Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 267

Full-Text Articles in Physical Sciences and Mathematics

Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar Jan 2023

Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar

Master's Projects

Facial expression recognition (FER) has been a challenging task in computer vision for decades. With recent advancements in deep learning, convolutional neural networks (CNNs) have shown promising results in this field. However, the accuracy of FER using CNNs heavily relies on the quality of the input images and the size of the dataset. Moreover, even in pictures of the same person with the same expression, brightness, backdrop, and stance might change. These variations are emphasized when comparing pictures of individuals with varying ethnic backgrounds and facial features, which makes it challenging for deep-learning models to classify. In this paper, we …


Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen Jan 2023

Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen

Master's Projects

Machine translation (MT) aims to translate texts with minimal human involvement, and the utilization of machine learning methods is pivotal to its success. Sentence-level and paragraph-level translations were well-explored in the past decade, such as the Transformer and its variations, but less research was done on the document level. From reading a piece of news in a different language to trying to understand foreign research, document-level translation can be helpful.

This project utilizes a hierarchical attention (HAN) mechanism to abstract context information making document-level translation possible. It further utilizes the Big Bird attention mask in the hope of reducing memory …


Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang Jan 2023

Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang

Master's Projects

As machine learning and deep learning models become ubiquitous, it is inevitable that there will be attempts to exploit such models in various attack scenarios. For example, in a steganographic based attack, information would be hidden in a learning model, which might then be used to gain unauthorized access to a computer, or for other malicious purposes. In this research, we determine the steganographic capacity of various classic machine learning and deep learning models. Specifically, we determine the number of low-order bits of the trained parameters of a given model that can be altered without significantly affecting the performance of …


Keystroke Dynamics And User Identification, Atharva Sharma Jan 2023

Keystroke Dynamics And User Identification, Atharva Sharma

Master's Projects

We consider the potential of keystroke dynamics for user identification and authentication. We work with a fixed-text dataset, and focus on clustering users based on the difficulty of distinguishing their typing characteristics. After obtaining a confusion matrix, we cluster users into different levels of classification difficulty based on their typing patterns. Our goal is to create meaningful clusters that enable us to apply appropriate authentication methods to specific user clusters, resulting in an optimized balance between security and efficiency. We use a novel feature engineering method that generates image-like features from keystrokes and employ multiclass Convolutional Neural Networks (CNNs) to …


Spam Comments Detection In Youtube Videos, Priyusha Kotta Jan 2023

Spam Comments Detection In Youtube Videos, Priyusha Kotta

Master's Projects

This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …


Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare Jan 2023

Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare

Master's Projects

Deep neural networks have gained popularity and achieved high performance across multiple domains like medical decision-making, autonomous vehicles, decision support systems, etc. Despite this achievement, the internal workings of these models are opaque and are considered as black boxes due to their nested and non-linear structure. This opaque nature of the deep neural networks makes it difficult to interpret the reason behind their output, thus reducing trust and verifiability of the system where these models are applied. This paper explains a systematic approach to identify the clusters with most misclassifications or false label annotations. For this research, we extracted the …


Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham Jan 2023

Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham

Master's Projects

The volume of air traffic is increasing exponentially every day. The Air Traffic Control (ATC) at the airport has to handle aircraft runway assignments for landing and takeoff and airspace maintenance by directing passing aircraft through the airspace safely. If any aircraft is facing a technical issue or problem and is in a state of emergency, it requires expedited landing to respond to that emergency. The ATC gives this aircraft priority to landing and assistance. This process is very strenuous as the ATC has to deal with multiple aspects along with the emergency aircraft. It is the duty of the …


Explainable Ai For Android Malware Detection, Maithili Kulkarni Jan 2023

Explainable Ai For Android Malware Detection, Maithili Kulkarni

Master's Projects

Android malware detection based on machine learning (ML) is widely used by the mobile device security community. Machine learning models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such models make decisions. As a result, popular malware detection strategies remain black box models, which may result in a lack of accountability and trust in the decisions made. The field of explainable artificial intelligence (XAI) attempts to shed light on such black box models. In this research, we apply XAI techniques to ML-based Android malware detection systems. We train classic ML models …


Deep Learning Neural Machine Translation Conversational Agent, Abhishek Vaid Jan 2023

Deep Learning Neural Machine Translation Conversational Agent, Abhishek Vaid

Master's Projects

Neural Machine Translation (NMT) is a prominent natural language processing technique that is being used to develop conversational AI technology. However, most chatbots do not provide live API features and have list-based scripted responses. Most chatbots are majorly restricted by the training data on which they were trained on and have no knowledge of current events. This research project intends to research and develop an approach to providing live information. We experiment with various techniques in terms of the type of data being used to harness live capabilities. We optimize the hyperparameters that are needed for a Conversational AI agent …


Relationalnet Using Graph Neural Networks For Social Recommendations, Dharahas Tallapally Jan 2023

Relationalnet Using Graph Neural Networks For Social Recommendations, Dharahas Tallapally

Master's Projects

Traditional recommender systems create models that can predict user interests based on the user-item relationships. However, these systems often have limited performance due to sparse user behavior data. To address this challenge, researchers are now exploring models for social recommendation that can account for both user- user and user-item relationships based on social networks, and user past behavior, respectively. These models aim to understand each user’s behavior by considering their trusted neighbors and their influence on each other. Specifically, the potential embedding of each user is influenced by their trusted neighbors, who are, in turn, influenced by their own trusted …


Base Station Load Prediction In 5g-V2x Handover, Madhujita Ranjit Ambaskar Jan 2023

Base Station Load Prediction In 5g-V2x Handover, Madhujita Ranjit Ambaskar

Master's Projects

5G V2X networks transmit large amounts of data with low latency, allowing for real-time communication between vehicles and other infrastructure. In 5G V2X networks, handover is a process that allows a connected vehicle to transfer its con- nection from one base station to another as it moves through the network coverage area. Handover is critical to maintaining the quality of service (QoS) and ensuring uninterrupted communication. The base station load is a critical factor in ensuring reliable and efficient 5G V2X connectivity. Prediction of traffic load on base stations ensure resource optimization and smooth connectivity during handovers. This research predicts …


Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi Jan 2023

Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi

Master's Projects

With the advances in technology, image classification has become one of the core areas of interest for researchers in the field of computer vision. We, humans, experience great levels of visuals in our day-to-day lives. The human eye is a powerful tool that not only lets us capture images around us but also aids in remembering, distinguishing, and interpreting these visuals. Comprehending the images that the user perceives is an important application in the fields of artificial intelligence, smart security systems, and areas of virtual reality. Recent advances in machine learning and neural networks have led to more precise and …


Hate Speech Detection In Hindi, Pranjali Prakash Bansod Jan 2023

Hate Speech Detection In Hindi, Pranjali Prakash Bansod

Master's Projects

Social media is a great place to share one’s thoughts and to express oneself. Very often the same social media platforms become a means for spewing hatred.The large amount of data being shared on these platforms make it difficult to moderate the content shared by users. In a diverse country like India hate is present on social media in all regional languages, making it even more difficult to detect hate because of a lack of enough data to train deep/ machine learning models to make them understand regional languages.This work is our attempt at tackling hate speech in Hindi. We …


Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale Jan 2023

Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale

Master's Projects

Machine translation presents its root in the domain of textual processing that focuses on the usage of computer software for the purpose of translation of sentences. Neural machine translation follows the same idea and integrates machine learning with the help of neural networks.Various techniques are being explored by researchers and are famously used by Google Translate, Bing Microsoft Translator, Deep Translator, etc. However, these neural machine translation techniques do not incorporate the context of the sentences and are only determined by the phrasesor sentence structure. This report explores the neural machine translation technique dedicated to context-aware translations. It also provides …


Machine Learning To Predict Sports-Related Concussion Recovery Using Clinical Data, Yan Chu, Gregory Knell, Riley P. Brayton, Scott O. Burkhart, Xiaoqian Jiang, Shayan Shams Feb 2022

Machine Learning To Predict Sports-Related Concussion Recovery Using Clinical Data, Yan Chu, Gregory Knell, Riley P. Brayton, Scott O. Burkhart, Xiaoqian Jiang, Shayan Shams

Faculty Research, Scholarly, and Creative Activity

Objectives
Sport-related concussions (SRCs) are a concern for high school athletes. Understanding factors contributing to SRC recovery time may improve clinical management. However, the complexity of the many clinical measures of concussion data precludes many traditional methods. This study aimed to answer the question, what is the utility of modeling clinical concussion data using machine-learning algorithms for predicting SRC recovery time and protracted recovery?
Methods
This was a retrospective case series of participants aged 8 to 18 years with a diagnosis of SRC. A 6-part measure was administered to assess pre-injury risk factors, initial injury severity, and post-concussion symptoms, including …


Robustness Of Image-Based Malware Analysis, Katrina Tran Jan 2022

Robustness Of Image-Based Malware Analysis, Katrina Tran

Master's Projects

Being able to identify malware is important in preventing attacks. Image-based malware analysis is the study of images that are created from malware. Analyzing these images can help identify patterns in malware families. In previous work, "gist descriptor" features extracted from images have been used in malware classification problems and have shown promising results. In this research, we determine whether gist descriptors are robust with respect to malware obfuscation techniques, as compared to Convolutional Neural Networks (CNN) trained directly on malware images. Using the Python Image Library, we create images from malware executables and from malware that we obfuscate. We …


Abstractive Text Summarization For Tweets, Siyu Chen Jan 2022

Abstractive Text Summarization For Tweets, Siyu Chen

Master's Projects

In the high-tech age, we can access a vast number of articles, information, news, and opinion online. The wealth of information allows us to learn about the topics we are interested in more easily and cheaply, but it also requires us to spend an enormous amount of time reading online. Text summarization can help us save a lot of reading time so that we can know more information in a shorter period. The primary goal of text summarization is to shorten the text while including as much vital information as possible in the original text so fewer people use this …


Caption And Image Based Next-Word Auto-Completion, Meet Patel Jan 2022

Caption And Image Based Next-Word Auto-Completion, Meet Patel

Master's Projects

With the increasing number of options or choices in terms of entities like products, movies, songs, etc. which are now available to users, they try to save time by looking for an application or system that provides automatic recommendations. Recommender systems are automated computing processes that leverage concepts of Machine Learning, Data Mining and Artificial Intelligence towards generating product recommendations based on a user’s preferences. These systems have given a significant boost to businesses across multiple segments as a result of reduced human intervention. One similar aspect of this is content writing. It would save users a lot of time …


Multi-Step Prediction Using Tree Generation For Reinforcement Learning, Kevin Prakash Jan 2022

Multi-Step Prediction Using Tree Generation For Reinforcement Learning, Kevin Prakash

Master's Projects

The goal of reinforcement learning is to learn a policy that maximizes a reward function. In some environments with complete information, search algorithms are highly useful in simulating action sequences in a game tree. However, in many practical environments, such effective search strategies are not applicable since their state transition information may not be available. This paper proposes a novel method to approximate a game tree that enables reinforcement learning to use search strategies even in incomplete information environments. With an approximated game tree, the agent predicts all possible states multiple steps into the future and evaluates the states to …


Darknet Traffic Classification, Nhien Rust-Nguyen Jan 2022

Darknet Traffic Classification, Nhien Rust-Nguyen

Master's Projects

The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the detection of darknet traffic to block these criminal activities. This research aims to improve darknet traffic detection by assessing Support Vector Machines (SVM), Random Forest (RF), Convolutional Neural Networks (CNN) and Auxiliary-Classifier Generative Adversarial Networks (AC-GAN) for classification of network traffic and the underlying application types. We find that our RF model outperforms the state-of-the-art machine learning techniques used by prior work with the CIC-Darknet2020 dataset. To evaluate the robustness of our RF classifier, we degrade …


Predicting Externally Visible Traits From A Dna Sample For Law Enforcement Applications, Niraj Pandkar Jan 2022

Predicting Externally Visible Traits From A Dna Sample For Law Enforcement Applications, Niraj Pandkar

Master's Projects

A large majority of crimes such as homicides, sexual assaults and missing person cases are not solved within a reasonable timeframe and become cold cases. The ability to predict visual appearance and ancestry from a DNA sample will provide an unprecedented advancement in such criminal investigations. DNA based prediction of craniofacial features, phenotypes and ancestry can be used to reduce the pool of candidates onto which to perform further investigations. To achieve the above goal, it is first essential to substantiate, model and measure the intrinsic relationship between the genomic markers and phenotypic features. The first step is to standardize …


Improving User Experiences For Wiki Systems, Parth Patel Jan 2022

Improving User Experiences For Wiki Systems, Parth Patel

Master's Projects

Wiki systems are web applications that allow users to collaboratively manage the content. Such systems enable users to read and write information in the form of web pages and share media items like videos, audios, books etc. Yioop is an open-source web portal with features of a search engine, a wiki system and discussion groups. In this project I have enhanced Yioop’s features for improving the user experiences. The preliminary work introduced new features like emoji picker tool for direct messaging system, unit testing framework for automating the UI testing of Yioop and redeeming advertisement credits back into real money. …


A Study On Human Face Expressions Using Convolutional Neural Networks And Generative Adversarial Networks, Sriramm Muthyala Sudhakar Jan 2022

A Study On Human Face Expressions Using Convolutional Neural Networks And Generative Adversarial Networks, Sriramm Muthyala Sudhakar

Master's Projects

Human beings express themselves via words, signs, gestures, and facial emotions. Previous research using pre-trained convolutional models had been done by freezing the entire network and running the models without the use of any image processing techniques. In this research, we attempt to enhance the accuracy of many deep CNN architectures like ResNet and Senet, using a variety of different image processing techniques like Image Data Generator, Histogram Equalization, and UnSharpMask. We used FER 2013, which is a dataset containing multiple classes of images. While working on these models, we decided to take things to the next level, and we …


Cloud Provisioning And Management With Deep Reinforcement Learning, Alexandru Tol Jan 2022

Cloud Provisioning And Management With Deep Reinforcement Learning, Alexandru Tol

Master's Projects

The first web applications appeared in the early nineteen nineties. These applica- tions were entirely hosted in house by companies that developed them. In the mid 2000s the concept of a digital cloud was introduced by the then CEO of google Eric Schmidt. Now in the current day most companies will at least partially host their applications on proprietary servers hosted at data-centers or commercial clouds like Amazon Web Services (AWS) or Heroku.

