Browsing College of Engineering, SUNY Polytechnic Institute by Title
Now showing items 1-20 of 44
-
5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers
(SUNY Polytechnic Institute, 2020)5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous ... -
Accessible Formal Methods: A Study of the Java Modeling Language
(2017-04-17)While formal methods offer the highest level of confidence that software behaves as intended, they are notoriously difficult to use. The Java Modeling Language and the associated OpenJML tool aim to make formal specification ... -
Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation
(2015-01-29)This document is an exploration into what types of curriculum changes must be made to accommodate accreditation. In the review of program accrediting bodies, none is more authoritative or more appropriate than the Accreditation ... -
An Analysis of a Signature-based Approach for an Intrusion Detection System in a Wireless Body Area Network (WBAN) using Data Mining Techniques
(SUNY Polytechnic Institute, 2020)Wireless Body Area Networks (WBANs) use biosensors worn on, or in the human body, which collect and monitor a patient’s medical condition. WBANs have become increasingly more beneficial in the medical field by lowering ... -
Applicability of the Julia Programming Language to Forward Error-Correction Coding in Digital Communications Systems
(2018-05)Traditionally SDR has been implemented in C and C++ for execution speed and processor efficiency. Interpreted and high-level languages were considered too slow to handle the challenges of digital signal processing (DSP). ... -
BGP Routing Protocol
(2016-08)Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls ... -
Botnet Campaign Detection on Twitter
(2016-08)The goal of this thesis is to investigate and analyze botnet activity on social media networks. We first start by creating an algorithm and scoring method for “likely bots,” and analyze them in conjunction with their ... -
A Case Study on Apache HBase
(2015-05-16)Apache HBase is an open-source, non-relational and a distributed data base system built on top of HDFS (Hadoop Distributed File system). HBase was designed post Google’s Big table and it is written in Java. It was developed ... -
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
(SUNY Polytechnic Institute, 2020)In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ... -
Comparison of Network Switch Architectures by CISCO
(2016-02-01)This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used ... -
Cyber Security Advantages of Optical Communications in SATCOM Networks
(SUNY Polytechnic Institute, 2020-12)Space-based communications, whether it is ground-to-space or inter-satellite communications, have so far been primarily within the RF spectrum. With the increase in space missions and the need for larger amounts of data ... -
Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio
(2016-12-01)The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project ... -
Data Mining: Privacy Preservation in Data Mining Using Perturbation Techniques
(2015-05-06)In recent years, data mining has become important player in determining future business strategies. Data mining helps identifying patterns and trends from large amount of data, which can be used for reducing cost, increasing ... -
De-anonymizing Social Network Neighborhoods Using Auxiliary and Semantic Information
(2015-12-11)The increasing popularity of social networks and their progressively more robust uses provides an interesting intersection of data. Social graphs have been rigorously studied for de-anonymization. Users of social networks ... -
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?
(2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible ... -
An Empirical Wi-Fi Intrusion Detection System
(SUNY Polytechnic Institute, 2020-05)Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. ... -
Employee Collaboration in Sharepoint
(2016-12-01)This project aims at developing a portal for a company’s internal needs that include leave portal, a pre-sales dashboard and a document sharing list for the employees in SharePoint Online. SharePoint Online is web based ... -
Enhancing the Effectiveness of Software Test Automation
(2015-12-01)Effective software testing can save money and effort by catching problems before they make it very far through the software development process. It is known that the longer a defect remains undetected, the more expensive ... -
Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems
(SUNY Polytechnic Institute, 2020)5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave ... -
?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks
(SUNY Polytechnic Institute, 2020)The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ...