• Best Practices for Embedding Videos on Oral History Websites

      Tucker, Michelle M. (2012-05-01)
      The study investigates current technical practices for viewing video on the internet. The study also investigates common features of oral history websites that contain video for viewing. 50 websites that contain video for viewing were analyzed for various features such as video upload capability, closed captioning or transcript presence, and video format(s) utilized or accepted. Review of the oral history websites revealed that long interviews are best broken into shorter video segments. Also, the presence of transcripts is helpful to viewers. In addition, research was conducted for recommendations for the creation of best quality videos and most common practices. It was found that the MPEG-4 video format produces a reliable, quality image. An oral history website about the Utica Psychiatric Center was created utilizing these recommendations. The website features videos of interviews with former employees. User testing was employed to critique the website.
    • BGP Routing Protocol

      Parasa, Sai Kiran; Hash, Larry; Advisor (2016-08)
      Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls the administrative part of a network. Routing with in an Autonomous System is called as Intra-Autonomous routing and routing between different Autonomous Systems is called as Inter-Autonomous System routing. The routing protocols used within an Autonomous System are called Interior Gateway Protocols (IGP) and the protocols used between the Autonomous Systems are called Exterior Gateway Protocols. Routing Information Protocol (RIP), Open Short Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) are the examples for IGP protocols and Border Gateway Protocol (BGP) is the example for EGP protocols. Every routing protocol use some metric to calculate the best path to transfer the routing information. BGP rather than using a particular metric, it uses BGP attributes to select the best path. Once it selects the best path, then it starts sending the updates in the network. Every router implementing BGP in the network, configures this best path in its Routing Information Base. Only one best route is selected and forwarded to the whole network. [17] Due to the tremendous increase in the size of the internet and its users, the convergence time during link failure in the protocol is very high.
    • Bioengineered Platforms for Human Stem Cell-Based Diagnostic and Therapeutic Interventions

      Paluh, Janet L.; Thesis Advisor; Sharfstein, Susan T.; Committee Member; Xie, Yubing; Committee Member; Wang, Jun; Outside Committee Member; Amini, Nooshin (2020-08)
      Human stem cells offer an unprecedented ability to restore function lost through disease or injury by providing options for cell therapies and regenerative medicine. Two hurdles that delay greater clinical use of stem cells are production of differentiated therapeutic cells in large-scale platforms and the challenge of choosing the optimum cell type and delivery method for cell therapy that is optimized for cell-cell signaling in the therapeutic microenvironment. In my thesis work I investigated different bioengineered platforms in combination with human stem cell technology to mass produce functional hiPSC-derived beta islets in a miniature bioreactor and study cytokine release from multipotent and differentiated hiPSC-derived neural stem cells as neural rosettes and their dissociated cells or differentiating inhibitory and excitatory neurons alone and in mixed cultures applying a neural cell-cell interaction microchip (NCCIM) with features developed specifically for these studies. My work has further expanded the application of hiPSC-derived neurons in an in vitro model of traumatic brain injury. In this study a hybrid culture of hiPSC-derived excitatory pyramidal neurons, inhibitory GABAergic interneurons and immortalized human microglia are being evaluated for secreted cytokines under healthy and stretch injured induced conditions. One of the challenges of TBI is the inability to yet effectively and with minimal invasiveness track changes following injury that may indicate healing or deterioration and an in vitro model is one important contribution to identifying biomarkers.
    • BIOENGINEERED, STEM CELL DERIVED OCULAR OUTFLOW TISSUE

