• Secure Routing in Mobile Ad-hoc Networks

      Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
      The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be performed on MANETs were researched in order to gain better understanding and insight on how they can be defended against. The focus of this project was to secure the routing protocols, since routing plays a vital role in the operation of network and is the target of most attacks. Various research papers were referenced for collecting the information needed. The existing routing protocols were systematically categorized and compared. Additionally, advanced routing protocols that integrate cryptographic methods into them were studied to come to a conclusion that they are the most robust protocols that effectively protect the Mobile Ad hoc Networks against some dangerous attacks. Securing the routing protocols is indeed the most important aspect for securing MANETs. However, there are other techniques that can be used as extensions for strengthening these networks, in addition to using a robust routing protocol. Recommendations have been made for the same.

      Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)
      This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network engineers’ views on preventing those security issues and whether implementing SDN is a good idea in the first place. This study was conducted in order to answer three questions: 1. How does data and control layer separation in SDN cause DoS and unauthorized access attacks? 2. What are the best practices and measures to minimize such security threats from the engineer’s point of view? 3. Do security threats at the lower layer affect the decision to implement SDN? These questions were answered by reviewing research papers and interviewing engineers from the telecommunication field. DoS and unauthorized access attacks are due to vulnerabilities in OpenFlow, SDN switches and SDN controllers. Table 6 presents solutions for preventing DoS and unauthorized access attacks. Most of the network engineers said SDN should be implemented based on cost, limited risk, customers’ positive views, and company projects, despite the current security challenges.
    • Sense Making Methodology: A Study of the Impact of a New Technology on Banking Culture

      Smith, Daniel J. (2012-12-01)
      The purpose of this paper is to explore the possibility that Remote Deposit Capture technology has enhanced productivity and culture at ABC Credit Union. This study used relevant literature as well as qualitative research methodology to investigate how this new technology has changed relationships between financial institution employees and members of the financial institution. More specifically, this qualitative study used a grounded theory concept developed by Glaser and Strauss (Merriam, 2009, pp. 199) to “constantly compare” employees and their productivity and workflow at ABC Credit Union in Upstate, NY. Using interviews, field notes and documents from employees has determined if ABC Credit Union has benefited from the implementation of Remote Deposit Capture. I also performed a coding analysis defined by Corbin & Strauss (Merriam, 2009, pp. 180) as “coding that comes from interpreting and reflection on meaning” to evaluate the responses provided to me by my participants regarding the implementation of Remote Deposit Capture at ABC Credit Union. Remote Deposit Capture technology is the ability to deposit checks directly into your ABC Credit Union account via mobile devices such as an iPhone or Android device. Based on the interviews I have been able to answer the research question: Does the implementation of Remote Deposit Capture enhance the culture at Financial Institutions? If so, how?
    • SipNrate: Mobile Application for New York State Wines

      Choquette, Rebecca E (2015-12)
      It is estimated that 893 million gallons of wine were consumed in 2014, according www.wineinstitute.org, which is an increase of 228 million gallons from ten years ago. In addition mobile phone usage has soared with 90% of American adults owning a cell phone and 50% of those cell phone users, use their phones to download mobile applications, according to the Pew Research Center. Due to increases in both wine consumption and cell phone usage/mobile downloads it showed a clear need for a mobile application to assist consumers in making an informed decision prior to purchasing wine. The prototype was created using mokeupphone.com, a free online tool. Cooley’s theory of Human Centered Design was used during the creation of this mock up to insure that it would be all around user friendly. The mock ups created aide in the understanding of why this mobile application is needed, furthermore this paper explores the need for this mobile application through research in wine consumption, wine marketing and cell phone usage. The protoypes created for this project are embedded as images throughout the paper with clearly labeled image numbers to coincide with the labeling in the paper.
    • Smart Technologies in a Technology Classroom: Integration Investigation of Smart board and Smart Notebook into 7-12 Technology Education Classroom

      Owens, Travis H. (2012-04-01)
      The project explores how the different uses of Smart technologies (Smart Board and Smart Notebook) can aide in teaching technology education and address New York State and ITEEA (International Technology and Engineering Educators Association) Standards for Technical Literacy during instruction by the creation of three Smart Notebook documents to be used in a 9-12 grade technology education classroom of 8-14 students. The lengths of the three presentations vary from 10-40 minutes. One presentation is used as a teacher presentation(and student note-taking) tool and demonstrates some of the affordances that Smart Notebook has over using a traditional whiteboard and markers or Microsoft Office Power Point. The second presentation explores interactivity and demonstrates how the interactive whiteboard can be used to increase student participation and motivation in the through the use of games, activities, and interactive websites. Lastly, Smart Notebook is utilized as an assessment tool; allowing the teacher to create questions from multiple resources. The project also covers a review of literature that attempts to explain why Smart Technologies have become so popular and are often credited to improve student learning. The literature review covers a few basic theories of student learning and informational technology and design that explain how content should best be created and structured so it is learner-friendly and effective.
    • Social Media Emoji Analysis, Correlations and Trust Modeling

