1 The Proceedings of the 9th Annual Computer Science Conference

The Proceedings of the 9th Annual Computer Science Conference.
Made possible in part by…
Organized by the School of Computer Science, University of Windsor.
Held on Friday, March 27, 2015.
Student Life
Enhancement Fund
Faculty of Science
School of
Computer Science
ComCom
1
This is not meant as an official document for citation purposes, but as a reference for
participation for those involved. Like past years, work presented as this conference is not published
outside of the School of Computer Science.
14 students showcased their presentations during the event. 13 students submitted videos to a
new session called “Cool, Clever, Creative Computing” (or “4C”), requiring videos up to 60 seconds long.
These two types of submissions were judged for prizes, to be announced at the end of the event.
Winners for the event can be seen on the conference website at conference.cs.uwindsor.ca .
The judges for the presentations were Dr. Stephanos Mavromoustakos, Dr. Satish Panigrahi,
Pooya Moradian Zadeh, and Supriya Supriya. The judges for the 4C video competition were Nikolai
Momot, Ryan Lawson, and Denis Alam, from student club “Developer Confederation.”
The event was generously sponsored by EPICentre (for food and location), Student Life
Enhancement Fund, Faculty of Science, School of Computer Science and GSS (all for providing funding
for awards).
The event was organized by Andrew Hlynka, Jay Raichandami, Supriya Supriya, and Santosh
Upadhyayula, led by faculty member Dr. Imran Ahmad. Additional thanks to Dr. Scott Goodwin, Dr.
Boubakeur Boufama, Dr. Ziad Kobti, and a very special thank you to Karen Bourdeau, Margaret Cookson
Garabon, and Stephen Karamatos.
2
9:00
9:20
BREAKFAST /
REIGSTRATION
Dr. Imran Ahmad
Opening / Welcome
Speaker
Presentation #1
(Poster)
Presentation #2
(Poster)
"Prediction of Human Emergency Behavior and Their Mobility Following Large-Scale Disaster"
Sravya Vangala
9:50
Presentation #3
(Poster)
"Logic and Reasoning Using Subjective Logic"
Jeffrey Drake
10:00
Presentation #4
(Poster)
"5 Pen PC Technology"
J Raghavendra Kumar
10:10
Presentation #5
(Oral)
"Data Storage Methods in Acquiring Information From Systematic Reviews"
Jeffrey Drake
10:30
Presentation #6
(Oral)
"Sums Are Something, Tag You're It!"
Eric Brisco
10:50
10 MINUTE BREAK
11:00
4C Video
Competition
"Cool, Clever, Creative Computing"
A collection of 60-second videos showing art, apps, game development and more by University of Windsor students!
Submissions by David Bergeron, Chris Brogly, Anthony Cavallro, Sam Burton, Jonathon Donais, Valerie St.
Gelais, Scott Goodwin, Andrew Hlynka, Jssamyn Medler, Justin Moore, Ryan Scott, Colin Totten, Halen Whiston.
11:10
External Keynote
Speaker
"Bridging Modern Theory with Modern Practice"
Aaron Mavrinac
9:30
9:40
"Overlapping Communities in Dynamic Networks: Their Detection and Mobile Applications"
Mukund Pandey
11:50
LUNCH
12:00
External Group
Speaker
12:20
10 MINUTE BREAK
12:30
Presentation #7
(Oral)
"Automated Vehicle Detection and Recognition"
Iqbal Singh
12:50
Presentation #8
(Oral)
"New Approach For Automated Human Actibity Recognition"
Pejman P.H. Habashi
1:10
Presentation #9
(Oral)
"Aspect-Based Sentiment Analysis in Microblogs"
Chukwuma O Ejieh
1:30
Presentation #10
(Oral)
"Strategic Decision Making in Healthcare Decision Support Systems"
Numanual H. Subhani
1:50
10 MINUTE BREAK
2:00
Presentaiton #11
(Oral)
"Pixel Matching on Zoomed Images"
Dominik Jaworski
2:20
Presentation #12
(Oral)
"An Agent-Interaction Machanism Framework Based On 'Near-Term Analysis' Framework"
Anivesh R .Minipuri
2:40
Presentation #13
(Oral)
"An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage"
Raja Sankar Dileep Muddu
3:00
Presentation #14
(Oral)
"Using EcoSim To Discover The Benefits of Using Different Mating Modes"
Ryan D. Scott
3:20
10 MINUTE BREAK
3:30
Closing Speaker /
Winner
Announcements
4:00
End
Session 1
9:30 - 11:00
Session 2
11:00 - 1:00
"Path to Entrepreneurship"
Brad Colthurst, EPICentre
Session 3
12:00 - 2:00
Session 4
2:00 - 3:30
Dr. Ziad Kobti
3
"Overlapping Communities in Dynamic Networks: Their Detection and Mobile Applications"
Mukund Pandey
Title
Overlapping Communities in Dynamic Networks: their detection and mobile applications
Author(s)
Nam P. Nguyen, Thang N. Dinh, Sindhura Tokala, My T. Thai
Author
Location(s)
University of Florida, Gainesville, FL, USA
Abstract
Many real-world problems related to the mobile networks possess the involvement of community structures and their
detection. Knowledge of the network gives information not only about the principles on which the network is
structured but also an insight about how to create other efficient algorithms. Authors in this paper are concentrating
on- first, detection of communities which overlap with one or more other communities in the same social network, the
second is if it's possible to update and configure the new structure of the network without starting from the scratch.