      Xie, Yubing; Advisor; Torrejon, Karen; Thesis committee; Cady, Nate; Thesis committee; Danias, John; Thesis committee; Sharfstein, Susan; Thesis committee; Tian, Yangzi Isabel (2018-10)
      Glaucoma is one of the leading causes of irreversible blindness in the world. Despite decades of research, intraocular pressure (IOP) is the only known treatable risk factor. IOP is affected by the timely removal of aqueous humor through the conventional outflow track, which is made up of the trabecular meshwork and adjacent Schlemm’s canal. Dysfunction in these tissues due to aging, oxidative stress, metabolic or pathological changes lead to increased flow resistance, elevated IOP, and ultimately glaucoma. Recent advances in ocular regenerative therapy have the potential to rescue glaucomatous tissue function and restore its delicate microenvironment. The possibility of using stem cell-derived trabecular meshwork and Schlemm’s canal cells to recreate a functional outflow tissue are explored in this thesis. Previously, our lab developed a well-defined, micro-porous substrate that promotes in vivo-like physiology and outflow function in primary trabecular meshwork and Schlemm’s canal cell cultures. Using these primary cell cultures as controls, we have created 3D stem cell-derived outflow tissues, evaluated and compared their morphology, expression, outflow facility, and drug responsiveness. To explore the importance of the dynamic microenvironment in outflow function, we developed a dual-flow microfluidic chamber that mimics the basal-to-apical and shear flow of aqueous humor through the conventional outflow track. Overall, this dissertation demonstrates the promising application of stem cells in future glaucoma drug screening and treatment.
    • Biomimetic Scaffolds Using Natural/Synthetic Polymers for Salivary Gland Regeneration

      Sfakis, Lauren; Castracane, James; Advisor (2017-06-01)
      Salivary glands are essential in maintaining oral cavity homeostasis. This tissue can become impaired by chemotherapy/radiotherapy given to head and neck cancer patients, as well as systemic diseases. Once this gland is damaged, it has limited ability to regenerate, and so the need for potential biodegradable/biocompatible scaffolds to aid in the growth and repair is of great interest. This soft tissue is made up of multiple cell populations that contribute to the function of the gland. Creating an environment that can recapitulate the one seen in vivo will promote the functionality of the engineered tissue. This research aims to investigate: (1) cell-substrate interactions with salivary gland epithelial cells and nanofiber scaffolds, (2) cell-cell interactions via incorporation of a second native cell population to further enhance epithelial differentiation, mimicking the in vivo microenvironment and (3) the development of engineering a three-dimensional scaffold that will better facilitate the two interactions described above. The hypothesis is that sponge scaffolds that mimic the mechanical properties and architecture of the tissue observed in vivo will provide a platform for future implantation and regeneration strategies. Bio-mimetically engineered scaffold systems for the growth of organs, such as the one described here, yield novel tools for studying organ development in applications for regenerative medicine.
    • Blogging as a Tool to Promote Student-Centered Learning

      Besler, Steven Richard (2013-12-01)
      With recent changes in the educational realm there is an inherent push for students to take an active role in creating their own ways to retain information. This can be defined as Student-centered learning instruction. As the teacher, it is necessary to create an environment to facilitate this style of learning. In order to make this style of learning possible, teachers must develop creative ways to present curriculum. A weblog is a tool that can make Student-centered instruction possible within the classroom. The goal of this research project is to prove that there is a correlation between the implementation of a weblog and Student-centered instruction.
    • Blogging September 11; Transforming Personal Expressions Into Data Visualization in Wordle and Tagxedo

      Lata, Andrzej (2012-05-01)
      September 11, 2001 is one of the most recognizable dates in world's modern history. Much has been said, published and reported about the tragic events and more may still be revealed and understood about that unforgettable day. So much information has been collected about September 11th, and many have studied and analyzed this information. Many educational, governmental and other organizations and institutions have worked and contributed toward a better understanding of the events of that tragic day. Under the guidance and leadership of Professor Steven Schneider, teachers and students of SUNY IT had an opportunity to participate in several projects directed towards a deepening understanding and reflection upon 9/11. I had the opportunity to participate in two of these projects during the Spring and Summer of 2011. My participation sparked my choice of a topic for my final project. I investigated content of blog entries posted immediately after the terrorist acts of September 11th, 2001. the research questions I sought to answer were centered on the personal expression of bloggers; What did they write about? How can this data be captured and analyzed? How can the researcher best present this data and findings? Analyzing blog content, identifying key words and transferring text of blogs into images called word clouds. is the solution I have modeled. The project was finalized by creating 42 word clouds, 21 in Wordle and the same number in Tagxedo, both are word cloud generation software. Sifting through the blogs and examining data in different forms enriched my understanding of the variation in the personal expression of the bloggers and helped me to see what they reported and contributed in a totally new light. There are still many questions to be answered about personal expression of people who reported their stories on the Internet in September, 2001 and many more projects and studies that could contribute much more towards understanding of content of 9/11. My hope is that the findings rand methodology reported here will add a small piece in understanding of what happened in September, 2001.
    • Botnet Campaign Detection on Twitter

