Search Constraints
Filtering by:
Campus
Sacramento
Remove constraint Campus: Sacramento
Department
Computer Science
Remove constraint Department: Computer Science
Number of results to display per page
Search Results

- Creator:
- Norton, Ryan Joseph
- Description:
- Self-splitting neural networks provide a new method for solving complex problems by using multiple neural networks in a divide-and-conquer approach to reduce the domain space each network must solve. However, choosing optimal points for splitting the domain is a difficult problem. A visualization tool exists to help understand how splitting occurs in the self-splitting neural network. This project provided several new enhancements to the tool to expand its scope and improve existing functionality. These enhancements included a new extensible framework for adding additional learning methods to the algorithm, integrating enhancements to the algorithm that had been discovered since the original tool was released, and several new features for observing how the domain space is partitioned. These modifications can be used to develop further insights into the splitting and training processes.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Manjunath Leelavathi, Jyothi
- Description:
- In this project, I am planning to develop a plug in module that can be integrated into the web based application. The aim of this application is to provide email-services, calendar services and chat services dynamically within the browser. I am responsible for developing Chat Service and Calendar service. For example, in Google apps, the user can open the Gmail and while working on this, the user can see the friends who are online without changing a window or logging into another chat messenger and also will be able to open the calendar and see the contents. In a single browser window, the user is able to view and modify the different applications dynamically. The client-side/web browser technologies used in Web 2.0 development are JavaScript and Ajax (XML). Ajax programming uses JavaScript to upload and download new data from the web server without undergoing a full page reload. Chat service is developed using Java and Ajax technology and the Mysql database. It has all the basic features that we see in general popular chat applications like Yahoo chat or Skype. Java technologies and Ajax framework makes the application more scalable and compatible to integrate with other application. The GUI part is greatly enhanced for better end user experiences. Calendar service application is provided with some of the basic features, such as ability to schedule one or more events on a particular day, a standard view that can show any month, with event times and titles listed in order and users will be able to open the application like any other application.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Lavender, Brian Eugene
- Description:
- netGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method proposed by the paper titled A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection written by Ren Hui Gong and associates. It also includes an implementation of the resulting rules into a Network Intrusion Detection System (NIDS) called nProbe. The project brings together Genetic Algorithms from soft computing methods, also known as Artificial Intelligence, and a Network Intrusion Detection System (NIDS). In order to limit the project scope, data developed by DARPA, also used in Gong's paper, is used as training data for the Genetic Algorithms. The resulting tool is described and analyzed, and results and sample runs are presented.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Wadhwani, Hitesh
- Description:
- The intent of this project is to explore the tracking capabilities of V1KU a neural network system. V1KU is a product by General Vision Company that comprises of CogniMem neural network chip for real-time image learning and CogniSight image recognition engine. The board also consists of Micron/Aptina monochrome CMOS sensor for visual input. The board has powerful capability to learn and recognize objects simultaneously within a fraction of a second. Due to this ability an application is developed which uses board’s capabilities to track a learned object in real-time. The development of this application has gone through various phases of experiments as during initial development stages the board was quite new and very little support was available. After applying the methodology of trial and error I was able to achieve a real-time tracking working with this board. The people at General Vision also gave their inputs on how to optimize the code so that tracking works efficiently. The board has the capabilities to track multiple objects simultaneously, but at this present time the goal is to effectively track a single object. The new version of the board with casing came out recently which has some mounting space that can be utilized in future to mount servo motors to automate the tracking process. The output of this application forms a basis for stereoscopic tracking of various objects in real-time.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Jadia, Neel
- Description:
- This project provides an overview into the life cycle of a cable modem. It demonstrates the initialization stages a cable modem would pass through. Once self-initialization of a cable modem is complete, it comes online. This project discusses the state machine transitions pursued by a cable modem. The focus of the project is to demonstrate how a cable modem acquires an IPv6 address for its operation from the network. A dummy process running on the other end would act as a very basic DHCPv6 server to provide IPv6 address to the requesting host, which happens to be a cable modem in our case. The cable modem logs the message received from the dummy process in a log file. Docisis 3.0 specification from Cable Labs titled as, "MAC and Upper Layer Protocols Interface Specification" is used as a strong guideline. Other sources of data include the DHCPv6, IPv6 RFC’s from IETF.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Veerappan, Sangeetha
- Description:
- Databases based on relational models support crisp and precise data. In the real world scenario, there exists a lot of uncertainty and imprecise information. Fuzzy logic breaks the rigid crisp logic boundaries and allows decisions to be taken in a more realistic manner. In this project, I have implemented a system supporting mutating events and temporal events using fuzzy active rules over XML database systems. The project included a language definition and an execution environment of timer rules in fuzzy active format for XML Databases. The language definition includes a grammar to specify timer rules, allowing fuzzy expressions in the condition part of a rule. The rule engine was developed to support the execution of rules with different types of fuzzy distributions. The project also designed and implemented the fuzzy XML system allowing fuzziness in database storage and queries. The project analyzed the system performance by comparing the execution overhead on fuzzy queries over crisp queries.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Patel, Kamleshkumar
- Description:
- The central component of any operating system is the Memory Management Unit (MMU). As the name implies, memory-management facilities are responsible for the management of memory resources available on a machine. Virtual memory (VM) in MMU allows a program to execute as if the primary memory is larger than its actual size. The whole purpose of virtual memory is to enlarge the address space, the set of addresses a program can utilize. A program would not be able to fit in main memory all at once when it is using all of virtual memory. Nevertheless, operating system could execute such a program by copying required portions into main memory at any given point during execution. To facilitate copying virtual memory into real memory, operating system divides virtual memory into pages. Each page contains a fixed number of addresses. Each page is stored on a disk, when the page is needed it is copied into the main memory. In order to achieve better performance, the system needs to provide requested pages quickly from memory. Tree search algorithm find requested pages from virtual page data structure. Its efficiency is highly depends on the structure and number of nodes. That is why data structure is an important feature of virtual memory. The splay tree and the radix tree are the most popular data structure for the current Linux operating system. FreeBSD OS uses the splay tree data structure. In some situation like prefix searching, the splay tree data structure is not the most effective data structure. As a result, the OS needs a better data structure than the splay tree to access VM pages quickly in that situation. The radix tree structure is implemented and used in place of the splay tree. The objective is efficient use of memory and faster performance. Both the data structures are used in parallel to check the correctness of newly implemented radix tree. Once the results are satisfactory, I also benchmarked the data structures and found that the radix tree gave much better performance over the splay trees when a process holds more pages.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Song, Chunhui
- Description:
- SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by submitting malicious SQL query segments to change the intended application-generated SQL queries. Researchers have proposed various solutions to address SQL injection problems. However, many of them have limitations and often cannot address all kinds of injection problems. What’s more, new types of SQL injection attacks have arisen over the years. To better counter these attacks, identifying and understanding the types of SQL injections and existing countermeasures are very important. In this project, I presented a review of different types of SQL injections and illustrated how to use them to perform attacks. I also surveyed existing techniques against SQL injection attacks and analyzed their advantages and disadvantages. In addition, I identified techniques for building secure systems and applied them to my applications and database system, and illustrated how they were performed and the effect of them.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Bandara, Hennayake M.
- Description:
- Nowadays database management systems are the most crucial factors in managing and storing the data. Security enforcement in a database is very important to assure that the data stored is properly secured. Most of the database management systems are occupied with strong defense mechanisms. In addition to this, many academic researchers have been proposing solutions and mechanisms to improve security enforcement in database management systems. Understanding and Identifying of these new mechanisms and security features provided by database systems are very important. In this project, I surveyed the solutions proposed and implemented by academic researchers on Relational and Object-Oriented Databases. Also, I identified and illustrated a set of security features that can be utilized to enforce security using Oracle database management system. In conclusion, this project identified the solutions, mechanisms, and features that can be used to improve security enforcement in both Relational and Object-Oriented databases.
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science

- Creator:
- Vasireddy, Jaipaul
- Description:
- The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for each machine which is usually done to monitor small number of systems. The configuration of Nagios can also be automated by using shell scripting which is generally done in an industry, where the numbers of systems to be monitored are large. Both the above methods of configuration have been implemented in this project. The project has been successfully used to know the status of each service running on the defending team’s network. The project also includes network traffic reduction using failover monitoring where one Nagios machine monitors another Nagios machine so that if one machine fails the other machine does the work of the broken system
- Resource Type:
- Project
- Campus Tesim:
- Sacramento
- Department:
- Computer Science