      Preisendorfer, Matthew; Sengupta, Sam; Adviser; White, Joshua; Adviser; Tekeoglu, Ali; Adviser (2018-01-18)
      Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. Currently, Twitter handles approximately six thousand new tweets every second, so there is plenty of data to be analyzed. With a character limit of 140 per tweet, emojis are commonly used to express feelings in a tweet without using extra characters that more explaining might use. This is helpful in identifying the mood or state of mind that a person may have been in when writing their tweet. From a computing standpoint, this makes mood analysis much easier. Rather than analyzing a group of words and predicting moods from keywords, we can analyze single (or many) emoji(s), and then match those emojis to commonly expressed emotions and feelings. The objective of this research is to gather large amounts of Twitter data and analyze emojis used to find correlations in societal interactions, and how current events may drive social media interactions and behaviors. By creating topic models for each user and comparing it with the emoji distribution analysis, a trust ”fingerprint” can be created to measure authenticity or genuineness of a given user and/or group of users. The emoji distribution analysis also provides the possibility of demographic predictions. Analysis is not limited to Twitter of course but is used here because the API is free and generally easy to use. This paper aims to prove the validity of emoji analysis as a method of user identification and how their trust models can be used in conjunction with pre-existing models to improve success rates of these models.
    • Spanning Tree Protocol

      Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
      This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in the network. Spanning Tree Protocol is standardized as IEEE 802.1D. Spanning tree is created within a Layer 2 network of connected switches, leaves only one active path between two network devices. Spanning tree has evolutions and extensions such as; Per VLAN Spanning Tree Protocol (PVST), Rapid Spanning Tree Protocol (RSTP) and Multi Spanning Tree Protocol (MSTP).
    • Sql Course Development Via Scaffolding, Social Constructivism, & Fantasy Football

      Thornton, Shawna (2013-12-01)
      Applying scaffolding and social constructivist concepts in online learning environments requires consideration of multimedia design and the impact it has on learning achievement. Online learning is transforming students’ experiences from “learning from technology” to “learning with technology”. Social constructivism –theoretical model in which learners make meaning from experience – and scaffold –theoretical guidelines for learning through incremental assistance – approaches aid instructors in providing effective and responsible learning environments though balancing student support and engaging challenges to help students understand that, ultimately, they learn from and teach each other. This project seeks to execute scaffolding and social constructivist techniques in a prototype online undergraduate level course on Structured Query Language, a programming language, for computer science and related field students. The prototype focuses on utilizing datasets from professional football players and utilizing Gamification aspects to create a pseudo fantasy football league. Students manage their fantasy teams and compete via increasing difficult SQL statements.
    • The Student Commons

      Stokes, Amy (2011-09-01)
      Over the past decade, distance learning has grown (in popularity) and developed at such a fast rate that getting your degree online is now accepted as a popular alternative to traditional face-to-face education (Connolly, MacArthur, Stansfield, & McLellan, 2007). Students’ lives have become increasingly complicated and busy, which makes distance learning’s flexible nature not only attractive but often one of the primary considerations as a student searches for a college degree. As online education continues to grow, however, so too does the rate at which students drop out or fail to complete their degree. Student retention for distance learning programs is lower than campus based programs, and while institutions are excited about the opportunities distance learning provides, they struggle to reduce the high attrition rates. To address the low retention rates, some educators suggest an abandonment of online education; others consider steps that would improve success for online students. Using Moreland & Carnwell’s three types of learning support for distance learners as a theoretical framework, I began to create an online Student Commons. The community was designed to provide students with each of the three types of support: academic, emotional and practical. After an initial survey of academic advisors, a concept of the Student Commons was born. Utilizing ANGEL (Bryant & Stratton’s Virtual Classroom program), the Student Commons was further developed. A focus group of academic advisors were then given permission to view and interact in the group for assessment and recommendations. Presently the Student Commons group is complete and in the process of having additional information added to complete its functionality. The group is expected to “go live” for all Bryant & Stratton online students in September 2011.
    • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example

