This project started out as a personal challenge posed by extended family members and has now turned into something fully functional and useful. Camp Scout is multifaceted platform where campers can monitor campsite availabilities, share their ideas, experiences, and interact with others. Using state of the art front end technology, a robust API library, and simple back-end code to do the leg work, Camp Scout succeeds in its ventures. With only four small pieces of information, a user can opt in to be notified via text message if their campsite becomes available. These results mean that the future of Camp Scout is a bright one, and the roadmap of scalability is always being observed. Further developments into cloud security, persistence mechanisms, and qualified hosting will be executed in the coming months, and the potential for Camp Scout to serve as a functional social media community will proceed to blossom.
The team found that many people like to talk about some stories while drinking in bars. Everyone's story is unique and interesting. And the team also hopes that everyone's story can be recorded, like a special cocktail for each person. Then, the team made "The Memory Bar” game. In the design of the game, the team hoped to bring the point of view to players through narrative, so the team chose to make a 2D RPG game with platform gameplay and 2D Pixel art style. The players will see some stories through the game. The team achieved storylines by using game characters' interactions and dialog boxes, bringing players into the game's plot. The game players will be playing some game levels, navigating UI pages, using chat dialogues to push the storyline, and interacting with non-player characters. The player will find some interesting stories in “The Memory Bar”.
The growing turnover rate in many industries and organizations makes them highly vulnerable to cyber-attacks that leverage Identity and Access Management vulnerabilities. Despite the obvious importance of IAM, this domain of IT is often overlooked and not fully covered in training courses. To cover this gap, we developed a free, comprehensive, and widely available training course that covers the topics of access revocation, data extraction, data breach prevention, and account management. After the completion of the course, students will have a full understanding of Identity and Access Management (IAM) and will be prepared to take the initiative in building and managing a secure IT infrastructure.
The successful creation of the Access Management & Off-boarding Suite confirmed the lack of information we found when researching the Suite. This reaffirms the necessity of the course, provided through the Ohio Cyber Range Institute.
Divvi is a web application that allows users to create groups and split expenses and transactions through multiple splitting methods with the people in those groups. As individuals with busy and diverse lives, we have certain bills and payments that we must make to distinct groups of people or organizations. Expenses like rent, ride-sharing services, food, groceries, favors, electricity, internet service, utilities, etc. can be difficult to keep track individually, but it is more of a challenge, especially with groups of people. Each of us has experienced forgetting to pay an expense, not paying the right amount, and the consequences of not paying these payments. Using different technologies, our group was successfully able to create a client-server application that makes sharing expenses more manageable, less stressful, and easier all together. In the end, the creation of users and groups were successful, and transactions can be split by the three payment methods. This means that transactions and payments can be managed more easily, relieving the stress of having to chase people down for payments.
The COVID-19 pandemic has had a massive impact on socialization of students outside of the classroom, especially for freshman and sophomore students who have joined University of Cincinnati (UC) at the beginning and during the pandemic. Students have been stuck indoors and away from campus the past year and a half and do not know the area very well. Additionally, the pandemic has impacted their ability to meet new students outside of the online and offline classroom. UC Night Life was created to allow for students to find locations in and around Cincinnati to go to meet new people and enjoy/explore the city to its fullest.
UC Night Life is a web application that allows for users to find locations of interest in and around campus. They can either navigate the map on the main landing page to manually find locations of interest around Cincinnati or use the search bar by typing in key terms of things that they might be interested in (e.g., restaurant, near campus, music, downtown). When they wish to learn more about a location, they can navigate to its dedicated webpage. Once on the webpage of their desired location, they can find information such as general location data, internal and external 360 photos of the location, a description of what they might expect, as well as information about the location written by fellow students. For locations that have events - such as music venues or sport arenas - the page will provide an up-to-date feed and links to purchase tickets to attend.
Having all this information accessible on UC Night Life will allow for students to visit handpicked locations in and around campus/Cincinnati and prepare them for what to expect at any given location. This will allow for them to go out, explore the city, and meet new people without worrying about finding where to go or what they're going to do there. This platform is a fantastic tool that allow for new students to better navigate Cincinnati.
Through the rise of the COVID-19 pandemic in 2020, we also saw the rise of QR codes and other forms of touchless solutions. These solutions included menus, payments, ads, etc. We noticed that restaurant menus from displayed from these QR codes presented a plethora of issues. They typically displayed PDF versions of the company’s physical menu. The problem with PDF menus is that they’re not easily updated, leaving inaccurate menus. They’re also not made for viewing on a mobile device. Users must pinch to zoom, scroll around, and often open multiple browser tabs. LiveMenu aims to solve these issues.
LiveMenu is a software solution for restaurants to display mobile-friendly interfaces to their customers, offering a user-friendly experience. These menus remain accurate thanks to the restaurant-facing mobile app, where management can easily toggle on and off items, as they’re available/offered. If a menu item is no longer available, management simply turns it off and it is no longer viewable on the customer-facing website.
The result of this solution is even better than we expected. Both the customers’ and the businesses’ experiences are totally transformed through our service. Customers no longer have trouble navigating restaurant menus and no longer are confused about what is accurate on the menu. Businesses no longer have trouble updating their menus, and no longer must explain menu inaccuracies to their customers. Overall, this provides a better experience for everyone in the restaurant industry, whether their role is customer or staff.
