Search Constraints
Filtering by:
Campus
Sacramento
Remove constraint Campus: Sacramento
Department
Computer Science
Remove constraint Department: Computer Science
Resource type
Project
Remove constraint Resource type: Project
Search Results
-
ProjectRajguru, Aniruddha ShekharOver the years, data privacy has been a major concern amongst consumers. Applications such as Facebook, Uber, and Instagram collect a huge amount of data from users in return for the free service. Some of this data collection is necessary for the serv . . .
-
ProjectLuman, RijulSince the rise of internet and e-commerce, buying and selling goods over the internet has relied heavily on financial institutions acting as 3rd parties to process financial transactions. These 3rd parties often charge a good percentage of the payment . . .
-
ProjectKollu, SindhuIn modern economic times, everyone wants to save their money and keep expenses with in their budget limit. But, due to our busy schedules in our day to day life, we may lose track of our expenses and end up overspending which leads to debts. In this p . . .
-
ProjectJain, AnshulIndoor localization has become one of the most talked about services in today’s technology. We have observed that there have been huge demand of Indoor Location services due to increase in smartphone market in last few years. GPS is widely used to fin . . .
-
ProjectDevarakonda, Divya SindhuriUSA has been grappling with crime for decades now and had made significant improvement. However, crime remains to be one of the core societal problems. To build a safer society, we need to take advantage of 21st century’s technology. With current tech . . .
-
ProjectPoon, Dennis YiuwingRefactoring is a process used by programmers to improve the non-functional qualities of code. It does not affect the actual output of the program, but it is useful for making the code easier to read and maintain. In practice, it often requires a lot o . . .
-
ProjectShah, JinalibenActive database systems support applications by moving the reactive behavior from applications into database management systems. It is a database system that includes an event-driven architecture that can respond to different types of events automatic . . .
-
ProjectPalanisamy, SharmilaA stochastic prediction modeling method such as Hidden Markov Model (HMM) is a complex system. The HMM is suitable to analyze and predict time-dependent phenomena and has been widely used in applications such as speech recognition, weather and stock m . . .
-
ProjectShenoy, ShwetaSecurity and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords are a typical example in which usability, psychology, and security meet. Absurd password rules fo . . .
-
ProjectPinto, RodneyOne of the most critical resources that ensure the current working of the internet is the domain name system (DNS). It is a decentralized, hierarchical naming system that is responsible for translating the human-readable domain name to its associated . . .
-
ProjectBavishi, Ujaliben KalpeshThis project is focusing on creating a chatbot to be used by students to get their queries responded easily from the college website. The College Enquiry Chatbot has the capacity to make friendly conversations; respond the course and faculty details; . . .
-
ProjectShojaei, RadoyehThe Sequential Ordering Problem (SOP) is a combinatorial optimization problem. Given a directed weighted graph and an unweighted directed graph representing precedence constraints among vertices, find a minimum-cost Hamiltonian path that satisfies the . . .
-
ProjectSingh, Shweta AmarjeetOne of the biggest innovations recently in the field of computer science is cryptocurrencies and Blockchain is at the heart of it. Cryptocurrency is one use case of blockchain and there can be many more. Blockchain is an incorruptible digital ledger o . . .
-
ProjectNarendra, PragathiThe diagnosis of a disease is the most critical and vital job in medicine and it mostly depends on a doctor’s intuition based on past experiences. The unfortunate case of recognizing the incorrect symptoms results in a misdiagnosis. To avoid such medi . . .
-
ProjectBibodi, Jay NikhilThis system will eliminate the need for common platforms to publish pod-cast. The methods create a new ERC-20 token named as 'Pods.' Users will have an ability to create an account and get some specific number of tokens (that is, Pods) as joining bonu . . .
-
ProjectSuryavanshi, Rajani MohanDefending today’s enterprise network has become more and more challenging considering the increasing amount of cyber-attacks. It is critical to understand how an attack happens and how the intrusion propagates inside the enterprise network. System Obj . . .
