Although faculty does research in various areas of computer science, the students are required to complete special projects before they graduate. Past special projects have been such topics as: Robotics, High Performance Computing, GPGPU technology, Elliptic Cure Cryptography, Genetic Algorithms, and Secured Network Environments.
Tracking a Stolen MacBook
The seminar objective is to track a stolen Mac-Book. Since there are numerous ways to track a Windows PC, the focus of this implementation is geared towards the Apple Mac-Book because the ways to track a Mac-Book are scarce. It was decided to name our project, Trac-A-Mac. Trac-A-Mac is a program created to assist victims and law enforcement officials in the recovery of stolen Mac-Books and the apprehension of the guilty party. Trac-A-Mac is a script that is able to grab the IP address, MAC address, and is also able to take pictures of who is using the computer with the built in camera. The presentation will consist of a demo showing the process of recovering the stolen Mac-Book and also the script used to do such. (Maya Norman and Michael Perry, Advisor: Dr. C. H. Chen)
My Quality Assurance(QA) Experience within the IT Industry
The project begins with a general understanding of what defines QA; followed by a discussion of the necessity of Quality Assurance. Additional topics include: QA roles and responsibilities within the IT industry; particularly within large companies (fortune 500) verses smaller companies from the researcher's exposure and experience; as well as future trends. (Bernard Neely, Advisor: Dr. C. L. Chen)
Steganography - Feasibility of Embedding data to Media Files, Securing information, to insure its confidentiality, is very important especially with sensitive data. One popular method is cryptography, which alters the data in a manner that renders it incomprehensible. Experimenting with another solution, a more subtle one, and discovering how feasible its use is with different media file types is the goal of this project. Steganography is the act of hiding or disguising information to deceive whomever intercepts it into thinking the data being passed is innocent, not what it actually is. Digitally, a good example of this is an image/text hidden within an image. This presentation will demonstrate working examples of Steganography and conclude with the researcher's findings. (Elijah Mike, Advisor: Dr. C. L. Chen)
The presentation will discuss computer animation, the history, and the difference between 2D and 3D animation. (Alfonzo Elliott, Advisor: Dr. C. L. Chen)
Using a webcam to capture and recognize hand movement to move and control the mouse cursor. (Terrence Carroll, Advisor: Dr. C. L. Chen)
Software Engineering: Software Development Life Cycle
The presentation will discuss the process used to complete a website for the Integrative Biosciences Research Experiences for Undergraduates for Dr. Bolden. It will mainly focus on the requirements and test. Also included will be the introduction of the concept of a system development life cycle (SDLC) model. Discussion includes SDLC methodology process during the life cycle, the challenges faced, and future work that can enrich the software. (Jasmine Battle, Advisor: Dr. C. Lester)
"Can a user with limited knowledge gain access to the secure data flow in a radio-frequency identification system?"
Radio frequency identification technology has gained much popularity in recent years due to its convenience and economic effectiveness. Despite its popularity, radio frequency identification technology does have some security issues that have proved to be of concern. The very way in which information is transferred can be prone to security breaches by those who have knowledge and access to the software and hardware needed to conduct attacks. This experiment was designed to determine if a person with limited knowledge and limited resources can in fact create a security risk to a simple radio frequency identification technology system. (LaQuana McCall, Advisor: Dr. C. Lester)
Matrix Multiplication using Graphics Processing Units
A graphics processing unit (GPU) is a specialized processor that offloads 3D or 2D graphics rendering from the microprocessor. Modern GPUs are very efficient at manipulating computer graphics, and their highly parallel structure makes them more effective than general-purpose CPUSs for a range of complex algorithms. Many computations involve matrix and vector operations, so the study of the use of GPUs for non-graphical calculations has increased. I will be discussing the benefits of general –purpose computing on GPUs, also known as GPGPU. This is a technique of using s GPU to perform computation in applications handled by the CPU. There are many areas where GPUs have been used for general purposes; however, this presentation will discuss its use for matrix multiplication and compare the speed and accuracy of this type of computation on CPU verses a GPU. (Jessica Brazelton, Advisor: Dr. F. Wu)