Many programs today that encourage emotional intelligence don’t engage young people. This has caused the youth of today to have dysfunctional relationships, unhappiness, and confusion with both themselves and those around them. To teach emotional intelligence and provide a fun, engaging resource to learn such concepts, Mindverse was a game developed to tackle the tough questions of where emotions come from and what is the proper way to deal with them. The tools used to create this game include the Unity Engine and Photoshop. In Unity, C# scripts were wired to the features of the game and the Unity build settings were used to link each game scene together. Through dialogue trigger/manager, the game utilized a choice system where the choices the player makes affect both the game and the characters around them, showing the consequences of choosing certain emotional responses over others that reflect real world scenarios. With this, emotional situations were simulated to walk the player through choices that are in their best interest and can be applied to their relationships and real life.
According to Peacock, data collection methods are becoming increasingly invasive. The preservation of information is shifting from a technological problem to a moral dilemma. As a result of this growing problem and concern, we decided to work on a solution addressing this. Our solution’s aim would give back some control to users who wish to still use the internet, without having as much of their data collected. By researching and developing different tools that protect a user’s data and privacy, we were able to develop Curtain. Our application, Curtain, serves to provide a centralized platform for privacy tools. There are several tools that we implemented into our application: blocking web tracking (including data such as user behavior in and outside of a website), blocking ads, bypassing AdBlock detection messages, deleting cookies, and a dashboard for easy access to settings and usage data. Our results and progress on the matter means that it is possible to centralize tools which made it easier for users to have more control over their privacy and data without needing to do additional research.
Often, small development teams and teams of inexperienced developers run into the problem of incorporating inconsistent frontend components into their projects. These points of inconsistency can be jarring or distracting to the user and can make a project appear messy or unprofessional. Stylebin is a web application that aims to resolve this issue by providing the user with an intuitive graphical interface for creating and styling sets of frontend React components. The user will be able to create workspaces for their projects and create ‘bins’ within those workspaces. Bins contain frontend components and a set of styling preferences that are reflected in those components. New components can be selected from a list, defined through a form, and then added to the bin. These components can then be exported and added to your codebase. The exported zip file contains the components along with a stylesheet that reflects the bin’s styling preferences. We created this project utilizing modern web development technologies to keep our product up-to-date and challenge our development team to learn a new tech stack. As it stands, our MVP serves all of our basic functionality from the frontend. Our future plans involve fleshing out the feature set that already exists within Stylebin, including adding more styling options and adding additional component types for users to work with.
With the rise of COVID-19, everything has begun to shift toward being on the internet. Grieving specifically has needed to move toward the internet because of how contagious COVID-19 has been. Before the pandemic families and friends would keep photos of their loved ones on their phones or in a photo album. These memories can be easily lost forever by misplacing the photo album or damaging your phone. Our solution, LifeShare, is a web application that would allow families to share the legacies of those who have passed on. The users can set up Vault pages for their loved ones, and give everyone in the family the option to add on to the album and share memories of their loved ones. LifeShare is a platform that allows users to grieve, reminisce through content and share the legacy that their loved ones created. In this paper we will discuss the web application we decided to build for our senior capstone project, called Lifeshare. Next, we will outline the objectives and project goals, following up with the project timeline and the tech stack. We will then review some diagrams that will better explain how our web application works and finally, we will review the budget for our project, testing plan, and change management plan.
Bolton Printing System is a collection of open-source software that works together to provide a seamless printing experience, allowing users to print directly from their device with just one click. The administrator can easily keep track of all print data. Three fundamental programs, referred to as engines, will be required to make this happen. Common Unix Print System (CUPS), which is the print engine, allowing any computer to operate as a print server, handling print workloads, fault detection, and logging. Our data engine will be constructed by utilizing Zabbix, a data dashboard program that will interact with CUPS using APIs to track and visualize data, such as error and print logs. Finally, we'll create a security engine with pfSense, an open- source firewall and router. It will enable for buffer overflow protection, port management, whitelisting and blacklisting of IP addresses and barring IPs from specified countries from accessing the system.
Anxiety Knot’s primary purpose is to address rising levels of anxiety present in each new generation. Our digital journaling application facilitates users to address anxiety issues through Cognitive Behavioral Therapy techniques. This method includes helping users understand their negative thinking patterns, identify inconvenient situations more clearly and respond in an effective manner. This process involves the implementation of notable features such as mood input via icons and ratings, mood history of user and journal entries to assist user reflection on their current and past feelings. Prompted entries are introduced to ask users various questions to assist in reflecting on a current or past event during the entry. If users desire to input a quick entry, without question prompts, freeform journals provide the option to write quickly and freely enter thoughts and feelings into a single text area.
Exploiting systems using known vulnerabilities has become a concern for companies. To protect their systems, penetration testers are being offered lucrative contracts to find vulnerabilities and exploits on a company’s system. Our team noticed there are many training programs for penetration testers and red teamers to hone their skills. When looking for blue-team training programs, there are much fewer, making it difficult for IT professionals to train on how to defend against such attacks. Our team set out to create labs in which an attack has already occurred, and it is up to the user to diagnose the attack, research the incident, and return the system to a working state. Our goal was to create an environment that simulates real world attacks and give the user tools to take out the attack.
This team of web and game developers came together through a common desire to build a
product that was both an immersive experience and a tool accessible through a common web
browser. The team identified a problem that content creators are now facing due to the closure
of art galleries and because many experiences are now becoming virtualized, an opportunity in
the market was identified. Furthermore, there was personal motivation for some members of
the team to build the product that they themselves wanted to use for their own artistic
endeavors. This is how and why the team decided to build ArtSync, a virtual gallery
environment which will allow artists to showcase their work and share it across the internet.