      Roy, Debsuta; Hash, Larry; Advisor (2016-08)
      Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends towards automation. The mechanics of this domain include computer prone brain interfaces induced on the cortical part of the brain which helps in controlling external devices via thought. These interfaces are designed such that they will receive and transmit acoustic data and process them so that they can be recorded as a generalization thereby helping in generating signals artificially. Cochlear Implant has been demonstrated as an example of BCI where stimulation of brain takes place with the help of an external device. As this field is still being developed, there are several factors needed to be focused viz. research/study of the subject, location of electrodes, cost, complexity, performance, setup requirements and security. BCI field is a highly vast topic and is a combination of various fields like science, technology, medicine etc. This piece of research and study focuses primarily on the neuroscience and technology part. This project is presented to showcase the depth of this field and create interest for further advancement in this field. Chapter one deals with introduction to the technology as a whole and its related study of papers. Chapter two discusses about brain and the principle behind this technology. Chapter three helps in understanding the technology by splitting its components. This is followed by taking an example of cochlear implant technology in chapter four. Chapter five initiates the wireless approach brought to this technology. And then chapter six is all about challenges, conclusions and ideas of enhancement.
    • Style Guide Development For An Internal Reference Library

      Lizardi, Ryan; Bush, Sarah C.; Lizardi, Ryan; First Reader; Jofre, Ana; Second Reader (SUNY Polytechnic Institute, 2020-12)
      This work strives to present information design and user experience (UX) techniques to improve continuity of design and usability, before migrating a cross-functional internal reference library to a new content management system (CMS). Expert-curated content accessed through LinkedIn Learning, combined with scholarly research, result in a complimentary style guide for use in the workplace.
    • Supplemental Teaching Tools: Will They Help Students Improve Their Learning Capabilities?

      Cirillo, Mary Catherine (2012-12-01)
      This project explores the use of supplemental teaching tools as an aid to a traditional lecture course. The website is geared for a community college course in Advertising and/or History of Visual Communication. I also discuss the positives of the use of Google Sites with podcasts, Google Presentation/Docs, Jing, and Prezi as supplemental teaching tools. Using the learning theories of constructivism and cognitivism, I explore how these tools will help students to learn. This paper looks at the learning theories that support the use of these tools to help students learn and fill in gaps that they might have missed in class during the lecture. This work discusses the planning, implementation, and evaluation of the project. A literature review examining different types of supplemental tools and supplemental instruction, as well as the supplemental teaching tool topic, “Women in Advertising,” is also included.
    • Supporting Interactive Fundraising for Gen X Cancer Survivors and Co-Survivors in the New England Area

      Winters, Robert (2015-12)
      Two theories were used in creating the application. The first, Human Centered Design accounts for a number of factors which support a design in being user-friendly and highly functional. The second, Engestrom’s Activity Theory, which stipulates for certain outcomes (goals) it is necessary to produce certain objects (experiences and knowledge). The question under investigation was: Can a mobile application provide interested parties transparent nonprofit financial information and allow them to make a personal contribution? Through the process of prototyping it was found that a mobile application can connect an individual to an organization. It was also found that it is possible for said application to create a connection that results in real world impact by providing clear and easy methods of contributing time and money. In providing this medium of connecting the user to an organization it was also found the organization can provide user impact data through the application to share real time data generating a cycle of application use, impact and reporting which builds over time. The application has been fully prototyped but has not yet been tested in a real world environment. The prototype can be viewed by downloading App Taster (https://itunes.apple.com/app/id518977767) and opening the prototype file (https://www.dropbox.com/sh/ttzg8kv1dwntjyi/AABrcWwi1c23fC0Hm7oOB5hPa?dl=0).
    • Surviving Remote Teaching during a Pandemic

      Stam, Kathryn; Thesis Advisor; Lizardi, Ryan; Second Reader; Van de Bogart, Patty (2020-05)
      On March 11, 2020, the Governor of New York, Andrew Cuomo, announced SUNY and CUNY Colleges of New York would move to online instruction only, as of March 19, 2020. At the same time, school districts throughout the state were moving their curriculum online, and non-essential businesses were being required to have their workers work at home. The headlines across the state were reminding everyone to “stay home” because of the Covid-19. The news was frightening to some of the Professors, Adjuncts and Teachers all across the state, (especially in K-12). In this paper, I will refer to all folks who teach as ‘Instructors’ or ‘Educators.’ These Instructors, who teach in person, and have never taught an online course, were expressing their concern that their course “could not” be taught on line. My Capstone Project is to create a “Guide” with some ideas to help in this stressful time.
    • Swarm Intelligence in the Multi Agent System Environment

      Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
      This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, outlined is the general framework of an interacting agents behaving as a swarm group on a mission to deliver a service such as transporting a set of goods from a given starting point to a destination. As an example, one could think of a team of drones, for instance, providing a delivery service in a milieu where normal transportation mode may be prohibitively expensive. The entire logistic, in detail as a commercial project, is too involved for our thesis focus; instead, some of the structural interaction issues with a group are outlined and discussed here to articulate the behavior of multi-agent based swarm as a group necessary to function as a distributed entity somewhat different from the standard swarm models found in literature.
    • The Synchronological Charting of The Evolution of Electronic Communications