And, the third question which authors are willing to solve is how the detection of the overlapping network
communities help mobile applications. For this, authors have proposed a two-phase framework called AFCOS
(Adaptive Finding Overlapping Community Structure), which not only detects network’s overlapping community
structure but also tracks their evolution in dynamic mobile networks.
"Prediction of Human Emergency Behavior and Their Mobility Following Large-Scale Disaster"
Sravya Vangala
Title
Prediction of Human Emergency Behavior and their Mobility following Large-scale Disaster
Author(s)
Xuan Song, Quanshi Zhang, Yoshihide Sekimoto and Ryosuke Shibasaki
Author
Location(s)
Center for Spatial Information Science, The University of Tokyo, Japan
Abstract
The frequency and intensity of natural disasters has significantly increased over the past decades and this trend is
predicted to continue. Facing these possible and unexpected disasters, accurately predicting human emergency
behavior and their mobility will become the critical issue for planning effective humanitarian relief, disaster
management, and long-term societal reconstruction. In this paper, authors tried to build up a large human mobility
database (GPS records of 1.6 million users over one year) and several different datasets to capture and analyze
human emergency behavior and their mobility following the Great East Japan Earthquake and Fukushima nuclear
accident. Based on our empirical analysis through these data, we find that human behavior and their mobility
following large-scale disaster sometimes correlate with their mobility patterns during normal times, and are also
highly impacted by their social relationship, intensity of disaster, damage level, government appointed shelters, news
reporting, large population flow and etc. On the basis of these findings, authors developed a model of human
behavior that takes into account these factors for accurately predicting human emergency behavior and their mobility
following large-scale disaster. The experimental results and validations demonstrate the efficiency of behavior
model, and suggest that human behavior and their movements during disasters may be significantly more predictable
than previously thought
4
"Logic and Reasoning Using Subjective Logic"
Jeffrey Drake
Title
Logic and Reasoning using Subjective Logic
Author(s)
Jeffrey Drake
Dr. Kent
et al.
Author
Location(s)
Windsor
Abstract
We have been looking into the use of Subjective Logic to analyze and reason about data. This system
represents work towards that.
"5 Pen PC Technology"
J Raghavendra Kumar
Title
5 PEN PC TECHNOLOGY
Author(s)
J RAGHAVENDAR KUMAR
Author
Location(s)
UNIVERSITY OF WINDSOR, WINDSOR
Abstract
Five pen pc shortly called as P- ISM (Pen -style Personal Networking Gadget Package) is a new discovery in the field of pen
computing. It is under developing stage by NEC Corporation. Pen computing is a field that outlines computer like user interface
that makes use of pen like devices that will be convenient to use in comparison to contemporary systems (such as laptops, desktops
etc.). 5 pen pc technology with digital pen makes it possible to obtain a digital copy of handwritten information, and have it
transferred to digital devices via wireless technologies, which operates as the main interconnecting device between different
peripherals. The whole set is also coupled to the Internet which makes the communication even more easy and efficient.
