Search Constraints
Filtering by:
Type of Work
Student Work
Remove constraint Type of Work: Student Work
Publisher
University of Cincinnati
Remove constraint Publisher: University of Cincinnati
« Previous |
1 - 50 of 517
|
Next »
Number of results to display per page
Search Results
-
- Type:
- StudentWork
- Description/Abstract:
- Environmental Engineering Senior Design Project Report. Project sponsor: Mike Geers (Duke Energy).
- Creator/Author:
- Stone, Chris; Tumbleson, Rachel, and Belisario, Kristen
- Submitter:
- CEAS Library Staff
- Date Uploaded:
- 09/21/2020
- Date Modified:
- 09/22/2020
- Date Created:
- 2020-04-17
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Environmental Engineering Senior Design Project Report. Project Sponsor: Richard Stuck (Greater Cincinnati Water Works).
- Creator/Author:
- Caspersz, Bethany; Adams, Dexter; Cummings, Matthew, and Xia, Qianhui
- Submitter:
- CEAS Library Staff
- Date Uploaded:
- 09/21/2020
- Date Modified:
- 09/22/2020
- Date Created:
- 2018-04-19
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- The FCC reported that there were about 3.1 million smartphone thefts in 2013. Today nearly everyone owns at least one smart device, and many people tend to keep personal or business information on these same devices. If your device is lost the first reaction you might have is to use attempt to use 3rd party software to locate or wipe the sensitive data from your device, but what happens when the connection to those services is severed? The Fail-Safe Erase application aims to provide you with the ability to wipe your device after its disconnected from reaching network services. After setting up a personalized password and a wipe timer, the Fail-Safe Erase application will run in the background while looking for those services. Once the connection to GPS, network, and cellular service is interrupted the wipe timer begins its countdown. If the user does not access their device to interrupt the wipe timer within the time set by the user, the device will begin to wipe itself of all personal data. Fail-Safe Erase aims to ensure that if you can’t gain access to your mobile device, remotely or physically, the private data on it will be securely erased, hopefully before it falls into the wrong hands.
- Creator/Author:
- Bach, Spencer; Sullivan, Nicholas, and Dean, Zackary
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- The use of the GoCart application will have the ability to enhance grocery shoppers’ experience by taking the shopping list and generating the most efficient shopping path. According to the Time Use Institute, the average shopping trip takes 45 minutes. In part, the time spent is attributed to confusing store layout, congested aisles, and uninformed staff (Marks, 2015). Results from our grocery shopping experience has shown that more time is directed towards roaming through the aisles searching for the items. There are applications dealing with allowing us to create a virtual list, but none directed towards the location of the items. Along with GoCart creating the most productive shopping path with the virtual list, there will also be a map with the store layout that pinpoints each item. Having GoCart will make the next trip to the grocery store quick and painless.
- Creator/Author:
- Mastroianni, Jacob; Wroblewski, Casey, and Basford, Zachary
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Nibbler is an android application used to search and find restaurants based on specific filters applied by the user. Nibbler gives users the ability to apply multiple filters to their searches and allows those with dietary restrictions or food allergies to find restaurants that fit their specific diet. Nibbler also aims to eliminate the issue of analysis paralysis by limiting the return on food locations that are returned to the user after completing a search. The reason for this is simple, if there are too many options, then an individual can overanalyze or overthink the situation. This way the user still has everything they originally searched for, but the decision is easier due to the fact that they are limited in their options. The application is simple to use and anyone with an android device can navigate the simple UI. This allows users to store personal data and health information safely and securely.
- Creator/Author:
- Schaller, Konrad; Young, Ryan, and Ehemann, Vincent
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Getting a job interview does not mean automatically landing a job. For people in IT, the interview process can be very lengthy and involve multiple face to face interviews and skill testing. These interviews can be stressful and hard to prepare for. No one should be held back from getting a job they are qualified for. In order to help people prepare for interviews, we have created PrepIN. PrepIN will do what sites like Indeed and Hackerrank do not. Anyone would be able to schedule a time for a practice interview. They will participate in a one to one host video call and have access to a video message chat. Having access to a test environment that will put them face to face with someone will better help stimulate the interview environment and process. That way job seekers can work to deal with the stress and anxiety that many face during interviews.
- Creator/Author:
- Millsap, Kyle; Ferdiny, David, and Thomas, Tyler
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to cybersecurityventures.com, despite the high demand for new talent in the cyber security field, there are currently not enough cyber professionals to fill this need (Morgan, 2019, p. 1). To generate new cyber talent, the Ohio Cyber Range Institute utilizes its in-house web application to host regional Capture-the-Flag (CTF) events—exciting, cyber-themed competitions that help inform and spur interest in cyber security. Our project, UC CTF, takes that existing web application and greatly expands upon it. UC CTF features a completely redesigned application site, enhanced functionality and quality-of-life improvements for site administrators, and a brand new question repository of fun cyber challenges for CTF players—from beginner to expert and everything in between. UC CTF greatly improves upon the capabilities of the original application, allows for players of all skill levels to engage in an exciting CTF environment, and helps to develop new talent in cybersecurity.
