Now showing items 21-40 of 44

    • An Inventory Management App in Salesforce 

      Chennamaneni, Rahul Madhava Rao; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed, Reviewer (2016-12-01)
      Salesforce is a cloud-based customer relationship management (CRM) software that accelerates business relationships and can transform the working lives of the team. Marc Benioff developed it in the late 1990s and now it ...
    • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception 

      Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
      This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ...
    • Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio 

      Bonthi, Sneha; Andriamanalimanana, Bruno; Adviser; Rezk, Mohamed; Reviewer; Reale, Michael; Reviewer (2016-12-01)
      The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project ...
    • New Techniques for Public Key Encryption with Sender Recovery 

      Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
      In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the ...
    • What Do Customers Really Seek From Their Mobile Service Providers? 

      Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
      With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ...
    • Swarm Intelligence in the Multi Agent System Environment 

      Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
      This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ...
    • Accessible Formal Methods: A Study of the Java Modeling Language 

      Rawding, Michael; Andriamanalimanana, Bruno; Advisor; Spetka, Scott; Reviewer; Vishwanathan, Roopa; Reviewer (2017-04-17)
      While formal methods offer the highest level of confidence that software behaves as intended, they are notoriously difficult to use. The Java Modeling Language and the associated OpenJML tool aim to make formal specification ...
    • A Normative Architecture for an Online Agent-Based Healthcare System 

      Bhaiya, Neha; Novillo, Jorge; Advisor; Rezk, Mohamed; Reviewer (2017-05)
      In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, ...
    • Image Processing In F# 

      Odoi, Kaia; Andriamanalimanana, Bruno; Advisor; Novillo, Jorge; Reviewer; Sengupta, Sam; Reviewer (2017-05-01)
      Image searching is an essential feature of many software applications. Histograms can be used to represent the pixel color intensities of images. Measuring the similarities between images by comparing the histograms can ...
    • The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars? 

      Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)
      The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible ...
    • NYS Fair Events Mobile Application With Client-Side Caching 

      Kanala, Sumant; Cheng, Chen-Fu; Advisor; Gherasoiu, Iulian; Reviewer; Tekeoglu, Ali; Reviewer (2017-12)
      NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, ...
    • Social Media Emoji Analysis, Correlations and Trust Modeling 

      Preisendorfer, Matthew; Sengupta, Sam; Adviser; White, Joshua; Adviser; Tekeoglu, Ali; Adviser (2018-01-18)
      Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. ...
    • Applicability of the Julia Programming Language to Forward Error-Correction Coding in Digital Communications Systems 

      Quinn, Ryan; Andriamanalimanana, Bruno R.; Advisor; Sengupta, Saumendra; Reviewer; Spetka, Scott; Reviewer (2018-05)
      Traditionally SDR has been implemented in C and C++ for execution speed and processor efficiency. Interpreted and high-level languages were considered too slow to handle the challenges of digital signal processing (DSP). ...
    • Password Habits of Security Literate Individuals 

      Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)
      In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ...
    • SECURITY CHALLENGES IN SDN IMPLEMENTATION 

      Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)
      This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ...
    • A Genetic Algorithm for Locating Acceptable Structure Models of Systems (Reconstructability Analysis) 

      Heath, Joshua; Cavallo, Roger; Advisor; Reale, Michael; Reviewer; Sengupta, Saumendra; Reviewer (2018-05)
      The emergence of the field of General Systems Theory (GST) can be best attributed to the belief that all systems, irrespective of context, share simple, organizational principles capable of being mathematically modeled w ...
    • 5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers 

      Steele II, Bruce; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
      5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous ...
    • Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems 

      Kholidy, Hisham A. (SUNY Polytechnic Institute, 2020)
      In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ...
    • Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems 

      Borgesen, Michael E.; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
      5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave ...
    • ?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks 

      Singh, Manjit; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
      The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ...