Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- MVC IDE Web Applications CakePHP (2)
- Anit-virus dynamic programming disassembly (1)
- Cheating detection (1)
- Computer Worm Simulator (1)
- Dynamic programming microRNA (1)
-
- False sharing cache multi-core CPUs (1)
- HITS online algorithm search engine (1)
- Intrusion detection systems hidden markov model (1)
- Keyword suggestion japanese search engine (1)
- MVC IDE Struts Web Applications (1)
- Owl Ontology Constraint Programming (1)
- Profile Hidden Markov Model microRNA (1)
- Reverse engineering software security (1)
- Social Networking Web Service Threading (1)
- Web Security SQL Injection Attacks (1)
Articles 1 - 30 of 41
Full-Text Articles in Entire DC Network
Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja
Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja
Master's Projects
A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the models as the IDE creates them automatically. The IDE offers a simple interface for users to edit the schema of their models. Users can add or delete data from their models without dealing with the SQL insert/delete statements. The IDE …
View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna
View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna
Master's Projects
The aim of the project is to build a Web-based IDE (Integrated Development Environment) that enables users to create a Web application in PHP on the CakePHP framework. The view component of the IDE allows the users to build the CakePHP view templates, which include the HTML tags which can be properly linked with the controller functions. Users will be able to create the HTML form elements only by performing certain drags, drops and clicks. This project will create dynamic view elements, which is achieved by connecting them to the Controllers components. This IDE helps the users to create dynamic …
Automatic Execution Path Finding Tool, Fan Yang
Automatic Execution Path Finding Tool, Fan Yang
Master's Projects
Today, there are many hackers trying to break software using reverse engineering tech- niques. To better protect software, we need to understand reverse engineering methods. This project presents a tool that automatically analyzes executable code in a manner simi- lar to the way an attack might analyze code.
Using reverse engineering techniques, executables can be disassembled to yield an as- sembly code representation of the program. Assembly code is much more human reada- ble than binary code. With assembly code, an attacker can attempt to modify the program to do something other than what was intended by the developer.
The …
Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung
Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung
Master's Projects
False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.
With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.
Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …
One Social, Sowmya Sampath
One Social, Sowmya Sampath
Master's Projects
Facebook streams and Twitter tweets represent user content in two common social media systems. Users often have accounts on both these systems and to keep their content current for both of them they must update each separately. It is thus difficult to manage and maintain both of these social networks together. The goal of this project is to build a social website called One Social, where users can view their Facebook streams and Twitter tweets in one single view and thereby easily organize and maintain their updates. In One Social, users can enter a status message and can share it …
An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna
An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna
Master's Projects
Generally, search engines perform the ranking of web pages in an offline mode, which is after the web pages have been retrieved and stored in the database. The existing HITS algorithm (Kleinberg, 1996) operates in an offline mode to perform page rank calculation. In this project, we have implemented an online mode of page ranking for this algorithm. This will improve the overall performance of the Search Engine. This report describes the approach used to implement and test this algorithm. Comparison results performed against other existing search engines are also presented in this report. This is helpful in describing the …
Improved Worm Simulator And Simulations, Arnold Suvatne
Improved Worm Simulator And Simulations, Arnold Suvatne
Master's Projects
According to the latest Microsoft Security Intelligence Report (SIR), worms were the second most prevalent information security threat detected in the first half of 2010 – the top threat being Trojans. Given the prevalence and damaging effects of worms, research and development of worm counter strategies are garnering an increased level of attention. However, it is extremely risky to test and observe worm spread behavior on a public network. What is needed is a packet level worm simulator that would allow researchers to develop and test counter strategies against rapidly spreading worms in a controlled and isolated environment. Jyotsna Krishnaswamy, …
Computational Mirna Target Prediction In Animals, Leyan Tang
Computational Mirna Target Prediction In Animals, Leyan Tang
Master's Projects
miRNAs are a class of small RNA molecules about 22 nucleotides long that regulate gene expression at the post-transcriptional level. The discovery of the second miRNA 10 years ago was as much a surprise in its own way as the very structure of DNA discovered a half century earlier[1]. How could these small molecules regulate so many genes? During the past decade the complex cascade of regulation has been investigated and reported in detail[2]. The regions of the genome called untranslated regions, or UTRs, proved true to their name: they were indeed untranslated, but certainly not unimportant: they act as …
A Microrna Target Prediction Algorithm, Rupinder Singh
A Microrna Target Prediction Algorithm, Rupinder Singh
Master's Projects
MicroRNA target prediction using the experimental methods is a challenging task. To accelerate the process of miRNA target validation, many computational methods are used. Computational methods yield many potential candidates for experimental validation. This project is about developing a new computational method using dynamic programming to predict miRNA targets with more accuracy. The project discusses the currently available computational methods and develops a new algorithm using the currently available knowledge about miRNA interactions.
Japanese Kanji Suggestion Tool, Sujata Dongre
Japanese Kanji Suggestion Tool, Sujata Dongre
Master's Projects
Many times, we can see that if we enter a misspelled search term in any of the search engines like Google, it will provide some help with "Did you mean:...." In my project, I am providing some suggestions for the wrong Japanese text entered by a user.
The Japanese language has three types of writing styles - hiragana, katakana and the most difficult, kanji. A single kanji symbol may be used to write one or more different compound words. From the point of view of the reader, kanji symbols are said to have one or more different "readings." Hence, sometimes …
Online Application Monitoring Tool, Sathya Anandan
Online Application Monitoring Tool, Sathya Anandan
Master's Projects
In some classes, students take online tests and some types of network activity (for example trying to find the answers in www.google.com) will be considered as cheating during the exam. It would be useful if instructor could monitor online activities of each student to detect cheating. The goal of this project is to develop such a tool using client/server architecture. Tool should display the student's hostname and the website visited during unauthorized web activity. Professor should able to see the applications opened by all students and he will have an option to view the log files of all the students …
Approximate Disassembly Using Dynamic Programming, Abhishek Shah
Approximate Disassembly Using Dynamic Programming, Abhishek Shah
Master's Projects
Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.
In …
Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong
Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong
Master's Projects
Personally identifiable information (PII) is information regarding things such as bank accounts, retirement or stock investment accounts, credit card accounts, medical records, or insurance claims. There is a need to protect the PII in databases that are connected to the ubiquitous, global network that is the Internet. If there is any vulnerability in the protection in a system that holds PII, then it presents an opportunity for an unauthorized person to access this PII. One of the techniques available to would- be information thieves is SQL injection (SQL-I). In this project, a system is developed to analyze the values submitted …
Web-Based Ide For Interfacing View Controller, Tejasvi Palvai
Web-Based Ide For Interfacing View Controller, Tejasvi Palvai
Master's Projects
The main idea of this project is to develop a web-based IDE, which helps users to avoid installing or configuring the Desktop IDE. It also enables users to create XHTML pages using the drag and drop mechanism in Struts. Struts extends the Java Servlet API to encourage developers to adopt the MVC (Model-View- Controller) architecture. In this project, a web application for interfacing the view and controller parts of the MVC architecture was developed. This web-based IDE connects the View and Controller components when the user drags and drops HTML elements in the UI of the IDE. With this project, …
Extending Owl With Finite Automata Constraints, Jignesh Borisa
Extending Owl With Finite Automata Constraints, Jignesh Borisa
Master's Projects
The Web Ontology Language (OWL) is a markup language for sharing and publishing data using ontologies on the Internet. It belongs to a family of knowledge representation languages for writing ontologies. Answer Set Programming (ASP) is a declarative programming approach to knowledge representation. It is oriented towards difficult search problems. In this project, we developed an extension to OWL add support for collection class constraints. These constraints come in the form of membership checks for sets where these set are computed by finite automata. We developed an inference engine for the resulting language. This engine extends the Java-based Pellet library …
A Study On Masquerade Detection, Lin Huang
A Study On Masquerade Detection, Lin Huang
Master's Projects
In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.
An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …
Bookmarklet Builder For Offline Data Retrieval, Sheetal Naidu
Bookmarklet Builder For Offline Data Retrieval, Sheetal Naidu
Master's Projects
Bookmarklet Builder for Offline Data Retrieval is a computer application which will allow users to view websites even when they are offline. It can be stored as a URL of a bookmark in the browser. Bookmarklets exist for storing single web pages in hand-held devices and these web pages are stored as PDF files. In this project we have developed a tool that can save entire web page applications as bookmarklets. This will enable users to use these applications even when they are not connected to the Internet. The main technology beyond Javascript used to achieve this is the data: …
Enhancing Open-Source Localization, Farzana Forhad
Enhancing Open-Source Localization, Farzana Forhad
Master's Projects
Pootle is a web portal which is designed to be a web translation tool. We can run Pootle like an internet server and run a local copy on an intranet. Pootle has a user friendly interface which ensures better quality and easier translation of projects. Users can log into the Pootle and create their own projects under any language, and they can also add or retrieve any language from any project or any project from any language. Although Pootle has many advantages, it also has its drawbacks, and one of the biggest drawbacks of Pootle is that whatever translation is …
Open Source Analysis Of Biomedical Figures, David Shao
Open Source Analysis Of Biomedical Figures, David Shao
Master's Projects
With a selection of biomedical literature available for open access, a natural pairing seems to be the use of open source software to automatically analyze content, in particular, the content of gures. Considering the large number of possible tools and approaches, we choose to focus on the recognition of printed characters. As the problem of optical character recognition (OCR) under rea- sonable conditions is considered to be solved, and as open source software is fully capable of isolating the location of characters and identifying most of them accurately, we instead use OCR as an application area for the relatively recent …
Parallel Programming Recipes, Thuy C. Nguyenphuc
Parallel Programming Recipes, Thuy C. Nguyenphuc
Master's Projects
Parallel programming has become vital for the success of commercial applications since Moore’s Law will now be used to double the processors (or cores) per chip every technology generation. The performance of applications depends on how software executions can be mapped on the multi-core chip, and how efficiently they run the cores. Currently, the increase of parallelism in software development is necessary, not only for taking advantage of multi-core capability, but also for adapting and surviving in the new silicon implementation. This project will provide the performance characteristics of parallelism for some common algorithms or computations using different parallel languages. …
How Smart Is Your Android Smartphone?, Deepika Mulani
How Smart Is Your Android Smartphone?, Deepika Mulani
Master's Projects
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt …
Food Phone Application, Shengyu Li
Food Phone Application, Shengyu Li
Master's Projects
This project is about implementing a food menu application for users to search and upload food information by using a mobile phone. People sometimes may just know what food they wish to eat instead of the restaurants' name. Without knowing any restaurants' names, our food application's search only requires the name of the dish (e.g., hamburger, spaghetti, etc) in order to get the list of restaurants that serve these items and their corresponding information (e.g., location, hours, phone number, item's price, etc.). An advantage of using my food application is the system not only includes Google Map, but any information …
Auto-Generation Of Use Case Controllers, Pushkar Marathe
Auto-Generation Of Use Case Controllers, Pushkar Marathe
Master's Projects
The thesis is based on the concept of generating machine executable code from UML diagrams. There has been some research done on the same topic but it is mainly focused on class diagrams. My main focus will be on the use case diagrams, and sequence diagrams. Sequence diagrams give us the details of any process in a step-by-step fashion which makes it easier to extract the required information regarding the use cases and the controllers which help us generate the code. The process follows three steps, first being generation of UML diagrams. Secondly, these are converted into XMI (XML Metadata …
Security In Peer-To-Peer Sip Voip, Richa Marwaha
Security In Peer-To-Peer Sip Voip, Richa Marwaha
Master's Projects
