Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 957

Full-Text Articles in Computer Sciences

Exploring The Shift In Player Enthusiasm Towards Games, David Daniel Dec 2023

Exploring The Shift In Player Enthusiasm Towards Games, David Daniel

ART 108: Introduction to Games Studies

Video games, providing a constant source of excitement have been an integral part of the lives of many enthusiasts, helping shape childhoods and providing a source of entertainment and social interaction between friends and strangers. From the joy of unboxing the Wii with siblings back in the day, all the way to playing multiplayer battle royales and among us with our friends over the pandemic, the gaming platform has been an ever changing and dynamic experience. However, with time, a noticeable split emerged among peers who once shared the same joy of running home and putting on the headset. Some …


An Analysis Of The Debate And How It Changed Everything: Narratology Vs. Ludology, Robert Veloya Dec 2023

An Analysis Of The Debate And How It Changed Everything: Narratology Vs. Ludology, Robert Veloya

ART 108: Introduction to Games Studies

Video games will rot your brain. Something that people have told us during its inception into the modern world; however, little did they know that the video game industry will one day take its place in the world as one of the best mediums to tell a story and challenge its audience. The video game industry is an ever-growing industry where innovation flows through its veins causing it to grow into a field that is more immersive and compelling. Video games have also evolved into a field of study, a discipline that dives deep into what makes them a unique …


From Pong To Narrative: The Evolution Of Ai In Gaming, Muhammad Assaf Dec 2023

From Pong To Narrative: The Evolution Of Ai In Gaming, Muhammad Assaf

ART 108: Introduction to Games Studies

As video games evolve, the role of artificial intelligence also referred to as AI has been essential. Games have come a long way from being small and having rudimentary logic to being extremely complex and narrative-driven. This research paper will dive into the vast history of AI in gaming, following its path from the simple ball-paddle mechanics of Pong, to the intricate entanglements presented in modern games such as Fortnite, Call of Duty, League of Legends, and more. The interplay between game design and AI development doesn’t just show how far we have come in technological advancement, but rather it …


Influence Of Pavement Conditions On Commercial Motor Vehicle Crashes, Stephen Arhin, Babin Manandhar, Adam Gatiba Dec 2023

Influence Of Pavement Conditions On Commercial Motor Vehicle Crashes, Stephen Arhin, Babin Manandhar, Adam Gatiba

Mineta Transportation Institute Publications

Commercial motor vehicle (CMV) safety is a major concern in the United States, including the District of Columbia (DC), where CMVs make up 15% of traffic. This research uses a comprehensive approach, combining statistical analysis and machine learning techniques, to investigate the impact of road pavement conditions on CMV accidents. The study integrates traffic crash data from the Traffic Accident Reporting and Analysis Systems Version 2.0 (TARAS2) database with pavement condition data provided by the District Department of Transportation (DDOT). Data spanning from 2016 to 2020 was collected and analyzed, focusing on CMV routes in DC. The analysis employs binary …


Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks Nov 2023

Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks

Mineta Transportation Institute Publications

There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …


What You Don't See: The Impact Of Hidden Game Mechanics On Players, Jan Virsunen Apr 2023

What You Don't See: The Impact Of Hidden Game Mechanics On Players, Jan Virsunen

ART 108: Introduction to Games Studies

Since the rise of technology in the early nineteen sixties the art of gaming became an increasingly popular form of entertainment for many people throughout the years. As time progressed so did the advancements in technology which allowed for video games to become more immersive, captivating, and complex. Due to these advancements in tech, it generated a wide variety of ways for developers to increase game complexities. However, as the complexity of video games has increased, so too has the number of hidden game mechanics. These game mechanics are seen as the underlying systems and rules that govern how the …


Vehicle-Based Disconnected Data Distribution, Aditya Singhania Jan 2023

Vehicle-Based Disconnected Data Distribution, Aditya Singhania

Master's Projects

The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks

(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …


Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara Jan 2023

Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara

Master's Projects

Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …


Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He Jan 2023

Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He

Master's Projects

Nakamoto’s Bitcoin is the first decentralized digital cash system that utilizes a blockchain to manage transactions in its peer-to-peer network. The newer generation of blockchain systems, including Ethereum, extend their capabilities to support deployment of smart contracts within their peer-to-peer networks. However, smart contracts cannot acquire data from sources outside the blockchain since the blockchain network is isolated from the outside world. To obtain data from external sources, smart contracts must rely on Oracles, which are agents that bring data from the outside world to a blockchain network. However, guaranteeing that the oracle’s off-chain nodes are trustworthy remains a challenge. …


Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik Jan 2023

Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik

Master's Projects

Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.

This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …


Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada Jan 2023

Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada

Master's Projects

With the widespread use of web applications across the globe, and the ad- vancements in web technologies in recent years, these applications have grown more ubiquitous and sophisticated than ever before. Modern web applications face the constant threat of numerous web security risks given their presence on the internet and the massive influx of data from external sources. This paper presents a novel method for analyzing taint through type-checking and applies it to web applications in the context of preventing online security threats. The taint analysis technique is implemented in TypeScript using its built-in type-checking features, and then integrated into …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


Insecure Deserialization Detection In Python, Aneesh Verma Jan 2023

Insecure Deserialization Detection In Python, Aneesh Verma

Master's Projects

The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …


Macruby: User Defined Macro Support For Ruby, Arushi Singh Jan 2023

Macruby: User Defined Macro Support For Ruby, Arushi Singh

Master's Projects

Ruby does not have a way to create custom syntax outside what the language already offers. Macros allow custom syntax creation. They achieve this by code generation that transforms a small set of instructions into a larger set of instructions. This gives programmers the opportunity to extend the language based on their own custom needs.