ArtSync is made up of two main parts: a game built inside Unity and a website which has access
to a database. The Unity game contains the 3D realistic environment, the movement controls,
the rendering of artwork, and the different actions to view the art. The website takes care of
the other elements that a user experiences: authentication, file uploading, gallery
management, and permissions. Separately, both parts are interesting enough; but by
integrating these two parts together, the team created something unique.
To embed the game inside the website, the team used Unity's WebGL exporter which bundles
the project into something that a web browser can read. The product sends data back and forth
game with the website and database into one cohesive product.
As a result, the team created a scene build inside Unity with all the controls functional, a basic
front-end built out with React, and the basic construction of an API which reads and writes from
a local SQLite database. With that, the team also created two use cases, technical diagrams and
documentation, and the creation of the front end.
The team first created a proof-of-concept product which proved that the idea was absolutely
possible and would not require a great amount of resources or extremely high technical
proficiency. By this point, the team has worked out all the major issues of the project and
moved forward into the enhancement stage where the team turned this app from a proof-ofconcept
into an alpha release.
Throughout the last several decades the way people communicate and connect with one
another has radically evolved. Compared to the start of the millennia when communication
technology was more text-based, today there are devices capable of full HD video calling. The
past two years during the COVID-19 epidemic have only added to the need for continuing to
advance communication technology. The time spent indoors, separated from friends and family,
left many people feeling alone and lonely. If left untreated, pervasive loneliness can have
long-term effects on an individual's physical and mental health (Mushtaq and Shah 2014). Video
calling was a great avenue for staying connected, but it can ultimately end up feeling stale and
not very engaging. The next communication platform will be more immersive, allowing one to
interact with others in a shared virtual environment. The project, HangoutVR (HoVR), aims to
make use of game and VR technology to provide individuals with a new way to connect with
others by providing a shared environment where they can all interact and play together. As a
multiplayer game, HangoutVR uses a client-server architecture. In this model, all players are
connected to the internet and Steam. One player then hosts a lobby and acts as the server for all
other joining players, or clients. Once players have joined a session, they are free to interact with
others using the multitude of features offered in HoVR including things such as voice chat, text
chat, object interaction, and more. over voice and text chat. The results provide a preliminary
working prototype of HoVR. Future work will focus on creating a more customized player
experience (ex. Avatar customization) and streamlining the experience in VR.
Classified information is crucial to protecting our national security. Not enough is being done to protect this information as security specialists in the Intelligence Community, Department of Defense and Industry/Contractors everywhere are struggling to keep track of what they have. Security Assets & Information Management System intends to help security specialists improve their security programs by helping manage this classified information. Security Assets & Information Management System has an interface and database to keep track and manage all classified assets and material. Security Specialists and Auditors can use this system to determine where assets and documents are, along with their status. This system fills a gap and creates a solution that did not exist in the first place. Security Specialists can now quickly and easily manage everything in one system. This will not only help their security program, but national security as well.
This application offers an innovative approach to the standard campus safety operations that Universities currently offer their students, faculty, and staff. This new method allows for the utilization of portable technologies which were not yet available when the former model of operation was introduced. This paper covers the process used for the development and implementation of this application. Help On the Go, or UC Help Me, is an emergency application that allows a user to contact emergency services on the UC Campus with ease. The application can be used in conjunction with former protocols to help increase safety for campus living. Through application development, use case data-collection, and test logs, a functional application was created to fulfill this goal. The result of this development, data collection, and testing of an application can be used successfully in a real-world environment. The belief is that with the success of this application, campus security can integrate the application into their operations to increase productivity and create a safer campus environment.
The purpose of OverIT is to supply IT technical assistance to non-commercial customers without
requiring a subscription while also supplying work to undergraduate and recently graduated IT
students. Our group developed a website connected to a SQL database backend that will allow a
user to post IT problems they have encountered and receive help in real time either in person or
over a voice chat from a volunteer IT professional. This peer-to-peer system is mutually
beneficial, as the customer gets IT help, and the volunteer receives experience they can add to a
resume without the time commitment of a job or internship.
Given the ever-changing nature of the technology field, the demand for cybersecurity and malware analysis is skyrocketing. However, in a field where time is of the essence, several hour-long malware analyses cannot be the norm. Despite this, most dynamic malware analyses take an hour on average, and faster solutions are out of the budget of most small to medium sized companies. SMART combines several popular open-source tools into a simple and intuitive UI to allow users to conduct static and dynamic analyses within minutes. The SMART front-end allows users to upload files or URLs, which are then passed through APIs to our tools. These tools produce individual reports, which are then scraped, and the user sees a single, integrated report with all the requested information.
Storage Rents is a web application that provides users with an alternative for local storage
services. Local storage is not always cheap and can be excessive; the program is a solution to this
issue. Storage Rents aims to provide users with the ability to search for storage spaces and
connect with the owners. The application also allows users to list their own storage spaces and
connect them with interested renters. Storage Rents is user driven, with a focus on keeping things
local for clients. Along with that, Storage Rents aims to give users an intuitive renting experience
that fits their needs. If someone ever finds themselves in need of storage, or they have excess
storage; Storage Rents will be there.
Covid-19 has contributed to the rising number and worsened effects of dementia. The most
significant explanation for this trend is the need for social isolation from loved ones. The
current generation of medication management software has the capability to connect
dementia patients with their caregivers or loved ones during these challenging times. These
applications are useful, but Project DNA wants to take medication management to the next
level. This team has created an application that allows this to be done. By interweaving the task
of taking daily medication with a social experience, Project DNA aims to decrease feelings of
social isolation in dementia patients who typically receive in-home care.
Cyber-attacks are on the rise, becoming more prevalent in every sector of industry, many users feeling unarmed and under-educated in the fight against these threats. With this problem in mind, Suite ‘n Secure aims to provide a platform to raise awareness and educate those who are often left out of the conversation of global cyber threats, the everyday user. We want to provide a ground-up, easy to understand, lesson plan on what potential cyber threats the average user will encounter in their time on the internet, at work, and with their family.
Everyday all around the world physical access control mechanisms are used to control who can go where and when. These systems often utilize a badge system that is flawed and vulnerable to abuse, or they incorporate biometric hardware that costs companies' tens of thousands of dollars. With GateKeeper we can lock down physical access points and require the user to authenticate using various methods with their local mobile device. Rather than having unfettered access to buildings, a smooth and fast authentication middleman can be added in to improve security, without greatly reducing costs.
The medical field is becoming increasingly dependent on the sharing of patient information. Current systems are not easily compatible, resulting in delayed transfer between physician offices, hospitals, and treatment facilities. QRU aims to use innovative technology to simplify the process of gathering and inputting patient data across different platforms. Current required paperwork for patients seeking treatment is redundant for each visit at a new or different medical facility or office. QRU is an app that doctors and patients would use exclusively, and it would hold their patient’s information and any medical information that may be critical in an emergency. The Microsoft PowerApps platform was selected to build the application because it is accessible to new programmers. Our team has 4 Cybersecurity majors, and we chose to use PowerApps because it was a website that gave you a template to create an app. We then used Microsoft Azure and Microsoft SQL Server Management Studio to add a database that holds all our data. The QRU application enables you to login or register as a patient or a doctor and access your patient profile. In this profile it has basic profile information such as name, age, insurance information. As a doctor you have access to the patient search feature which brings up a specific patient in our database and displays their information. This means that doctors have a quick and easy way to access any patient in their system and view their medical information to help assist in any treatment. This means that doctors will have access to all patient data with the scan of a QR code and be able to add updates and new documents to a patient’s profile which will be a comprehensive profile for a patient when complete.
The spread and unintentional consumption of misinformation has increased drastically in the past decade. The cause of this is not well known. According to a 2019 poll, 67% of Americans believe fake news causes a great deal of confusion, while only 26% percent of Americans feel “very confident” in their ability to recognize fake news. (Watson 2019) To combat this issue, we created SpoofSpotter. SpoofSpotter is a multi-platform application that is taking a proactive approach to combatting the unintentional spread and consumption of misinformation. Users are provided with a wide variety of curated news headlines, in which they will use their skills to determine which of these are not real. Failure to determine the fake news will direct users to a training module that will 1.) Teach them what they got wrong 2.) Teach them how to prevent this from happening in the future. 3.) provide other skills and information regarding dangers surrounding the spread and consumption of illegitimate information. We have successfully developed the core features for our app, allowing users to proactively learn how to spot fake information.
Using online voting tools in America is a very controversial and hot topic and has been
for about the past 20 years. In our project we tackle this issue by looking into the
viability of using online tools to conduct voting in secure and accessible ways. Over the
course of the class, we show who would need to use this system, what help they might
need to use it, and how it can be conducted as secure or more secure than current
voting systems – both public and private. Through work and research, we proved that an
online voting system can have the security of modern voting systems with high
accessibility while costing a fraction of the current system. This means that with an
upgrade of current voting systems the state can both save money and increase
accessibility all in one move.
In a constantly expanding, technology-centered world, it is more important than ever for companies to have a secure hosting option for their websites. In addition, it is necessary for every company to have competent security that includes penetration testing and plans on what to do in the event of a disaster. InfoTeach aims to make life easier for companies looking to get their website up. We will do all the work to configure the servers, get the website running, and support the website after our job is done. That way companies can enter themselves into the digital world without all the weight on their shoulders. InfoTeach looks to make a positive impact on companies who are looking to set up their website but do not have the technical knowledge to do so.
The current consumer privacy framework in U.S. law is outdated, allowing corporations to invade a user’s privacy using technology without consequence. In 2013 & 2020, the U.S. Government Accountability Office reported this issue to Congress, yet nothing has changed (Cackley 2020). iSeeU plans to change this by demonstrating to the public how powerful technology already is in invading user privacy, specifically facial recognition technology.
The choice to focus on facial recognition technology is an intentional one by the authors, as rather than conquer the impossible task of addressing every single technology that can invade a person’s privacy, focusing on facial recognition makes more sense as it is the most unavoidable in the authors’ opinion since it does not require a person to have or use anything.
iSeeU uses facial recognition technology to target the user with advertisements based on demographic information determined from the user’s image. iSeeU then explains how no legal controls on this technology prevent it from being abused (Cackley 2020). iSeeU finishes by asking the user to take two specific actions. The first is to bring awareness to the issue by sharing iSeeU with their social networks. The second is to ask the user to contact their congressional representatives to ask for legal controls on this technology, hopefully leading to a much-needed update to the consumer privacy framework in U.S. law.
A network of riders and drivers willing to carpool over long distances and share travel costs does
not exist. The development of HitchHike started because of this unmet need in the current app
market for a rideshare solution that is reliable, affordable, easy to use, and available to everyone.