P- ISM is a gadget package including five functions: a CPU pen, communication pen with a cellular phone function, virtual
keyboard, a very small projector, and a camera. All the 5 pens are connected to each other via wireless technology preferably
Bluetooth,i.e, 802.11 BG. P- ISM’s are connected with one another through short-range wireless technology. The whole set is
also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the
ultimate ubiquitous computing. This technology can be used for various purposes. It can be utilized for multimedia functions. All
the web related tasks can be performed by the user. Additionally, it can perform all the tasks similar to a dual core processor
system. Also, it adds a layer of security.
5
"Data Storage Methods in Acquiring Information From Systematic Reviews"
Jeffrey Drake
Title
Data storage methods in acquiring information from systematic reviews.
Author(s)
Jeffrey Drake
Dr. Kent
et al.
Author
Location(s)
Windsor
Abstract
In a research project into traffic road injury prevention, our research group has been engaged in acquiring results
from previous systematic reviews, and adding to the data. A tool has been developed to help store the data.
"Sums Are Something, Tag You're It!"
Eric Brisco
Title
Sums are something, tag you're it!
Author(s)
Eric Brisco
Author
Location(s)
Windsor, Ontario
Abstract
I can give a talk on implementing and using ADTs in languages without native support for them. I will use Java as a
primary example because it is probably most applicable to the audience. This talk is focused on applied computer
science and not theoretical definitions or theoretical implications.
What is an ADT? (brief summary)
Implementing ADTs in Java
Using Maybe and Either (case examples)
Extra considerations
6
"Bridging Modern Theory with Modern Practice"
Aaron Mavrinac
Title
Bridging Modern Theory with Modern Practice
Author(s)
Dr. Aaron Mavrinac
Author
Location(s)
Windsor, Ontario
Abstract
I spoke with Dr. Boufama about giving a talk on putting state-of-the-art research and theory into practice in a
production environment. I got my best exposure to this as a recent PhD graduate working as a research engineer at
Bosch on their automated driving project, and I have since left that position to focus on building a small business (in
part) around experiential education here in Windsor. The talk should speak to graduate students (specifically in CS),
who acquire formidable theoretical knowledge but often don't have much chance to develop practical implementation
skills up to modern industry standards; it will also cover the entrepreneurship base as a bonus.
I'd like to entitle the talk "Bridging Modern Theory with Modern Practice" to emphasize an approach to leveraging the
benefits of both ivory tower and hard-nosed industry in the computing world.
"Automated Vehicle Detection and Recognition"
Iqbal Singh
Title
Automated Vehicle Detection and Recognition
Author(s)
Iqbal Singh
Author
Location(s)
Windsor, ON
Abstract
Vehicle Identification is important in many applications e.g. Border Security, Automated Toll Collection etc. Vehicles
can be recognised by many features. Some of these features are unique such as license plate and others such as
color and shape are not unique. Machine vision can be used to extract such features such as color, shape, license
plate etc. Vehicle identification involves many aspects, primary aspect being license plate. However, in number of
cases this feature alone can be misleading. Conversely, it can be tampered with and can be switched to different
vehicle easily. Using machine learning paradigm, we propose a new vehicle identification model that is based on
automatic plate recognition and vehicle type identification.
7
"New Approach For Automated Human Actibity Recognition"
Pejman P.H. Habashi
Title
New Approach for Automated Human Activity Recognition
Author(s)
Pejman Habashi, Dr. Boubakeour Boufama, Dr. Imran Ahmad
Author
Location(s)
Visual Processing Lab,
Computer Science department,
University Of Windsor
Abstract
Automatic Human activity recognition (HAR) is a very active and challenging area of computer vision. The main goal
of HAR is to detect the type of activity which is currently being done by the human subject in a sequence of images
aka videos. Many different methods have been proposed during the last two decades, but, due to difficult nature of
the problem, the performance of those methods is far from optimum.
Each video has a lot of information and most of them are irrelevant for recognition of human activity, for example the
color and texture of the actor clothes or the distance of actor to camera usually is not related to the type of activity
which is performing. For this reason, each HAR system uses an intermediate representation for the activities. This
representation is the heart of any HAR system. A good representation should eliminates the non-related information
while keeping the related information as much as possible.
One of the most successful representation methods proposed in the literature is the bag of features (BoF). In this
method, each activity is represented as a sparse set of feature points. Traditionally the feature points are extracted
based on appearance based information (i.e. pixel values in a neighbourhood). These methods usually look for most
informative local points in a video (feature points or interest points) and define a descriptor around those points
(feature descriptor). Despite the simple nature of BoF methods, their result on actual data is relatively good.
