AI-Spotter is a Django-based web application built to address growing problem of AI-generated images being mistaken for authentic ones online. It allows users to upload suspicious images and evaluates them using an ensemble of five...
For most students, the search for a sublease is less of a hunt and more of a minefield, where 'great deals' are usually scams and 'available' listings are often just shady dead ends. ApartMate was developed to bridge this gap, providing...
Phishing remains one of the largest cybersecurity threats, mostly because there is no surefire way to patch it. Phishing exploits the people who work at a company rather than the software the company uses. Existing phishing tools lack...
Traveling sports fans frequently face challenges when navigating unfamiliar cities, as essential information regarding fan-friendly venues, safety, and community meetups is often fragmented across various social media platforms. To...
Base Battle is a multiplayer online battle arena (MOBA) game that is designed to introduce new players to the genre. The game is aimed at people who are interested in the MOBA genre of games but are dissuaded by the typical high barrier...
Organizations faced increasing cybersecurity threats such as ransomware attacks while lacking incident response training aligned with industry standards. Existing solutions were fragmented and failed to provide realistic training scenarios....
Campus Connect was developed to provide a centralized and reliable communication platform tailored to university housing communities. The web-based application improves communication between students, Resident Assistants, and housing...
Did you know what job you wanted to pursue in high school? With few advocates at school or home for STEM careers, and opportunities to work with professionals limited, the benefits of pursuing these careers may be overlooked by high...
CatAssist was developed as a web-based academic planning and advising assistant for School of Information Technology students. The platform integrated a Next.js front end, a Neon-hosted PostgreSQL database, and the Google Gemini 1.5...
Cybersecurity teams often struggle to manage the constant stream of threat intelligence and industry news. Manually filtering through every article is repetitive and often slows down response times. To solve this, our team developed...
CredLock is a controlled and isolated ransomware simulation environment for companies to safely replicate their environments for ransomware testing. Many organizations lack realistic and low risk ways to simulate ransomware in their...
For companies in the 21st century, not having security is no longer an option, it's in every aspect of the business. This presents a difficult environment, especially today as the data landscape is ever changing. This leads to people...
In Assetto Corsa, competition is a large part of the player base, but trying to improve can be difficult, especially for new players. Delta Sync is a publicly available web application and mod for Assetto Corsa. Its goal is to give...
Many organizations rely on fragmented applications that handled isolated tasks such as scheduling, inventory, or delivery tracking, leading to redundant data entry and workflow delays. The Driving Management System was developed as...
The reach of movie streaming services continues to expand, with subscriber counts and annual film releases growing rapidly each year. While the number of options has made watching movies more accessible, it has also made choosing what...
Every year, over 400 million items were lost, resulting in approximately $2.7 billion spent on replacements and an average of 2.5 days spent searching for misplaced belongings. Found.AI was a web-based lost and found management system...
Many drivers struggle to stay on top of their car maintenance, which can lead to expensive repairs that could have been easily avoided. The Garage Guide app was developed to assist motor vehicle owners with maintenance logging and...
Phishing can start with just a click. Interaction with a malicious link can cause users to fall victim to a range of issues such as identity theft, financial loss, malware infection, and more. GoPhish is a Google Chrome Extension for...
The Grocery Store Application was designed to streamline grocery planning by overcoming issues such as scattered list management, limited budget visibility, and difficulties coordinating purchases among multiple shoppers. This project...
HarmonyHub is a web-based music sharing platform that was meant to consolidate the disparate history tracking of music lovers who utilize multiple different music streaming platforms. The goal of HarmonyHub was to foster an environment...
The HereWeGo project addresses the inefficiency of finding lost items on a university campus by creating a centralized, digital lost and found platform. The current decentralized methods, such as physical bulletin boards and social...
With the increasing prevalence of smart phones, and the many features they have designed to gain and retain attention, many people struggle to regulate the amount of time they spend on their phones. The current apps in this space do...
InsiderOUT is a cybersecurity platform that identifies insider threats by deploying realistic tokenized documents and tracking user interactions with them. When a document is opened, the system records the event and updates the associated...
KitchenSync was developed as a web based kitchen inventory and meal planning application designed to reduce household food waste and improve grocery management efficiency. The project addressed research showing that approximately 30...
LeaseVault was a cybersecurity and AI-powered web application that provided a secure storage system and an AI-generated summary tool. The project’s goal was to assist young adults with managing and understanding lease documents effectively....
Every day, people click links without knowing if they are safe. From office workers clicking email attachments and redirects to students accessing online materials and knowledge, users are constantly interacting with potentially harmful...
My Dad Can Beat Up Your Dad is based on the classic childhood playground debate over who has the strongest dad, taking the form of a comedic video game. Users collect cards representing different kinds of dads and items to enhance...
Do you struggle making an appointment with your doctor? Well, that's why we built an AI- powered scheduling chatbot. Our app allows patients to select their provider, appointment, and location with a conversational chatbot. Instead...
The MyHealth Portal is a web-based healthcare management system developed to support senior citizens and their caregivers through an accessible, centralized platform. Many older adults face challenges with digital health technologies...
Orizon addresses challenges such as unclear university requirements, fragmented information, and a lack of structured guidance during the application process. As a result, Orizon was developed as a web-based platform designed to help...
Home users and small businesses often lack the technical expertise and financial resources required to conduct professional cybersecurity assessments, leaving their networks vulnerable to common threats. To address this gap, the team...
