Collection of Master's Theses and Final Projects for Programs within the Computer and Information Science Department, with the College of Engineering.

Recent Submissions

  • Employee Collaboration in Sharepoint 

    Vempati, Sai Sandeep Soumithri; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2016-12-01)
    This project aims at developing a portal for a company’s internal needs that include leave portal, a pre-sales dashboard and a document sharing list for the employees in SharePoint Online. SharePoint Online is web based ...
  • An Inventory Management App in Salesforce 

    Chennamaneni, Rahul Madhava Rao; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed, Reviewer (2016-12-01)
    Salesforce is a cloud-based customer relationship management (CRM) software that accelerates business relationships and can transform the working lives of the team. Marc Benioff developed it in the late 1990s and now it ...
  • New Techniques for Public Key Encryption with Sender Recovery 

    Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
    In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the ...
  • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception 

    Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
    This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ...
  • Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio 

    Bonthi, Sneha; Andriamanalimanana, Bruno; Adviser; Rezk, Mohamed; Reviewer; Reale, Michael; Reviewer (2016-12-01)
    The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project ...
  • What Do Customers Really Seek From Their Mobile Service Providers? 

    Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
    With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ...
  • Swarm Intelligence in the Multi Agent System Environment 

    Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
    This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ...
  • Botnet Campaign Detection on Twitter 

    Fields, Jeremy; Sengupta, Saumendra; Adviser; White, Joshura; Reviewer; Spetka, Scott; Reviewer (2016-08)
    The goal of this thesis is to investigate and analyze botnet activity on social media networks. We first start by creating an algorithm and scoring method for “likely bots,” and analyze them in conjunction with their ...
  • Routing Protocols for MANETs 

    Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)
    This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ...
  • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example 

    Roy, Debsuta; Hash, Larry; Advisor (2016-08)
    Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ...
  • BGP Routing Protocol 

    Parasa, Sai Kiran; Hash, Larry; Advisor (2016-08)
    Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls ...
  • Secure Routing in Mobile Ad-hoc Networks 

    Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
    The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...
  • Technology Case Study on Web Real-Time Communications (WebRTC) 

    Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
    Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ...
  • NautiCode: Coding for Kids 

    Zeo, Brittany; Mullick, Rosemary; Adviser; Sarner, Ronald; Reviewer; Urban, Christopher; Reviewer (2016-05-08)
    Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t ...
  • Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation 

    Cook, John; Marsh, John; Adviser; Hash, Larry; Reviewer; Bull, Ronny; Reviewer (2015-01-29)
    This document is an exploration into what types of curriculum changes must be made to accommodate accreditation. In the review of program accrediting bodies, none is more authoritative or more appropriate than the Accreditation ...
  • Spanning Tree Protocol 

    Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
    This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ...
  • A Case Study on Apache HBase 

    Nalla, Rohit Reddy; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2015-05-16)
    Apache HBase is an open-source, non-relational and a distributed data base system built on top of HDFS (Hadoop Distributed File system). HBase was designed post Google’s Big table and it is written in Java. It was developed ...
  • De-anonymizing Social Network Neighborhoods Using Auxiliary and Semantic Information 

    Morgan, Steven Michael; Novillo, Jorge; Adviser; Andriamanalimanana, Bruno; Reviewer; Reale, Michael; Reviewer (2015-12-11)
    The increasing popularity of social networks and their progressively more robust uses provides an interesting intersection of data. Social graphs have been rigorously studied for de-anonymization. Users of social networks ...
  • Data Mining: Privacy Preservation in Data Mining Using Perturbation Techniques 

    Patel, Nikunjkumar; Sengupta, Sam; Adviser; Andriamanalimanana, Bruno; Reviewer; Novillo, Jorge; Reviewer (2015-05-06)
    In recent years, data mining has become important player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing ...
  • Enhancing the Effectiveness of Software Test Automation 

    Jansing, David; Novillo, Jorge; Adviser; Cavallo, Roger; Reviewer; Spetka, Scott; Reviewer (2015-12-01)
    Effective software testing can save money and effort by catching problems before they make it very far through the software development process. It is known that the longer a defect remains undetected, the more expensive ...

View more