In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of...
My research was about analyzing how computer scientists are portrayed in the media. The idea was to do a project that somehow combined ideas of computer science and theater, being that I am a Computer Science major that has done...
This paper examines the integration of the NSF/TCPP Core Curriculum Recommendations in a liberal arts undergraduate setting. We examine how parallel and distributed computing concepts can be incorporated across the breadth of...
Current algorithms in the Positive Influence Dominating Set (PIDS) problem domain are focused on a specific type of PIDS, the Total Positive Influence Dominating Set (TPIDS). We have developed an algorithm specifically targeted...
This paper is a continuous study of the registration server system using a previous created real-time simulation application for my working product- T-Mobile Digits' registration server system - an Enterprise-level solution...
Individual Mobility is the study that depicts how individuals move inside a region or system. As of late a few researches have been accomplished for this reason and there has been a flood in enormous informational accessible in...
This report focuses on independently developed applications that are primarily used to support group or group solutions. The tools used to develop this application include Android development tools, and Google Firebase...
Machine learning models & AI are popular term in past couple of years. Almost every aspect on our daily life we are using these machine learning models & AI knowing or unknowing. The simple statement of this research paper is to...
Thermal Advantage (TA) Instruments DSC 2920 and SDT 2960 require a computer running Windows NT 2000 and an Industry Standard Architecture (ISA) expansion card to output and record data. Due to the lack of availability for this...
One of the key challenges in Wireless Sensor Networks (WSNs) is that of extending the lifetime of the network while meeting some coverage requirements. In this paper, we present a distributed algorithmic framework to enable...
Modern education technology tools and learning systems provide the means for faculty to develop courses that offer connected and engaging learning opportunities. However, many courses, particularly those in the sciences and...
Humor is a very complex characteristic concept that defines us as human beings and social entities. Humor is an essential component in personal communication. How to create a method or model to discover the structures behind...
This project created a web application for users to instantly communicate with each other. An the most important part of building a good chat application is focus on the data flow on web. This project spends a good amount of...
The emergence of large scale social networks has led to research in approaches to classify similar users on a network. While many such approaches use data mining techniques, recent efforts have focused on measuring the...
Software in today's world is used more and in different ways as well than ever before. From microwaves and vehicles to space rockets and smart cards. Usually, a software programmer goes through a certain process to establish a...
The basic unit of any nervous system is the neuron. Therefore, understanding the operation of nervous systems ultimately requires an inventory of their constituent neurons and synaptic connectivity, which form neural circuits....
Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud...
Cyberbullying is a type of bullying that uses technology such as cell phones to harass or malign another person. To detect acts of cyberbullying, we are developing an algorithm that will detect cyberbullying in SMS (text)...
Current algorithms in the Positive Influence Dominating Set (PIDS) problem domain are focused on a specific type of PIDS, the Total Positive Influence Dominating Set (TPIDS). We have developed an algorithm specifically targeted...
I started the process of Game Development on an arena-based roguelike game, using the Construct 3 engine for the development. This included documents with the design process timeline, as well as design documents for content...
A Connected Dominating Set (CDS) of a graph representing a Wireless Sensor Network can be used as a virtual backbone for routing through the network. Since the sensors in the network are constrained by limited battery life, we...
The rise in the use of social media and particularly the rise of adolescent use has led to a new means of bullying. Cyber-bullying has proven consequential to youth internet users causing a need for a response. In order to...