Search Constraints
Filtering by:
Campus
Sacramento
Remove constraint Campus: Sacramento
Department
Computer Science
Remove constraint Department: Computer Science
Search Results
-
ProjectNorton, Ryan JosephSelf-splitting neural networks provide a new method for solving complex problems by using multiple neural networks in a divide-and-conquer approach to reduce the domain space each network must solve. However, choosing optimal points for splitting the . . .
-
ProjectManjunath Leelavathi, JyothiIn this project, I am planning to develop a plug in module that can be integrated into the web based application. The aim of this application is to provide email-services, calendar services and chat services dynamically within the browser. I am respon . . .
-
ProjectLavender, Brian EugenenetGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method proposed by the paper titled A Software Implementation of a Genetic Algorithm Base . . .
-
ProjectWadhwani, HiteshThe intent of this project is to explore the tracking capabilities of V1KU a neural network system. V1KU is a product by General Vision Company that comprises of CogniMem neural network chip for real-time image learning and CogniSight image recognitio . . .
-
ProjectJadia, NeelThis project provides an overview into the life cycle of a cable modem. It demonstrates the initialization stages a cable modem would pass through. Once self-initialization of a cable modem is complete, it comes online. This project discusses the stat . . .
-
ProjectVeerappan, SangeethaDatabases based on relational models support crisp and precise data. In the real world scenario, there exists a lot of uncertainty and imprecise information. Fuzzy logic breaks the rigid crisp logic boundaries and allows decisions to be taken in a mor . . .
-
ProjectPatel, KamleshkumarThe central component of any operating system is the Memory Management Unit (MMU). As the name implies, memory-management facilities are responsible for the management of memory resources available on a machine. Virtual memory (VM) in MMU allows a pro . . .
-
ProjectSong, ChunhuiSQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by submitting malicious SQL query segments to change the intended application-generated SQL . . .
-
ProjectBandara, Hennayake M.Nowadays database management systems are the most crucial factors in managing and storing the data. Security enforcement in a database is very important to assure that the data stored is properly secured. Most of the database management systems are oc . . .
-
ProjectVasireddy, JaipaulThe goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for . . .