Current options, including the private market and public transportation, leave users
underwhelmed with functionality and useability. The development team has integrated an app
that is clean and intuitive. Users can post rides that can be used to connect them to various
destinations, regardless of the distance. The application's add trip feature allows users to choose
their origin and destination, whether they are a rider or a driver. The design features lead from
one screen to the next without frustrating the user. Depending on users ' needs, it is easy to
search for existing rides or create new rides. By introducing HitchHike into the market, the hope
is to connect riders and drivers with common destinations for mutually beneficial travel
Nexum is a web application that gives students a place to communicate and share resources online. According to several studies, a lack of resources and an inability to make friends in class are two of the most prevalent reasons students drop out. Melanie Hanson's study for the Education Data Initiative (2021) found that 13% of students drop out of college due to poor social fit and 3% due to mental/emotional issues.
The solution to these problems is to develop a web application that allows students to connect with one another on a website where they can write posts and conduct one-on-one chats with classmates and mentors. This online application would also provide students with a centralized location in which they could find and access all the resources they could need.
Nexum will require the development of a database to store all the postings that the students will make as well as the one-on-one chats. Both the data and the website will be hosted on Azure.
Finally, Nexum is a platform where students can have private chats and get the resources they need to succeed in their academic courses in a safe and secure environment.
Many credit cards are often marketed towards young adults, who sign up for these credit cards without a second thought. Having credit cards early on during your career is good for building up credit score, but it could lead to misuse as not everyone will have a proper understanding of credit card management. Kredit King is committed to providing users with tools that prevent them from finding themselves in financial turmoil. These tools allow users to store their credit cards in one convenient location, set up single card or multiple card budget screen, analyze spending trends using various charts and graphs, and notify the user of which credit card to use for a particular payment to maximize their credit card cashback or rewards. This means that individuals will improve their credit score, manage their money more efficiently, and increase their spending power by effectively utilizing the rewards associated with their cards.
Over the past years, we encountered an incident lot of firms did not see the great impact (negatively and positively) it had on their day-to-day transactions. Some percentage of rising or small firms had difficulties accessing work-based resources and data. We came up with a solution to help small businesses solve this issue. Networkado can assist small businesses with network infrastructure and the move to a cloud-based solution. Due to the epidemic, most businesses would require more time to allow remote workers to use cloud services. Using easy methods to give users remote access, Networkado will save time and money while relocating. The main goal of this project is to build a wide-area network with a VoIP system that will allow mobile phones, PCs, and other IP-enabled devices to communicate both inside and outside the company. Because of its adaptability, we chose the agile strategy. Networkado is a step toward protecting organizations and enterprises in a world where information is publicly available due to security breaches and hacking. The network uses public network infrastructure to connect geographically dispersed nodes, allowing numerous off-site or remote workers to access the file server. You may also keep track of your staff using dedicated file servers. This necessitates keeping a watch on the actions of the users. This entails safeguarding critical files and keeping track of all data entering and exiting your company.
Significant barriers exist when trying to adopt a pet from a shelter. Adoption agencies lack the resources and tools to share crucial details and important demographics about their animals online. This lack of access and availability inhibits potential adopters from finding and adopting the right pet from an animal rescue shelter in their area. The obstacles adopters and agencies face surrounding digital communication, the growing number of animals in shelters, and adoption requirements emphasize a clear and current need for a solution. Swipet aims to streamline the adoption process by creating a web application that engages users to quickly find the right pet and providing shelters a digital tool to post their pets online. Swipet is a two-sided web application that caters to adopters and shelter organizations. On the adopter-facing portion of the app, Swipet will display animal images, bios, medical history, and other details about the pet to potential adopters in a design that encourages pet adoption. On the shelter/organization side of the app, Swipet will display users with a dashboard interface that handles adoption requests, activity monitoring, and supports animal uploads, updates, or deletions. With this approach, Swipet will eliminate many of the existing barriers between adopters, animals, and shelters. Utilizing emergent front-end frameworks and a reliable backend stack, the team at Swipet has developed a clean and engaging solution.
Due to changes to the technology and the ability to have most items delivered to their houses or have the items ready for pickup shortly after purchasing, millions of people take advantage of online shopping services. The problem with having so many online marketplaces is that the end user does not have the convenience of organizing their items. The Kartz application helps the end users by creating a place where they can keep track of the items. The application allows the user to add, edit, and delete items in the Items list. Kartz impacts the online shopping industry by making the experience seamless and organized.
Phishing is a dangerous form of cyber-attack that is frequently used due to the lack of awareness and training the public has. The intention of this project is to help small-to-medium-sized businesses prevent and educate their employees on phishing attacks. PhishBait is a free web solution that contains phishing templates, training videos, quizzes, a phishing campaign guide, and a dashboard to view quiz results targeted at small-to-medium-sized businesses. The results of this project will allow more small-to-medium-sized businesses to send out phishing campaigns, along with training and educating their employees about phishing. Preventing them from being the victim of phishing attacks. Overall, this means less time, money and resources spent by these companies.
ConnActivity is an immersive social media application for people to get connected once again encouragingly and proactively. ConnActivity’s purpose is to bring people together both in-person and online. ConnActivity being a web-accessible application gives users an easy way to access from any device. ConnActivity allows users to create their profiles, unique activities, user comments, likes, and posts. ConnActivity facilitates the proactive engagement between people using their activities as the connection.
Simple technology questions get asked every day. There are thousands of tools to help
technically inclined people get further in their careers and in their knowledge. Tools for learning
the basics of computer literacy are either reading documentation or watching videos, nothing
that allows for user interaction. Tenjin Tech aims to solve this by giving users interactive
challenges for basic computer skills. The team created a website with links to other learning
platforms and knowledge. The website also allows for users to access the web application and
select specific lesson plans and launch into lessons that ask them to solve a simple challenge.
