Browsing SUNY Polytechnic Institute by Title
Now showing items 121-140 of 456
-
A Case Study on Apache HBase
(2015-05-16)Apache HBase is an open-source, non-relational and a distributed data base system built on top of HDFS (Hadoop Distributed File system). HBase was designed post Google’s Big table and it is written in Java. It was developed ... -
Characterization and Control of the Surface of the Topological Insulator Bi2Se3
(2017-12)The field of topological insulator (TI) materials is new. The ideal TI contains surface states in helical Dirac cones that can be used for spintronics or interconnect applications. Of the TI class, Bi2Se3 is the most ... -
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
(SUNY Polytechnic Institute, 2020)In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ... -
Comparing Direct and Mixed Methods of Solution in a Discretized Framework of a Mass-Spring System
(2017-04)In a discretized framework of a simplified system of masses and springs, the vector representing displacements in masses may be solved for via the direct method or the mixed method. The direct method combines a series of ... -
Comparing Linux Firewalls
(SUNY Polytechnic Institute, 2017-04)A firewall is a requirement for enterprise-level organizations and is recommended in any network environment. In some cases, a firewall may be necessary, but purchasing a hardware firewall might be out of the scope of the ... -
Comparing Pre-Built Hypervisors
(2017-04)There are a lot of Hypervisors out there, from almost every developer. VMWare isn't the only option anymore, with free and open source hypervisors everywhere now. However, in terms of usability, building a system from ... -
Comparison of Network Switch Architectures by CISCO
(2016-02-01)This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used ... -
The Cops Found Me (April Fools 2021)
(2021-04) -
Cyber Security Advantages of Optical Communications in SATCOM Networks
(SUNY Polytechnic Institute, 2020-12)Space-based communications, whether it is ground-to-space or inter-satellite communications, have so far been primarily within the RF spectrum. With the increase in space missions and the need for larger amounts of data ... -
Damped Motion of a charged Particle in Time-varying Electromagnetic Fields
(2020 Student Project Showcase, SUNY Polytechnic Institute, 2020-04)In this project, we study the general 3D mechanics of point charges moving under specific electric and magnetic fields. First, we consider the motion in the absence of any damping forces. In this category, we break down ... -
Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio
(2016-12-01)The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project ... -
Data Mining: Privacy Preservation in Data Mining Using Perturbation Techniques
(2015-05-06)In recent years, data mining has become important player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing ... -
De-anonymizing Social Network Neighborhoods Using Auxiliary and Semantic Information
(2015-12-11)The increasing popularity of social networks and their progressively more robust uses provides an interesting intersection of data. Social graphs have been rigorously studied for de-anonymization. Users of social networks ... -
Deception Technology: A Method to Reduce the Attack Exposure Time of a SCADA System
(2018-04-20)Supervisory Control and Data Acquisition (SCADA) systems in renewable power system networks can potentially mean greater susceptibility to malicious attackers. SCADA systems have inherent cyber vulnerabilities as these ... -
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?
(2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible ... -
Design and simulation of sensor networks for tracking Wifi users in outdoor urban environments
(Disruptive Technologies in Sensors and Sensor Systems, Proceedings of SPIE, 2017)We present a proof-of-concept investigation into the use of sensor networks for tracking of WiFi users in outdoor urban environments. Sensors are fixed, and are capable of measuring signal power from users’ WiFi devices. ... -
Design Culture, Immersion, and Viso-Spatial Learning: Enhancing Transfer of Training
(2018-04-20)Scholars have long identified transfer of training as an important component in the model of training and development. In this research, we explore qualitative results from a series of educational initiatives that use ... -
Detection of silicide formation in nanoscale visualization of interface electrostatics
(Applied Physics Letters, 2017)The ability to detect localized silicide formation at a buried metal semiconductor Schottky interface is demonstrated via nanoscale measurements of the electrostatic barrier. This is accomplished by mapping the Schottky ... -
Determining form and data assimilation algorithm for weakly damped and driven Korteweg-de Vries equation - Fourier modes case
(Nonlinear Analysis: Real World Applications, 2017-08)We show that the global attractor of a weakly damped and driven Korteweg–de Vries equation (KdV) is embedded in the long-time dynamics of an ordinary differential equation called a determining form. In particular, there ... -
Development of Imaging Probes for Fracture Healing Response
(2020 Student Project Showcase, SUNY Polytechnic Institute, 2020-04)The five primary problems created by bone fractures are bleeding, infection, disproportionate strains, vascular discontinuity, and inability to bear weight. The body goes into the acute phase response (APR) in order to ...