- Creator/Author:
- Glecker, Sydney; Reilly, Taylor, and Penn, Devaughn
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Car maintenance management can be difficult due the different components that are commonly repaired and replaced. Even if an owner has vast knowledge of their vehicle’s maintenance routine, it is common to forget when a component was replaced. Consumer Reports advises that the best way to save money at the mechanic is to do proper research on specific components, and fix/replace components at the right time. iMechanic is a multi-platform web application that allows car owners to take maintenance into their own hands by keeping detailed work logs and allowing owners to efficiently organize their car’s data. The user can input simple vehicle information to create their dashboard, where they can get familiar with common maintenance routines, costs, and local mechanics. When a car owner uses a proper organization management tool, they can increase the well-being of their vehicle, while also saving money from avoiding unnecessary repairs.
- Creator/Author:
- Gill, Taylor; Gigliotti, Ryan, and Nader, Alec
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to a study in 2018 from PSYCOM, it was concluded that 50% of teenagers feel they are addicted to their smartphones, 60% of adults say that they believe that their children are having issues with time on their phone and, on average, 60% adults and children state they immediately respond to notifications. HomeWatch is a web-based application that would give everyone ease of mind when it comes to overlogging by tracking the time used on certain websites and applications without limiting time or function. HomeWatch is meant to be a safeguard for expectations set by parents so that children aren’t abusing time on their device. With social media, and easy access apps on smartphones, it is easier to spend more time on the phone than it is to do productive work, and HomeWatch is there to make sure that work and play are budgeted effectively.
- Creator/Author:
- Bosse, Josh; Salzmann, Stefan, and Rankey, Mark
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to Marketing Metrics [1] businesses have a 60 to 70 percent chance to sell to existing customers versus just 5 to 20 percent for other prospects. A database can provide essential insights into a customer’s choices that can be used to grow a business. Unfortunately, many small businesses do not have the knowledge or budget to create and manage a database. EasyDB aims to alleviate the stress on small businesses by providing a tool to learn the basics of database design as well as getting a template database created in real time that a small business can set up quickly with some acquired knowledge. This is done using EasyDB’s guided template builder that walks users through the creation of essential database designs with the intention of creating an end database that the user can download for their own use. When the guided learning databases are not enough there are also templates, that users can edit and download to meet their specific needs. In the case that we tested with a small business owner, the owner was able to step through all of the guides and gain enough knowledge to implement a database that he could use in the future.
- Creator/Author:
- Dantz, Austin; Watkins, William, and Pelton, Spencer
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- FinanaceSmart is a Xamarin based mobile application targeted at middle to late adolescents in order to teach them how to be prepared for financial success with Credit Card debt and financial knowledge. Credit Card debt and lack of financial knowledge has a negative effect on young adults for adulthood, most adults do not have enough capital saved up to cover them in any financial emergency or are so deep into debt that they are just trying to pay it back but don’t know how to effectively go about it. Also, currently available applications don’t have customizable features that fits user needs. FinanceSmart will be a cross - platform application with an easy to use intuitive user interface to entice adolescents to take responsibility for their finances and financial literacy. Customizable budgeting features will keep users up to date on financial aspects.
- Creator/Author:
- Patel, Devansh and Joshi, Shiv
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/06/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Many police departments lack technological resources that enables them to track meaningful data. Beginning in 2020, the State of Ohio has mandated that all departments track and collect police incident data. This data is where most police officers’ public contact comes from according to the Bureau of Justice Statistics (Office of Justice Programs). Currently, this data is gathered from notes that the officer makes at the time of the incident and later recorded in an excel document. This process is inefficient and fallible. Patrol is a cross-platform web application that allows officers to easily, accurately and efficiently gather incident data. By creating an application that is cloudbased, officers can easily input information that stores the data at the time of the incident. This data is used to generate reports for the department and state auditors. Patrol's design and development allows officers to save time and difficulty in creating incident reports.
- Creator/Author:
- Geverdt, Ian; McLeod, Sean, and Hampton, Kramer
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Enterprise data migration was a common practice amongst businesses in corporate America. Organizations chose to migrate databases for a variety of reasons including trying to reduce costs by moving to cloud-based databases, seeking specific database features and functionality, or their existing systems were simply outdated and unable to keep up with the demands of the business (Alooma 2019). As companies continued to expand and evolve, features such as agile data migrations and integration capabilities became more integral. Company acquisitions and departmental mergers were common catalysts for data migrations. Upon these occurrences, the responsibility had been given to the IT department to migrate and integrate the data into the new environment to allow end users to complete daily functions. DataGrate was conceived to provide data solutions to both the technology professional and the end user. Data functions included on the front end allowed users to easily pull, clean, and organize data for the end user. At the end of the project lifecycle, DataGrate solutions had been developed into a fully functional data migration software with dynamic capabilities and user functionalities, making the product a success for both the DataGrate Solutions team and the end user.