The Covid-19 pandemic has made it even more important to know the basics in computer skills.
Tenjin Tech allows those who may have felt that technology was getting past them to learn in a
fun and safe environment.
The Hop social application was created to solve problems that the group found when socializing on the weekends. People were not able to meet up with friends, or spent most of their evening trying to, because they didn’t know which location their friends were at. When that person found their friends, they had to wait in a line outside the bar or restaurant to get in. After this individual got through the line and found their friends, they may have to wait again for a drink.
At this point, their friends may be ready to move on to the next location. Hop has been created to solve these problems and to make going out on the weekends a more fun and simpler process. Our team researched these problems and spoke with people in our target market to better understand their problems and what type of solution they would like to see. We also researched competitors that had similar solutions or those that users had heard about to understand how we could differentiate our product. Our group members downloaded other applications and used them so we would have firsthand experience in what worked well and what could be improved on to solve our users’ problems. We collected our insights as well as data received from conversations with target users. Our decision was to create an iOS application using the swift programming language, and the group had to conduct research to successfully utilize this language. As a group, we had no knowledge of this language, so we spent time researching the fundamentals and learning how the language works. We focused on how it interacts with other platforms and languages, and we learned how to use Xcode as our development environment. This research took a significant amount of time as swift is a fairly new language. Apple does have resources that we used and referred to as we worked on creating the application. After completing research and work on understanding the coding language, development platform, and other platforms used in the project, the group moved to look at the features that would be included. The research focused on wait times at bars and restaurants and how that could be minimized. The group also looked into different APIs and resources for implementing the features. We worked in Google Developer to understand their location data API and how that could be implemented into our application. We also completed research on how we could get another user’s location data, a friend the user has added, to display on their map. This was a more difficult task that led to the decision of supplying friend location data through their status. The majority of our research was completed based on each group members’ experiences and through talking with other people at bars and restaurants. We created Hop as a solution to these problems and as a way to make going to bars and restaurants easier. Our solution makes the experience easier and more efficient for users while allowing the bars to benefit through promotion and partnerships.
Cinderella's Closet's inventory management and event scheduling software is an innovative approach
to a complex problem that Cinderella's Closet faces when planning and managing their events. This
app is designed to simplify workflows and increase efficiency of managing high school girl's
appointments and integrate an inventory management system. It is made accessible through web
technology so that there is no need to install software and the app can be accessed through any
device with a web browser, including both mobile and desktop
This project is meant to help single fathers improve their day-to-day lives by improving accessibility to needed resources who will not discriminate against them, increase the opportunity for them to meet other single fathers in their area, and let other single fathers know about their experiences with resources that other single fathers may be looking for. It will accomplish these goals by allowing them to search for locations and services near them or somewhere they may be traveling. Once they identify a resource, which they may choose to use, they will gain access to reviews and ratings made by other single fathers who used the same resources. This will let them know if they should expect to be treated with some bias or be treated as any other parent would be treated. They would also be able to create events which they could advertise to other single fathers in their area, which would allow them to meet other single fathers and socialize their children. This web application is put together using Java Spring Boot, HTML, CSS, and PHP. The Google Map API is configured to only pull reviews for locations from the applications database and not public reviews. The messaging feature allows users to establish connections with other users and create chats for events that they create. This web application will help to resolve four areas of concerns identified in the research for this web application. Those concern themes are health, perceived bias, lack of peer connection and stress relief. This web application will help an increasing demographic which has gotten little assistance, even though it suffers from worse mental and physical health than any other parenting group. This improvement will, in turn, benefit the children of single fathers.
Tsukioka Yoshitoshi (1839-1892) was a Japanese print maker. His artistic career bridged between the Edo Period (1600-1868) and the Meiji Period (1868-1912). With the start of the Meiji Period, Western technologies and ideologies were introduced to Japan. The art of printmaking had long been a tradition in Japan, especially revered during the Edo Period; however, the introduction of photography began to threaten the tradition. Yoshitoshi is considered to be the last great ukiyo-e artist that used his prints to revitalize and modernize the tradition of prints. His series One Hundred Aspects of the Moon was his last great print series.
The only artist to be featured at all eight Impressionist Exhibitions in Paris was Camille Pissarro. The Impressionist movement emerged during a period of rapid social change and growing industrialization with more people moving to cities. In Pissarro’s works, he specifically concentrated on the conditions of different weather and times of day to alter how he painted scenes of a city. My paper focuses on the Boulevard Montmartre series and his use of building tonal relationships and skill of lighting placement across the fourteen paintings in order to establish a harmonious composition where the day’s essence radiates off the canvas.
William Morris, a famous 19th-century British textile designer, craftsman, Socialist, and poet, was a prominent and multifaceted figure. His flattened, floral designs were inspired by his love for the 14th- and 15th centuries and generated the Arts and Crafts Movement. Morris briefly worked as a painter and founding member of the Pre-Raphaelite Brotherhood. In his only surviving oil painting, La Belle Isuelt, Morris depicts the medieval subject, Iseult, from Sir Thomas Mallory’s Le Morte D’Arthur, 1485. Through the theme of Arthurian legend, reference to medieval symbols, wall tapestries, and other motifs, Morris displays his admiration of Medieval themes.
