Search Constraints
Filtering by:
Department
Computer Science
Remove constraint Department: Computer Science
Collection
Thesis
Remove constraint Collection: Thesis
Resource type
Project
Remove constraint Resource type: Project
Search Results
-
ProjectSoundararajan, Thilak RajShoulder surfing is the process of stealing one’s personal information such as personal identification number or password by looking over the victim’s shoulder. Nowadays, a hacker can use a video camera to actively record a user entering the password . . .
-
ProjectAnnapragada, Laxmi SubhamkarPromoter sequences are the main regulatory elements of gene expression. The accurate prediction of promoters remains a challenge because the key DNA regulatory regions have variable structures, but their recognition by computer algorithms is fundament . . .
-
ProjectMaheshwari, AasthaThe world is getting advanced, and it becomes our responsibility to be on the same pace as the world. With the increase in the amount of data, it is becoming difficult to accommodate everything in our brain in a small span of time. Data Visualization . . .
-
ProjectPanneer Selvam, PratimaDuring medical emergencies, patients are often shunted from hospital to hospital due to lack of ICU beds leading to loss of many lives. Also crucial time is lost calling up every individual blood bank trying to find blood of the required group in an e . . .
-
ProjectPanchal, JalanilbhaiThe use of Smartphones and its complementary technologies like wearable devices have gained immense momentum over the decade, which has led to their vast amount of use in various daily activities. On top of that, the new technologies plus their variou . . .
-
ProjectPandiri, Venkat ShivaThis project carried out a systematic investigation to predict the final price of each home using machine learning techniques. Various machine learning techniques such as multiple linear regression (base model), random forest regression and polynomial . . .
-
ProjectRamamurthy, KishoreAn Annotation is a metadatum (comment, explanation) attached to a specific section of a document (text, image, video or other formats) after it has been created. Annotations have been used in several fields such as literature and education, software e . . .
-
ProjectPabbaraju, AkhilaMobile health describes the use of portable electronic devices with software applications to provide health services and manage patient information. With almost 5 billion mobile phone users in the world, health care providers and researchers are reali . . .
-
ProjectTan, AndreaCyber Scavenger is a map-based application created for the CyberQUEST project that allows teachers to set learning goals for class trips before bringing students to the fieldtrip. The existing application is geared more towards a classroom based envir . . .
-
ProjectCronin, TimothyThis paper describes a system that automatically tags unstructured medical records using the Naïve Bayes and Decision Tree algorithms for a variety of risk factors and patient medical history indicators. Additional natural language processing techniqu . . .
-
ProjectMontes, ElizabethProteins are large biological molecules of long polymers of amino acid residues, typically containing thousands of atoms and consisting of a uniform repetitive backbone and variable side chains attached to each residue. They fold into complex 3D struc . . .
-
ProjectLin, YunxiThe genome of a haptophyte was sequenced using the next-generation sequencing (NGS) technology. 18 billion base pairs high quality sequence data from NGS platform, HiSeq 2000, was assembled into scaffolds by using different tools including ABySS, Velv . . .
-
ProjectNejati, SinaThe goal of this project is to provide an open source solution for physical therapy with Kinect. In order to achieve that, we have designed and implemented a multi-layered application that will act as a portal for patients and therapists. This applica . . .
-
ProjectSubramani, Sabareesh KannanAugmented Reality (AR) is a view of a physical, real-world environment in real-time in which some elements are augmented by computer-generated object such as sound, video, graphics or plain text. Early stages of AR primarily used head-mounted display . . .
-
ProjectAlhajjaj, LaithLesson plans are essential in the DREAM project success. They are provided to help teachers to successfully implement the DREAM methodologies, also to include visual arts and theater activities in their lesson plans. The DREAM Lesson Plan application . . .
-
ProjectErdelyi, ChristopherGame playing algorithms are commonly implemented in video games to control non-player characters (hereafter, “NPC’s,”) in order to provide a richer or more competitive game environment. However, directly programming opponent algorithms into the game c . . .
