All campuses are research institutions and offer bachelor's, master's and doctoral degrees through a broad range of academic programs. Undergraduate research and honors programs provide students with opportunities to interact one-on-one with renowned national and international faculty.

Sub-communities within this community

Recent Submissions

  • Designing an Instructional Informative Website for Pet Owners

    Jofre, Ana; Ortiz, Sherman; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
    Searching for pet owners' information on the world wide web can be difficult and confusing due to the many different websites on must scroll through depending on your search results. With the rise of social media, forums, online pet stores, and blogs there are more websites to look into. Although these websites have articles on pet information, they are often opinionated, lacking in follow up information or simply unfinished. This paper looks into the development of a site with the end users' navigation in mind for all their pets primary concerns. This website is made for user's accessing information about their pets. Using a classic template website builder, the site is able to be updated in real time with ease as more information becomes available. The website's user experience is evaluated by analyzing survey information. The end user experience, the most important aspect of any website, comprises navigation, clarity, and simplicity. Prototype website link:
  • Style Guide Development For An Internal Reference Library

    Lizardi, Ryan; Bush, Sarah C.; Lizardi, Ryan; First Reader; Jofre, Ana; Second Reader (SUNY Polytechnic Institute, 2020-12)
    This work strives to present information design and user experience (UX) techniques to improve continuity of design and usability, before migrating a cross-functional internal reference library to a new content management system (CMS). Expert-curated content accessed through LinkedIn Learning, combined with scholarly research, result in a complimentary style guide for use in the workplace.
  • Game Streaming in the Wake of a Pandemic: Topic: Live Streaming and Branding

    Jofre, Ana; Martucci, Nicholas; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
    The purpose of this study is to determine what the key motivational factors for creating a live stream gaming channel in the wake of a global pandemic are. This is executed by generating a series of podcast interviews from live streamers, generating branding for the launch of a live stream gaming channel and launching the channel. With the world in a current state of emergency, the live streaming industry under has boomed, giving streamers and viewers alike an opportunity to interact, communicate, and form communities like never before in the shadow of these pressing times. In light of this, we seek an escape from the harsh reality that is quarantine and find comfort in engaging with others all the while having fun indoors.
  • Critical Document Design: A Survey of Considerations for the Next Generation of Procedures Used in High-Risk Organizations

    Jofre, Ana; McLaren, Elizabeth A.; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
    Since the innovation of the pre-flight cockpit checklist first made the Boeing B-17 safe to fly, several high-risk industries have adopted the approach, to varying degrees. This paper reviews regulatory findings and recommendations from formal investigations following incidents across multiple high-risk industries to identify areas how checklists may be misused, misunderstood, or where they could have been of value to operators who didn't use them. The recommendations are then compared against current findings in information design and usability, and conclude with recommendations for how the future of electronic documentation may further improve the usability experience of operators and their teams, and ensure the safety of the public around them.
  • Bridges: An All-in-One Resource App to Help Narrow the Digital Divide

    Jofre, Ana; Torres, Abigail; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
    goal of this project is to design a user-friendly mobile application prototype for people who are disadvantaged by the digital divide. This includes people who are of lower income and those who live in areas where internet isn't accessible or expensive. This application can be accessed through IOS devices as well as a text messaging service system for those without said device. It is an application that will be extremely easy to use and manage, and where users will be able to access multiple resources to gain not only digital literacy but find places that offer computer labs and internet for free, in case neither is available at home. The mobile application's goal is to create resource where the user has everything, they need in a way that is easily accessible; a product that is not currently on the market. In this paper, I will not only explore research on what the digital divide is, but also how it affects those who are disadvantaged by it and ways we can start to help narrow the gap. I will also explore the advantages of mobile applications and how it can be used to narrow the digital divide.
  • THE POWER OF BRAND DEVELOPMENT: Leveraging Branding to Effectively Engage Customers

    Jofre, Ana; Pondolfino, Amy; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
    This paper explores the relationship between brand development and customer engagement. Customer brand engagement and customer engagement theories and models are examined through existing literature. Concrete steps to advance customer engagement are identified. Artifacts are created as part of a comprehensive branding package to guide a children's museum, Oneonta World of Learning (OWL), through their branding process.
  • Developing Helpdesk Mobile App to Support Classroom Technology During COVID-19 Pandemic