To best of our knowledge all of the descriptors proposed in the literature benefited only from visual information (i.e.
pixel values, their derivatives and etc.) in a small neighbourhood. This way all movement clues (which we believe are
informative for activity detection) are eliminated.
Tracking of feature points is relatively simple. For example Lucas and Kanade Tracking (KLT) is one of the first and
simplest methods for tracking feature points. Event though this simple method can be used to capture the
movements of feature points in the video, the amount of movement in the real environment depend on the depth of
those point. Thus, this value need to be normalized relative to the depth of feature point.
In order to incorporate movement clues in HAR, we proposed a new descriptor calculation method. We captured two
videos of the same event using stereo cameras. In each step we found the corners in left and right frames. Then we
extracted SIFT feature descriptors for each of them. Then we matched left feature points with right counterparts and
calculated the disparity for each feature point. Then we tracked the movement of these points in few next frames.
This produced a spatio-temporal trajectory for each feature point in 3D XYD space. (X and Y represent the pixel
location spatial domain and D represents the disparity domain (not Depth)). Since disparity is proportional to the
reverse of depth, we have normalized our movement descriptors with disparity.
8
"Aspect-Based Sentiment Analysis in Microblogs"
Chukwuma O Ejieh
Title
Aspect-based Sentiment Analysis in Microblogs
Author(s)
Chukwuma EJIEH
Author
Location(s)
University of Windsor
Abstract
One of the important reasons for information gathering is to know what people think about. The rise of social
websites in the past decade has presented us with new avenues to explore what people think and gather their
opinions about diverse topics of discussion. Such gathering of sentiments and opinion is useful to businesses to
know what their customers think about their product and services and also by politicians and lawmakers to gather
public opinion about a certain policy.
Although, sentiment analysis and opinion mining has a lot of application areas apart from the business and political
world, its domain of operation has been limited to news streams, blogs and reviews. Due to the rise in usage of
microblogging sites like Twitter in past few years, some research has been going on in exploring microblogging sites
as domains for sentiment analysis and opinion mining.
Mining sentiments in microblogging sites is a challenging task because microblog posts are short (a Tweet is a
maximum of 140 characters), the use of informal language and mis-spelling of words is frequent in microblogs (e.g.“I
luuuuuuuuuuv this my new 4one”) and also the volume of unstructured data is does not making it easy to perform
some preprocessing tasks and labeling (for classification sake). Researchers have been able to address these
problems to a reasonable extent with the help of Machine Learning and Natural Language Processing techniques but
they only analyse microblogs at the entity level, not the aspect level.
Aspect-based sentiment analysis is a more fine-grained approach in which opinions of an aspect of an entity is
mined. For example, consider this tweet “the iPhone6 rocks in sound quality but the display sucks”. The above tweet
expresses positive and negative opinions about two different aspects (speaker and screen) of a particular entity
(iPhone 6). Current sentiment classifiers used on microblogs would not correctly classify the opinions expressed in
this tweet because they do not analyse sentiments at the aspect-based level. Other tweets like “I wish Obama’s
policies were as cool as his suits” would be classified as positive sentiment because the tweet did not contain any
explicit negative word.
A lot of work has been done on aspect-based sentiment analysis in product reviews and movie reviews. Very little
work has been done as regards aspect-based analysis in microblogs. A review of the basic approaches to sentiment
analysis and aspect-based sentiment analysis would be contained in the presentation. Also challenges and progress
on the work being done in the microblog domain would be reviewed and a proposed approach of solving the problem
of mining aspects in tweets would be discussed.
"Strategic Decision Making in Healthcare Decision Support Systems"
Numanual H. Subhani
Title
Strategic decision making in healthcare decision support systems
Author(s)
Numanul Hoque Subhani
Author
Location(s)
University of Windsor
Abstract
In Ontario, the most populous province of Canada, healthcare is expected to represent 66 % of government
expenditure in 2017 and close to 100 % in 2026 [1]. Total provincial health spending has grown at an average annual
rate of 7.5% over the last ten years, compared to only 5.7% for total available provincial revenue (including federal
transfers), and only 5.2% for GDP [2]. Emerging technologies increase the need for personalization of healthcare
systems, quantified self, and wearable healthcare devices [3]. Increasing rates of chronic illness and aging
population require more technological innovation [4], and self-sustainable healthcare systems that fulfills the demand
of healthcare costs, skilled workforces and continuous innovation.