VoIP (Voice over Internet Protocol) is one of the fastest growing technologies in the world. It is used by people all over the world for communication. But with the growing popularity of internet, security is one of the biggest concerns. It is important that the intruders are not able to sniff the packets that are transmitted over the internet through VoIP. Session Initiation Protocol (SIP) is the most popular and commonly used protocol of VoIP. Now days, companies like Skype are using Peer-to-Peer SIP VoIP for faster and better performance. Through this project I am improving an already existing Peer-to-Peer …
Exhaustive Statistical Analysis For Detection Of Metamorphic Malware, Aditya Govindaraju
Exhaustive Statistical Analysis For Detection Of Metamorphic Malware, Aditya Govindaraju
Master's Projects
Malware is a serious threat to the security of the system. With the widespread use of the World Wide Web, there has been a tremendous increase in virus attacks, making computer security an essential for every personal computer. The rat-race between virus writers and detectors has led to improved viruses and detection techniques. In recent years, metamorphic malwares have posed serious challenge to anti-virus writers. Current signature based detection techniques, heuristic based techniques are not comprehensive solutions. A formidable solution to detection of metamorphic malware is void. This paper investigates the problem of malware detection, specifically metamorphic malwares. The paper …
Document Builder, Thien Tran
Document Builder, Thien Tran
Master's Projects
In this paper, we consider problems related to on-demand content publishing and maintenance. Specifically, we are concerned with the recent concept of structural Content Management Systems (CMS) and its design principles. We focus on Apache Ant, a popular document generator tool for the Java development industry. However, Ant has not been widely extended beyond its capacity to deal with computer programs, which limits its utility. We analyze the Ant build script structure, study its usage, and implement an on-demand document generator for Ant. The focus is to provide a better document build model based on Ant, which can provide document …
Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
Master's Projects
WiSeNetor is a teaching and a research tool that simulates a scalable wireless sensor network on a single computer, based on the “Spamulator” (Aycock, J., Crawford, H., & deGraaf, R., 2008) which simulates the Internet on a single computer. Routing protocols and network discovery algorithms used in mesh networks and cluster tree networks can be demonstrated using this tool. WiSeNetor contains a network creation module, simulated network devices and it simulates routing algorithms. The network creation module spawns a network according to user specified network type, where the type can be a cluster tree or mesh. In this process, neighbor …
Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar
Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar
Master's Projects
Clustering is a popular method to glean useful information from microarray data. Unfortunately the results obtained from the common clustering algorithms are not consistent and even with multiple runs of different algorithms a further validation step is required. Due to absence of well defined class labels, and unknown number of clusters, the unsupervised learning problem of finding optimal clustering is hard. Obtaining a consensus of judiciously obtained clusterings not only provides stable results but also lends a high level of confidence in the quality of results. Several base algorithm runs are used to generate clusterings and a co-association matrix of …
Reliable Broadcasting In Vanet, Pat Jangyodsuk
Reliable Broadcasting In Vanet, Pat Jangyodsuk
Master's Projects
Vehicular Adhoc NETwork (VANET) is a rapid growing wireless ad-hoc network model where the vehicles play the nodes role in a network. Major application of VANET including hazard warning application requires effective broadcast mechanism. Typically, selection of the next relaying hop is the major problem in VANET broadcasting. To get the smallest propagational delay, the number of relaying hops must be minimize. Meanwhile, the transmission reliability must also be preserved. Both of these two constrains must be taken into consideration. However, these two aspects often collide to each other since increasing one of them always result in decreasing of another. …
Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah
Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah
Master's Projects
Metamorphic computer viruses change their structure—and thereby their signature—each time they infect a system. Metamorphic viruses are potentially one of the most dangerous types of computer viruses because they are difficult to detect using signature-based methods. Most anti-virus software today is based on signature detection techniques. In this project, we create and analyze a metamorphic virus toolkit which creates viruses with a built-in buffer overflow. The buffer overflow serves to obfuscate the entry point of the actual virus, thereby making detection more challenging. We show that the resulting viruses successfully evade detection by commercial virus scanners. Several modern operating systems …