Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2010

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 563

Full-Text Articles in Entire DC Network

Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja Dec 2010

Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja

Master's Projects

A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the models as the IDE creates them automatically. The IDE offers a simple interface for users to edit the schema of their models. Users can add or delete data from their models without dealing with the SQL insert/delete statements. The IDE …


Spartan Daily December 9, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 9, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 53


Spartan Daily December 8, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 8, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 52


Spartan Daily December 7, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 7, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 51


Spartan Daily December 6, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 6, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 50


Spartan Daily December 2, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 2, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 49


"Teaching Competitiveness In Advertising", Timothy Hendrick Dec 2010

"Teaching Competitiveness In Advertising", Timothy Hendrick

Faculty Publications

No abstract provided.


Communicator, Dec. 2010, San Jose State University, Department Of Kinesiology Dec 2010

Communicator, Dec. 2010, San Jose State University, Department Of Kinesiology

Communicator (Kinesiology)

Volume 23, Issue 2


Measuring Walking And Cycling Using The Pabs (Pedestrian And Bicycling Survey) Approach: A Low-Cost Survey Method For Local Communities, Ann Forsyth Dec 2010

Measuring Walking And Cycling Using The Pabs (Pedestrian And Bicycling Survey) Approach: A Low-Cost Survey Method For Local Communities, Ann Forsyth

Mineta Transportation Institute

To tackle the problems of greenhouse gas emissions, traffic congestion, resident quality of life, and public health concerns, communities are using initiatives to spur more walking and cycling. As local governments face hard choices about which programs to fund, decision makers, planners, and residents seek to understand if proposed policies to increase bicycling and walking—modes referred to as “active travel”— actually work. However, most communities have unreliable means to know how many active travel trips occur in their jurisdictions, let alone how the numbers may change over time. This project developed a low-budget survey method and related sampling strategy for …


Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung Dec 2010

Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung

Master's Projects

False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.

With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.

Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …


An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna Dec 2010

An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna

Master's Projects

Generally, search engines perform the ranking of web pages in an offline mode, which is after the web pages have been retrieved and stored in the database. The existing HITS algorithm (Kleinberg, 1996) operates in an offline mode to perform page rank calculation. In this project, we have implemented an online mode of page ranking for this algorithm. This will improve the overall performance of the Search Engine. This report describes the approach used to implement and test this algorithm. Comparison results performed against other existing search engines are also presented in this report. This is helpful in describing the …


Japanese Kanji Suggestion Tool, Sujata Dongre Dec 2010

Japanese Kanji Suggestion Tool, Sujata Dongre

Master's Projects

Many times, we can see that if we enter a misspelled search term in any of the search engines like Google, it will provide some help with "Did you mean:...." In my project, I am providing some suggestions for the wrong Japanese text entered by a user.

The Japanese language has three types of writing styles - hiragana, katakana and the most difficult, kanji. A single kanji symbol may be used to write one or more different compound words. From the point of view of the reader, kanji symbols are said to have one or more different "readings." Hence, sometimes …


Approximate Disassembly Using Dynamic Programming, Abhishek Shah Dec 2010

Approximate Disassembly Using Dynamic Programming, Abhishek Shah

Master's Projects

Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.

In …


A Study On Masquerade Detection, Lin Huang Dec 2010

A Study On Masquerade Detection, Lin Huang

Master's Projects

In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.

An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …


Improved Worm Simulator And Simulations, Arnold Suvatne Dec 2010

Improved Worm Simulator And Simulations, Arnold Suvatne

Master's Projects

According to the latest Microsoft Security Intelligence Report (SIR), worms were the second most prevalent information security threat detected in the first half of 2010 – the top threat being Trojans. Given the prevalence and damaging effects of worms, research and development of worm counter strategies are garnering an increased level of attention. However, it is extremely risky to test and observe worm spread behavior on a public network. What is needed is a packet level worm simulator that would allow researchers to develop and test counter strategies against rapidly spreading worms in a controlled and isolated environment. Jyotsna Krishnaswamy, …


Automatic Execution Path Finding Tool, Fan Yang Dec 2010

Automatic Execution Path Finding Tool, Fan Yang

Master's Projects

Today, there are many hackers trying to break software using reverse engineering tech- niques. To better protect software, we need to understand reverse engineering methods. This project presents a tool that automatically analyzes executable code in a manner simi- lar to the way an attack might analyze code.

