Collections in this community

Recent Submissions

  • Botnet Campaign Detection on Twitter 

    Fields, Jeremy; Sengupta, Saumendra; Adviser; White, Joshura; Reviewer; Spetka, Scott; Reviewer (2016-08)
    The goal of this thesis is to investigate and analyze botnet activity on social media networks. We first start by creating an algorithm and scoring method for “likely bots,” and analyze them in conjunction with their ...
  • Routing Protocols for MANETs 

    Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)
    This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ...
  • BGP Routing Protocol 

    Parasa, Sai Kiran; Hash, Larry; Advisor (2016-08)
    Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls ...
  • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example 

    Roy, Debsuta; Hash, Larry; Advisor (2016-08)
    Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ...
  • Secure Routing in Mobile Ad-hoc Networks 

    Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
    The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...
  • Technology Case Study on Web Real-Time Communications (WebRTC) 

    Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
    Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ...
  • NautiCode: Coding for Kids 

    Zeo, Brittany; Mullick, Rosemary; Adviser; Sarner, Ronald; Reviewer; Urban, Christopher; Reviewer (2016-05-08)
    Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t ...
  • Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation 

    Cook, John; Marsh, John; Adviser; Hash, Larry; Reviewer; Bull, Ronny; Reviewer (2015-01-29)
    This document is an exploration into what types of curriculum changes must be made to accommodate accreditation. In the review of program accrediting bodies, none is more authoritative or more appropriate than the Accreditation ...
  • Spanning Tree Protocol 

    Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
    This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ...
  • A Case Study on Apache HBase 

    Nalla, Rohit Reddy; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2015-05-16)
    Apache HBase is an open-source, non-relational and a distributed data base system built on top of HDFS (Hadoop Distributed File system). HBase was designed post Google’s Big table and it is written in Java. It was developed ...
  • De-anonymizing Social Network Neighborhoods Using Auxiliary and Semantic Information 

    Morgan, Steven Michael; Novillo, Jorge; Adviser; Andriamanalimanana, Bruno; Reviewer; Reale, Michael; Reviewer (2015-12-11)
    The increasing popularity of social networks and their progressively more robust uses provides an interesting intersection of data. Social graphs have been rigorously studied for de-anonymization. Users of social networks ...
  • Data Mining: Privacy Preservation in Data Mining Using Perturbation Techniques 

    Patel, Nikunjkumar; Sengupta, Sam; Adviser; Andriamanalimanana, Bruno; Reviewer; Novillo, Jorge; Reviewer (2015-05-06)
    In recent years, data mining has become important player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing ...
  • Enhancing the Effectiveness of Software Test Automation 

    Jansing, David; Novillo, Jorge; Adviser; Cavallo, Roger; Reviewer; Spetka, Scott; Reviewer (2015-12-01)
    Effective software testing can save money and effort by catching problems before they make it very far through the software development process. It is known that the longer a defect remains undetected, the more expensive ...
  • Representational State Transfer as a Web Service 

    Desai, Dhruv; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Andriamanalimanana, Bruno; Reviewer (2015-12-01)
    This report is a study on Representational State Transfer architectural style and its usefulness for implementing web service. This report will highlight the differences in perceiving REST as an architectural style and as ...
  • A Mobile Application for a Growing Utica Comets Community 

    MacIntosh, Jessica; Kahn, Russel; Adviser; Schneider, Steven; Reviewer (2016-05-01)
    This research project is a prototype of a mobile application that would be dedicated to the Utica Comet hockey community and its team through the use of special fan features to give the area a sense of belonging. The ...
  • High Performance Distributed Big File Cloud Storage 

    Shakelli, Anusha; Sengupta, Sam; Adviser; White, Joshua; Reviewer (2016-05-01)
    Cloud storage services are growing at a fast rate and are emerging in data storage field. These services are used by people for backing up data, sharing file through social networks like Facebook [3], Zing Me [2]. Users ...
  • Live Tweet Map with Sentimental Analysis 

    Kotrika, Rohila; Chen-Fu Chiang; Reviewer; Saumendra, Sengupta; Advisor; Andriamanalimanana, Bruno; Reviewer (2016-05-01)
    This project basically aims to build a system for the real-time analysis of the trends and public views around the whole world by storing and analyzing the stream of tweets from the Twitter live API which produces a huge ...
  • Magnesium Oxide Tunneling Current and Ferromagnetic Film Characterization 

    Bull, Horace (SUNY Polytechnic Institute, 2016-05-01)
    Magnetic Tunnel Junctions are a very promising technology with the potential to replace numerous forms of computer memory a well as a wide range of other applications. Three novel studies are done demonstrating various ...
  • Mobile technologies aide cancer patients in rural areas with digital medicine to seek a second opinion 

    Wurz, Stacy L (2015-12)
    This mobile application provides cancer patients in rural areas the ability to seek a second opinion from more experienced physicians based on the criteria they input. According to the N.Y. Times there are over 100,000 ...
  • Supporting Interactive Fundraising for Gen X Cancer Survivors and Co-Survivors in the New England Area 

    Winters, Robert (2015-12)
    Two theories were used in creating the application. The first, Human Centered Design accounts for a number of factors which support a design in being user-friendly and highly functional. The second, Engestrom’s Activity ...

View more