In order to achieve a sustainable healthcare system, it is necessary to develop decision support systems that rely on
information creation through predictive analytics. This is a priority to support strategic decision making in the realm of
Big Data and Business Intelligence (BI). At the core of user-generated analytics is a philosophy and focus for
reducing variability in process operations. Defining process and incorporating statistical analytic methods to measure
the process performance through various attributes are steps towards developing a methodology. We will present a
methodology that combines the available and mined data through analytics to monitor effectiveness of the strategic
decision and overall performance of the process.
9
"Pixel Matching on Zoomed Images"
Dominik Jaworski
Title
Pixel Matching on Zoomed Images
Author(s)
Dominik Jaworski
Dr. Boubaker Boufama
Author
Location(s)
Windsor, Ontario
Abstract
Stereo vision is the practice of obtaining 3D information from an image pixel. Using stereo images (2 images of a 3D
scene), a camera is used to obtain the depth of the scene. Pixel matching operations are used to find matches
between points that correspond in two images.
Matching images at different zoom levels has it's own set of issues. Stereo images are just off set images which
have some constraints that make it easier to locate the corresponding pixel in the other image. Traditional
constraints have less use for zoomed images since their is no offset to the side, and the size of objects changes.
A program will be built that will perform dense matching on zoomed images. A GUI will be able to load in images at
different zoom levels from file, and detect matches between points. After which, user input on one image will show
the corresponding match in the other.
"An Agent-Interaction Machanism Framework Based On 'Near-Term Analysis' Framework"
Anivesh R .Minipuri
Title
An Agent-Interaction Mechanism Framework based on “Near-term Analysis” Framework.
Author(s)
Anivesh Reddy Minipuri
Author
Location(s)
Windsor, Ontario
Abstract
In many domains where situations are dynamically changing “what-if” analysis is a critical situation. To estimate the
changes of a particular organization under uncertainity is essential. “What-if” some of employees leave the company.
“What-if” some of the officers die in a militry action. To answer this type of questions “Near-term analysis” frame work
was introduced. It simulates the social dynamic within an organization and isolates the particular agents in
organization and calculates the degree of knowledge diffusion from the simulation over time in a network. However
the drawback for above tool is that it cannot produce agent interactions for larger group size(over 100). We propose
a new framework based on “Near-term analysis” framework which can handle group size of more than 100 and can
able to produce valid interactions. Our main objective is to make the proposed framework suitable to estimate
changes of a large and huge organization in an uncertain situation.
10
"An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage"
Raja Sankar Dileep Muddu
Title
An Autonomous Frontier Based Multi Robot Approach for Dynamic Unknown Environment Coverage.
Author(s)
Raja Sankar Dileep Muddu
Author
Location(s)
Windsor, Ontario
Abstract
With the advent of latest technical advancements in the field of robotics, a stage has arrived where autonomous
robots are expected to help the humans in tasks that are either dangerous or too monotonous such as mining,
search and rescue, floor cleaning. All these problems are derivatives of coverage problem wherein the motto is
complete coverage of the environment in a time effective manner. Coverage can be accomplished in two ways
Sensor Based or Map based. Sensor based approaches use the built-in sensors of the robot for coverage. Map
based approaches have a onetime fixed cost for map building which can be used later to generate path between two
points. Most of the coverage methods developed till date have access to the map prior to exploration and only few of
them made use of multiple robots. In view of the drawbacks of the current approaches, we propose a frontier based
multi robot approach for coverage of unknown environments where mapping is performed simultaneously while
exploration. Frontiers which are the boundaries between explored and unexplored areas are identified using digital
image processing techniques provided by ROS and navigated accordingly. Experiments and Simulations will be
conducted using the Stage module in ROS framework.
"Using EcoSim To Discover The Benefits of Using Different Mating Modes"
Ryan D. Scott
Title
Using EcoSim to Discover the Benefits of Using Different Mating Modes
Author(s)
Ryan Scott, Brian MacPherson, Robin Gras
Author
Location(s)
University of Windsor Department of Computer Science, University of Windsor Biological Sciences Department,
University of Windsor Computer Science
Abstract
Sexual reproduction comes at a high cost to animals that implement it. There are explicit costs, such as the costs of
physically searching for a suitable partner. There are also implicit costs, such as the costs of maintaining sensory
equipment necessary to finding a suitable partner. A much more efficient method of reproduction is asexual
reproduction. Asexual reproduction does not require a partner, and therefore it foregoes much of the costs of sexual
reproduction. However, asexual reproduction essentially produces an exact copy of an organism, which means that
genetic variation across an asexual population is extremely low. This has its own costs; a population with low genetic
variation is one that is prone to disease, parasitism, mass extinction due to environmental disturbances, or mass
extinction due to failure to cope with rapidly changing biotic and abiotic factors within its environment. Sexual
reproduction, on the other hand, increases genetic variation within a population through recombination. This allows
the population to evolve more rapidly, and increases the odds that at least some members of the population will be
able to survive random disturbances, or waves of infection or parasitism.
In this study, we aim to test four hypotheses. First, we test the hypothesis that in a stable environment, asexual
individuals should fare better. Secondly, in high predation, sexual individuals should perform better. Thirdly, in the
presence of pathogens, sexual species will outperform asexual ones. Lastly, with fluctuating resources, sexually
reproducing individuals should perform better. In the standard configuration of EcoSim, all individuals are obligated to
reproduce sexually. Two new versions of EcoSim were created: one in which prey individuals can only reproduce
asexually, and another in which prey individuals can decide to perform either sexual or asexual reproduction. Since
the energy dynamics of asexual reproduction (with respect to the simulation) were unknown to us prior to this study,
we first set out to determine the point at which asexual and sexual reproduction were equally appealing for prey
individuals. We created runs for obligate and facultative asexual reproduction in which the cost of reproducing
asexually varied from 20% to 40% of an individual’s total energy. Even with a 40% energy cost, individuals typically
still seem to favor asexual reproduction. This study is in its data creation phase. A total of 175 EcoSim runs (75
asexual only, 75 asexual and sexual, and 15 original) are currently running using dedicated high-performance
computing resources on Sharcnet. When these runs are complete, we plan to use saved states of these runs to test
how populations are affected by random environmental disturbances, such as reduced predation or low resource
availability. We also plan to create a pathogen that spreads throughout prey populations, in order to determine the
role of sexual reproduction in keeping a population healthy while threatened by pathogens.
11
4C Video Compeititon
Name: Andrew Hlynka, School of Computer Science, University of Windsor
Voices by Jessica N. Osborne, Max Gonzalez, Casting by Ben-Robert French.
Music by "Mee."
Title: "Drew and the Floating Labyrinth - Hand-Drawn 3D Platformer Game"
Help Drew find her way home in this hand-drawn 3D puzzle-platformer, available now.
Andrew Hlynka, School of Computer Science, University of Windsor
Title: "Sudoku Solver - Computer VS Man"
How fast can a computer solve a Sudoku puzzle? Faster than you can (probably)!
Music is "Run Down - Bounty" and "Super Logo - The event" from Adobe Premiere Elements 11.0.
Name: Andrew Hlynka, School of Computer Science, University of Windsor
Title: "Unfinished - Teaser Trailer"
A teaser trailer for a hand-sketched 3D adventure game.
Name: Andrew Hlynka, School of Computer Science, University of Windsor
Title: "Look At Me When I'm Talking To You"
What can you make with the Oculus Rift?
I confirm the School of Computer Science and the University of Windsor can reuse this video.
Hello, I am David Bergeron, School of Music
Project title: Vocolour
The video was solely made by me.
In the video I introduce myself and my electronic art.
Vocolour was coded using the program MAXMSP which is developed by Cycling 74.
Name: Jessamyn Medler
Computer Science
Title: "Bird's Got Your Tongue"
Final project for 03-60-350-01, flash video about a curious cat and a curious-er bird.
Title:
Names:
Snapfolio: Making teacher's lives easier.
Jon Donais (Computer Science),
Sam Burton (Computer Science)
Description:
Snapfolio is an iOS app for primary teachers that lets them document learning skills, and make report cards easier.
Third Party Materials: Made with PowToon, Music https://www.youtube.com/watch?v=LCowFcEXt0Y
Name: Ryan Scott,
Scott Goodwin, Colin Totten, Justin Moore, Valerie St. Gelais, Anthony Cavallaro
Title: "Graspoid - Gameplay Trailer"
Gameplay video of physics-platformer for mobile devices.
I confirm the School of Computer Science and the University of Windsor can reuse this video.
Halen Whiston
(late submission, unconfirmed)
Chris Brogly
(late submission, unconfirmed)
12