-
ProjectZampell, KyleIn today’s markets, facial detection technologies are making great strides forward in accuracy and speed, continuously pushing the limitations of computerized vision and offering ever-increasing opportunities for automation and machine learning in wha . . .
-
ProjectVijayaPandian, AbishekBased on the Linked List Visualizer developed at California State University, San Marcos, we had built an interactive, adaptive tutor (LLV Tutor) to help students master the effects of individual C++ statements on a linked list, instead of demonstrati . . .
-
ProjectDembla, SiddharathaCyberscavenger is a map-based application created for the CyberQUEST project that allows teachers to set learning goals for the class before a field trip. Students then use Cyberscavenger to create a class report of the field trip based on the learnin . . .
-
ProjectTian, YuWith the rapid increase of information on the Internet, people are in desperate need to find a better way to access, filter, and organize content online. This project presents the concept, design, and implementation of the reading platform named Motif . . .
-
ProjectGilbert, NoahThis project examines the effectiveness of applying machine learning techniques to the realm of college student success, specifically with the intent of discovering and identifying those student characteristics and factors that show the strongest pred . . .
-
ProjectKale, MihirBased on the Linked List Visualizer developed at California State University, San Marcos, we built an interactive, adaptive tutor to help students master the effects of individual C++ statements on a linked list, instead of demonstrating “large scale” . . .
-
ProjectLi, TianceSelenium plays an important biological role in the expression of the functions of proteins, such as reproduction, immune function and disease resistance. A selenoprotein includes an amino acid called selenocysteine (Sec) which is known as the 21st ami . . .
-
ProjectCastillo III, Lanier ScottStudents in data structure classes often have difficulties visualizing what each C++ statement does to a data structure they are creating. This is especially true of data structures with pointers. In this paper we present a system that helps students . . .
-
ProjectDavies, ChadBiomineralization is used by Coccolithophores to produce shells made of calcium carbonate that still allow photosynthetic activity to penetrate the shell because the shells are transparent. This project tried to build machine learning models for predi . . .
-
ProjectGharagozloo, AarashWhenever a person tries to accomplish some goal in a game, the technique that they use is known as their strategy. A player’s strategy and their decision making skills have a high significance in determining the outcome of the game. Players with “bett . . .
-
ProjectSchiller, KyleThe intent of this study is to further the understanding of polyphenol oxidase's (PPO) functional characteristics in walnut and the plant kingdom through the use of RNA-seq de novo assembly and differential expression analysis. We begin the study with . . .
-
ProjectWalton, NicholasThis project considers an all-or-nothing log-return residual which allows the Diebold- Mariano test to discern significant differences in profitability of stock market index forecasting. Using this metric, fifteen years of historical S&P 500 closi . . .
-
ProjectRalston, MatthewThe DREAM Lesson Plan APP, developed by previous researchers of CSUSM aimed to provide a process for approved K-12 teachers to use when creating lessons. They set out to incorporate a data server, which would allow the application to acquire and post . . .
-
ProjectNeal, ElishaThe Basic Local Alignment Search Tool (BLAST) [ ] algorithm is one of the most commonly used algorithms within the field of Bioinformatics. Recent advances in sequencing technologies have vastly increased the amount of genomic data available to resear . . .
-
ProjectKarthik, SrilakshmiIdentification of named entities in medical records is important for doing further analysis of clinical notes to extract meaningful information from the records. Biomedical Named entity identification is a non-trivial problem as the accuracy of the na . . .
-
ProjectRawat, AnandSocial networks are the hub of social interactions in today’s world and conversations are a treasure trove of sentiments on these platforms. Currently, to the best of our knowledge, there is no system in place in any of the social networking platforms . . .
-
ProjectColson, Michael BradleyOne of the main responsibilities of an Operating System (OS) is to ensure system stability and security. Most OSes utilize mechanisms built into the CPU hardware to prevent user-mode processes from altering the state of the system or accessing protect . . .
