• Nanoscale Schottky Barrier Visualization Utilizing Computational Modeling and Ballistic Electron Emission Microscopy

      Nolting, Westly; LaBella, Vincent; Advisor (2018-05)
      Understanding the properties and performance of semiconductor interfaces on the nanoscale advances semiconductor device technology which has had tremendous impact on nearly all aspects of our daily lives. Investigating the nanoscale fluctuations in the electrostatics of metal-semiconductor, or Schottky, interfaces is crucial. However, techniques for directly measuring the electrostatics at an interface are limited. Current state-of-the-art finFETs use metal-semiconductor silicides, such as Ti-Si/Si, for Schottky source-drain contacts. Studying the underlying physics of the Schottky barrier interface of silicides and other metal-semiconductor systems is critical for measuring the Schottky barrier accurately, which can be accomplished with ballistic electron emission microscopy (BEEM), a scanning tunneling microscopy (STM) based technique. In this work, the visualization of the interface to nanoscale dimensions is enhanced by computational modelling of threshold histograms acquired by the BEEM measurement technique. Modelling using a kinetic Monte-Carlo approach is utilized to simulate the distributions of barrier heights that includes effects from the interface and transport of the hot electrons as well as indication of a multi-barrier heights present at the interface. The aid of this modelling enables the discovery of several underlying properties of the interface. Analyzing the parameters of the modelling and comparing to measured data provides detailed insight into the effects that both electron scattering and incomplete silicide formation in W/Si(001) and WSi2/Si(001) have upon the transport of electrons through these structures, which is difficult to detect with conventional current-voltage measurements. The modelling also includes simulation of multiple barriers present at the interface due to the intermixing of similar metals such as Au and Ag at the interface of Si(001) In this regard, Schottky barrier visualization as the combination of histograms, mapping, and modelling provides a new insight into the local nanoscale phenomenon of the Schottky barrier. This thesis investigates the modelling of these metal-semiconductor systems and uses modelling to look at metal thickness dependent effects on the Schottky barrier from Fermi-level pinning in Au/Cr-Si/Si(001) and Au/Cr-Si/Si(111) silicide.
    • NautiCode: Coding for Kids

      Zeo, Brittany; Mullick, Rosemary; Adviser; Sarner, Ronald; Reviewer; Urban, Christopher; Reviewer (2016-05-08)
      Throughout my college career, I have asked students what made them decide to major in Computer Science. The answers I received very seldom revealed previous coding experience. Unfortunately, this is the system: you don’t know what you want to major in and so you choose something that looks interesting. You just hope it works out for the best. Fortunately for me, I had four years of programming experience in classes before reaching college as well as being a programmer on my high school’s FIRST Robotics team. This previous exposure to coding allowed me to make an educated decision about what I wanted to major in. It is not always the case that an individual gets this experience, and I want to change that. For my Masters Project, I have decided to come up with a website to get kids to learn and practice some basic concepts of coding: NautiCode. My target audience is mid to upper elementary school children. And best of all, there is no previous coding experience needed when using NautiCode. Even if Computer Science is not their career choice, they can have the exposure at an early age. Coding does not only benefit computer scientists; just having the background knowledge of concepts such as: logic, data storage, and how things relate, can be beneficial to an individual for any major. These ideas can help individuals think about problems differently and come up with solutions that would not have been possible had they not been exposed to computer science concepts. What better time in an individual’s life to introduce these concepts than childhood. Children’s brains are magnificent. They can absorb so much information and they think differently about the world. This leads to creative solutions and a new perspective. What I aim to do with NautiCode is to get children thinking in new ways and exploit their creativity and spark new ideas. I aim to give an explanation of the simple concepts in an introduction and gradually work up towards more difficult problems. Children are more capable than they know and with a little guidance, they can start creating their own technologies in no time. NautiCode is a fully functional website that I created on my own. The front end is using Scss, and HTML5 while the backend is using PHP, SQL, JS, and AJAX. My databases are being hosted locally through phpMyAdmin and MAMP.
    • New Techniques for Public Key Encryption with Sender Recovery