Every day, sensitive personal information sits hidden inside thousands of digital documents, often without anyone realizing the risk. PIIE is a desktop application developed to help users identify sensitive personal information within...
While gaming connects millions of players globally, communication within these spaces are characterized as toxic or isolating. As for other spaces that foster social interaction, such as dating and friendship applications, it is harder...
Many students hesitate to seek academic help due to fear of judgment or limited access to timely support, which this project aimed to address through technology.The Peer Feedback App was created to support structured, anonymous, and...
Pet Care was developed to improve the lifespan of pets by providing users with an opportunity to keep up with veterinarian appointments, receive health suggestions, and create customized pet profiles to manage their pet's health. The...
Phishing attacks are one of the most successful and costly cyber threats and likely will continue to be successfully, largely due to human error and ineffective, passive security training. We noticed that many people struggle to recognize...
Many users lack the experience or knowledge to notice when a phishing email lands in their inbox. This is where Phishing Simulator comes into play. Most other Phishing Simulators have the goal of teaching via a fake phishing attack...
Emergency response and public safety operations often suffer from delayed situational awareness, insecure UAV deployments, and limited trusted communication between citizens and responders, creating risks during disasters, search-and-rescue...
There is a gap in the available network security tools for homes and small offices that continues to grow as IoT devices continue to be sources of vulnerabilities on networks. This growing gap led to the creation of Ping, a standalone...
Plateful was developed as a web-based platform to reduce food waste by connecting surplus food sources with food banks, shelters, and communities in need. The system featured real-time donation listings, intelligent inventory management,...
Project Playbook was developed as an open-source cybersecurity awareness and training platform designed to assist small businesses, local organizations and educational institutions in meeting the requirements outline in Ohio House...
Have you ever had common challenges such as forgetting ingredients while shopping, disorganized storage space in the kitchen, and duplicate purchases? Well, we have an application for that! Web based, built on an ASP.NET Core platform...
Many students struggle with dividing chores fairly and maintaining clear communication, often relying on disorganized tools such as group chats or spreadsheets. These inefficiencies can lead to misunderstandings, stress and negative...
Rotfall is a fast-paced survival game designed to challenge players through timed combat and strategic decision-making. Inspired by classic roguelike mechanics, it incorporates a countdown system, forcing players to balance exploration,...
As home networks grow increasingly complex due to the adoption of Internet of Things (IoT) devices, households face rising cybersecurity risks including unauthorized access, device vulnerabilities, and unsafe internet use. Most cybersecurity...
Have you ever wanted to hide sensitive information on your computer without drawing attention to it? This is exactly the problem Steg Crypt is designed to solve. Steg crypt has been designed to be a security-focused application to...
In this project, I sought to solve the challenges that student encounters in managing their various subjects, assignments, and their limited time. I created a student planner that uses various heuristic rules and techniques to help...
Each semester, thousands of UC students either start a fresh slate of classes or begin a new co-op rotation. As a result of the back-and-forth schedule of classes and co-ops, many of these students move into or out of off-campus housing...
Online activities are fraught with risks of unauthorized access and cyberattacks. Synapse is a security solution delivered through an intuitive browser extension to help protect individuals and companies from web-based threats such...
As phishing attacks grow more targeted and convincing, TackleBox turns individual reports into a shared early warning system that helps communities recognize threats before they spread. TackleBox is a phishing reporting, tracking,...
The growth of new trading card games and systems has created a need for more available tools to identify and catalogue card collections. Similar identification systems have been created as applications tracking a single card system,...
Modern networks are typically breached before an organization realizes an intrusion has occurred, leaving critical visibility gaps that attackers can exploit. Our project is Tripwyre, a deception-based intrusion detection suite designed...
We created Typescript for GNOME to reduce the difficulty of developing and maintaining desktop extensions for the GNOME desktop environment, which is the default user interface of Red Hat, Ubuntu, and many other Linux-based operating...
Students in the University of Cincinnati's School of Information Technology lacked a structured, university backed system for securing consistent mentorship beyond informal networking and advising. UC ConnectIT was developed to address...
Many college students face challenges in maintaining healthy activity levels and connecting with peers due to barriers such as academic workload and time constraints. The UC Sports App is an application designed to increase student...
Commuters face challenges such as accidents, construction, roadblocks, and limited parking availability. University of Cincinnati Traffic is our mobile application that focuses on helping UC students, faculty, and staff navigate traffic...
The Um Actually! project aims to address the growing spread of biased information across social media and other online platforms. As more people rely on the internet for news and information, it has become increasingly difficult to...
Losing items within a college campus is often disorganized and difficult to track. The Campus Lost and Found web application was created for students and faculty at the University of Cincinnati to report and recover lost items. The...
Modern workplaces demand constant access to digital information, yet professionals still rely on fragmented tools that require switching between phones, laptops, and cloud- based systems, reducing efficiency and limiting hands-free...
Food waste, limited time, and struggles finding recipes tailored to dietary preferences and needs are challenges that many individuals face, specifically college students. What's In My Fridge? is a web-based application built using...
Small businesses face increasing cybersecurity risks yet often lack the financial resources, technical expertise, and dedicated IT personnel required to protect their systems effectively. The Windows Security Toolkit for Small Business...
Many applications are on the market, but they often provide the same information and can be filled with useless data. WiseCents seeks to address concerns among college students regarding management of their finances. WiseCents aids...
Premier Sponsor
Gold Sponsor
Silver Sponsor
#ITExpo26