- Creator/Author:
- Patel, Nayanchandra and Batt, Sean
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- 22 percent of turnover happens in the first 45 days from the start of employment. Onboarding is critical for the longevity of a new hire’s career at any company. Minerva was a web application which held all the resources that new hires received during their training period. The application dedicated drive space to each employee and held their resources. It was a new employee’s one stop service for onboarding resources. It used ASP.NET, SQL server, and Bootstrap to hold the entirety of a user’s resources. The user could access files saved to their drive, complete learning courses, and surf the company wiki. Minerva created network drives for each employee on hire and assigned them all the materials they needed for their specific training. This allowed trainers and trainees to have their resources available and to be prepared before the first day of training.
- Creator/Author:
- Johnston, Jospeh and Sabelhaus, Scott
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to NIH (National Institute of Drug Abuse), an estimated 52 million people have used prescription drugs for nonmedical reasons at least once in their lifetimes. There are many applications that allow healthcare organizations to view patient’s history, but they lack the flexibility of allowing other organizations to view the same information. SafeMeds is a cloud-based web solution that allows healthcare providers to be connected, preventing patients going from office-to-office to acquire prescriptions. Our product allows pharmacists and their prescriber to be alerted to patient activity. SafeMeds allows pharmacists to view the prescription sent over by doctors or prescribers, while doctors can view the history and prescribing prescriptions page. SafeMeds now makes it easy for prescribers and pharmacists to view trends and identify abuses in prescriptions. Prescription drugs can be regulated and the use of medications for nonmedical reasons can decline gradually using SafeMeds.
- Creator/Author:
- Patel, Vriti and Curry, Samuel
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- WhereToPics is a web application built on the foundation and spirit of community with the intention of sharing the best picture locations around the world! Statista.com reported 1.323 billion international tourists as of 2019, compared to 911 million just 10 years ago. Everyone will be able to add their best photograph locations and check to see if there are any other incredible picturesque spots nearby! WhereToPics is unique in that it is the only application that provides precise information about the absolute best places to take pictures. We designed WhereToPics as a website application platform so that everyone can access it from their device via internet connection. The control and monitoring of content will be overseen by elected regulator site managers. WhereToPics will continue to bring people together and reinforce the importance of sharing, interaction, and strong community. Never miss a wonderful opportunity to capture a beautiful memory again!
- Creator/Author:
- Berthenet, Damien and Brown, Samuel
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to a recent Microsoft survey, over 90 percent of people say that dealing with a company that uses outdated technology would cause them to reconsider business relations due to concerns over security, privacy or user-friendly convenience.( www.microsoft.com) This is the problem for which the Use Case was developed. With modern network infrastructure, businesses are able to operate more efficiently and securely as well as improve the quality of life of both their customers and employees. The solution being implemented is a modern VoIP solution and additionally an IP-Based NVR system. This will maximize workplace security and provide a unified communications solution for employee/customer collaboration. With the solution, a business will be able to focus solely on business, and not all the headaches that can come with outdated unsupported system. Customer relations will greatly improve, andthe business itself will have better communications equipment and security.
- Creator/Author:
- Peterson, Andrew; Kroeger, Daniel, and Stathes, Nick
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Head StARt is an interactive Augmented Reality (AR) application designed to aid incoming freshmen going through college orientation. The current college orientation process is very heavy on information in the form of stacks of paper. This can lead to students feeling overwhelmed and missing key information. Paired with a brochure or document of choice, Head StARt allows you to use your phone to scan the document and bring up interactive AR experiences, helping students better understand and retain key information. Our application will also have an easy to read map, with pictures and models of the buildings provided when you scan the map. Head StARt can take any brochure or pamphlet to the next level by engaging the audience in an exciting way and helping new students better retain important information.
- Creator/Author:
- Bandy, Nic and Dougher, Brian
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- In today’s market, large game distribution platforms take a sizable cut of developers’ game sales, which significantly impacts indie developers’ ability to grow. In the recent GDC State of the industry that was held in March of this year, it was polled that “ just 6% of nearly 4,000 respondents believe that Steam justifies the 30% cut it takes from developers” (Sinclair 2019) . Our team will create a blockchain network based on Ethereum that will function as the ledger and transaction engine for our digital game distribution platform. We are developing this platform to create a marketplace focused on allowing indie game developers to earn a larger cut of their sales. In addition, our platform will provide infrastructure by crowd-sourcing hardware from nodes in our network by incentivizing users to host content and provide downloads in return for a small gratuity. Through a combination of Hyperledger frameworks and IBM blockchain technology, we will be able to minimize the middleman and shrink the necessary infrastructure to a fraction of traditional methods.
- Creator/Author:
- Richter, Daniel; Wood, Michael, and Jaeger, Austin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Over 200 million 911 calls are made every year1. For first responders and dispatchers fast flowing information and communication during an ever-changing emergency is crucial to saving lives. No One Left Behind has focused on improving emergency response by managing and presenting data to 9-1-1 dispatchers and has improved upon the existing process of dispatching. Currently, the standard way of first responders receiving information is through a slow relay over radio between dispatcher and first responder. With No One Left Behind we improved communication, enhance situational awareness, and better crisis remediation through our easy to use UI. NLB is designed to utilize user’s smartphones for a quicker yet more accurate and detailed description of what is happening. Furthermore, NLB was built to improve upon ‘Areas of Refuge’ that currently lack in assisting the disabled. Our UI has been tailored for quick and easy use by both dispatchers and users.
