Search Constraints

Search Results

  • Work
    Project
    Manjunath Leelavathi, Jyothi
    In this project, I am planning to develop a plug in module that can be integrated into the web based application. The aim of this application is to provide email-services, calendar services and chat services dynamically within the browser. I am respon . . .
  • Work
    Project
    Lavender, Brian Eugene
    netGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method proposed by the paper titled A Software Implementation of a Genetic Algorithm Base . . .
  • Work
    Project
    Wadhwani, Hitesh
    The intent of this project is to explore the tracking capabilities of V1KU a neural network system. V1KU is a product by General Vision Company that comprises of CogniMem neural network chip for real-time image learning and CogniSight image recognitio . . .
  • Work
    Project
    Jadia, Neel
    This project provides an overview into the life cycle of a cable modem. It demonstrates the initialization stages a cable modem would pass through. Once self-initialization of a cable modem is complete, it comes online. This project discusses the stat . . .
  • Work
    Project
    Veerappan, Sangeetha
    Databases based on relational models support crisp and precise data. In the real world scenario, there exists a lot of uncertainty and imprecise information. Fuzzy logic breaks the rigid crisp logic boundaries and allows decisions to be taken in a mor . . .
  • Work
    Project
    Patel, Kamleshkumar
    The central component of any operating system is the Memory Management Unit (MMU). As the name implies, memory-management facilities are responsible for the management of memory resources available on a machine. Virtual memory (VM) in MMU allows a pro . . .
  • Work
    Project
    Song, Chunhui
    SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by submitting malicious SQL query segments to change the intended application-generated SQL . . .
  • Work
    Project
    Bandara, Hennayake M.
    Nowadays database management systems are the most crucial factors in managing and storing the data. Security enforcement in a database is very important to assure that the data stored is properly secured. Most of the database management systems are oc . . .
  • Work
    Project
    Vasireddy, Jaipaul
    The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for . . .
  • Work
    Project
    Krishna, Chetan
    Truck Data Warehouse (TDW) System is a web-based application developed at the California State University Sacramento for the California Department of Transportation (Caltrans). The TDW System allows Caltrans to use this web-based application system to . . .