Recent Submissions

  • A Genetic Algorithm for Locating Acceptable Structure Models of Systems (Reconstructability Analysis)

    Heath, Joshua; Cavallo, Roger; Advisor; Reale, Michael; Reviewer; Sengupta, Saumendra; Reviewer (2018-05)
    The emergence of the field of General Systems Theory (GST) can be best attributed to the belief that all systems, irrespective of context, share simple, organizational principles capable of being mathematically modeled with any of many forms of abstraction. Structure  modeling is a well‐developed aspect of GST specializing in analyzing the structure of a system ‐ that is, the interactions between the attributes of a system. These interactions, while intuitive in smaller systems, become increasingly difficult to comprehend as the number of measurable attributes of a system increases. To combat this, one may approach an overall system by analyzing its various subsystems and, potentially, reconstruct properties of that system using  knowledge gained from considering a collection of these subsystems (a structure model). In situations where the overall system cannot be fully reconstructed based on a given structure model, the benefits and detriments associated with using such a model should both be considered. For example, while a model may be simpler to understand, or require less storage space in memory than the system as a whole, all information regarding that system may not be inferable from that model. As systems grow in size, determining the acceptability of every meaningful structure model of a system in order tofind the most acceptable becomes exceedingly resource-intensive. In this thesis, a measure of the memory requirements associated with storing a system or a set of subsystems (a structure model) is defined and is used in defining an objective measure of the acceptability of a structure as a representation of an overall system. A Genetic Algorithm for Locating Acceptable Structures (GALAS) is then outlined, with this acceptability criterion serving as an optimizable fitness function. The goal of this heuristic is to search the set of all meaningful structure models, without the need for exhaustively generating each, and produce those that are the most acceptable, based on predefined acceptability criteria. 
  • SECURITY CHALLENGES IN SDN IMPLEMENTATION

    Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)
    This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network engineers’ views on preventing those security issues and whether implementing SDN is a good idea in the first place. This study was conducted in order to answer three questions: 1. How does data and control layer separation in SDN cause DoS and unauthorized access attacks? 2. What are the best practices and measures to minimize such security threats from the engineer’s point of view? 3. Do security threats at the lower layer affect the decision to implement SDN? These questions were answered by reviewing research papers and interviewing engineers from the telecommunication field. DoS and unauthorized access attacks are due to vulnerabilities in OpenFlow, SDN switches and SDN controllers. Table 6 presents solutions for preventing DoS and unauthorized access attacks. Most of the network engineers said SDN should be implemented based on cost, limited risk, customers’ positive views, and company projects, despite the current security challenges.
  • Password Habits of Security Literate Individuals

    Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)
    In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important to use good password habits. Security literate internet users, i.e, students, faculty, professionals in the IT industry are expected to know better than to use bad password habits. But that may not always be the case. This thesis aims to test the hypothesis that security literate internet users use bad password habits despite knowing better, and then proceeds to understand the underlying factors behind these habits through a survey. The survey consisted of questions about basic password habits. The responses were analyzed for better insights
  • OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION

    Piszcz, Alan; Ishaq, Naseem; Advisor; Novillo, Jorge E; Reviewer; Sengupta, Saumendra; Reviewer (1993)
    Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation simulator. The application domain investigated is hand printed text and engineering symbol recognition. An object oriented approach to the simulator allows other simulator paradigms to reuse a large body of the object classes developed for this particular application. The review and implementation of image feature extraction methodologies is another area researched in this paper. Four feature techniques are researched, developed, applied and tested, using digits, upper case alphabet characters and engineering symbol images. Final implementation and testing of the feature extraction methods with a baseline technique is analyzed for applicability in the domain of hand printed text and engineering symbols
  • Applicability of the Julia Programming Language to Forward Error-Correction Coding in Digital Communications Systems

    Quinn, Ryan; Andriamanalimanana, Bruno R.; Advisor; Sengupta, Saumendra; Reviewer; Spetka, Scott; Reviewer (2018-05)
    Traditionally SDR has been implemented in C and C++ for execution speed and processor efficiency. Interpreted and high-level languages were considered too slow to handle the challenges of digital signal processing (DSP). The Julia programming language is a new language developed for scientific and mathematical purposes that is supposed to write like Python or MATLAB and execute like C or FORTRAN. Given the touted strengths of the Julia language, it bore investigating as to whether it was suitable for DSP. This project specifically addresses the applicability of Julia to forward error correction (FEC), a highly mathematical topic to which Julia should be well suited. It has been found that Julia offers many advantages to faithful implementations of FEC specifications over C/C++, but the optimizations necessary to use FEC in real systems are likely to blunt this advantage during normal use. The Julia implementations generally effected a 33% or higher reduction in source lines of code (SLOC) required to implement. Julia implementations of FEC algorithms were generally not more than 1/3 the speed of mature C/C++ implementations.While Julia has the potential to achieve the required performance for FEC, the optimizations required to do so will generally obscure the closeness of the implementation and specification. At the current time it seems unlikely that Julia will pose a serious challenge to the dominance of C/C++ in the field of DSP.
  • NYS Fair Events Mobile Application With Client-Side Caching