-
ProjectAhmed, SatiaMongoDB is a document based NoSQL database system which stores data in the form of JSON documents. The de-normalized structure of MongoDB document makes query performance efficient and cost effective. In this project, a daycare application is implemen . . .
-
ProjectKamble, NikhitaBug tracking is defined as a procedure of tracking reported software bugs of any product of an organization. While developing any product or software, there are chances of bug occurrences. Keeping track of these bugs/issues manually is not feasible. A . . .
-
ProjectVemuri, PujithaWith advances in technology, there is a constant need of sharing resources in the form of social media, blogs, and through links to websites. To make sharing easier, URL shortening services like bit.ly, goog.gl, tinyurl.com, ow.ly are used, but often . . .
-
ProjectSaxena, PrachiWith the high increase of Web applications and websites devolvement and usage, monitoring web applications and websites became a necessity to minimize the risk of vulnerability, failures and customer dissatisfaction. The aim of this project is address . . .
-
ProjectBhatia, BhuvanNowadays, the aviation industry plays a crucial role in the world's transportation sector, and a lot of businesses rely on various airlines to connect them with other parts of the world. But, extreme weather conditions may directly affect the airline . . .
-
ProjectMelnik, Victor VladimirovichFollowing secure coding rules while developing software is challenging, but necessary due to the prevalence of large data breaches attributed to insecure code that have occurred for companies and government entities such as Equifax, Uber, and U.S. Sec . . .
-
ProjectKilaru, SindhuraThe 0-1 Knapsack Problem is a combinatorial optimization problem that can be described as follows. Given a set of items with weights and values and a knapsack with a certain capacity, find a subset of the items that fit in the knapsack and produce a m . . .
-
ProjectPatil, ToshitGraphical Processing Units (GPUs) used in embedded systems such as cars, robotics, mobile devices are usually required to run multiple tasks at the same time. But traditionally GPUs are designed to run only one task at a time. Prior studies have intro . . .
-
ProjectKhiria, RitikaIn this project, the Personal Dietitian android application will use food ontology APIs, which is a part of knowledge representation and semantic web technology to produce diet plans for the users. Additionally, the app will provide an activity tracke . . .
-
ProjectBhokare, MitaliVirtualization means to create a virtual or software-based representation of something rather than having a physical one. Beyond expanding the computing potential, virtualization can be used as a technique to increase security. This project has implem . . .
-
ProjectKuan, NientzuAnalyzing the U.S. stock market is a big data challenge due to its high volume of data and large price volatility. This project demonstrated how deep learning, specifically the Long Short Term Memory (LSTM) recurrent neural network, could make use of . . .
-
ProjectDalavi, Reena PrakashEmotions play an important role in shaping how we think and how we behave in many situations. Our action depends upon the surrounding emotions and paying attention to the surrounding emotions helps us take a decision. When we interact with other peopl . . .
-
ProjectPatel, Nevil DilipkumarPC2v10 is a web-based contest management framework which supports the ability to create and configure contests, control who can participate in defined contests, start/stop contests, and a variety of similar operations. [10] PC2v10 consists of various . . .
-
ProjectDong, YulongNowadays, online social networking is becoming one of the options for botnet command and control (C&C) communication, and QR codes have been widely used in the area of software automation. In this paper, we exploit QR codes, Twitter, Tor network, . . .
-
ProjectWahane, Arundhati VThere are various approaches for Extensible access control markup language (XACML) security policies implementation. This project demonstrated a solution to use graph database to implement XACML Role-based access control in Neo4j. The project consists . . .
-
ProjectAldausari, NuhaDesign by contract (DBC) is an effective methodology that dynamically checks whether a program meets its specifications which are also called design contracts. The contracts for object-oriented programs are defined in terms of preconditions and postco . . .
-
ProjectAppana, PranaviAn intruder attacks a computer network and breaks into it by exploiting a combination of system vulnerabilities. An attack graph models security vulnerabilities of a network and a sequence of all possible exploits that an intruder can use to get incre . . .