Collection of Master's Theses and Final Projects for Programs within the Computer and Information Science Department, with the College of Engineering.

Recent Submissions

  • A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP 

    Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)
    There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ...
  • A Normative Architecture for an Online Agent-Based Healthcare System 

    Bhaiya, Neha; Novillo, Jorge; Advisor; Rezk, Mohamed; Reviewer (2017-05)
    In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, ...
  • Accessible Formal Methods: A Study of the Java Modeling Language 

    Rawding, Michael; Andriamanalimanana, Bruno; Advisor; Spetka, Scott; Reviewer; Vishwanathan, Roopa; Reviewer (2017-04-17)
    While formal methods offer the highest level of confidence that software behaves as intended, they are notoriously difficult to use. The Java Modeling Language and the associated OpenJML tool aim to make formal specification ...
  • Image Processing In F# 

    Odoi, Kaia; Andriamanalimanana, Bruno; Advisor; Novillo, Jorge; Reviewer; Sengupta, Sam; Reviewer (2017-05-01)
    Image searching is an essential feature of many software applications. Histograms can be used to represent the pixel color intensities of images. Measuring the similarities between images by comparing the histograms can ...
  • Employee Collaboration in Sharepoint 

    Vempati, Sai Sandeep Soumithri; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2016-12-01)
    This project aims at developing a portal for a company’s internal needs that include leave portal, a pre-sales dashboard and a document sharing list for the employees in SharePoint Online. SharePoint Online is web based ...
  • An Inventory Management App in Salesforce 

    Chennamaneni, Rahul Madhava Rao; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed, Reviewer (2016-12-01)
    Salesforce is a cloud-based customer relationship management (CRM) software that accelerates business relationships and can transform the working lives of the team. Marc Benioff developed it in the late 1990s and now it ...
  • New Techniques for Public Key Encryption with Sender Recovery 

    Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
    In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the ...
  • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception 

    Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
    This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ...
  • Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio 

    Bonthi, Sneha; Andriamanalimanana, Bruno; Adviser; Rezk, Mohamed; Reviewer; Reale, Michael; Reviewer (2016-12-01)
    The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project ...
  • What Do Customers Really Seek From Their Mobile Service Providers? 

    Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
    With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ...
  • Swarm Intelligence in the Multi Agent System Environment 

    Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
    This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ...
  • Botnet Campaign Detection on Twitter 

    Fields, Jeremy; Sengupta, Saumendra; Adviser; White, Joshura; Reviewer; Spetka, Scott; Reviewer (2016-08)
    The goal of this thesis is to investigate and analyze botnet activity on social media networks. We first start by creating an algorithm and scoring method for “likely bots,” and analyze them in conjunction with their ...
  • Routing Protocols for MANETs 

    Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)
    This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ...
  • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example 

    Roy, Debsuta; Hash, Larry; Advisor (2016-08)
    Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ...
  • BGP Routing Protocol 

    Parasa, Sai Kiran; Hash, Larry; Advisor (2016-08)
    Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls ...
  • Secure Routing in Mobile Ad-hoc Networks 

    Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
    The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...
  • Technology Case Study on Web Real-Time Communications (WebRTC) 

    Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
    Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ...
  • NautiCode: Coding for Kids 

    Zeo, Brittany; Mullick, Rosemary; Adviser; Sarner, Ronald; Reviewer; Urban, Christopher; Reviewer (2016-05-08)
    Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t ...
  • Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation 

    Cook, John; Marsh, John; Adviser; Hash, Larry; Reviewer; Bull, Ronny; Reviewer (2015-01-29)
    This document is an exploration into what types of curriculum changes must be made to accommodate accreditation. In the review of program accrediting bodies, none is more authoritative or more appropriate than the Accreditation ...
  • Spanning Tree Protocol 

    Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
    This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ...

View more