      Godi, Murali; Viswanathan, Roopa; Adviser; Novillo, Jorge; Reviewer; Chiang, Chen-Fu; Reviewer (2016-12-15)
      In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the receiver’s help in decrypting the ciphertext, and without having to store a set of plaintext/ciphertext pairs for every receiver the sender interacts with. This problem, known as public key encryption with sender recovery has intuitive solutions based on KEM/DEM schemes. We propose a KEM/DEM-based solution that is CCA-secure, and only requires the receiver to be equipped with a public/secret key pair (the sender needs only a symmetric recovery key), and has much simplified proofs compared to prior work in this area. We prove our protocols secure in the single receiver and multi-receiver setting. To achieve our goals, we use an analysis technique called plaintext randomization that results in greatly simplified and intuitive proofs for protocols that use a PKE internally as a component and compose the PKE with other primitives. We instantiate our protocol for public key encryption with sender recovery with the well-known KEM/DEM scheme due to Cramer and Shoup.
    • Non-Convex Optimization: RMSProp Based Optimization for Long Short-Term Memory Network

      Andriamanalimanana, Bruno; Committee Chair; Chiang, Chen-Fu; Thesis Committee; Novillo, Jorge; Thesis Committee; Yan, Jianzhi (2020-05)
      This project would give a comprehensive picture of non-convex optimization for deep learning, explain in details about Long Short-Term Memory (LSTM) and RMSProp. We start by illustrating the internal mechanisms of LSTM, like the network structure and backpropagation through time (BPTT). Then introducing RMSProp optimization, some relevant mathematical theorems and proofs in those sections, which give a clear picture of how RMSProp algorithm is helpful to escape the saddle point. After all the above, we apply it with LSTM with RMSProp for the experiment; the result would present the efficiency and accuracy, especially how our method beat traditional strategy in non-convex optimization.
    • Non-Convex Optimization: RMSProp Based Optimization for Long Short-Term Memory Network

      Andriamanalimanana, Bruno; Yan, Jianzhi; Andriamanalimanana, Bruno; First Reader; Chiang, Chen-Fu; Second Reader; Novillo, Jorge; Third Reader (SUNY Polytechnic Institute, 2020-05-09)
      This project would give a comprehensive picture of non-convex optimization for deep learning, explain in details about Long Short-Term Memory (LSTM) and RMSProp. We start by illustrating the internal mechanisms of LSTM, like the network structure and backpropagation through time (BPTT). Then introducing RMSProp optimization, some relevant mathematical theorems and proofs in those sections, which give a clear picture of how RMSProp algorithm is helpful to escape the saddle point. After all the above, we apply it with LSTM with RMSProp for the experiment; the result would present the efficiency and accuracy, especially how our method beat traditional strategy in non-convex optimization.
    • A Normative Architecture for an Online Agent-Based Healthcare System

      Bhaiya, Neha; Novillo, Jorge; Advisor; Rezk, Mohamed; Reviewer (2017-05)
      In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, computation and communication architecture providing a foundation plane for a total healthcare system based on Body Area Network sensors under the supervision of a physician or a team of physicians. Such an online healthcare system as yet does not exist; this thesis anticipates the necessary framework an online healthcare system need to proceed in the near future. The thesis is centered upon the notion of an anomalous system state that may arise owing to temporal anomalous behavior of one or more locally monitored state variables. The system that is envisaged in this thesis is an anomaly-driven event-oriented system triggering doctor’s office for further action if and when such a system enters into a state of anomaly. The data is constantly monitored for anomalous pattern by an ‘Intelligent Server’ which intimates the user’s physician upon receiving an anomalous data like sudden drop in blood pressure, pulse and other vital statistics. The physician then alerts the patient of a declining reading, or calls for emergency services and decides if the patient needs to be admitted in the hospital. We discuss our proposed system architecture for the same.
    • Nursing Home Website Review: Are they accessible, usable, and do they meet consumer needs?