    Jofre, Ana; Reed, Allen; Jofre, Ana; First Reader; Yucel, Ibrahim; Second Reader (SUNY Polytechnic Institute, 2020-12)
    This research project is a prototype of a mobile application that would be dedicated to the Syracuse University faculty members and students and serve as service mobile app providing helpdesk support for classroom technology issues. The development of this mobile application uses Universal Design Principles focuses on Human-Centered Design theory, and the app build upon a user’s needs. The prototype has been created using Adobe XD, the prototypes are made to be high fidelity and fully interactive so it can be used for usability test. This research project paper intends to determine the benefit of using mobile app for helpdesk support during the COVID-19 pandemic, and to find out if using helpdesk mobile app could enhance IT services and the time needed to response to classroom technology issue. The fully interactive prototype can be viewed through the link below:
  • Mechanisms of aseptic loosening in total knee arthroplasty

    Cyndari, Karen (2017)
    Introduction: Cemented Total Knee Arthroplasty (TKA) is the gold standard of care for end-stage, multi-etiologic arthritis. While the longevity of these devices may now reach or even surpass 15 years in service, a minority (~10%) will fail prematurely due to a process called aseptic loosening. Historically, this process has been attributed to an inflammatory reaction against wear debris from the TKA polyethylene (PE) insert. However, we have previously estimated supraphysiologic fluid shear stress (FSS) (exceeding 900 Pa) at the cement-bone interface of cemented joint replacements, and examined this as a possible alternative cause of increased osteoclast activity. Methods: We analyzed the cement-bone interlock of tibial and femoral components from en-bloc, postmortem-retrieved, non-revised TKAs to explore the process of loss of fixation, prior to any clinical loosening. For the tibial components, we used a novel protocol wherein whole undecalcified bone+PMMA cement segments from the proximal tibia were embedded in Spurr’s resin and thinly sectioned. Polarized light microscopy was used to identify and quantify co-located PE debris. Using a novel bioreactor developed by our lab called the Multi-Well Fluid Loading (MFL) System, we examined static, subphysiologic, physiologic, and supraphysiologic FSS on RAW 264.7 osteoclast activity and morphology, with and without PE particle treatment. Results: We found no association been the amount or presence of PE debris and the amount or location of loss of interlock in retrieved TKAs. FSS up to 17 Pa increased the ability of osteoclasts to resorb mineral, and FSS up to 4.4 Pa induced the formation of larger osteoclasts. FSS and fluid shear rate interacted together to increase the area of actin rings, while PE treatment increased the number of actin rings and TRAP production. FSS up to 4.4 Pa decreased expression of Ctsk and Il1a, but PE co-treatment abolished this effect. Conclusions: These results indicate there may be alternative factors leading to aseptic loosening apart from PE debris. We demonstrated that osteoclasts are mechanosensitive and able to adjust activity, morphology, and gene expression based on FSS. Further, PE interferes with osteoclast gene downregulation in response to FSS, indicating PE could be a potentiator of osteoclast activity or differentiation.
  • Alternative splicing dysregulation in mental disorders

    Glatt, Stephen; Cohen, Ori S (2014)
    The brain's ability to adapt ultimately depends on the efficiency with which neuronal connections are made, destroyed, or manipulated. This connectivity is largely controlled by synaptic plasticity, which creates, strengthens, or weakens signals that are necessary for appropriate functioning of the organism. This constant rewiring allows an organism to learn, mature, and cope with the ever-changing environment. However, this rewiring is dependent on the ability to make new proteins, which highlights the importance of transcription, translation, and post-translational modification in the process of synaptic plasticity. Among these cellular functions, transcription plays a key role in providing the necessary variability that is required to regulate neurodevelopment and cognitive behaviors. During transcription, alternative splicing regulates the contents of transcriptomic elements by cutting and stitching the transcribed pre-mRNA and adjusting the configuration of the mature mRNA(s) to meet the necessary cellular requirements. Therefore, it is conceivable that alternative splicing abnormalities can result in inappropriate adjustment of the transcriptome and result in pathological adaptation. In this dissertation, I review the evidence of dysfunctional gene splicing in neuropsychiatric disorders. Then I evaluate the extent of alternative splicing in an animal model for social interaction. This model utilizes valproic acid exposure at a critical developmental period to illicit significant and long-lasting changes in social interaction behavior. Next, I explore the abundance and types of alternative-splicing dysregulationin postmortembrain tissue samples from schizophrenia patients as compared to non-psychotic comparison subjects. Finally, I describe the mechanisms by which a schizophrenia-associated polymorphism in a strong candidate gene (DRD2, which encodes the D2 dopamine receptor) disrupts alternative splicing and leads to inappropriate transcription that is associated with cognitive dysfunction. Collectively, these results reinforce the notion that consideration of genetic variants that dysregulate particular mRNA isoforms and understanding the biological consequence of expressing such isoforms is a crucial step in our efforts to understand human behavior and to develop therapeutic interventions for mental disorders.
  • Detection of Brain Tumor in Magnetic Resonance Imaging (MRI) Images using Fuzzy C-Means and Thresholding