    Kanala, Sumant; Cheng, Chen-Fu; Advisor; Gherasoiu, Iulian; Reviewer; Tekeoglu, Ali; Reviewer (2017-12)
    NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, and a Google Maps to show the route to the event from the user’s location. The motivation for creating this project arose with understanding the growing market for mobile applications and by working for a startup for several months now in the field of web development. A trend has been established in which more users are switching towards mobile apps as their preferred information exchange tool than their traditional PCs and hence the development of better apps should be geared towards mobile phones and tablet PCs. The development of the app is mainly divided into two steps, the client and server side. For the client side I developed a Cordova-based mobile app which is cross-platform and can be compiled to work on Android and IOS based mobile devices. For the server side, I used Node.js runtime environment and deployed it onto Heroku’s free dyno tier which is a cloudbased Platform as a service (paaS). Based on user’s actions, data is requested from the server’s endpoints and appropriate information is served and shown to the user in an intuitive manner.
  • Social Media Emoji Analysis, Correlations and Trust Modeling

    Preisendorfer, Matthew; Sengupta, Sam; Adviser; White, Joshua; Adviser; Tekeoglu, Ali; Adviser (2018-01-18)
    Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. Currently, Twitter handles approximately six thousand new tweets every second, so there is plenty of data to be analyzed. With a character limit of 140 per tweet, emojis are commonly used to express feelings in a tweet without using extra characters that more explaining might use. This is helpful in identifying the mood or state of mind that a person may have been in when writing their tweet. From a computing standpoint, this makes mood analysis much easier. Rather than analyzing a group of words and predicting moods from keywords, we can analyze single (or many) emoji(s), and then match those emojis to commonly expressed emotions and feelings. The objective of this research is to gather large amounts of Twitter data and analyze emojis used to find correlations in societal interactions, and how current events may drive social media interactions and behaviors. By creating topic models for each user and comparing it with the emoji distribution analysis, a trust ”fingerprint” can be created to measure authenticity or genuineness of a given user and/or group of users. The emoji distribution analysis also provides the possibility of demographic predictions. Analysis is not limited to Twitter of course but is used here because the API is free and generally easy to use. This paper aims to prove the validity of emoji analysis as a method of user identification and how their trust models can be used in conjunction with pre-existing models to improve success rates of these models.
  • Comparison of Network Switch Architectures by CISCO

    Vemula, Veera Venkata Satyanarayana; Hash, Larry; Advisor (2016-02-01)
    This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used to improve the network performance and network health. In this document the switching architectures CATALYST and NEXUS are compared. All the available features in each architectures are listed and working of the supported protocols is explained in detail. The document also considers three network scenarios and explains which architecture is best suited and explains why in detail.
  • The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?

    Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)
    The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible limitations which need to be fix before any critical missions. The paper discusses issues such as: data rate, hardware upgrade and new install requirement and a budget required for that, propagation delay, need of dedicated antenna support for the mission and security constraints. The Technology Case Study (TCS) and focused discussion help to know the possible solutions and what everyone things about the DSN technology. The public platforms like Quora, Reddit, StackExchange, and Facebook Mars Society group assisted in gathering technical answers from the experts and individuals interested in this research.
  • A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP

    Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)
    There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less performance. Since network devices are hardware modules, processing them requires more power and more memory. However, if network protocols are developed using software modules, flexibility can be achieved in various programming applications and reduces dependency on hardware. The concept of using networking protocols as a software module can be explained using “Software Defined Networking (SDN).” With SDN, existing infrastructure can be integrated with various applications and centralized control protocols can be developed. One of the key components of SDN is integrating with Cloud Computing, where many applications can be built, which can be used for on-demand services. Integrating cloud computing with SDN will create dynamic networks and reduces infrastructure costs. In this paper, a case was considered for providing better internet connectivity by building public & private networks using Open source cloud technology (OpenStack) and existing distribution environments. For connectivity, BGP was used as routing protocol as it is known to be well- suited for such environments. Both public and private networks were integrated with SDN for centralized control. OpenStack was used to build various network topologies using different plugins through SDN controller. This method allowed to develop SDN controller with global view of OpenStack networks. The same controller was connected to distributed layers using Open Flow protocol. Since, both OpenStack and distributed networks were attached to SDN controller, centralized control of network protocols could be achieved. This model of centralized networks could be very useful in reducing costs and improving network efficiency, especially in large scale deployments.
  • A Normative Architecture for an Online Agent-Based Healthcare System