- Creator/Author:
- Siniawski, Justin; Maiwald, Michael, and Williams, Jared
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- There are around 2700 locations with National Park in their title on our planet, and more than 6500 locations with Category II type of protected areas that defines “National Park” per International Union for Conservation of Nature (IUCN), and its World Commission on Protected Areas (WCPA). So far, there is not a single website or mobile app dedicated to the World’s National Parks where all the information about the parks is available on a map. If any user wants to search information about the world’s national parks, he or she will have to rely on Wikipedia, TripAdvisor, travel blogs, or find the park’s official website. Searching for a list of World National Parks on online search engines usually returns an incomplete Wikipedia page or short list of well-known or well publicized National Parks. That makes the search very difficult and doesn’t give all the information. Also, there is not a single database or API with all the world’s national parks on the Internet. We’ve created The World’s National Parks website and mobile application that provides a brief information and a map of all the National Parks. Mobile Application has features like finding parks nearby and directions.
- Creator/Author:
- Jordan, Ryan; Mukimov, Max, and Aktleuov, Malik
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- IT security teams at small companies are often understaffed and overworked, according to a survey published by Sophos (June 2019). ReapRE is an automated malware analysis tool designed to assist analysts at small businesses. Unlike other costly solutions, the analyst will not have to worry about potential confidential data leakage resulting from a 3rd party application breach, as everything will be hosted internally. A potentially malicious document will be uploaded by an analyst into a locally hosted instance of our application, where it will then be run against a stack of malware analysis tools. A summarized report will be given to the analyst based on its findings and a list of indicators of compromise (hashes, IPs, URLs, domains, etc.). After review, the analyst is able to import the IOCs into a local database, Malware Information Sharing Platform (MISP).
- Creator/Author:
- Granitto, Matthew; Church, Claire, and Ferguson, Michael
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to IEEE, agile methodologies have drive organizations to alter their infrastructure at an ever-increasing rate. Thus, it is important to also accelerate the deployment time for external monitoring systems to provide fast and continuous feedback to security, development, and infrastructure teams. VMware's vCenter is a product that, according to VMware's hardening guides, requires external monitoring from the moment it is put into production. Existing solutions (e.g. SexiGraf, psview, and checkmk) do not adhere to infrastructure-as-code principals, and are instead deployed as complex, monolithic and non-integrating applications. In response to this need, we built OmegaGraf, a one-click vCenter monitoring solution. OmegaGraf is an entirely open-source, containerized solution, confused and deployed through a simple web interface, providing dynamic dashboards, granular time series data, environment aggregation, and alerting. Best of all, OmegaGraf is deployable in under five minutes, allowing IT professionals to provide value to their organization faster than ever before.
- Creator/Author:
- Owen, Dylan; Colvin, Jacob, and Currie, Matthew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to research done by IEEE (2016), “recording attendance is inefficient and takes up too much class time especially with larger groups of students,” and if attendance takes 5 minutes of a 45 minute period, that means that 10% of class time is lost taking attendance. Another research report completed by UC Berkley (2017) stated that time in class is when students are most productive. Important class time is wasted taking attendance, so being able to remove the amount of time taken by attendance would be beneficial to students. AutoAttend assisted with this issue by using a fingerprint scanner to sign students into the classroom. AutoAttend saved time taking attendance, which helped improve student performance.
- Creator/Author:
- Flick, Elizabeth; Dewit, Martin, and Stose, Nick
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- As of 2019, Windows 7 has been discovered to possess 1283 security vulnerabilities, according to the Common Vulnerabilities and Exploits including 250 this year alone. In addition, effective January 2020, Microsoft will discontinue providing support, updates, and software patches and fixes for Windows 7. According to both CVE and Microsoft, the main solution to remediate these vulnerabilities is to upgrade to Windows 10. However, due to its user-friendly interface and stability, most companies still contain several computer workstations that run Windows 7 causing a major increase in security risks. AutOSImage provides the IT personnel with a cutting-edge software solution that can automate an upgrade from Windows 7 to Windows 10 on multiple computers at a time. This is done by utilizing features that perform the necessary tasks in the following order: Automatically backup user data; determine software and driver compatibility prior to beginning the upgrade, deploy the Windows 10 image to Windows 7 systems.
- Creator/Author:
- Tran, Kent and Chandler, Derrick
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Extreme Makeover: Tech Edition is an initiative to help a small business develop a technology presence. According to the Small Business Administration, approximately 33% of all small business owners are 35-49 years old and 51% are 50-88 years old. Studies, such as the “Older Adults and Technology Use” study conducted by Pew Research Center, have shown that the majority of older adults need assistance when learning new technology. At the rate that technology progresses, some business owners do not know where to start. The owner of Four Source Restoration and Remodeling fell into this category. Kelly Winhoven is a 48-year-old, small business owner with limited technology skills. Winhoven was looking for a way to improve the technology within his small business. Our team partnered with him to achieve this goal. We created a website to enhance and increase customer engagement. We built a database to organize the data structure to ease management and optimize data. We secured the company’s network and devices to protect the company from threats and vulnerabilities. We also modernized the company’s logo and gave them a social media presence. All these factors came together to create a full business technology makeover for Four Source Restoration and Remodeling.
- Creator/Author:
- Rosenbaum, Adam; Berens, Josie, and Winhoven, Karlie
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- The Internet of Things is an emerging market that is expected to grow to 43 billion devices by 2023.[1] This exponential growth comes with security concerns, as 80% of devices including cloud and mobile applications fail to require complex passwords, and 70% of devices did not encrypt traffic to and from its connected network.[2] Identifying the security risks can be difficult, since every network has a different combination of devices. The use of PotPi’s testing ground for emerging IoT devices provides the necessary foresight to combat the increasing number of security threats in homes and workplaces worldwide. PotPi provides this service to a growing industry and creates targeted objectives to reduce security concerns by allowing the community to discover vulnerabilities and be rewarded for doing so. Creating a game-like platform is not a new concept. In fact, there are many companies that have adopted this concept due to its increased user interaction and ability to relate to the audience it is trying to reach. Giving the community a way to show their progress and accomplishments gives companies data on what is working and what needs to be changed. More incentive to complete objectives leads to more solutions and a better market.
- Creator/Author:
- Brad, Ryan and Niemiller, Jospeh
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- UC Route Assistant is a mobile web application that allows the user to input their schedule and needs and determines the most optimal appropriate route for them to take on campus. This application was originally inspired by the vast quantity of new students coming to the University of Cincinnati each year. With over 7,000 new first year students in the 2019 fall semester, it is apparent that there is a need for assistance navigating the large campus. We built a mobile web application that enables the user to upload their course schedules, extracurricular activities, and accessibility preferences. UC Route Assistant processes this information and leverages Google Maps Application Programming Interface (API) to determine the fastest route that the user can take in order to reach their various destinations, while accounting for accessibility preferences and other major on-campus events. This results in less headaches having to reroute, less surprises running into blockades, and overall reduced travel time for the user.
- Creator/Author:
- Macbeth, Jon; Ralston, Adam, and Worrix, Hayden
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Today everyone is a target for cyber-attacks, hackers are only getting more sophisticated and persistent. According to Verizon’s 2018 annual breach report, Cyber-attacks against small businesses make up 58% of targeted attacks, and 76% of all attacks are financially motivated[1]. This makes small financial institutions a prime target for cyber-attacks. These smaller businesses also lack proper cyber defense, only 27% of businesses say they are prepared for a cyber-attack. SOC-In-A-Box is a cyber security solution for businesses that brings the best of on-site and cloud-based architectures together to help solve the growing problem of cyber-attacks and data breaches. SOC-In-A-Box's cutting-edge system is modularly designed to quickly scale and easily integrate with existing solutions, allowing businesses to maintain visibility over their IT and OT infrastructure and trust that their data and business operations are always safe and secure.
- Creator/Author:
- Wolfe, Clifton and Singh, Jai
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to Forbes, the sports industry is expected to reach an all-time high value of $73.5 billion by the end of 2019. The University of Cincinnati Athletic Department was looking to engage more with their fanbase by learning what events are their fans attending? Is this fan following UC’s social media accounts? When should they send a retargeting campaign to season ticket holders? A system designed to answer these questions typically costs thousands of dollars and is usually cumbersome to incorporate into the user’s daily workflow. Introducing GameSuite, the simple solution to a complex problem. GameSuite is a web-based application with a collection of games that users can play once per day to compete for a chance at a high score to be awarded a prize. User authentication is performed through Twitter API and the user’s name, email and location are collected for marketing material.
- Creator/Author:
- Welch, Jackson; Radcliffe, Matthew, and Baca, Colin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Many of the top companies in the world use a SIEM to collect and monitor network events to ensure their environment is secure. Looking at the top SIEM solutions, these products struggle at having all necessary capabilities out of the box. Our team developed Scout, Scout provides a missing value which will minimizes setup in environment’s and reduce security event response times, thus preventing security breaches. Scout is able to scan and discover all relevant and important asset details within an environment and integrate them directly into your companies SIEM. Rapid7 claims, “…connecting your tools and automating security processes can save up to 83 percent of the time spent manually fetching data and other triage and incident response tasks.”. Staying on budget is something that all companies need to keep in mind, and our solution, Scout, will be able to save companies thousands, if not more.
