Search Constraints

Filtering by: Campus Sacramento Remove constraint Campus: Sacramento

Search Results

  • Ff3655524?file=thumbnail
    Padua-Dean, Hayley
    There is growing need for staff buy-in and resources to educate school members on the benefits and methods of implementation of student voice strategies. Although schools strive to increase student achievement and create a safe space for students, the . . .
  • J38607392?file=thumbnail
    Perez, Rochelle Amores
    The purpose of the study is twofold: a) to understand the Asian American community college students’self-beliefs, particularly self-efficacy, emotional awareness, and grit, while reaching their academic goals; and b) to unveil the issue of data disagg . . .
  • Z603qx64j?file=thumbnail
    Ramirez, Claudia
    There is no single universal definition of the terms stalking and cyberstalking as these terms vary in legal, social and academic meaning. This study aims to determine which behaviors are most commonly considered stalking and cyberstalking, based on s . . .
  • W3763714z?file=thumbnail
    Taiwo, Adewunmi Oluwademilade
    Statement of Problem: Permissive Overreaching Transfer Trip (POTT) is a scheme that enables fast tripping of breakers at the local and remote end of a protected equipment. POTT schemes are typically used for high voltage line protection against faults . . .
  • J9602102w?file=thumbnail
    Shah, Jinaliben
    Active database systems support applications by moving the reactive behavior from applications into database management systems. It is a database system that includes an event-driven architecture that can respond to different types of events automatic . . .
  • 73666490x?file=thumbnail
    Palanisamy, Sharmila
    A stochastic prediction modeling method such as Hidden Markov Model (HMM) is a complex system. The HMM is suitable to analyze and predict time-dependent phenomena and has been widely used in applications such as speech recognition, weather and stock m . . .
  • M326m2061?file=thumbnail
    Shenoy, Shweta
    Security and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords are a typical example in which usability, psychology, and security meet. Absurd password rules fo . . .
  • Jq085k40f?file=thumbnail
    Pinto, Rodney
    One of the most critical resources that ensure the current working of the internet is the domain name system (DNS). It is a decentralized, hierarchical naming system that is responsible for translating the human-readable domain name to its associated . . .
  • 8s45q927v?file=thumbnail
    Bavishi, Ujaliben Kalpesh
    This project is focusing on creating a chatbot to be used by students to get their queries responded easily from the college website. The College Enquiry Chatbot has the capacity to make friendly conversations; respond the course and faculty details; . . .
  • B5644r94c?file=thumbnail
    Shojaei, Radoyeh
    The Sequential Ordering Problem (SOP) is a combinatorial optimization problem. Given a directed weighted graph and an unweighted directed graph representing precedence constraints among vertices, find a minimum-cost Hamiltonian path that satisfies the . . .