, but also the family and the facility's caretakers. There is a myriad of concerns that come along with these scenarios, which our app aims to ease. While we do not provide the care ourselves, we offer a platform to give families a direct line. CareLine is your line to care, right away"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/p8418p72j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p8418p72j","cf95jd05h","76537282p","5138jg077"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["p8418p72j","cf95jd05h","76537282p","5138jg077"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CARELINE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/pr76f503v"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124957605068800,"timestamp":"2021-04-15T16:34:43.799Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T20:43:53Z","system_modified_dtsi":"2020-10-07T21:38:56Z","has_model_ssim":["StudentWork"],"id":"7m01bn01j","accessControl_ssim":["addc7a12-d9b1-4b5c-9c57-8d63c8e81b90"],"hasRelatedMediaFragment_ssim":["qf85nc779"],"hasRelatedImage_ssim":["qf85nc779"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Interdisciplinary Capstone: Bringing Dialogue in the Dark to Cincinnati"],"date_uploaded_dtsi":"2020-06-18T20:43:53Z","date_modified_dtsi":"2020-10-07T21:38:53Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/ygp7-wf27"],"alternate_title_tesim":["Dialogue in the Dark, Theory of Grand Irrationality, and Social Pulse Theory"],"geo_subject_tesim":["Earth","Global","Cincinnati, Ohio"],"advisor_tesim":["Sanders, Rebecca","Ris, Cynthia"],"degree_tesim":["BIS (Bachelor of Interdisciplinary Studies)"],"college_tesim":["Arts and Sciences"],"department_tesim":["Bachelor of Interdisciplinary Studies"],"genre_tesim":["Document"],"note_tesim":["The first half of this work is a report on my capstone project. The latter half of this work contains a rushed and imperfect attempt to distill frameworks, theories, and thoughts I developed in the course of my undergraduate program, and which I did and do intend to formalize as a book at some point in my career. Shortly after submitting my capstone, I realized I had made some errors in trying to communicate my ideas in the latter half, and in my private documents I wrote notes concerning these. \r\nIn this sense, this uploaded document is not the best representation of what I thought or was/am attempting to say, but I felt it is still worth formally documenting the existence of, and may even be of interest to some."],"creator_tesim":["Turner, Grant"],"publisher_tesim":["Grant W. Turner"],"subject_tesim":["Social Change","Social Psychology","Interdisciplinary","Ontology","Action Research","Peace and Conflict Studies","Philosophy","Education","Sociology","Ethics and Morality","Visual Anthropology","Development","Axiology","Organizational Psychology","Epistemology","Metaphysics"],"language_tesim":["English"],"description_tesim":["      The purpose of this capstone was to organize and pursue the creation of a Dialogue in the Dark exhibition in Cincinnati. Dialogue in the Dark is an organization that, since 1988, has internationally utilized exhibits that allow visitors to be led through an hour long simulation of blindness as lead by a visually impaired guide through four pitch back simulated environments. The purpose of this exhibit is twofold. In an immediate sense it is meant to demonstrate to visitors that those who we often marginalize due to their disabilities are in fact quite capable, effectively serving as a platform to recognize, address, and overcome problems created by perceived \"otherness\". The larger lessons derive from experiencing a profoundly different reality than is normally accessible in terms of both the specific type of experience and the degree of contrast of realities it poses. Such jarring experiences open a brief window for dialogue. \r\n\r\n      Drawing from actor-network theory, various principles and techniques from action research, and from fields such as organizational psychology, visual anthropology, and sociology, this capstone contains workable processes and objectives relevant to both the creation of a Cincinnati based Dialogue in the Dark and the framework for a Coalition for Community Action and Cooperation. These processes and objectives are to be constantly ongoing in development, and are only rudimentary in presentation style. \r\n\r\n      Additionally, this project contains a reflection on both the process of bringing Dialogue in the Dark to Cincinnati thus far, a discussion of post-capstone plans for Dialogue in the Dark, and, in the spirit of demonstrating my BIS inspired work in general, a condensed introduction to my “Theory of Grand Irrationality” and my “Social Pulse Theory”, both of which are central starting points for the grad school experience I am both seeking and planning.\r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2014"],"thumbnail_path_ss":"/downloads/qf85nc779?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["qf85nc779"],"file_set_ids_ssim":["qf85nc779"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTERDISCIPLINARY CAPSTONE BRINGING DIALOGUE IN THE DARK TO CINCINNATI","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__pathnames_ssim":["7m01bn01j"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697105475459350528,"timestamp":"2021-04-15T11:25:04.178Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T19:45:04Z","system_modified_dtsi":"2020-06-18T19:46:03Z","has_model_ssim":["Article"],"id":"dv13zv78j","accessControl_ssim":["005e9656-2b8f-4c7a-b414-696f8541eb11"],"hasRelatedMediaFragment_ssim":["7s75dd65m"],"hasRelatedImage_ssim":["7s75dd65m"],"depositor_ssim":["vianajr@mail.uc.edu"],"depositor_tesim":["vianajr@mail.uc.edu"],"title_tesim":["Mathematical Impact of Relative Motion in the Deformation of Time "],"date_uploaded_dtsi":"2020-06-18T19:45:04Z","date_modified_dtsi":"2020-06-18T19:45:51Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/hrcq-j588"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["Aerospace Engineering"],"creator_tesim":["Viaña, Javier"],"publisher_tesim":["University of Cincinnati"],"language_tesim":["Spanish"],"description_tesim":["El movimiento relativo de un punto respecto de un observador no solo depende de la velocidad relativa del movimiento. La dirección de esta velocidad juega un papel fundamental en la deformación del tiempo. En este estudio, se ha cuantificado el efecto de la dirección sobre el factor de intervalos de tiempo."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["June 10, 2020"],"thumbnail_path_ss":"/downloads/7s75dd65m?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["7s75dd65m","05741t100"],"file_set_ids_ssim":["7s75dd65m","05741t100"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MATHEMATICAL IMPACT OF RELATIVE MOTION IN THE DEFORMATION OF TIME ","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["vianajr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["dv13zv78j"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697121064299003904,"timestamp":"2021-04-15T15:32:50.854Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4797,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":979,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":666,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1951,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12573,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":182,"next_page":183,"prev_page":181,"total_pages":1275,"limit_value":10,"offset_value":1810,"total_count":12744,"first_page?":false,"last_page?":false}}}