      Conklin, Donald; Kahn, Russell; Thesis Adviser; Stam, Kathryn; Second Reader (SUNY Polytechnic Institute, 2019-05)
      From 1850s to the present time, electronic communications have been evolving from the analog transmission of harmonics over a singular wire connected to boxes with a single hole for transmitting and receiving to texting, FaceTime, Facebook, and twitter. This evolution did not follow a direct path from A to B; instead, it took a winding and interlocking path. This path is represented via a timeline that textually analyzes the data collected, and through graphical interpretation, depicts the history of the path. With this one should be able to see the growth of the enterprises through history, which is shown horizontally, as well as the different variables that affected their growth along the way, depicted vertically. Both of these variables are depicted on one chart, from the same vantage point. This timeline not only shows the path of growth of the technology and its enterprises but also the interrelations of the different enterprises and how either technology, politics, or geographic presence influenced this swath. The online interactive Prezi timeline “Evolution of Electronic Communications” referenced in this abstract can be found at https://prezi.com/vt9673mvbqsa/evolution-of-electronic-communications/ .
    • Teaching of SQL Through a Game

      Ward, Patrick T. (2015-05-01)
      The project seeks to provide an effective alternate method for teaching SQL through the use of a Game. There is value in learning SQL, as SQL skills are still in the top ten list of sought after IT skills for 2015 (Greenspan, 2014). However, lecture based teaching may not fully engage the learner. Therefore, the game was constructed with the MDA framework and Problem-Based Learning in mind. These methods help the learner bridge the gaps between lesson content, problems, and solutions. The game itself was constructed with MSSQL, Adobe Cold Fusion, HTML, CSS, and JavaScript. The game presents lessons on SQL concepts and quiz-based challenges for students to solve. Students faced increasingly difficult challenges as their level SQL knowledge expanded. The project may be found here: http://www.patrickward.net/SQLGame/
    • Technology Case Study in Storage Area Networks

      Marsh, John ; Thesis Advisor; Hash, Larry J.; Climek, David; Bull, Ronny; Pethe, Ameya (2014-05)
      In today's world we need immediate access to data. The demand for networked data access has increased exponentially in the last 20 years. With that demand the importance and volume of networked data has also grown exponentially. The speed at which the data can be accessed has increased and with that the data has moved from individual workstations to a networked location. Over the last decade there has been a trend to move mission critical data away from individual workstations to a centralized data center. A centralized data center removes the location constraint for accessing the data. If critical data is stored on individual servers, a failure will cause the data to be inaccessible. Today, mission critical applications are spanned over multiple servers for redundancy. With this topology, having the data in a central location allows the individual servers to better work with data. With the addition of virtualization, servers can be moved online from one physical server to another. If the data is centralized, it can be presented to all hosts in the cluster. This allows servers to move efficiently between hosts without losing access to the critical data. Many businesses in various industries like finance, airline, hospital, research, etc. depend on the speed and secure availability of their centralized data to function efficiently.
    • A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP

      Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)
      There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less performance. Since network devices are hardware modules, processing them requires more power and more memory. However, if network protocols are developed using software modules, flexibility can be achieved in various programming applications and reduces dependency on hardware. The concept of using networking protocols as a software module can be explained using “Software Defined Networking (SDN).” With SDN, existing infrastructure can be integrated with various applications and centralized control protocols can be developed. One of the key components of SDN is integrating with Cloud Computing, where many applications can be built, which can be used for on-demand services. Integrating cloud computing with SDN will create dynamic networks and reduces infrastructure costs. In this paper, a case was considered for providing better internet connectivity by building public & private networks using Open source cloud technology (OpenStack) and existing distribution environments. For connectivity, BGP was used as routing protocol as it is known to be well- suited for such environments. Both public and private networks were integrated with SDN for centralized control. OpenStack was used to build various network topologies using different plugins through SDN controller. This method allowed to develop SDN controller with global view of OpenStack networks. The same controller was connected to distributed layers using Open Flow protocol. Since, both OpenStack and distributed networks were attached to SDN controller, centralized control of network protocols could be achieved. This model of centralized networks could be very useful in reducing costs and improving network efficiency, especially in large scale deployments.
    • Technology Case Study on Web Real-Time Communications (WebRTC)

      Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
      Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web platform where a native proprietary app like Skype could do something which is media communication that World Wide Web just couldn’t. Now, this can be done form web using WebRTC technology. This paper starts with a brief introduction of WebRTC and how it got started. Moving on, it provides information about the WebRTC technical goals, architecture and protocols involved. This paper highlights the network address translation (NAT) traversal where STUN, TURN and ICE protocols are involved. Also, this paper highlights about the peer to peer to media flows with reference to WebRTC protocol stack and application program interface (API). In the end, this paper discusses about implemented security features, tools available for WebRTC development and provides enterprise use cases.