This arrangement seems like a straight forward win-win for both parties, the customer gets rid of the hassle of maintaining a live server for their applications and …


Whole File Chunk Based Deduplication Using Reinforcement Learning, Xincheng Yuan Jan 2022

Whole File Chunk Based Deduplication Using Reinforcement Learning, Xincheng Yuan

Master's Projects

Deduplication is the process of removing replicated data content from storage facilities like online databases, cloud datastore, local file systems, etc., which is commonly performed as part of data preprocessing to eliminate redundant data that requires unnecessary storage spaces and computing power. Deduplication is even more specifically essential for file backup systems since duplicated files will presumably consume more storage space, especially with a short backup period like daily [8]. A common technique in this field involves splitting files into chunks whose hashes can be compared using data structures or techniques like clustering. In this project we explore the possibility …


Contextualized Vector Embeddings For Malware Detection, Vinay Pandya Jan 2022

Contextualized Vector Embeddings For Malware Detection, Vinay Pandya

Master's Projects

Malware classification is a technique to classify different types of malware which form an integral part of system security. The aim of this project is to use context dependant word embeddings to classify malware. Tansformers is a novel architecture which utilizes self attention to handle long range dependencies. They are particularly effective in many complex natural language processing tasks such as Masked Lan- guage Modelling(MLM) and Next Sentence Prediction(NSP). Different transfomer architectures such as BERT, DistilBert, Albert, and Roberta are used to generate context dependant word embeddings. These embeddings would help in classifying different malware samples based on their similarity …


Faking Sensor Noise Information, Justin Chang Jan 2022

Faking Sensor Noise Information, Justin Chang

Master's Projects

Noise residue detection in digital images has recently been used as a method to classify images based on source camera model type. The meteoric rise in the popularity of using Neural Network models has also been used in conjunction with the concept of noise residuals to classify source camera models. However, many papers gloss over the details on the methods of obtaining noise residuals and instead rely on the self- learning aspect of deep neural networks to implicitly discover this themselves. For this project I propose a method of obtaining noise residuals (“noiseprints”) and denoising an image, as well as …


Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns, Devinesh Singh Jan 2022

Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns, Devinesh Singh

Master's Projects

CoV-2 pandemic prompted lockdown measures to be implemented worldwide; these directives were implemented nationwide to stunt the spread of the infection. Throughout the lockdowns, millions of individuals resorted to social media for entertainment, communicate with friends and family, and express their opinions about the pandemic. Simultaneously, social media aided in the dissemination of misinformation, which has proven to be a threat to global health. Sentiment analysis, a technique used to analyze textual data, can be used to gain an overview of public opinion behind CoV-2 from Twitter and TikTok. The primary focus of the project is to build a deep …


Graph Neural Networks For Malware Classification, Vrinda Malhotra Jan 2022

Graph Neural Networks For Malware Classification, Vrinda Malhotra

Master's Projects

Malware is a growing threat to the digital world. The first step to managing this threat is malware detection and classification. While traditional techniques rely on static or dynamic analysis of malware, the generation of these features requires expert knowledge. Function call graphs (FCGs) consist of program functions as their nodes and their interprocedural calls as their edges, providing a wealth of knowledge that can be utilized to classify malware without feature extraction that requires experts. This project treats malware classification as a graph classification problem, setting node features using the Local Degree Profile (LDP) model and using different graph …


Gesture Recognition Using Neural Networks, Ashwini Kurady Jan 2022

Gesture Recognition Using Neural Networks, Ashwini Kurady

Master's Projects

The advances in technology have brought in a lot of changes in the way humans go about their lives. This has enhanced the significance of Artificial Neural Networks and Computer Vision- based interactions with the world. Gesture Recognition is one of the major focus areas in Computer Vision. This involves Human Computer Interfaces (HCI) that would capture and understand human actions. In this project, we will explore how Neural Network concepts can be applied in this challenging field of Computer Vision. By leveraging the latest research for Gesture Recognition, we researched on how to capture the movement across different frames …