Browsing College of Engineering, SUNY Polytechnic Institute by Title
Now showing items 25-44 of 44
-
Live Tweet Map with Sentimental Analysis
(2016-05-01)This project basically aims to build a system for the real-time analysis of the trends and public views around the whole world by storing and analyzing the stream of tweets from the Twitter live API which produces a huge ... -
NautiCode: Coding for Kids
(2016-05-08)Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t ... -
New Techniques for Public Key Encryption with Sender Recovery
(2016-12-15)In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the ... -
A Normative Architecture for an Online Agent-Based Healthcare System
(2017-05)In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, ... -
NYS Fair Events Mobile Application With Client-Side Caching
(2017-12)NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, ... -
OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION
(1993)Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation ... -
Password Habits of Security Literate Individuals
(2018-05)In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ... -
People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception
(2016-12-01)This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ... -
Representational State Transfer as a Web Service
(2015-12-01)This report is a study on Representational State Transfer architectural style and its usefulness for implementing web service. This report will highlight the differences in perceiving REST as an architectural style and as ... -
Routing Protocols for MANETs
(2016-08)This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ... -
Secure Routing in Mobile Ad-hoc Networks
(2016-05-01)The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ... -
SECURITY CHALLENGES IN SDN IMPLEMENTATION
(2018-05)This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ... -
Social Media Emoji Analysis, Correlations and Trust Modeling
(2018-01-18)Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. ... -
Spanning Tree Protocol
(2015-05-21)This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ... -
Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example
(2016-08)Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ... -
Swarm Intelligence in the Multi Agent System Environment
(2016-12-20)This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ... -
A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP
(2016-12)There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ... -
Technology Case Study on Web Real-Time Communications (WebRTC)
(2016-05-01)Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ... -
What Do Customers Really Seek From Their Mobile Service Providers?
(2016-12-17)With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ... -
A Wireless Intrusion Detection for the Next Generation (5G) Networks
(SUNY Polytechnic Institute, 2020-05)5G data systems are closed to delivery to the public. The question remains how security will impact the release of this cutting edge architecture. 5G data systems will be sending massive amounts of personal data due to the ...