Using reverse engineering techniques, executables can be disassembled to yield an as- sembly code representation of the program. Assembly code is much more human reada- ble than binary code. With assembly code, an attacker can attempt to modify the program to do something other than what was intended by the developer.

The …


A Microrna Target Prediction Algorithm, Rupinder Singh Dec 2010

A Microrna Target Prediction Algorithm, Rupinder Singh

Master's Projects

MicroRNA target prediction using the experimental methods is a challenging task. To accelerate the process of miRNA target validation, many computational methods are used. Computational methods yield many potential candidates for experimental validation. This project is about developing a new computational method using dynamic programming to predict miRNA targets with more accuracy. The project discusses the currently available computational methods and develops a new algorithm using the currently available knowledge about miRNA interactions.


Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong Dec 2010

Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong

Master's Projects

Personally identifiable information (PII) is information regarding things such as bank accounts, retirement or stock investment accounts, credit card accounts, medical records, or insurance claims. There is a need to protect the PII in databases that are connected to the ubiquitous, global network that is the Internet. If there is any vulnerability in the protection in a system that holds PII, then it presents an opportunity for an unauthorized person to access this PII. One of the techniques available to would- be information thieves is SQL injection (SQL-I). In this project, a system is developed to analyze the values submitted …


Online Application Monitoring Tool, Sathya Anandan Dec 2010

Online Application Monitoring Tool, Sathya Anandan

Master's Projects

In some classes, students take online tests and some types of network activity (for example trying to find the answers in www.google.com) will be considered as cheating during the exam. It would be useful if instructor could monitor online activities of each student to detect cheating. The goal of this project is to develop such a tool using client/server architecture. Tool should display the student's hostname and the website visited during unauthorized web activity. Professor should able to see the applications opened by all students and he will have an option to view the log files of all the students …


View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna Dec 2010

View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna

Master's Projects

The aim of the project is to build a Web-based IDE (Integrated Development Environment) that enables users to create a Web application in PHP on the CakePHP framework. The view component of the IDE allows the users to build the CakePHP view templates, which include the HTML tags which can be properly linked with the controller functions. Users will be able to create the HTML form elements only by performing certain drags, drops and clicks. This project will create dynamic view elements, which is achieved by connecting them to the Controllers components. This IDE helps the users to create dynamic …


Web-Based Ide For Interfacing View Controller, Tejasvi Palvai Dec 2010

Web-Based Ide For Interfacing View Controller, Tejasvi Palvai

Master's Projects

The main idea of this project is to develop a web-based IDE, which helps users to avoid installing or configuring the Desktop IDE. It also enables users to create XHTML pages using the drag and drop mechanism in Struts. Struts extends the Java Servlet API to encourage developers to adopt the MVC (Model-View- Controller) architecture. In this project, a web application for interfacing the view and controller parts of the MVC architecture was developed. This web-based IDE connects the View and Controller components when the user drags and drops HTML elements in the UI of the IDE. With this project, …


Extending Owl With Finite Automata Constraints, Jignesh Borisa Dec 2010

Extending Owl With Finite Automata Constraints, Jignesh Borisa

Master's Projects

The Web Ontology Language (OWL) is a markup language for sharing and publishing data using ontologies on the Internet. It belongs to a family of knowledge representation languages for writing ontologies. Answer Set Programming (ASP) is a declarative programming approach to knowledge representation. It is oriented towards difficult search problems. In this project, we developed an extension to OWL add support for collection class constraints. These constraints come in the form of membership checks for sets where these set are computed by finite automata. We developed an inference engine for the resulting language. This engine extends the Java-based Pellet library …