- Creator/Author:
- Hood, Chase; Hu, Joseph, and Brown, Jack
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to the Center of American Progress, over a quarter of people in the United States send their children to daycare facilities. Parents often wonder how their children are at daycares, which is why every daycare facility have daily reports and sign-in sheets. Some daycares have subscriptions with a phone/web app to provide this information to the parents, while other daycares cannot afford those applications. These other daycares rely on paper to provide the information to parents, such as the Pleasant Run Church of Christ Child Development Center. Now, the Kids Day Care app is a mobile application for daycares that couldn’t afford these other phone/web app. Our app is an affordable and user-friendly phone application for daycare staff and parents. Teachers are be able to input every child’s daily activities at the daycare, and parents thus have access to this information at any moment.
- Creator/Author:
- Baker, Gabriella and Honsaker, Steven
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to a study published by Ohio State University news (Grabmeier, 2018), many college students have schedules that are all over the place. Seventy percent of college students are stressed about finances. A lot of them must budget their money as many are living on savings or working part-time. Many students also have a social life to balance as well. Planning to see others while working out a budget can be difficult. Palendar is a web-based application that allows users to create a monthly budget to help manage their money, as well as a social calendar to plan their time. There are social calendar and financial planner applications out there, but there aren’t any that appeal directly to the younger demographic as well has having a budgeting tool built in. Having a web app that helps with both important areas of young people’s lives allow Palendar to be a great app for many people to use.
- Creator/Author:
- Stehiln, Cameron; Alghamdi, Asem, and Smith, Evan
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Social media is the single-most powerful marketing tool available to influencers and small businesses looking to expand their audience and reach more potential online customers. The largest of these platforms (Facebook, Twitter, etc.) are aware of this and reduce the average account’s potential reach to pressure businesses to pay for ad-space. According to the 2018 Sprout Social Index, Facebook controlled 84.9% of its social video ad growth. We have designed FindUS, which is an automated service that helps users who lack funding to reach their target audiences. FindUS monitors posts made by accounts under our service and provides statistics based on each post’s performance and provides additional services to help reach followers. This includes mailing lists, additional offers, or customizable content a business can notify their audience of. FindUS provides valuable marketing information to expand to small businesses through monitoring and automatic post services.
- Creator/Author:
- Stalf, Nicholas; Clifton, Ethan, and Perinovic, Connor
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Technology is exponentially evolving, sometimes faster than we expect it to. Because of this, it’s difficult for those who are just trying to keep up with the newest technologies. Of course, there are many outlets that people can look to for help. However, trying to troubleshoot over the phone can be frustrating for others on both ends and some problems just simply go unsolved. With Tech Wizard, we are providing an extra hands-on approach to users who are facing technical difficulties at home. We created an app that allows users to sign up and search for an available Tech Wizard in the area that can offer support via chat, phone support, or in person. We expect the result of this is to increase the availability of tech support to people of all ages and all levels of technical knowledge.
- Creator/Author:
- Holt, Charles; Partin, Erica, and Miracle, Matthew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 07/01/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- The main goal of our EZTask program is to allow our users to break down big projects and goals into simple, manageable steps so that they can more easily accomplish big things. EZTask is a .NET web application designed to aid users of all ages and situations in accomplishing their daily home and work tasks. The EZTask program is flexible enough to be used in a range of different environments. It can be implemented into a work environment by an administrator to help organize the workloads of his/her employees and boost their productivity. It also works well for a group of students working together on a project, or even a single user trying to organize their own personal project. EZTask breaks down big, potentially overwhelming projects or ideas into a series of small, easier steps. It makes it easy to work with others by allowing you to share/assign some of these steps, and track who is or isn’t accomplishing their goals on time. It also makes the process of getting started on your work each day much smoother by clearly presenting each user with their individual goal for the day right when they login. Clear, concise tutorials combined with an intuitive interface make it simple to add tasks to the list while giving a satisfying text congratulating the completed work. This help app is unique due to its web-based platform, allowing users with a wide variety of phones, computers, and other devices to access their tasks lists so that no one is left out. This will allow group work to be done in a wide variety of long-distance situations as well as easy access from home regardless of the many different types of devices team members or employees might have.
- Creator/Author:
- Nortmann, Eric
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to Enjoy Safer Technology (ESET, 2019), 97% of people are unable to identify sophisticated phishing attacks. Though phishing attempts use scare tactics, website forgeries, or scams to increase their effectiveness and chances of success, research shows that the heart of the problem resides in a lack of effective training. Phishing Guard is a FREE, comprehensive, and easy to navigate web application designed to provide its users with the ability to receive interactive and effective training. In addition to creating a new approach to learning about phishing, this application will revolutionize the way these attacks are prevented. Phishing Guard has an easy to use menu system that includes short interactive quizzes, up to date videos, games, and more. These resources allow Phishing Guard to stand out among its peers, as it not only effectively decreases the success rate of phishing attempts but also increases user retention and awareness rate.