      Fields, Jeremy; Sengupta, Saumendra; Adviser; White, Joshura; Reviewer; Spetka, Scott; Reviewer (2016-08)
      The goal of this thesis is to investigate and analyze botnet activity on social media networks. We first start by creating an algorithm and scoring method for “likely bots,” and analyze them in conjunction with their neighboring messages to determine whether there is a likely group of bots, or botnet. Chapters 1 & 2 cover the overview of the work, and the previous research done by others. Multiple datasets were collected from Twitter, over different time frames, including random samples, and targeted topics. Chapters 3 & 4 cover the methodology and results of the approach using these datasets. The method is shown to have high accuracy.
    • Bridges: An All-in-One Resource App to Help Narrow the Digital Divide

      Jofre, Ana; Torres, Abigail; Jofre, Ana; First Reader; Lizardi, Ryan; Second Reader (SUNY Polytechnic Institute, 2020-12)
      goal of this project is to design a user-friendly mobile application prototype for people who are disadvantaged by the digital divide. This includes people who are of lower income and those who live in areas where internet isn't accessible or expensive. This application can be accessed through IOS devices as well as a text messaging service system for those without said device. It is an application that will be extremely easy to use and manage, and where users will be able to access multiple resources to gain not only digital literacy but find places that offer computer labs and internet for free, in case neither is available at home. The mobile application's goal is to create resource where the user has everything, they need in a way that is easily accessible; a product that is not currently on the market. In this paper, I will not only explore research on what the digital divide is, but also how it affects those who are disadvantaged by it and ways we can start to help narrow the gap. I will also explore the advantages of mobile applications and how it can be used to narrow the digital divide.
    • Building a University Information Technology Knowledge Base Using TiddlyWiki

      Stam, Kathryn; Thesis Advisor; Lizardi, Ryan; Second Reader; Fischer, Sam (2021-05)
      Keeping a knowledge base up to date can be a difficult and endless task for an Information Technology Services (ITS) department at a university. As technology emerges and is embraced by students and faculty, ITS can become responsible for supporting end users with all sorts of questions and problems. A knowledge base is a website or application used to store helpful information in the form of articles that can be easily shared with end users, giving them a way to support their technology problems without contacting a live person. When managing a large-scale knowledge base, information can be inadvertently replicated in many different areas and contradict other articles, especially when more than one manager can add or edit information. Information modules, or chunks of verified information that can be referenced and inserted into an article, can help eliminate contradictory information and ensure consistency with information that has to be in multiple places through the use of hypertextuality and transclusion. Hypertextuality is a way of organizing information and documents by creating individual bits of information that are assembled together to create a larger document, and transclusion is a way of assembling hypertext documents by simply referencing one into the other. TiddlyWiki is an application that is built around the idea of hypertextuality and transclusion. This project aims to explore the potential for a knowledge base to be built with the TiddlyWiki application.
    • Building an Educational Website Dedicated to the Study of Violent Crime Perpetuated Through Social Media

      Maloney, Kristen; Lizardi, Ryan; First Reader; Jofre, Ana; Second Reader (2019-04)
      Computing technology has taken over every aspect of life, from business to socializing, the world is entirely dependent on the Internet. Social engineering, hacking, and phishing attempts have made protecting private information and finances more complex than ever. As new techniques and equipment are created by the day, law enforcement struggles to keep pace. With the rise of social media, online gaming, and crowdfunding, there are more outlets than ever for criminals to attempt to defraud unsuspecting victims. This study serves to examine what makes cybercrime so attractive, the types of attacks and targets, and the role of law enforcement in investigating crimes; with on how social media networks like Facebook or Twitter have allowed crime to cross into real life. Utilizing this information, I have created an educational website for use in public or academic spaces to make cybersecurity information accessible. This flexible platform can be updated in real time as more information becomes available – allowing for new risk and solutions to be added.
    • Building an Engaging and Inviting MOOC in Moodle

