Identifying the most relevant items in an e-commerce site is becoming more and more
difficult nowadays because of the heavy overload of information. A Java Recommender
System that uses Collaborative Filtering techniques has been developed to reduce such
information overload and even personalize the information to the individual’s preference.
The...
GEM-GIS is a prototype of a web-based GIS/Database application for managing a germplasm collection. This application include a database, a map interface, a set of web forms for database access, and an analysis module. The analysis module perform statistical analysis for the accessions of a species selected by the user...
Accreditation Board for Engineering and Technology, Inc. (ABET) is the primary organization responsible for monitoring, evaluating and certifying the quality of engineering, engineering technology, computing and applied sciences education in the United States. In 2000, ABET changed the way computer science (and engineering) programs are accredited from a ‘checklist’ approach...
"A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. Furthermore, the advantage of redundant number system lies in its application for...
In this report, I first introduce three areas of interest to collaborative filtering researchers, namely: (a) how to solve the sparsity and scalability problems in recommendation systems; (b) how to rapidly develop and test collaborative filtering algorithms; and (c) how to apply collaborative filtering to unbounded numeric preference data. In...
Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has proposed a timing attack on smart card devices. We implemented this attack based on the same approach for RSA...
Personalization is defined as a process that facilitates interaction among consumers and providers such that individual consumers are enabled to more readily access the content and services of providers, and individual providers are enabled to more effectively and easily deliver their content and services to consumers. This project presents a...
This paper discusses Java Bytecode Obfuscation techniques that make the reverse engineering task more difficult. This paper is structured as follows: Java virtual machine and Java language specifications are discussed first. Then the paper talks about different techniques for protecting software and then details one promising approach named Obfuscation. The...
Shape transformation is a technique for gradually changing one geometric shape to another. A recent approach presents the use of thin-plate radial basis functions as opposed to traditional "blobby sphere" implicit functions. Without the explicit evaluation of he energy function, this approach combined the two traditional steps into one by...
Statistics and Metrics Generator (SMG), is a software tool that gathers, stores and reports
performance and execution metrics for a web-based software installation process. The
purpose of this project was to develop a software utility that provides feedback about software
download and installation process efficiency. A web-based software installation is...