      Warchol, Gail (2005-05-01)
      This study addresses a two-part research question: Are nursing home websites easily accessible and used and do they offer enough information for consumers to make informed choices? Research indicated that generally, hospital discharge planners are the ones who initially explain nursing homes to their patients with brochures and other hard copy information. Some consumers, (generally family members of the patients) have visited nursing home websites. A review of nursing home websites found that nursing home guide sites are often used for giving an array of information, including state survey results, quality assurance, staff ratio, and occupancy rates. The internet users who were interviewed stated that nursing home websites are often difficult to locate. Once having found the sites, interviewees ranked resident rights information as being most interesting, especially information on choice-making and how they are treated once in the nursing home.
    • NYS Fair Events Mobile Application With Client-Side Caching

      Kanala, Sumant; Cheng, Chen-Fu; Advisor; Gherasoiu, Iulian; Reviewer; Tekeoglu, Ali; Reviewer (2017-12)
      NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, and a Google Maps to show the route to the event from the user’s location. The motivation for creating this project arose with understanding the growing market for mobile applications and by working for a startup for several months now in the field of web development. A trend has been established in which more users are switching towards mobile apps as their preferred information exchange tool than their traditional PCs and hence the development of better apps should be geared towards mobile phones and tablet PCs. The development of the app is mainly divided into two steps, the client and server side. For the client side I developed a Cordova-based mobile app which is cross-platform and can be compiled to work on Android and IOS based mobile devices. For the server side, I used Node.js runtime environment and deployed it onto Heroku’s free dyno tier which is a cloudbased Platform as a service (paaS). Based on user’s actions, data is requested from the server’s endpoints and appropriate information is served and shown to the user in an intuitive manner.
    • OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION

      Piszcz, Alan; Ishaq, Naseem; Advisor; Novillo, Jorge E; Reviewer; Sengupta, Saumendra; Reviewer (1993)
      Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation simulator. The application domain investigated is hand printed text and engineering symbol recognition. An object oriented approach to the simulator allows other simulator paradigms to reuse a large body of the object classes developed for this particular application. The review and implementation of image feature extraction methodologies is another area researched in this paper. Four feature techniques are researched, developed, applied and tested, using digits, upper case alphabet characters and engineering symbol images. Final implementation and testing of the feature extraction methods with a baseline technique is analyzed for applicability in the domain of hand printed text and engineering symbols
    • A Parent's Interactive guide to the Social Network

      Wasecka, Joseph James (2013-05-01)
      This project hopes to determine what characteristics of an eBook will afford learning and be an effective tool for educating parents and their children on the responsible use of social networking sites. Two separate literature reviews of related studies are conducted. The first begins by examining findings from previous research on the use of social media by young children. The purpose of this review is to determine the focus and content of the eBook. Literature was collected in an electronic database by using the following key words: Cyber bullying, Web 2.0 tools, Internet Safety. The second review looks at the characteristics of an Ebook that affords learning. Literature was collected in an electronic database by using the following key words: Multimedia, Hypertext, Online Learning, Interactivity, E-books and education. E-book prototypes of an eBook were created using Flip Book Creator Professional. The Prototypes were designed using information from previous studies, Information Interactive Design and applying some of the Universal Principles of Design that afford learning. The hope is that the eBook will bridge the gap between what schools are doing and what parents need to do. The idea is that parents are going to stay connected with their children while they are online. The E-book will help educate and prepare parents to guide their children while using the “Social Network”.
    • Participant Interaction and Social Exchange-Centered Design in Massively Multiplayer Online Role-Playing Games: A Qualitative Study of Furcadia

      Scialdone, Michael J (2007-08-01)
      The purpose of this ethnography is to understand participant interaction in a Massively Multiplayer Online Role-Playing Game (MMORPGs). As participation and action of users are the glue of any community, it is imperative to examine how and why people congregate in graphical virtual environments. This relatively new phenomenon is studied within both existing and emerging schools of social thought. In this paper, the question is asked: how do participants interact within the context of an MMORPG, and are they encouraged to do so? This question is answered through an ethnographic study of one such MMORPG entitled Furcadia. This study applies both Human-Centered Design (to answer the how), and Social Exchange Theory (to answer the why). It is asserted that MMORPGs can be explained through a marrying of theories into a new one entitled Social Exchange-Centered Design.
    • Password Habits of Security Literate Individuals

      Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)
      In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important to use good password habits. Security literate internet users, i.e, students, faculty, professionals in the IT industry are expected to know better than to use bad password habits. But that may not always be the case. This thesis aims to test the hypothesis that security literate internet users use bad password habits despite knowing better, and then proceeds to understand the underlying factors behind these habits through a survey. The survey consisted of questions about basic password habits. The responses were analyzed for better insights
    • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception

      Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
      This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. Although many companies are pushing these devices with extensive marketing, do people feel a need for these devices in their home? This thesis tries to find the answer to this question and what factors are affecting these opinions. Focus group methodology is used for this thesis. It is commonly used to perform qualitative researches. Based on the analysis of the Focus Group discussions, it is found that most people (from the targeted population) will be interested in adopting these smart home devices. There are some concerns which will still need to be addressed by the company such as security, Privacy and some health concerns to make the consumers more comfortable in adopting these devices.
    • PEP Tutorials: Using Cognitive Learning Theory in Creating Online Library Instruction

      Covino, Laura (2013-05-01)
      This paper describes the creation of online tutorials that teach about the PEP (Psychoanalytic Electronic Publishing) Archive, a full-text bibliographic database, for two small, graduate-level psychoanalytic institutes. ,QFUHDWLQJWKHWXWRULDOV WKHLQVWLWXWHV¶OLEUDULDQ used Camtasia Studio software and incorporated principles of cognitive learning theory. Research questions are, first, the practicality of creating and maintaining such online tutorials, and second, their effectiveness in providing PEP training. Methodology includes a literature review, pre-project survey, software choice and training, and preparation of recording scripts. The resulting tutorials do display features of cognitive learning theory, including learner control, encoding and individual differences, perception and attention, memory, and active learning. Conclusions are that for future projects, it would be best to create shorter tutorials along with additional, text-based training materials. The second research question is yet to be answered, and finding effective means of evaluation and assessment remains a challenge.
    • A Personal Web Portfolio: Creating an Online Presence from Conception to Implementation

      Stam, Kathryn; Thesis Advisor; Jofre, Ana; Second Reader; Pierre, Marvin (2020-05)
      Approaching the end of my two-year journey through SUNY Poly’s online IDT program, I felt it was necessary for me to create an artifact showcasing my growth and progression as an Information Designer. Since I completed my degree entirely online (via distance learning), I decided to create a web portfolio representing my work in the program. This paper maps, from concept to execution, my process for creating a personal portfolio website. It includes research and analysis of existing portfolios websites, and it investigates how technology and selected design principles influence a website’s creation. The research presented here culminates with the creation and launch of my own personal portfolio website.
    • Podcast Creation for In-Home Use: An Overview of Podcast Creation Methodology Using Bloom’s Taxonomy

      Stam, Kathryn; Thesis Advisor; Lizardi, Ryan; Second Reader; Holmes, William (2021-05)
      Making an effective podcast is more complex than just using your laptop mic to record your thoughts to post on your favorite social media, there are methods or approaches with which to achieve the best results. My project was to overview the methods for making effective audio podcasts and making them available professionally and accessibly to an audience using a subject matter revolving around 3D printing. The resulting example podcasts and the framework used to create them was examined using Bloom’s Taxonomy to assess the formation and delivery of the content for maximum information retention and engagement of the listener. The final goal of this research was to examine and identify the most important characteristics in meaningful audio development for creating podcasts that will properly deliver subject matter and engage the listener. I did an audio-only podcast using a standard Windows computer to create a short series of 15–20-minute podcasts to exemplify the points I discuss in this research. The hope for this research was to outline and display this discipline in a meaningful overview, I particularly planned to use Bloom’s Taxonomy to review this subject matter in how it can be used as a framework for making effective podcasts.
    • Podcast in a Box: A low cost and effective tool to produce compelling educational videos.