Macros are a form of meta-programming that helps programmers in writing clean and concise code. MacRuby is a hygienic macro system. It works by parsing the Abstract Syntax Tree(AST) and replacing macro references with expanded Ruby code. MacRuby offers an intuitive way to declare macro …


Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah Jan 2023

Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah

Master's Projects

In recent years, social cognitive theory has emphasized the role of cognitive processes in shaping perceptions and behavior related to gender bias. By examining the impact of targeted training interventions, this study seeks to better understand the influence of such processes on decision-making in the context of character selection. This human-computer interaction study explores the potential of intervention-based training to untraining gender bias in character selection. With an increasing need to address gender bias in various domains, understanding the impact of gender-based training becomes crucial. According to our hypothesis, exposure to masculine characters would boost people’s preference for female- intellectualized …


A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde Jan 2023

A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde

Master's Projects

Previous attempts to bring the data of the internet to environments that do not have continuous connectivity to the internet have made use of special hardware which requires additional expenditure on installation. We will develop a software-based infrastructure running on existing Android smartphones to exchange application data between a disconnected user’s phone and corresponding application servers on the internet. The goal of this project is to implement client and server modules for this infrastructure to run on a disconnected phone and the internet respectively. These modules will multiplex application data to be sent into packages and distribute the data present …


High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru Jan 2023

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru

Master's Projects

Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …


Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana Jan 2023

Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana

Master's Projects

Road accidents occur frequently due to driving distractions all around the world. A driving simulator has been created to explore the cognitive effects of distractions while driving in order to address this problem. The purpose of this study is to discover the distraction-causing elements and how they affect driving performance. The simulator offers a secure and regulated setting for carrying out tests while being distracted by different visual distractions, such as solving mathematical equations and number memorizations.

Several trials have been conducted in the studies, which were carried out under varied circumstances like varying driving sceneries and by displaying different …


Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar Jan 2023

Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar

Master's Projects

Botnet is a network of infected computer systems called bots managed remotely by an attacker using bot controllers. Using distributed systems, botnets can be used for large-scale cyber attacks to execute unauthorized actions on the targeted system like phishing, distributed denial of service (DDoS), data theft, and crashing of servers. Common internet protocols used by normal systems for regular communication like hypertext transfer (HTTP) and internet relay chat (IRC) are also used by botnets. Thus, distinguishing botnet activity from normal activity can be challenging. To address this issue, this project proposes an approach to detect botnets using peculiar traits in …


Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani Jan 2023

Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani

Master's Projects

Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …


Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla Jan 2023

Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla

Master's Projects

This pilot study used a driving simulator experiment to look into how podcast consumption affects driving performance as a continuous distraction. Three volunteers conducted three trials in the study, each with a different driving scenario. Data analysis was done to compare two conditions. The first condition is the Audio, where volunteers listen to podcasts while driving. The second condition is no-audio condition.. The no-audi condition had nothing to play in the background. We used eye-tracking technology to gather gaze data. The study's findings using the post survey and eye fixation data indicate that listening to podcasts leads to continuous distraction …


The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta Jan 2023

The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta

Master's Projects

EBooks are a form of multimedia applications that encourage cognitive learning. Multimedia can also influence readers to have a deeper connection to the story. Understanding the influence of a static picture book versus an animated and audio guided eBook can prove valuable in developing learning media and other forms of content. In this research we take a published children's book and apply the content into a multimedia eBook. The purpose of the creation of the eBook is to compare the interest of a reader on a story when static format, when some multimedia is added and when the story is …


Automated Evaluation For Distributed System Assignments, Nimesh Nischal Jan 2023

Automated Evaluation For Distributed System Assignments, Nimesh Nischal

Master's Projects

A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …


Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala Jan 2023

Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala

Master's Projects

Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …


Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade Jan 2023

Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade

Master's Projects

Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …


Codeval, Aditi Agrawal Jan 2023

Codeval, Aditi Agrawal

Master's Projects

Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong Jan 2023

Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong

Master's Projects

Sign language recognition (SLR) has long been a studied subject and research field within the Computer Vision domain. Appearance-based and pose-based approaches are two ways to tackle SLR tasks. Various models from traditional to current state-of-the-art including HOG-based features, Convolutional Neural Network, Recurrent Neural Network, Transformer, and Graph Convolutional Network have been utilized to tackle the area of SLR. While classifying alphabet letters in sign language has shown high accuracy rates, recognizing words presents its set of difficulties including the large vocabulary size, the subtleties in body motions and hand orientations, and regional dialects and variations. The emergence of deep …


Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee Jan 2023

Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee

Master's Projects

Coral Reefs and their diverse array of life forms play a vital role in maintaining the health of our planet's environment. However, due to their fragility, it can be challenging to study the reefs without damaging their delicate ecosystem. To address this issue, researchers have employed non-invasive methods such as using Autonomous Reef Monitoring Structures (ARMS) plates to monitor biodiversity. Data was collected as genetic samples from the plates, and high-resolution photographs were taken. To make the best use of this image data, scientists have turned to machine learning and computer vision. Prior to this study, MASKR-CNN was utilized as …


Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy Jan 2023

Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy

Master's Projects

Deep learning is one of the most advanced machine learning techniques, and its prominence has increased in recent years. Language processing, predictions in medical research and pattern recognition are few of the numerous fields in which it is widely utilized. Numerous modern medical applications benefit greatly from the implementation of machine learning (ML) models and the disruptive innovations in the entire modern health care system. It is extensively used for constructing accurate and robust statistical models from large volumes of medical data collected from a variety of sources in contemporary healthcare systems [1]. Due to privacy concerns that restrict access …