Search Constraints

Search Results

  • G445cd59x?file=thumbnail
    Project
    Soundararajan, Thilak Raj
    Shoulder surfing is the process of stealing one’s personal information such as personal identification number or password by looking over the victim’s shoulder. Nowadays, a hacker can use a video camera to actively record a user entering the password . . .
  • 0v838089r?file=thumbnail
    Project
    Annapragada, Laxmi Subhamkar
    Promoter sequences are the main regulatory elements of gene expression. The accurate prediction of promoters remains a challenge because the key DNA regulatory regions have variable structures, but their recognition by computer algorithms is fundament . . .
  • 7s75dc78g?file=thumbnail
    Project
    Maheshwari, Aastha
    The world is getting advanced, and it becomes our responsibility to be on the same pace as the world. With the increase in the amount of data, it is becoming difficult to accommodate everything in our brain in a small span of time. Data Visualization . . .
  • Sj139245q?file=thumbnail
    Project
    Panneer Selvam, Pratima
    During medical emergencies, patients are often shunted from hospital to hospital due to lack of ICU beds leading to loss of many lives. Also crucial time is lost calling up every individual blood bank trying to find blood of the required group in an e . . .
  • 41687h88c?file=thumbnail
    Project
    Panchal, Jalanilbhai
    The use of Smartphones and its complementary technologies like wearable devices have gained immense momentum over the decade, which has led to their vast amount of use in various daily activities. On top of that, the new technologies plus their variou . . .
  • Fx719m836?file=thumbnail
    Project
    Pandiri, Venkat Shiva
    This project carried out a systematic investigation to predict the final price of each home using machine learning techniques. Various machine learning techniques such as multiple linear regression (base model), random forest regression and polynomial . . .
  • Ww72bb93g?file=thumbnail
    Project
    Ramamurthy, Kishore
    An Annotation is a metadatum (comment, explanation) attached to a specific section of a document (text, image, video or other formats) after it has been created. Annotations have been used in several fields such as literature and education, software e . . .
  • Np193947n?file=thumbnail
    Project
    Pabbaraju, Akhila
    Mobile health describes the use of portable electronic devices with software applications to provide health services and manage patient information. With almost 5 billion mobile phone users in the world, health care providers and researchers are reali . . .
  • 3x816n09c?file=thumbnail
    Project
    Tan, Andrea
    Cyber Scavenger is a map-based application created for the CyberQUEST project that allows teachers to set learning goals for class trips before bringing students to the fieldtrip. The existing application is geared more towards a classroom based envir . . .
  • 9k41zd93b?file=thumbnail
    Project
    Cronin, Timothy
    This paper describes a system that automatically tags unstructured medical records using the Naïve Bayes and Decision Tree algorithms for a variety of risk factors and patient medical history indicators. Additional natural language processing techniqu . . .
  • 2801pg85d?file=thumbnail
    Project
    Montes, Elizabeth
    Proteins are large biological molecules of long polymers of amino acid residues, typically containing thousands of atoms and consisting of a uniform repetitive backbone and variable side chains attached to each residue. They fold into complex 3D struc . . .
  • Nv935326b?file=thumbnail
    Project
    Lin, Yunxi
    The genome of a haptophyte was sequenced using the next-generation sequencing (NGS) technology. 18 billion base pairs high quality sequence data from NGS platform, HiSeq 2000, was assembled into scaffolds by using different tools including ABySS, Velv . . .
  • N583xv56x?file=thumbnail
    Project
    Nejati, Sina
    The goal of this project is to provide an open source solution for physical therapy with Kinect. In order to achieve that, we have designed and implemented a multi-layered application that will act as a portal for patients and therapists. This applica . . .
  • 2227mq099?file=thumbnail
    Project
    Subramani, Sabareesh Kannan
    Augmented Reality (AR) is a view of a physical, real-world environment in real-time in which some elements are augmented by computer-generated object such as sound, video, graphics or plain text. Early stages of AR primarily used head-mounted display . . .
  • 9306sz819?file=thumbnail
    Project
    Alhajjaj, Laith
    Lesson plans are essential in the DREAM project success. They are provided to help teachers to successfully implement the DREAM methodologies, also to include visual arts and theater activities in their lesson plans. The DREAM Lesson Plan application . . .
  • 7w62f8544?file=thumbnail
    Project
    Erdelyi, Christopher
    Game playing algorithms are commonly implemented in video games to control non-player characters (hereafter, “NPC’s,”) in order to provide a richer or more competitive game environment. However, directly programming opponent algorithms into the game c . . .