- Creator/Author:
- Drury, Katie; Kikonda, Serge, and Matevia, Sarah
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Companies are generally hyper-focused on releasing software quickly to meet strict deadlines or to stay ahead of the competition. This generally results in implementing security once software is near release. In applying DevSecOps best practices early, companies can not only catch and fix security problems early but train their teams in what to avoid in the future. For those organizations that implement DevSecOps, it is found to be implemented during the beginning stages of their software development projects. Most of which is focused on identifying and displaying the source of security misconfigurations. AutoDSO will base their security best practice requirements based off the OWASP DevSecOps model. AutoDSO takes DevSecOps a step further by focusing on establishing security baseline requirements and allowing the users to select metrics specific to their DevSecOps policies and procedures. The application generates an automated DevSecOps policy document which can be used by security analyst and given to auditors to monitor a company’s DevSecOps processes. This allows companies an efficient way to document their security best practices and ensuring that security becomes a part of continuous integration and continuous development (CI/CD) in their organization.
- Creator/Author:
- Gantt, Chelsea; Phu, Vance, and Eves, Dorothy
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Zendesk states that 69% of support tickets were resolved with just “one touch”, and yet many tickets require resolution times of over 24 hours[1]. Incident Management, Change Management, and Service Request management are key elements to combat with an end user's daily frustration regarding problematic or unavailable business needs. MyHelpDesk eliminates the need for an end user to reach out to Managed Services for assistance by providing a wide selection of tools to use, including, but not limited to: training videos, trusted software solutions, access to Statement of Work’s and Client/Company process documentation, and in-app scripting all in one convenient location. MyHelpDesk allows end users of any technological experience to easily operate this centralized application for all things troubleshooting, training, workflow, and support within their network scope.
- Creator/Author:
- Rindler, David; Fayaz, Samon, and Gautam, Tulashi
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to a 2015 survey conducted by the Pew Research Center and published in a September 2016 Internet and Technology report, 52% of adults are relatively hesitant to use digital tools because of lower levels of digital skills and trust in the online environment. As technology has evolved to become an essential part of our modern everyday lives, it is important for end users to understand how to both utilize it effectively, and keep themselves and their data safe. From email to online banking, technology has introduced new ways to organize and manage our lives. However, it has also introduced new sets of risks and challenges never before faced by users. This is where Athena Systems can help. Athena Systems is a multi-platform web application that both protects and assists users with catching up to the functionality of modern technology. It provides interactive lessons and opportunities such as registering and collaborating with a community of Athena Systems users. The security tool also provided by Athena Systems allows users to cross check websites and domains for legitimacy by running them against a blacklist database. Stay smart and stay safe with Athena Systems.
- Creator/Author:
- Childred, Lionell; Manasrah, Abdallah; Zorzi, Aaron, and Wirt, David
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Gaming has become less social than ever, with 67% of gamers strictly playing solo, while the rest are constantly connecting to games full of random players (Forbes). We want to create a way for gamers to reconnect with each other by finding out they have a similar taste in games as their friends. With the influx of new game releases, it can be difficult to keep track who wants to play what. Co-op Queue will be an application that has all new games imported into it, allowing users to tag which games they like. This marks whether or not they’re interested in playing that game. Then, once the user indicates that they are interested in a game, it will automatically inform them of their friends who are also interested in the game and give the user an opportunity to message them. Helping more people to fill their co-op queue.
- Creator/Author:
- Glaser, Cole; Howard, David, and Liston, Brianna
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to The Hechinger Report “On the eastern edge of Silicon Valley, school districts have gone into debt by, authorizing a $16.2 million sale of general-obligation bonds intended almost exclusively for laptop purchases.” (Marcus, 2019) CyberPods is a system designed to let high school classes delve into the world of Cyber Security, leveraging the cheap used hardware market. Designed using the existing Proxmox Virtualization platform, CyberPods provides a way of easy installation and operation of Virtual Machines, so the focus can be on learning about Cyber Security, rather than battling configuration files. By utilizing the power of the cloud, CyberPods automatically configures and installs itself on hardware. A web-based user interface provides easy management and deployment of pre-configured Virtual Machines that are ready for a classroom environment.
- Creator/Author:
- Blakey, Dakota; Griffiths, Henry, and Griffith, Wade
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Five out of every six home router devices are inadequately updated, leaving sensitive data and connected devices unprotected from known vulnerabilities. The American Consumer Institute Center for Citizen Research released this information after the FBI sent out a warning in the 2018, stating hackers from Russia had successfully compromised hundreds of thousands of routers and were collecting user information. Users treat routers as plug and play devices where, once installed, they are left sitting with no further configurations made. However, blame does not fall solely on the user. ISPs and manufacturers fail to educate their customers of the proper steps to take after installation. NetLock was created with the user in mind, to act as a guide and walkthrough after router installation. Once connected to the router and opened via desktop application, NetLock will assist the user with proper setting configuration while providing network security best practices throughout the setup
- Creator/Author:
- Conn, Austin and Hooper, Andrew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- The Wireless Charging SmartBag is the ultimate solution for users on the go, who fail to find time to recharge devices. The combination of proprietary smart device connection cables, adapters, and battery banks into this SmartBag can substantially increase the freedom and organization of users of Qi enabled devices. Current market research shows no viable all-in-one solution that provides this ease-of-use. According to Cisco VNI, the number of networked devices per person is expected to jump to fourteen by 2022. This paper discusses the work, validation, and development of the resulting fully inclusive system utilizing a mobile application to allow users to view battery percentage data for each registered device including the backpack itself, as well as the ability to prioritize device charging based on need and available charging capacity. Additional features include a SmartBag charging dock, GPS tracking, and Global Wifi HotSpot.