      Herrick, Stacy (2013-05-01)
      The study of this project focuses on the development of a connectivist massive open online course (MOOC) using Moodle, an open-source software. Ten MOOCs were analyzed for information that could be used to apply best practices in my course prototype. In addition to analyzing MOOCs, the history, learning theories, technology, and course production methods were also explored. This information was combined to help produce a prototype of a working course that displays the desired characteristics. The course was set up in Moodle with all working parts, including the second week’s module that included a video lecture, suggested readings, and discussion topics. An ideal approach to the course was also included in the writeup.
    • A Case Study on Apache HBase

      Nalla, Rohit Reddy; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Rezk, Mohamed; Reviewer (2015-05-16)
      Apache HBase is an open-source, non-relational and a distributed data base system built on top of HDFS (Hadoop Distributed File system). HBase was designed post Google’s Big table and it is written in Java. It was developed as a part of Apache’s Hadoop Project. It provides a kind of fault – tolerant mechanism to store minor amounts of non-zero items caught within large amounts of empty items. HBase is used when we require real-time read/write access to huge data bases. HBase project was started by the end of 2006 by Chad Walters and Jim Kellerman at Powerset.[2] The main purpose of HBase is to process large amounts of data. Mike Cafarella worked on code of the working system initially and later Jim Kellerman carried it to the next stage. HBase was first released as a part of Hadoop 0.15.0 in October 2007[2]. The project goal was holding of very large tables like billions of rows X millions of columns. In May 2010, HBase advanced to a major project and it became an Apache Top Level Project. Several applications like Adobe, Twitter, Yahoo, Trend Micro etc. use this data base. Social networking sites like Facebook have implemented its messenger application using HBase. This document helps us to understand how HBase works and how is it different from other data bases. This document highlights about the current challenges in data security and a couple of models have been proposed towards the security and levels of data access to overcome the challenges. This document also discusses the workload challenges and techniques to overcome. Also an overview has been given on how HBase has been implemented in real time application Facebook messenger app.
    • Centralized Information Site for IDT Imternational Students

      Sathiaseelan, Akila (2008-12-01)
      This qualitative research study analyzes the outcomes of a centralized information site created for prospective and current international students for Information Design and Technology department. Information specific to International students’ needs were gathered and categorized into major groups. A Flash site was constructed based upon those needs by applying ease of use, maintainability, search-ability and Human Centered Design (HCD) principles. Qualitative researches, namely, Participatory Action Research and Qualitative interviewing were applied for data collection and data analysis to yield the results.
    • Characterization and Control of the Surface of the Topological Insulator Bi2Se3

      Green, Avery James; Diebold, Alain; Advisor (2017-12)
      The field of topological insulator (TI) materials is new. The ideal TI contains surface states in helical Dirac cones that can be used for spintronics or interconnect applications. Of the TI class, Bi2Se3 is the most promising for applications due to its stoichiometric composition, its relatively large band gap (0.3 eV), and the central (??-point) position of the Dirac cone in its 2D surface band structure. Although the theoretical solid-state models that the TI field has produced are powerful and unique, their novel emergent physical properties are not universally observed in every sample. These materials are difficult to grow and maintain under ambient conditions. Growths tend to either not be applicable to wafer-scale production or produce high polycrystallinity, and all samples experience natural oxidation, band bending, and intrinsic n-doping, which generates spin-degenerate or bulk conduction. This thesis contains a primer on topologically non-trivial materials, and two studies aimed at understanding and minimizing defects at the surface of Bi2Se3. In the first, the aging process of Bi2Se3 when exposed to air at room temperature is investigated. The time scale and topographic changes of the oxidation process at micromechanically exfoliated surfaces are measured, and an optical model of the bulk and oxide layers are developed. The surface appears to oxidize starting at 2 hours after exfoliation, and continuing through 1.5 weeks, by which time, the oxide layer growth has reached an asymptote of 1.9 nm. New optical characterization methods are developed to monitor the orientation of the crystal (via second harmonic generation) and to measure the oxide growth at the surface (using spectroscopic ellipsometry and the derived dielectric functions of the bulk and oxide layers). The goal of the second study is to assess the use of Se capping and subsequent thermal decapping to preserve a pristine surface and maintain a constant Fermi level. This was measured by annealing samples in a UHV environment to successively higher temperatures until the Bi2Se3 film decomposed, and measuring the surface crystallinity, topography, surface chemistry, and Fermi level between each anneal. Thermally decapping samples has no measurable effect on crystallinity, minimal effect on surface topography, reveals the expected Bi-Se surface bonds, and retains a mid-gap Fermi level. This may serve as a reference to improve the fabrication process of devices that include Bi2Se3.
    • Climate Change: Restaurant and Employee Awareness Through the Use of Tutorials

      Rowe, Amy (2015-12)
      Restaurants have a profound affect on climate change because of the large amounts of water and food that is discarded by the food industry on a daily basis. Most restaurant employers are not educated enough about food waste and its affect on climate change; so, these employers do not educate their employees on the best practices to avoid food waste. However, many companies use multimedia learning to train employees on menu offerings, company policies, payroll or other pertinent information, but do not use the opportunity to educate employees and customers about the food industry’s affects on climate change. Tutorials with infographics are a large part of multimedia learning because it offers a way for learners to do things, such as, selfinteract, read, solve problems, and answer questions. With distance learning becoming more and more popular, tutorial style teaching is as well. Multimedia learning aids are costeffective for restaurants because it accommodates multiple learning styles while covering a lot of material at once. As demonstrated by this project’s website, tutorials and infographics, when used in a multimedia setting, can motivate restaurant employees to learn about important issues, like climate change. This paper seeks to find, and to discuss, what restaurants are doing to educate employees about climate change, what the significance of climate change means to a restaurant’s best practices, and how multimedia learning can educate and influence restaurant employees to move toward best practices which will then help reverse the effects of climate change.
    • Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems

      Kholidy, Hisham A. (SUNY Polytechnic Institute, 2020)
      In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation.
    • Comic Books as American Propaganda During World War II

      Dellecese, David; Stam, Kathryn; Thesis Advisor; Lizardi, Ryan; Second Reader; Kahn, Russell; Instructor (2018-05)
      American comic books were a relatively, but quite popular form of media during the years of World War II. Amid a limited media landscape that otherwise consisted of radio, film, newspaper, and magazines, comics served as a useful tool in engaging readers of all ages to get behind the war effort. The aims of this research was to examine a sampling of messages put forth by comic book publishers before and after American involvement in World War II in the form of fictional comic book stories. In this research, it is found that comic book storytelling/messaging reflected a theme of American isolation prior to U.S. involvement in the war, but changed its tone to become a strong proponent for American involvement post-the bombing of Pearl Harbor. This came in numerous forms, from vilification of America’s enemies in the stories of super heroics, the use of scrap, rubber, paper, or bond drives back on the homefront to provide resources on the frontlines, to a general sense of patriotism. This research looks to the motivations behind such storytelling in the background of comic book writers and artists as well as involvement from government agencies such as the War Writer’s Board. It’s also important to note that while comics often vilified the enemies of America through the use of terrible stereotypes and caricature, within those same pages were messages promoting solidarity among religion, race, and background for the purpose of winning the war. These mixed messages often make for very contradictory presentations, especially when looked at retroactively and allow comic books from this time period to be looked at as media artifacts, providing insight into cultural and societal ways of thinking during this period, with appropriate historical context. I have created a website supplement to this thesis where many examples of the types of images discussed have been collected and organized for viewing: https://comicsgotowar.weebly.com/
    • A Community Approach to Discovering the September 11 LOC Web Archive

      Bingley, Matthew (2012-05-01)
      The Library of Congress September 11 Web Archive contains more websites than is reasonably analyzable by a single researcher. This project demonstrates the design of a site, titled “Source September 11,” which would enlist volunteers to analyze the Archive‟s contents. Moreover, the proposed site would allow volunteers to produce original, curated WebStories about themes in the September 11 Web Archive. The proposed site would thus have a dual function as a research and civic site, and one in which volunteers participate in its maintenance and functioning. This thesis is intended to be read in conjunction with a video overview which demonstrates the site. It can be found at http://people.sunyit.edu/~binglem/Thesis2/Thesis2.html.
    • Comparison of Network Switch Architectures by CISCO

      Vemula, Veera Venkata Satyanarayana; Hash, Larry; Advisor (2016-02-01)
      This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used to improve the network performance and network health. In this document the switching architectures CATALYST and NEXUS are compared. All the available features in each architectures are listed and working of the supported protocols is explained in detail. The document also considers three network scenarios and explains which architecture is best suited and explains why in detail.