If life is said to imitate art, then Suzanne Valadon’s rebellious, unorthodox, bohemian lifestyle is reflected in her artworks. Valadon's choice of the nude as the primary focus of much of her work reveals much about her role in society. A as a member of the working-class, Valadon was able to step outside the domestic and painted within the traditionally male domain. The art of Suzanne Valadon has been reprised in recent years as feminist art historians have been questioning the art historical canon and challenging the ideology of the nude as a masculine domain. This paper will discuss Valadon’s time as a model, what influence this had on her works, and her relationship with Edgar Degas, her family, and female contemporaries. It will also examine why Valadon chose the nude as the primary focus of much of her works and what this says about her role in society. Through this study, I hope to give better insight on why Valadon’s works were championed during her life, but the recognition faded after her death. Through her work, Valadon challenged not only the rules of the day, but she reclaimed the female nude in her work, the woman was no longer an object to be viewed but a subject in her own right.
This is a biography of the Shawnee tribal chief Tecumseh. The early childhood of Tecumseh is researched all the way to his death at the Battle of Thames in 1813 in this biography that sticks to the truth and cites sources from different authors. Originally this research project was just a capstone project for a class but as the research accumulated, I found the need to create this biography about Tecumseh. Tecumseh made a confederation of like-minded tribes to combat the encroaching United States' government in the late 18th century and early 19th century. All the information that is presented in the biography has been researched and edited. With more than 50 hours of research involved with this biography, the historical contributions regarding The War of 1812 are noteworthy and the contributions made regarding the killer of Tecumseh are found in this biography as well. This isn't a complete overview of Tecumseh's life, but rather this biography details the life of a Shawnee in a time rich with civil strife during the expansion of the United States after the Northwest Ordinance of 1787. The Heritage Village Musuem in Sharonville, Ohio allowed for me to intern during the summer of 2022 to bolster the accuracy of this biography.
Why do the majority of allegorical figures in art take on a female form? What does this tell us about the way women were viewed in their societies? This essay examines the relationship of the female form in allegorical prints and European Renaissance society in the 15th century.
The University of Cincinnati Art Collection houses prints by two early 20th century German Expressionist printmakers, Max Pechstein (1881-1955) and Käthe Kollwitz (1867-1945). Pechstein’s Das Vater Unser (The Lord’s Prayer) series (1921) originally a portfolio of twelve, is represented in the University of Cincinnati Art Collection with nine of the bold woodcut prints. Kollwitz’s small postcard lithographs, Two Chatting Women with Two Children (c. 1930) and The Hospital Visit (c. 1926), are intimate and show the artists soft touch. Though formally very different, these prints share a common subject, the suffering of Germans during the interwar period (1918-1939). Both artists personally experienced both World Wars and their tragedies, and while Pechstein rarely addressed it directly, Kollwitz’s career was full of her antiwar sentiments. The prints grapple with the grief, political turmoil, and financial difficulties associated with the interwar period and each artist turns to their own form of religion to exercise their pain.
A visual analysis of the Kanagawa-oki Nami, or the Great Wave off Kanagawa by the Japanese
ukiyo-e printmaker Katsushika Hokusai and its impact of Western Art culture following the Meiji Restoration of 1867
This essay investigates the complex subject matter and the significance of Félix Bracquemond’s etching Le Haut d’un battant de porte (The Top of a Door) through a biographical approach, visual analysis, and examination of the artist’s creative process and intentions. The investigation demonstrates that this etching is not only unusual for its clarity, but also for its ambiguity. The seemingly contradictory yet complementary characteristics – clarity and ambiguity – coexist in this work. It is the coexistence and interaction of clarity and ambiguity that makes this work more significant and intriguing.
Draft of capstone class final project. Includes file of images and wall labels for DRAFT of the exhibition. Includes prints from the UC art collection from the 16th century, 17th century, 18th century, 19th century, and 20th century.
The representation of architecture within art is a main theme for artists of all time periods. Within the UC Art Collection, prints display different stylistic approaches from abstract to realistic when portraying architecture. This exhibit will display five prints that compare and contrast the idea of stylistic approach. By viewing these artworks, there is the question as to why artists chose to portray the two types differently. Does the style dictate the importance or function of the architecture? Through exploration, one could say that there is a correlation between the type of architecture and its stylistic rendering. When viewing the examples of the collection, architecture that is considered monumental, such as cathedrals or government buildings, seem to be portrayed with realistic detailing and perspective, leaving no room for artistic expression in the portrayal. On the other hand, common architecture is portrayed with more abstraction but allows more freedom of expression from the artist to interpret the structure. Is one better than the other or do these two separate approaches give their subjects individualized attention to their charms?
Starting a food producing garden should be easier to do successfully. Getting data related to your specific gardening conditions can be time consuming and tedious for the average person who does not have any gardening experience. In 2020 during the coronavirus pandemic, there has been an increase in food insecurities for people because of grocery supply chain fulfillment concerns. A simple yet shocking Google trends search for terms like “how to start a garden”, “food shortage”, and “food insecurity” since 2004 in the US have more than doubled in March of 2020 alone, during the beginning of the coronavirus pandemic. A search for “garden apps” has also shown more than double the interest in the same time frame on average.
People want and need to grow their food to reduce their food anxieties. Having an alternative food source can also reduce national food-related supply chain disruptions caused by climate change, natural disasters, or even global pandemics.
STEMMED Gardens was created to make gardening easier by crowdsourcing scientific data and real-life gardening success and failures. We created an iOS and Android application with an Azure based backend for users to be able to plan, maintain, troubleshoot, and share those gardening experiences. New and experienced users can easily retrieve and identify plant information and gardening techniques that can be used in each stage of their personal food garden journey.