- Creator/Author:
- Patel, Mihir and Skipper, Cole
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Have you ever actually completed a New Year’s Resolution? Neither have we! According to Forbes, 80% of Americans set a New Year’s Resolution, but only 8% will actually complete their goal[1]. The simple fact is that these self-improvement goals require motivation and discipline that most people lack. That’s why we’ve created Purrsistent Pet. While there are many solutions available to keep track of your study and workout habits, there are none that also give you additional inspiration towards completing those goals. Purrsistent Pet provides this by making the user responsible for their own digital pet, and to care for it the user must make progress towards their goals. We’ve built this application on the fact that it is easier to motivate yourself when your new digital friend is relying on you, too, so please give it a try and improve yourself today!
- Creator/Author:
- Schumaker. Carsten; Myers, Church, and Aylward, Bekah
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Since the year 2000, there have been on average over 400 natural disasters per year affecting rural and metropolitan areas alike. These disasters leave communications networks broken and segmented. The victims are left merely helpless while they wait for assistance and emergency first responders to save their lives. Even after these tragic events, communication services may not be restored for months or even years. This leaves families and individuals vulnerable to further hardship due to lack of supplies. Our solution aims to reconnect disaster victims faster. With our GoKits, families and emergency services will come back online in dramatically less time. A GoKit includes everything you need to connect to our emergency communications network. With this GoKit, users can connect from up to 15km away from our eNAP (Emergency Network Access Point). PEW believes access to communications networks should remain a human right.
- Creator/Author:
- Shaheen, Christian; Thomas, Nicholas, and Paul, Conner
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- How would you like to save $120 a year? By opting to purchase your router, rather than renting one from your Internet Service Provider (ISP), not only will you save money, but you will also get the best security and performance out of your broadband connection. ISP4ME is a web application that aims to be an all-in-one solution for consumers that will allow them to effortlessly make this transition, regardless of their technical background. Using a concise and intuitive user evaluation, ISP4ME will determine the most suitable broadband speed for the user’s specific situation. It will then recommend a compatible and budget-friendly router that is optimal for their network needs. ISP4ME will provide users with the information necessary to make financially wise decisions when selecting a broadband package and networking equipment, as well as everything they need to know to implement the best network security configurations for their equipment.
- Creator/Author:
- Lang, Chance and Widina, Andrew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- According to a study done by TouchBistro, sixty-three percent of restaurant goers say that the type of food has the biggest impact on their restaurant choice. Many people that have dietary restrictions or specific eating lifestyles can have difficulty choosing a place to eat that meets their needs. Currently, there are applications that target one specific eating lifestyle, (e.g. vegetarian, vegan, gluten free, etc.) but none encompass the full spectrum of eating lifestyles a person can follow. The Possibility mobile application is a food finding application that allows users to enter their specific eating lifestyle and view menu options of nearby restaurants that accommodate their needs. The application features tools for reviewing restaurant choices and sharing recipes with other users. Whether a person is looking for vegan, vegetarian, keto, paleo, gluten-free, or allergy-free options, they will find the best place to eat using the Possibility App.
- Creator/Author:
- Jepsen, Zachary and Lopez, Carlos II
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- Business communications are becoming more and more demanding as technology continues to advance in our ever-changing world. VOIP communications allow a business to stay connected with a reliable and flexible method of handling their telecommunication needs. However, VOIP must have optimal networking conditions for it to work properly and reliably. We created a solution to allow businesses to stay connected while minimizing any impacts they may have on their everyday communications. Using Dynamic routing we were able to shift network traffic from overloaded VOIP servers in order to keep communications up and running. According to PriceItHere.com VOIP Solutions can cost $20 to $40 per month per user, which can add up fast. We were able to keep costs low by using open-source software. The result is a quick and reliable VOIP solution that can handle large amounts of traffic and keeps client costs low.
- Creator/Author:
- Baldrick, Randy; Hahn, Logan, and Tierney, Brett
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- StudentWork
- Description/Abstract:
- In 2017, US motorists spent an average of 17 hours a year attempting to find parking after reaching their destination. In wasted time, fuel, and emissions this costed an estimated $345 per driver over the course of the year.1 The amount of time spent looking for parking is expected to increase as more Americans begin driving. SpotCheck is an end-to-end solution to provide mobile users the ability to quickly and reliably find parking wherever they are. Using machine learning to process images from cameras arrays stationed around local parking lots, our application suite determines where open parking is, so you don’t have to. Our applications allow users to quickly identify and get directions to the closest open parking spaces without the hassle. Parking lot information can be easily managed using our admin web application, allowing parking lot owners to easily make changes that are immediately available to SpotCheck users.
- Creator/Author:
- Bruce, Bradley; Bunker, Ryan, and Watson, Will
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/30/2020
- Date Created:
- 2020-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International