    Andriamanalimanana, Bruno; Kalakuntla, Shashank; Andriamanalimanana, Bruno R.; First Reader; Novillo, Jorge E.; Second Reader; Spetka, Scott; Third Reader (SUNY Polytechnic Institute, 2020-08)
    Although many clinical experts or radiologists are well trained to identify tumors and other abnormalities in the brain, the identification, detection and segmentation of the affected area in the brain is observed to be a tedious and time consuming task. MRI has been a conventional and resultant image processing technique to visualize structures of the human body. It is very difficult to visualize abnormal structures of the brain using simple imaging techniques. MRI technique uses many imaging modalities that scan and capture the internal structure of the human brain. Even with the use of these techniques, it is a difficult and tedious task for a human eye to be always sophisticated in detecting brain tumors from these images. With emerging technology, we can provide a way to ease the process of detection. This project focuses on identification of brain tumor in MR images, it involves in removing noise using noise removal technique AMF followed by enhancing the images using Balance Enhancement Contrast technique (BCET).Further, image segmentation is performed using fuzzy c-means and finally the segmented images are produced as an input to a canny edge detection resulting with the tumor image. This report entices the approach, design, and implementation of the application and finally the results. I have tried implementing/developing this application in Python. The Jupyter notebook provides a block simulation for the entire flow of the project.
  • Non-Convex Optimization: RMSProp Based Optimization for Long Short-Term Memory Network

    Andriamanalimanana, Bruno; Yan, Jianzhi; Andriamanalimanana, Bruno; First Reader; Chiang, Chen-Fu; Second Reader; Novillo, Jorge; Third Reader (SUNY Polytechnic Institute, 2020-05-09)
    This project would give a comprehensive picture of non-convex optimization for deep learning, explain in details about Long Short-Term Memory (LSTM) and RMSProp. We start by illustrating the internal mechanisms of LSTM, like the network structure and backpropagation through time (BPTT). Then introducing RMSProp optimization, some relevant mathematical theorems and proofs in those sections, which give a clear picture of how RMSProp algorithm is helpful to escape the saddle point. After all the above, we apply it with LSTM with RMSProp for the experiment; the result would present the efficiency and accuracy, especially how our method beat traditional strategy in non-convex optimization.
  • Cyber Security Advantages of Optical Communications in SATCOM Networks

    Kholidy, Hisham A.; Baker, Cameron; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020-12)
    Space-based communications, whether it is ground-to-space or inter-satellite communications, have so far been primarily within the RF spectrum. With the increase in space missions and the need for larger amounts of data being sent to and from satellites, the near infrared or optical spectrum has started to become more widely used instead of RF. Higher bandwidth is not the only advantage of using optics for communications over RF, there is also an inherent security advantage as well. Currently, there is far too little enforcement of security standards for space communications networks, and the use of RF only worsens the problem due to its very large beam spread when compared to optics. This paper will seek to prove that optics is a far more superior technology to be used for space communications networks from a security standpoint as well as providing an increase in available bandwidth. These points will be proven by first introducing the technology by examining current Free Space Optics (FSO) systems and space optics systems being provided by manufacturers. Secondly, this paper will discuss the current state of space communications security, and issues space communications networks are facing using RF with the recent advancement into low-cost SmallSat operations that threaten existing space vehicles, and the lack of standard security practices within these networks. Lastly, this paper will provide evidence into why optics communications can improve the security of spaced based communications due to its lower beam spread and the ability to incorporate quantum key distribution into the communications channel.
  • A Wireless Intrusion Detection for the Next Generation (5G) Networks

    Kholidy, Hisham A.; Ferrucci, Richard; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020-05)
    5G data systems are closed to delivery to the public. The question remains how security will impact the release of this cutting edge architecture. 5G data systems will be sending massive amounts of personal data due to the fact that everybody in the world is using mobile phones these days. With everyone using a 5G device, this architecture will have a huge surface area for attackers to compromise. Using machine learning techniques previously applied to 802.11 networks. We will show that improving upon these previous works, we can have a better handle on security when it comes to 5G architecture security. We find that using a machine learning classifier known as LogIT boost, combined with a selected combination of feature selection, we can provide optimal results in identifying three different classes of traffic referred to as normal, flooding, and injection traffic. We drastically decrease the time taken to perform this classification while improving the results. We simulate the Device2Device (D2D) connections involved in the 5G systems using the AWID dataset. The evaluation and validation of the classification approach are discussed in details in this thesis.
  • ?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks

    Kholidy, Hisham A.; Singh, Manjit; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
    The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave (mmWave) massive multiple-input-multiple-output (massive MIMO) system is one of the dominant technology that consistently features in the list of the 5G enablers and opens up new frontiers of services and applications for next-generation 5G cellular networks. The mmWave massive MIMO technology shows potentials to significantly raise user throughput, enhances spectral and energy efficiencies and increases the capacity of mobile networks using the joint capabilities of the huge available bandwidth in the mmWave frequency bands and high multiplexing gains achievable with massive antenna arrays. In this report, we present the preliminary outcomes of research on mmWave massive MIMO (as research on this subject is still in the exploratory phase) and study two papers related to the Millimeter Wave (mmwave) and massive MIMO for next-gen 5G wireless systems. We focus on how a generic dataset uses accurate real-world measurements using ray tracing data and how machine learning/Deep learning can find correlations for better beam prediction vectors through this ray tracing data. We also study a generated deep learning model to be trained using TensorFlow and Google Collaboratory.
  • Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems

    Kholidy, Hisham A. (SUNY Polytechnic Institute, 2020)
    In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation.
  • 5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers

    Kholidy, Hisham A.; Steele II, Bruce; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
    5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous generation with the ability to support new and emerging technologies in addition to the growth in the number of devices. The purpose of this report is to give a broad overview of what 5G encompasses including the architecture, underlying technology, advanced features, use cases/applications, and security, and to evaluate the security of this new networks using existing machine learning classification techniques such as The J48 Tree Classifier and the Random Forest tree classifier. The evaluation is based on the UNSW-NB15 dataset that was created at the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) at the University of New South Wales. Since 5G datasets have yet to have been created, there is no publicly available dataset for the 5G systems. However, While the UNSW-NB15 dataset is built using a standard wireless computer network, we will use it to simulate the device-to-device (D2D) connections that 5G will support. In the case with the UNSW dataset, the J48 tree classifier fits more accurately than the Random Forest classifier. The J48 tree classifier achieved an 86.422% of correctly classified instances. On the other hand, the Random Forest tree classifier achieved 85.8451% of correctly classified instances.
  • An Empirical Wi-Fi Intrusion Detection System

    Kholidy, Hisham A.; Basnet, Diwash Bikram; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020-05)
    Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. Intrusion Detection Systems detect the attacks by inspecting the network traffics or logs. The work demonstrated the effectiveness of detecting the attacks using machine learning techniques on the AWID dataset, which is produced from real wireless network logging. The author of the AWID dataset may have used several supervised learning models to successfully detect the intrusions. In this paper, we propose a newer approach for intrusion detection model based on dense neural networks, and long short-term memory networks (LSTM) and evaluate the model against the AWID-CLS-R subset. To get the best results from the model, we applied feature selection by replacing the unknown data with the value of “none”, getting rid of all repeated values, and kept only the important features. We did preprocess and feature scaling of both training and testing dataset, additional we also change the 2-dimensional to the 3- dimensional array because LSTM takes an input of 3-dimensional array, and later we used flatten layers to change into a 2-dimensional array for output. A comprehensive evaluation of DNN and LSTM networks are used to classify and predict the attacks and compute the precision, recall, and F1 score. We perform binary classification and multiclass classification on the dataset using neural networks and achieve accuracy ranging from 86.70 % to 96.01%.
  • An Analysis of a Signature-based Approach for an Intrusion Detection System in a Wireless Body Area Network (WBAN) using Data Mining Techniques