Phishy is a service intended for security administrators in order to allow them to launch several simultaneous, simulated phishing campaigns to gauge and improve the phishing awareness of employees within their organization. With our service, we want to take security awareness training to the next level. We designed Phishy to help combat the major phishing problem companies face today and to help better educate employees on the dangers of phishing. Currently, there is not an open-source platform that acts as a “one stop shop” for managing phishing campaigns and users’ phishing awareness training. Phishy fills this need by helping its users launch realistic phishing campaigns, utilizing WGET to clone websites in order to create realistic phishing situations. Along with giving users the ability to create practical phishing training for their organization, live visual and data analytics will be provided with tools such as Elasticsearch and Kibana. Since we know how busy security professionals are, it would be unlikely that each user who falls for a phishing simulation would be able to receive security training catered to what phishing tactic they fell for. Phishy has the ability to track which users are falling for which phishing scams and enroll them into specific phishing awareness training based on their interactions with the phishing simulation. Our hope is that Phishy will provide security professionals with a comprehensive tool that will allow them to better train and prepare their organization against the dangers of phishing
As of 2019, it was estimated that over 21 million people in the United States go without reliable Internet connectivity (Winslow, 2019). The Internet is integral to everyday life now more than ever; many relying heavily on it for conducting work, obtaining an education, and maintaining communications. Because of these benefits and reliance, it is essential for anyone to have access to the Internet when it is needed, especially in cases of emergency. However, many people do not have the financial resources or technical know-how to stay connected. Our PANIK Guide hopes to help solve this issue by providing a user-friendly approach to setting up an inexpensive mesh network that can be used to help provide this access in areas and times where Internet connection is needed most. PANIK Kits are an affordable, easy to set up, quickly deployable approach to help connect those who are in most need of these resources.
Since February 2020, tickets coming in over channels like WhatsApp, Facebook Messenger, direct messages over Twitter, and SMS rose nearly 50 percent. While this is convenient for the user, this could result in tickets not being generated for the help desk and may be negatively impacting their tracking metrics. Our solution integrates itself within multiple commonly used messaging and support desk platforms. This provides end users with easy solutions for their common problems and granting them an easy way to make a support ticket should they require additional support from their help desk. By using readily available technology, we are bringing an easy-to-use solution to those in need of support in a way that is convenient for the end user and easy for the support desk to track. Our Solution provides an easily accessible chatbot that provides end users with quick level one support.
In today’s ever-changing world, people are beginning to increasingly feel the effects of climate change. Many users want to make an impact, but many do not know how they can do to play their part. GreenImpact is the ultimate solution for users to have a better understanding of environmental problems and realize that everyone can contribute to solving environmental problems. Green Impact combines the feed of information, maps locations of social welfare projects, tracks green activities, shares what they find, and gets rewarded points. Based on the research of Pew Research Center surveys dating back nearly two decades, nearly as many Americans say protecting the environment should be a top policy priority (64%) as say this about strengthening the economy (67%) (February, 2020). Our application will serve as a tool for environmentally conscious people, who want to track their actions and see how they are making an impact.
Knowledge bases are a growing industry due to the information required in the background to support multiple applications and daily tasks for employees. These knowledge bases are filled with an abundance of information. This information could include passwords, keys and other credentials that could be critical for an organization. According to the Verizon Data Breach Investigations Report, 78% of attacks on web applications involved the use of stolen credentials with credentials and personally identifiable information as a target. With the Mismanaged Credential Finder, this application is looking to find and help remedy credentials that are in these knowledge bases. By doing so, this application is looking to help IT professionals manage their knowledge base and enforce cybersecurity policies. In doing so, our goal is to minimize risk due to a knowledge base breach for an organization.
Introsec is an informational program that introduces middle and early high school students to the realm of cybersecurity. This web application consists of a series of interactive gamified labs that help students develop skills that are relevant to their personal cybersecurity and the broader industry. According to security firm ProtectWise, 67 percent of millennials have never taken a cybersecurity class (Delaney, 2018). Based on our research, there is a need for a quick and interactive course to introduce middle and high school level students to the basics of cybersecurity and gauge their interest in the field. Introsec provides a fast, fun and effective way to get hands-on experience without needing to commit to a long camp or series of courses. We have created a functioning web application that provides students with basic information about aspects of cybersecurity through multiple scenario-based games.
SchoolSpace is the best solution for any parent or student concerned about Covid-19. By using SchoolSpace students can gain a better understanding of key curriculum classes such as Math, Science, English, History and even Chemistry. There are many functions that SchoolSpace can provide. By using SchoolSpace users will be able to learn these courses through both interactive mini games and cool visuals that will make learning the subject more fun. Additionally, users will be able to create their very own avatars that they can make it look as if they're actually in the game as well as interact with their own classmates!
Simply Scheduled is a solution for Bridger Brewing’s Management and similar small businesses who want to digitize their schedule. Software Advice states that 61% of small businesses experience faster, easier, and more accurate scheduling by using scheduling software. Of those, 70% use a system created specifically for scheduling. The use of an application that provides flexibility for managers and employees to establish an organized digital schedule significantly reduces the administrative load on small businesses. We have supported the Bridger Brewing company by developing a web application that makes their scheduling process simple, quick, and transparent. The integration of overtime visibility, automated scheduling, and team messaging can help the company reduce the time required to create and maintain a schedule, saving money while reducing the strain on managers.