    Bhaiya, Neha; Novillo, Jorge; Advisor; Rezk, Mohamed; Reviewer (2017-05)
    In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, computation and communication architecture providing a foundation plane for a total healthcare system based on Body Area Network sensors under the supervision of a physician or a team of physicians. Such an online healthcare system as yet does not exist; this thesis anticipates the necessary framework an online healthcare system need to proceed in the near future. The thesis is centered upon the notion of an anomalous system state that may arise owing to temporal anomalous behavior of one or more locally monitored state variables. The system that is envisaged in this thesis is an anomaly-driven event-oriented system triggering doctor’s office for further action if and when such a system enters into a state of anomaly. The data is constantly monitored for anomalous pattern by an ‘Intelligent Server’ which intimates the user’s physician upon receiving an anomalous data like sudden drop in blood pressure, pulse and other vital statistics. The physician then alerts the patient of a declining reading, or calls for emergency services and decides if the patient needs to be admitted in the hospital. We discuss our proposed system architecture for the same.
  • Accessible Formal Methods: A Study of the Java Modeling Language

    Rawding, Michael; Andriamanalimanana, Bruno; Advisor; Spetka, Scott; Reviewer; Vishwanathan, Roopa; Reviewer (2017-04-17)
    While formal methods offer the highest level of confidence that software behaves as intended, they are notoriously difficult to use. The Java Modeling Language and the associated OpenJML tool aim to make formal specification and verification more accessible to Java developers. This report gives an overview of JML and assesses its current status and usability. Though many common Java features have been implemented, lack of standard library support is identified as an obstacle to using JML effectively. To help address that problem, this report documents the process of adding support for a new library to OpenJML.
  • Image Processing In F#

    Odoi, Kaia; Andriamanalimanana, Bruno; Advisor; Novillo, Jorge; Reviewer; Sengupta, Sam; Reviewer (2017-05-01)
    Image searching is an essential feature of many software applications. Histograms can be used to represent the pixel color intensities of images. Measuring the similarities between images by comparing the histograms can be performed through the use of information-theoretic measures, such as the Kullback-Leibler divergence and cross-entropy. In this project, a query image is selected from a collection of images and it is compared to the other images to determine which image is most similar to the query image. This process is carried out by creating histograms of each image, and then using measures such as the Kullback-Leibler divergence and cross-entropy to compare the histograms. The .NET functional language, F#, is used in the implementation of this project. The C# language, another .NET language, was also used for coding the graphical user interface.
  • Employee Collaboration in Sharepoint

    Vempati, Sai Sandeep Soumithri; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2016-12-01)
    This project aims at developing a portal for a company’s internal needs that include leave portal, a pre-sales dashboard and a document sharing list for the employees in SharePoint Online. SharePoint Online is web based Content Management System (CMS) provided by Microsoft. Microsoft introduced SharePoint in 2001 which was an instant winner. It had all the features that are needed for storage and collaboration. SharePoint later on evolved into two major versions, namely, On-premise and Cloud version. SharePoint the cloud version proved to be a feasible CMS for start-ups and small companies. As the usage of SharePoint Online has minimised the burden maintenance of servers and administration more companies started using SharePoint. The utility of SharePoint has caught the attention of many companies lately. It has scaled up to, 75000 organisations saving 160 million users [8]. The usage of SharePoint made companies develop portals that are interactive and act as platforms for collaboration and exchange of information. The workflow automation provided by SharePoint helps in simplifying the business process management. Web technologies can be used to develop the portal in a user friendly and responsive manner. In this project, a portal is developed that mainly has three functionalities – a leave application platform, a dashboard for Presales and a list that helps sharing of information. The leave application feature is based on the workflow automation service provided by SharePoint in which the user can request concerned manager for a leave approval. The whole process of approval is automated in the portal. The Presales dashboard option helps in viewing data related to projects that can be used to develop reports by the Presales team of a company. The data is shown in various forms suitable for easy understanding using web parts in the dashboard. A list that demonstrates file approval is included in the portal.
  • An Inventory Management App in Salesforce

