Now showing items 16-35 of 44

    • An Empirical Wi-Fi Intrusion Detection System 

      Basnet, Diwash Bikram; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020-05)
      Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. ...
    • Employee Collaboration in Sharepoint 

      Vempati, Sai Sandeep Soumithri; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2016-12-01)
      This project aims at developing a portal for a company’s internal needs that include leave portal, a pre-sales dashboard and a document sharing list for the employees in SharePoint Online. SharePoint Online is web based ...
    • Enhancing the Effectiveness of Software Test Automation 

      Jansing, David; Novillo, Jorge; Adviser; Cavallo, Roger; Reviewer; Spetka, Scott; Reviewer (2015-12-01)
      Effective software testing can save money and effort by catching problems before they make it very far through the software development process. It is known that the longer a defect remains undetected, the more expensive ...
    • Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems 

      Borgesen, Michael E.; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
      5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave ...
    • ?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks 

      Singh, Manjit; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
      The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ...
    • A Genetic Algorithm for Locating Acceptable Structure Models of Systems (Reconstructability Analysis) 

      Heath, Joshua; Cavallo, Roger; Advisor; Reale, Michael; Reviewer; Sengupta, Saumendra; Reviewer (2018-05)
      The emergence of the field of General Systems Theory (GST) can be best attributed to the belief that all systems, irrespective of context, share simple, organizational principles capable of being mathematically modeled w ...
    • High Performance Distributed Big File Cloud Storage 

      Shakelli, Anusha; Sengupta, Sam; Adviser; White, Joshua; Reviewer (2016-05-01)
      Cloud storage services are growing at a fast rate and are emerging in data storage field. These services are used by people for backing up data, sharing file through social networks like Facebook [3], Zing Me [2]. Users ...
    • Image Processing In F# 

      Odoi, Kaia; Andriamanalimanana, Bruno; Advisor; Novillo, Jorge; Reviewer; Sengupta, Sam; Reviewer (2017-05-01)
      Image searching is an essential feature of many software applications. Histograms can be used to represent the pixel color intensities of images. Measuring the similarities between images by comparing the histograms can ...
    • An Inventory Management App in Salesforce 

      Chennamaneni, Rahul Madhava Rao; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed, Reviewer (2016-12-01)
      Salesforce is a cloud-based customer relationship management (CRM) software that accelerates business relationships and can transform the working lives of the team. Marc Benioff developed it in the late 1990s and now it ...
    • Live Tweet Map with Sentimental Analysis 

      Kotrika, Rohila; Chen-Fu Chiang; Reviewer; Saumendra, Sengupta; Advisor; Andriamanalimanana, Bruno; Reviewer (2016-05-01)
      This project basically aims to build a system for the real-time analysis of the trends and public views around the whole world by storing and analyzing the stream of tweets from the Twitter live API which produces a huge ...
    • NautiCode: Coding for Kids 

      Zeo, Brittany; Mullick, Rosemary; Adviser; Sarner, Ronald; Reviewer; Urban, Christopher; Reviewer (2016-05-08)
      Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t ...
    • New Techniques for Public Key Encryption with Sender Recovery 

      Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
      In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the ...
    • A Normative Architecture for an Online Agent-Based Healthcare System 

      Bhaiya, Neha; Novillo, Jorge; Advisor; Rezk, Mohamed; Reviewer (2017-05)
      In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, ...
    • NYS Fair Events Mobile Application With Client-Side Caching 

      Kanala, Sumant; Cheng, Chen-Fu; Advisor; Gherasoiu, Iulian; Reviewer; Tekeoglu, Ali; Reviewer (2017-12)
      NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, ...
    • OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION 

      Piszcz, Alan; Ishaq, Naseem; Advisor; Novillo, Jorge E; Reviewer; Sengupta, Saumendra; Reviewer (1993)
      Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation ...
    • Password Habits of Security Literate Individuals 

      Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)
      In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ...
    • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception 

      Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
      This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ...
    • Representational State Transfer as a Web Service 

      Desai, Dhruv; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Andriamanalimanana, Bruno; Reviewer (2015-12-01)
      This report is a study on Representational State Transfer architectural style and its usefulness for implementing web service. This report will highlight the differences in perceiving REST as an architectural style and as ...
    • Routing Protocols for MANETs 

      Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)
      This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ...
    • Secure Routing in Mobile Ad-hoc Networks 

      Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
      The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...