      Ward, James (2018-05)
      The current generation is the media generation, devoting more than a fifty percent or more of each day to media. As media devices become increasingly portable, and as it spreads even further through young our environment, from their schools to their cars, media messages will become an even more ubiquitous presence in an already media-saturated world. Turning our attention as educators to this fact requires harnessing the power of educational video for teaching and learning. Video has become an important part of education. It is integrated as part of traditional courses, serves as a cornerstone of many courses, and is often the main information delivery mechanism in MOOCs. Several meta-analyses have shown that technology can enhance learning , and multiple studies have shown that video, specifically, can be a highly effective educational tool. In order for video to serve as a productive part of a learning experience, however, it is important that the instructor has the correct tools for video design and implementation. This tool must be cost effective, easy to use, and be able to produce interesting, high quality video. My Podcast in a Box fills in this void.
    • Podcasting: The Process of Creating a Digital Narrative

      Cannarelli, Vincent; Schneider, Steven; Advisor; Stam, Kathryn; Reviewer (2016-12-01)
      Podcasts are an emerging and quickly growing form of information design to deliver some sort of message to a listener. The purpose of that message may be to teach, inform, discuss social happenings, narrate their life, talk to guests, tell stories, and so much more. Being able to speak to people in an organic, stream of conscious format, allows for a feeling of comfort and ease of listening. There’s many steps in order to create this digital narrative from starting a blog to host a podcast, recording and editing an episode, uploading to iTunes, and more. This paper is a complete overview of a digital media package including a website, blog, and podcast. You will learn the process of creating the site, recording a podcast, editing, music production, uploading to the site and then iTunes, Apple approval, and experiences had. Also there is an in depth view of motives of creating a podcast, influences, things learned.
    • POLITICAUSE.NET: DEVELOPING A VIRTUAL CROWDSOURCING COMMUNITY TO INCREASE THE ENGAGEMENT OF WOMEN IN POLITICS

      Stam, Kathryn; Thesis Advisor; Lizardi, Ryan; Second Reader; Topping, Veronique (2020-05)
      For the past 40 years, the continued growth and engagement of women in the political process has created opportunities to increase the influence of the female electorate. Through grassroots political activism, community networks, and online advocacy, women voters have been galvanized to come together collectively to take action to address relevant political issues, but this rising political enthusiasm has not translated into an equal focus on women's issues or equal representation in Congress. This thesis examines the factors that have contributed to the growth and influence of women's political advocacy and explores women's political engagement/activism, traditional vs. online activism, the effectiveness of all-women online networks, and female voter demographics. Based on this research, I developed a virtual crowdsourcing community as a shared space for members to propose and discuss important and timely women's issues including domestic violence, reproductive health, and pay equity and to collaborate to suggest relevant legislation to political leaders. The purpose of this social network is provide a platform for women activists and constituents to connect with others who want to advance the political causes that are relevant to women and to increase the engagement of women in politics to achieve gender equality in local and national government.
    • Postmodernism & Punk: Examining a Counterculture’s Significance: The Creation of a Digital Exhibit

      Stam, Kathryn; Thesis Advisor; Jofre, Ana; Second Reader; Manley, Taylor (2020-05)
      As an IDT major, my focus is on graphic design and the visual arts. Examining where we have come in terms of graphic design aesthetics is important to continue to grow as creators. We take inspiration and develop something either similar to what we have learned or something completely new, which we would not know without learning about what past designers have done. Design is essential, it is used in every aspect of life, whether it be acknowledged or not. Without design, we cannot always communicate effectively. We incorporate design into advertising so that people will understand a product or just share information. Graphic Design is not just used for monetary profits though. Design is a way for artists to share their creativity with the world. Each designer has their own style that is unlike any others, just like significant design movements in the art world. The point of art is to establish yourself as different from the rest, so why were movements like postmodernism and punk dismissed when that is exactly what they sought to do? We must share in all forms of the visual arts and not decide what can or cannot be art.