    Chennamaneni, Rahul Madhava Rao; Chiang, Chen-Fu; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed, Reviewer (2016-12-01)
    Salesforce is a cloud-based customer relationship management (CRM) software that accelerates business relationships and can transform the working lives of the team. Marc Benioff developed it in the late 1990s and now it has been announced as the world's most innovative company for six consecutive years by Forbes Magazine [1]. Unlike traditional CRM software, Salesforce is an internet service. It is available with just a sign-up and logs in through a browser, and it is immediately available. It is based on cloud computing, where the customers, without the need of installing any traditional software, can access the cloud, i.e., through the internet, for their business needs [2]. Inventory Management (IM) is the method of controlling and supervising the storage, utilization and ordering of components that an organization can track of their items it sells. It is the act of controlling and administering the quantities of products in the sale. For a business, an inventory is the main asset which represents an investment by the owner until the item is sold [3]. To demonstrate its functionalities of Salesforce, I created an application for inventory management. Here, In the inventory management, there are two parts: one is administration part, and another part is customer portal. The administrator manages the inventory and store operations, and the customer buys the products in the inventory through customer portal.
  • New Techniques for Public Key Encryption with Sender Recovery

    Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
    In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the receiver’s help in decrypting the ciphertext, and without having to store a set of plaintext/ciphertext pairs for every receiver the sender interacts with. This problem, known as public key encryption with sender recovery has intuitive solutions based on KEM/DEM schemes. We propose a KEM/DEM-based solution that is CCA-secure, and only requires the receiver to be equipped with a public/secret key pair (the sender needs only a symmetric recovery key), and has much simplified proofs compared to prior work in this area. We prove our protocols secure in the single receiver and multi-receiver setting. To achieve our goals, we use an analysis technique called plaintext randomization that results in greatly simplified and intuitive proofs for protocols that use a PKE internally as a component and compose the PKE with other primitives. We instantiate our protocol for public key encryption with sender recovery with the well-known KEM/DEM scheme due to Cramer and Shoup.
  • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception

    Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
    This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. Although many companies are pushing these devices with extensive marketing, do people feel a need for these devices in their home? This thesis tries to find the answer to this question and what factors are affecting these opinions. Focus group methodology is used for this thesis. It is commonly used to perform qualitative researches. Based on the analysis of the Focus Group discussions, it is found that most people (from the targeted population) will be interested in adopting these smart home devices. There are some concerns which will still need to be addressed by the company such as security, Privacy and some health concerns to make the consumers more comfortable in adopting these devices.
  • Data Mining and Bi Data Warehousing Based Implementation for a Random Film Studio

    Bonthi, Sneha; Andriamanalimanana, Bruno; Adviser; Rezk, Mohamed; Reviewer; Reale, Michael; Reviewer (2016-12-01)
    The purpose of this report is to study a dataset of movies and analyse the possibility and feasibility of implementing a data warehousing or a data mining application to improve analytics and decision making. The project report talks about the raw data originating from the data collection centres and box offices which can be modelled and transformed into a specific format and structure that would help the business analysts in identifying patterns and trends so as to take important business decisions. The report explores the benefits of extracting, transforming and loading this raw data into a dimensional model. According to the proposed implementation, one can create a reporting layer to perform aggregations and grouping them by various attributes like date, genre, actor and country and present them using dashboards and reports to enable better decision making. This single point of data, which is the result of data mining activity, can be shared and brainstorming sessions can then be carried out to infer priceless market information and effectively utilize time and efforts to maximize profits.
  • What Do Customers Really Seek From Their Mobile Service Providers?

    Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
    With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing 5G, it is important to understand consumer needs today. This paper includes findings from an online survey that was administered to students and alums of SUNY Polytechnic and other universities in the US to understand what drives choice of mobile service providers. Additionally, the challenges faced by consumers with respect to their mobile and wireless use were tested and the improvements they seek was sought. The author then uses secondary research to understand if 5G will address these consumer needs and facilitate other commercial applications. While consumers might be fairly satisfied with their mobile service providers today, there is still room for improvement on some aspects such as network coverage, call quality and data speed. Implementation of 5G through efficient spectrum use and technologies such as Massive MIMO and MmWave will help address the above and also facilitate broader commercial applications in multiple industries such as driverless cars, smart cities etc.
  • Swarm Intelligence in the Multi Agent System Environment

    Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
    This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, outlined is the general framework of an interacting agents behaving as a swarm group on a mission to deliver a service such as transporting a set of goods from a given starting point to a destination. As an example, one could think of a team of drones, for instance, providing a delivery service in a milieu where normal transportation mode may be prohibitively expensive. The entire logistic, in detail as a commercial project, is too involved for our thesis focus; instead, some of the structural interaction issues with a group are outlined and discussed here to articulate the behavior of multi-agent based swarm as a group necessary to function as a distributed entity somewhat different from the standard swarm models found in literature.

View more