    Kholidy, Hisham A.; Medina, Serene Elisabeth; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020)
    Wireless Body Area Networks (WBANs) use biosensors worn on, or in the human body, which collect and monitor a patient’s medical condition. WBANs have become increasingly more beneficial in the medical field by lowering healthcare cost and providing more useful information that medical professionals can use for a more accurate, and faster diagnosis. Due to the fact that the data collected from a WBAN is transmitted over a wireless network, there are several security concerns involved. This research looks at the various attacks, and concerns involved with WBANs. A real physiological dataset, consisting of ECG signals obtained from a 25-year-old male, was used in this research to test accuracy of various decision tree classifiers. The Weka software was used to analysis the accuracy and detection rate results of this dataset in its original form, versus a reduced dataset consisting of less, more important attributes. The results concluded that the use of decision tree classifiers using data mining, is an efficient way to test the increased accuracy on a real dataset obtained from a WBAN once it has been altered. The original dataset produced results where the ROC curve ranged from 0.313 (31%) to 0.68 (68%), meaning their accuracy is not very high and the detection rate is low. Once an attribute selection feature was used on the dataset, the newly reduced set showed ROC curves ranging from 0.68 (68%) to 0.969 (97%) amongst the three classes. As a result, decision tree models were much more accurate with a higher detection rate when used on a real dataset that was reduced to function better as a detector for a WBAN.
  • Structural and functional characterization of the V-ATPase membrane sector

    Couoh-Carde, Sergio J. (2017)
    The vacuolar ATPase (V1VO-ATPase, V-ATPase) is a H+-pump involved in the acidification of organelles in eukaryotes. Under certain physiological conditions, the VATPase disassociates into an inactive soluble ATPase sector (V1) and a membrane sector (VO) that is impermeable to protons. Due to the lack of detailed structural and functional information, the auto-inhibition mechanism of VO is not well understood. Although the V-ATPase shares a similar structure and rotary catalysis mechanism with the F- and AATPases, V-ATPase’s increased structural complexity and unique mode of regulation suggest other functions beyond its canonical proton pumping. We purified Vo and Vo sub-complexes for structural and functional characterization. First, our ~18 Å cryo-EM model of Vo suggests that c-ring (c8c’c’’) is partially surrounded by the C-terminal membrane integral portion of subunit a (aCT). On the other hand, the soluble N-terminal portion of subunit a (aNT) interacts with subunit d that sits atop of the c-ring. Selective removal of subunit d (VoΔd) did not allow passive proton translocation. Second, the c-ring was isolated and its X-ray crystal structure was solved at ~4 Å resolution. Two c-rings interact to form a gap-junction like structure. The presence of c’’ disrupts the intrinsic and global symmetry of the c8c’ sub-complex, constituting a kinetic barrier during c-ring axial rotation. Third, we discovered that c-ring can act as a large-conductance ion-channel independently from its canonical function in proton pumping. Our biophysical, biochemical, and functional data suggest that exquisite kinetic barriers play a primary role in the auto-inhibition of Vo, and that Vo may have noncanonical functions in intercellular communication.
  • Laminins regulate retinal angiogenesis

    Brunken, William J.; Biswas,Saptarshi (2017)
    Vascular pathologies are the leading causes of acquired blindness in the developed world. While many studies sought to unravel cell-intrinsic and growth factor-mediated regulations of angiogenesis, it is only recently that the role of the basement membrane (BM) components in angiogenesis began to be explored. Several diseases with ocular manifestations are known to alter vascular BM compositions. Therefore, a detailed knowledge of the BM-mediated signals that regulate angiogenesis is of great importance. Laminins, a critical component of the BM, have been shown to regulate several aspects of angiogenesis in the retina. Our laboratory previously demonstrated that the laminin composition of the inner limiting membrane (ILM) regulates astrocyte migration, and consequently vascular expansion along the retinal surface. Here, I examined the role of γ3- and β2-containing laminins in two specific aspects of angiogenesis: 1) vascular branching and endothelial cell proliferation in the nascent vascular plexus, and 2) arterial morphogenesis in the remodeling zone. Results presented in Chapter 2 and Appendix 1 demonstrate that laminin composition of the BM is a critical regulator of microglial recruitment to the growing nascent plexus, where microglia facilitate vascular branching. Furthermore, microglia interact with the astrocyte-derived layer of the vascular BM, and that this interaction regulates iii microglial activation. The activation state of microglia, in turn, regulates endothelial cell proliferation. Results presented in Chapter 3 and Appendix 2 demonstrate that vascular BM laminins are critical regulators of arterial morphogenesis. Specifically, my results reveal a novel mechanism where γ3- containing laminins signal through dystroglycan to induce Dll4/Notch signaling in arterial endothelial cells, regulating proper arterial morphogenesis. Finally, in Appendix 3, I examined the coordinated expression of different laminin chains in the vascular BM. My preliminary results suggest that expressions of laminin α2-, α5- and γ3-chains in the retinal vascular BM are coordinately regulated with the expression of laminin β2-chain. In conclusion, this study sheds light on hitherto unexplored mechanisms by which BM laminins regulate retinal vascular development.

View more