  • Qr46r1217?file=thumbnail
    Project
    Zampell, Kyle
    In today’s markets, facial detection technologies are making great strides forward in accuracy and speed, continuously pushing the limitations of computerized vision and offering ever-increasing opportunities for automation and machine learning in wha . . .
  • 2f75r846f?file=thumbnail
    Project
    VijayaPandian, Abishek
    Based on the Linked List Visualizer developed at California State University, San Marcos, we had built an interactive, adaptive tutor (LLV Tutor) to help students master the effects of individual C++ statements on a linked list, instead of demonstrati . . .
  • Sx61dm54h?file=thumbnail
    Project
    Dembla, Siddharatha
    Cyberscavenger is a map-based application created for the CyberQUEST project that allows teachers to set learning goals for the class before a field trip. Students then use Cyberscavenger to create a class report of the field trip based on the learnin . . .
  • Vq27zn88c?file=thumbnail
    Project
    Tian, Yu
    With the rapid increase of information on the Internet, people are in desperate need to find a better way to access, filter, and organize content online. This project presents the concept, design, and implementation of the reading platform named Motif . . .
  • N009w2675?file=thumbnail
    Project
    Gilbert, Noah
    This project examines the effectiveness of applying machine learning techniques to the realm of college student success, specifically with the intent of discovering and identifying those student characteristics and factors that show the strongest pred . . .
  • 0k225b555?file=thumbnail
    Project
    Kale, Mihir
    Based on the Linked List Visualizer developed at California State University, San Marcos, we built an interactive, adaptive tutor to help students master the effects of individual C++ statements on a linked list, instead of demonstrating “large scale” . . .
  • 7m01bm002?file=thumbnail
    Project
    Li, Tiance
    Selenium plays an important biological role in the expression of the functions of proteins, such as reproduction, immune function and disease resistance. A selenoprotein includes an amino acid called selenocysteine (Sec) which is known as the 21st ami . . .
  • Fq977v08c?file=thumbnail
    Project
    Castillo III, Lanier Scott
    Students in data structure classes often have difficulties visualizing what each C++ statement does to a data structure they are creating. This is especially true of data structures with pointers. In this paper we present a system that helps students . . .
  • 8c97kq90c?file=thumbnail
    Project
    Davies, Chad
    Biomineralization is used by Coccolithophores to produce shells made of calcium carbonate that still allow photosynthetic activity to penetrate the shell because the shells are transparent. This project tried to build machine learning models for predi . . .
  • 1j92g798k?file=thumbnail
    Project
    Gharagozloo, Aarash
    Whenever a person tries to accomplish some goal in a game, the technique that they use is known as their strategy. A player’s strategy and their decision making skills have a high significance in determining the outcome of the game. Players with “bett . . .
  • Vt150j61b?file=thumbnail
    Project
    Schiller, Kyle
    The intent of this study is to further the understanding of polyphenol oxidase's (PPO) functional characteristics in walnut and the plant kingdom through the use of RNA-seq de novo assembly and differential expression analysis. We begin the study with . . .
  • 9k41zd95w?file=thumbnail
    Project
    Walton, Nicholas
    This project considers an all-or-nothing log-return residual which allows the Diebold- Mariano test to discern significant differences in profitability of stock market index forecasting. Using this metric, fifteen years of historical S&P 500 closi . . .
  • Qv33rx05x?file=thumbnail
    Project
    Ralston, Matthew
    The DREAM Lesson Plan APP, developed by previous researchers of CSUSM aimed to provide a process for approved K-12 teachers to use when creating lessons. They set out to incorporate a data server, which would allow the application to acquire and post . . .
  • 4q77fr797?file=thumbnail
    Project
    Neal, Elisha
    The Basic Local Alignment Search Tool (BLAST) [ ] algorithm is one of the most commonly used algorithms within the field of Bioinformatics. Recent advances in sequencing technologies have vastly increased the amount of genomic data available to resear . . .
  • V118rd95z?file=thumbnail
    Project
    Karthik, Srilakshmi
    Identification of named entities in medical records is important for doing further analysis of clinical notes to extract meaningful information from the records. Biomedical Named entity identification is a non-trivial problem as the accuracy of the na . . .
  • Work
    Project
    Rawat, Anand
    Social networks are the hub of social interactions in today’s world and conversations are a treasure trove of sentiments on these platforms. Currently, to the best of our knowledge, there is no system in place in any of the social networking platforms . . .
  • Work
    Project
    Colson, Michael Bradley
    One of the main responsibilities of an Operating System (OS) is to ensure system stability and security. Most OSes utilize mechanisms built into the CPU hardware to prevent user-mode processes from altering the state of the system or accessing protect . . .