-
ProjectSingh, AdityaNowadays it is very widespread to see attacks in the system. The attackers try automated tools and programs to attempt and gain access to the data of the users. However, for attackers, it is hard to boycott system calls. System calls are used by the u . . .
-
ProjectRaja Lemarji, Godson MillerStudents in a university tends to have various resources to trade. Trading has become an essential thing in our day-today life. In this project, I would like to recall barter system which is one of the oldest method of exchange. This has been used bef . . .
-
ProjectGhonsikar, Kasturi KiranToday with fast growing technology and increasing computing needs, industry is opting for deploying and using cloud to fulfill their extensive computing requirements. Deployment of cloud is a lengthy and convoluted process. Manual installation of clou . . .
-
ProjectGampa, RavaliThis work presents a visual analytical tool, to assist instructors of introductory computer science courses to manage students’ learning. The first half of this project is an investigation on various visualization tools which inspired the motivation a . . .
-
ProjectShegakula Nagaraj, SumukhaIn this generation, when an entrepreneur wants to bring his ideas to life he will start searching for funds. There are people around the globe who have small amounts of money that they can invest in ideas that might grow bigger or solve problems faced . . .
-
ProjectKaja, Krishna ChaitanyaExtensible Access Control Markup Language (XACML) is an access control policy language. Typically, an XACML policy has configurable standard extension points to define new functions, data types and the ways to combine them as a single unit. With this . . .
-
ProjectLadde, Bhushan ArunThe PC2 Contest Control System provides for the ability of teams in a programming contest to submit runs – that is, programs which are attempts at solving a contest problem specified by the contest judges. In Version 10 (V10) of PC2, runs are submitte . . .
-
ProjectMitra, KaranInformation-based systems have allowed researchers from all aspects of sciences to study their data better. Environmental studies is one such area where timely and accurate data is critical for research and development of the science. The energy-water . . .
-
ProjectBabhulkar, AdityaSelf-driving cars has become a trending subject with a significant improvement in the technologies in the last decade. The project purpose is to train a neural network to drive an autonomous car agent on the tracks of Udacity’s Car Simulator environme . . .
-
ProjectDeo, SudarshanThis project collects several experiments in Deep Learning Convolutional Neural Network for Image predictions. It makes use of Google TensorFlow and TFlearn Deep Learning libraries for computations, training, and testing of images. The project is deve . . .
-
ProjectAn, DongThe purpose of this project is to learn about OpenStack Cloud infrastructure-as-aService Platform (IaaS) through manual installation of core OpenStack cloud services and to create an automated cloud deployment script using BASH shell scripting. The pr . . .
-
ProjectKalyanaraman, SaranyaThese days, most software companies work on complex projects that require a collaboration of multiple people across many geographic locations. Managers in such companies are responsible for integrating many complex projects while maintaining high accu . . .
-
ProjectVellore Ramesh, RamyaFor any statistical study, from predicting the winner of an election, to governing the health statistics, a huge amount of real time data is necessary. Twitter data is extensively used in recent times for such statistical studies. The speed at which n . . .
-
ProjectTiptur Ravindra, Thrilok3D graphics programming is generally done using libraries such as OpenGL, DirectX and Vulkan. Some effects such as lighting, reflection have well defined approaches, however simulating water is known to be a little difficult to achieve. This project o . . .
-
ProjectVadlamannati Lakshmi, Venkata Sai Raja BharathA graph database presents data and the relationship among data based on the graph model. Graph Databases uses graph structures for semantic queries with nodes, edges, and properties. A graph database has two defining elements: 1) Node, which represent . . .
-
ProjectWani, Gaurav DilipIn 21st century it has become a norm that companies are using virtual assistants such as Siri, Google assistant or Alexa to resolve many problems faced by customers. These technologies are empowered by using natural language processing and are good at . . .