One Social, Sowmya Sampath Dec 2010

One Social, Sowmya Sampath

Master's Projects

Facebook streams and Twitter tweets represent user content in two common social media systems. Users often have accounts on both these systems and to keep their content current for both of them they must update each separately. It is thus difficult to manage and maintain both of these social networks together. The goal of this project is to build a social website called One Social, where users can view their Facebook streams and Twitter tweets in one single view and thereby easily organize and maintain their updates. In One Social, users can enter a status message and can share it …


Computational Mirna Target Prediction In Animals, Leyan Tang Dec 2010

Computational Mirna Target Prediction In Animals, Leyan Tang

Master's Projects

miRNAs are a class of small RNA molecules about 22 nucleotides long that regulate gene expression at the post-transcriptional level. The discovery of the second miRNA 10 years ago was as much a surprise in its own way as the very structure of DNA discovered a half century earlier[1]. How could these small molecules regulate so many genes? During the past decade the complex cascade of regulation has been investigated and reported in detail[2]. The regions of the genome called untranslated regions, or UTRs, proved true to their name: they were indeed untranslated, but certainly not unimportant: they act as …


Information Outlook, December 2010, Special Libraries Association Dec 2010

Information Outlook, December 2010, Special Libraries Association

Information Outlook, 2010

Volume 14, Issue 8


Noticias De Naccs, Vol. 39, No. 4, December 2010, National Association For Chicana And Chicano Studies Dec 2010

Noticias De Naccs, Vol. 39, No. 4, December 2010, National Association For Chicana And Chicano Studies

Noticias de NACCS Newsletter

No abstract provided.


"Teaching Competitiveness In Advertising", Timothy Hendrick Dec 2010

"Teaching Competitiveness In Advertising", Timothy Hendrick

Timothy Hendrick

No abstract provided.


Spartan Daily December 1, 2010, San Jose State University, School Of Journalism And Mass Communications Dec 2010

Spartan Daily December 1, 2010, San Jose State University, School Of Journalism And Mass Communications

Spartan Daily (School of Journalism and Mass Communications)

Volume 135, Issue 48


2012 Census Of California Water Transit Services ,Mti Report 12-02, Richard M. Kos, Maria Louise Javier, Brent Carvalho, Asha W. Agrawal Dec 2010

2012 Census Of California Water Transit Services ,Mti Report 12-02, Richard M. Kos, Maria Louise Javier, Brent Carvalho, Asha W. Agrawal

Mineta Transportation Institute

The U.S. Bureau of Transportation Statistics conducts a nationwide census of ferry boat operators for the U.S. Department of Transportation and the collected information is used for statistical purposes. The Caltrans Division of Local Assistance has been asked by the Federal Highway Administration (FHWA) to gather data regarding ferry operations under MAP-21, the Moving Ahead for Progress in the 21st Century Act. MAP-21 includes a new formula program for ferry boats and ferry terminal facilities eligible under 23 USC 129(c) which authorizes federal participation in toll roads, bridges, tunnels, and ferries. FHWA has asked that Caltrans assure the ferry boat …


Error Correcting Codes For Cooperative Broadcasting, Robert H. Morelos-Zaragoza Nov 2010

Error Correcting Codes For Cooperative Broadcasting, Robert H. Morelos-Zaragoza

Faculty Publications

This talk considers the design and implementation of error correcting codes for cooperative broadcasting in wireless networks. Focus is on the case of two cooperating sources transmitting two classes of information to a single receiver. This case was first introduced in the seminal work of Bergmans and Cover and referred to as "over the air mixing". Two levels of protection are provided using two low-density parity-check (LDPC) codes combined using Plotkin's |u|u+v|-construction. Expressions are derived for the bit metrics used in iterative decoding for two-level codes combined with BPSK, QPSK and 4-PAM modulations. Several examples of codes and their performance …