  • Work
    Project
    Ahmed, Satia
    MongoDB is a document based NoSQL database system which stores data in the form of JSON documents. The de-normalized structure of MongoDB document makes query performance efficient and cost effective. In this project, a daycare application is implemen . . .
  • Work
    Project
    Kamble, Nikhita
    Bug tracking is defined as a procedure of tracking reported software bugs of any product of an organization. While developing any product or software, there are chances of bug occurrences. Keeping track of these bugs/issues manually is not feasible. A . . .
  • Work
    Project
    Vemuri, Pujitha
    With advances in technology, there is a constant need of sharing resources in the form of social media, blogs, and through links to websites. To make sharing easier, URL shortening services like bit.ly, goog.gl, tinyurl.com, ow.ly are used, but often . . .
  • Work
    Project
    Saxena, Prachi
    With the high increase of Web applications and websites devolvement and usage, monitoring web applications and websites became a necessity to minimize the risk of vulnerability, failures and customer dissatisfaction. The aim of this project is address . . .
  • Work
    Project
    Bhatia, Bhuvan
    Nowadays, the aviation industry plays a crucial role in the world's transportation sector, and a lot of businesses rely on various airlines to connect them with other parts of the world. But, extreme weather conditions may directly affect the airline . . .
  • Work
    Project
    Melnik, Victor Vladimirovich
    Following secure coding rules while developing software is challenging, but necessary due to the prevalence of large data breaches attributed to insecure code that have occurred for companies and government entities such as Equifax, Uber, and U.S. Sec . . .
  • Work
    Project
    Kilaru, Sindhura
    The 0-1 Knapsack Problem is a combinatorial optimization problem that can be described as follows. Given a set of items with weights and values and a knapsack with a certain capacity, find a subset of the items that fit in the knapsack and produce a m . . .
  • Work
    Project
    Patil, Toshit
    Graphical Processing Units (GPUs) used in embedded systems such as cars, robotics, mobile devices are usually required to run multiple tasks at the same time. But traditionally GPUs are designed to run only one task at a time. Prior studies have intro . . .
  • Work
    Project
    Khiria, Ritika
    In this project, the Personal Dietitian android application will use food ontology APIs, which is a part of knowledge representation and semantic web technology to produce diet plans for the users. Additionally, the app will provide an activity tracke . . .
  • Work
    Project
    Bhokare, Mitali
    Virtualization means to create a virtual or software-based representation of something rather than having a physical one. Beyond expanding the computing potential, virtualization can be used as a technique to increase security. This project has implem . . .
  • Work
    Project
    Kuan, Nientzu
    Analyzing the U.S. stock market is a big data challenge due to its high volume of data and large price volatility. This project demonstrated how deep learning, specifically the Long Short Term Memory (LSTM) recurrent neural network, could make use of . . .
  • Work
    Project
    Dalavi, Reena Prakash
    Emotions play an important role in shaping how we think and how we behave in many situations. Our action depends upon the surrounding emotions and paying attention to the surrounding emotions helps us take a decision. When we interact with other peopl . . .
  • 5m60qr90c?file=thumbnail
    Project
    Patel, Nevil Dilipkumar
    PC2v10 is a web-based contest management framework which supports the ability to create and configure contests, control who can participate in defined contests, start/stop contests, and a variety of similar operations. [10] PC2v10 consists of various . . .
  • Pr76f341v?file=thumbnail
    Project
    Dong, Yulong
    Nowadays, online social networking is becoming one of the options for botnet command and control (C&C) communication, and QR codes have been widely used in the area of software automation. In this paper, we exploit QR codes, Twitter, Tor network, . . .
  • Qf85nb29f?file=thumbnail
    Project
    Wahane, Arundhati V
    There are various approaches for Extensible access control markup language (XACML) security policies implementation. This project demonstrated a solution to use graph database to implement XACML Role-based access control in Neo4j. The project consists . . .
  • N583xv02m?file=thumbnail
    Project
    Aldausari, Nuha
    Design by contract (DBC) is an effective methodology that dynamically checks whether a program meets its specifications which are also called design contracts. The contracts for object-oriented programs are defined in terms of preconditions and postco . . .
  • N870zq83v?file=thumbnail
    Project
    Appana, Pranavi
    An intruder attacks a computer network and breaks into it by exploiting a combination of system vulnerabilities. An attack graph models security vulnerabilities of a network and a sequence of all possible exploits that an intruder can use to get incre . . .