-
ProjectShiroor, Shekhar VikasThis project to implements a generalized neural network agent that plays different video games using reinforcement learning algorithm. This project uses OpenAIs simulated video game environment ‘gym’ for training and testing the proposed reinforcement . . .
-
ProjectMuriki, Satya TejaswiOnline reviews are highly influential, with consumers preferring the advice of other consumers rather than information provided through advertisements. Hence, review consistency and trustworthiness became an urgent need and a necessity for both indivi . . .
-
ProjectPoosarla, AkshaySkeletal bone age assessment is a common clinical practice to analyze and assess the biological maturity of pediatric patients. This process generally involves taking X-ray of the left hand, along with fingers and wrist, then followed by image analysi . . .
-
ProjectRawlani, BhagyashreeConvolutional neural networks are generally assumed to be the best neural networks for classifying images. In November 2017, Geoffrey Hinton et al. introduced another neural network approach known as Capsule Network. He and his team have claimed that . . .
-
ProjectNatesh, AdarshIn this work, we present a novel visual analytical tool, intended to improve the Facebook experience which produces an interactive visual analytic presentation of a user’s newsfeed to help understand bias trends existing among the user’s social group. . . .
-
ProjectMinton, Suzanne LouiseStatement of Problem The problem of missing data in statistical analysis is one that the field of social research has failed to adequately address despite its potential to significantly affect results and subsequent substantive conclusions. The purpos . . .
-
ProjectOnitsuka, Lynne MidoriThe purpose of this project is to develop a data analysis tool for assessment. There are three tiers of users: public, data entry, and faculty. The public can view non-sensitive assessment information. In addition to accessing public information, the . . .
-
ProjectNorton, Ryan JosephSelf-splitting neural networks provide a new method for solving complex problems by using multiple neural networks in a divide-and-conquer approach to reduce the domain space each network must solve. However, choosing optimal points for splitting the . . .
-
ProjectManjunath Leelavathi, JyothiIn this project, I am planning to develop a plug in module that can be integrated into the web based application. The aim of this application is to provide email-services, calendar services and chat services dynamically within the browser. I am respon . . .
-
ProjectLavender, Brian EugenenetGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method proposed by the paper titled A Software Implementation of a Genetic Algorithm Base . . .
-
ProjectWadhwani, HiteshThe intent of this project is to explore the tracking capabilities of V1KU a neural network system. V1KU is a product by General Vision Company that comprises of CogniMem neural network chip for real-time image learning and CogniSight image recognitio . . .
-
ProjectJadia, NeelThis project provides an overview into the life cycle of a cable modem. It demonstrates the initialization stages a cable modem would pass through. Once self-initialization of a cable modem is complete, it comes online. This project discusses the stat . . .
-
ProjectVeerappan, SangeethaDatabases based on relational models support crisp and precise data. In the real world scenario, there exists a lot of uncertainty and imprecise information. Fuzzy logic breaks the rigid crisp logic boundaries and allows decisions to be taken in a mor . . .
-
ProjectPatel, KamleshkumarThe central component of any operating system is the Memory Management Unit (MMU). As the name implies, memory-management facilities are responsible for the management of memory resources available on a machine. Virtual memory (VM) in MMU allows a pro . . .
-
ProjectSong, ChunhuiSQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by submitting malicious SQL query segments to change the intended application-generated SQL . . .
-
ProjectBandara, Hennayake M.Nowadays database management systems are the most crucial factors in managing and storing the data. Security enforcement in a database is very important to assure that the data stored is properly secured. Most of the database management systems are oc . . .
-
ProjectVasireddy, JaipaulThe goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for . . .
-
ProjectKrishna, ChetanTruck Data Warehouse (TDW) System is a web-based application developed at the California State University Sacramento for the California Department of Transportation (Caltrans). The TDW System allows Caltrans to use this web-based application system to . . .