Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 32
Full-Text Articles in Physical Sciences and Mathematics
Repetitive Component Based Motion Learning With Kinect, Govind Kalyankar
Repetitive Component Based Motion Learning With Kinect, Govind Kalyankar
Master's Projects
Today’s world wants quick, smart and cost effective solutions to their problems. People want to learn everything online. They are interested in learning new techniques and every kind of art in a limited amount of time because they are busy with their own work and have very short time to take in class instructor led training. This is an attempt to fulfill the same so that the people can easily learn and master a new kind of art by themselves by using Kinect. The focus of this project is to master Kung-Fu, an ancient form of Chinese Martial Arts. Kung-Fu …
Hidden Markov Models For Malware Classification, Chinmayee Annachhatre
Hidden Markov Models For Malware Classification, Chinmayee Annachhatre
Master's Projects
Malware is a software which is developed for malicious intent. Malware is a rapidly evolving threat to the computing community. Although many techniques for malware classification have been proposed, there is still the lack of a comprehensible and useful taxonomy to classify malware samples. Previous research has shown that hidden Markov model (HMM) analysis is useful for detecting certain types of malware. In this research, we consider the related problem of malware classification based on HMMs. We train HMMs for a variety of malware generators and a variety of compilers. More than 9000 malware samples are then scored against each …
San José State University Building Editor, Viet Trinh
San José State University Building Editor, Viet Trinh
Master's Projects
The San José State University (SJSU) Building Editor is a graphic application that renders the SJSU architectures in a multidimensional space and simulates the flows of people evacuating in the buildings under different circumstances. For a given building, the goals of this application are to analyze a density of people on each floor, to predict bottlenecks in each structure, and to simulate an optimal evacuation plan in case of an emergency for selected SJSU buildings that are visualized in multidimensional models. This report describes in detail functionalities of the application, studies key points in its implementation, and analyzes the application’s …
Determining Spread Of Diseases Using Social Networking Data, Jiten P. Oswal
Determining Spread Of Diseases Using Social Networking Data, Jiten P. Oswal
Master's Projects
“Hi, in a weeks, there will be high possibility you may get infected by flu. Please go to take a flu shot.” – This is a sample warning to some users in Twitter about the spreading of flu to people from specific location. Twitter may already be used to plan social lives, interact with celebrities and communicate with friends. But now data from the social networking sites could have a far more serious use like tracking diseases and learning about their spread. Using this kind of data, I will help Health Agencies to personalize the prediction and warn the general …
Metamorphic Detection Using Function Call Graph Analysis, Prasad Deshpande
Metamorphic Detection Using Function Call Graph Analysis, Prasad Deshpande
Master's Projects
Well-designed metamorphic malware can evade many commonly used malware detection techniques including signature scanning. In this research, we consider a score based on function call graph analysis. We test this score on several challenging classes of metamorphic malware and we show that the resulting detection rates yield an improvement over previous research.
Higher Order Pwm For Modeling Transcription Factor Binding Sites, Dhivya Srinivasan
Higher Order Pwm For Modeling Transcription Factor Binding Sites, Dhivya Srinivasan
Master's Projects
Traditional Position Weight Matrices (PWMs) that are used to model Transcription Factor Binding Sites (TFBS) assume independence among different positions in the binding site. In reality, this may not necessarily be the case. A better way to model TFBS is to consider the distribution of dinucleotides or trinucleotides instead of just mononucleotides, thus taking neighboring nucleotides into account. We can therefore, extend the single nucleotide PWM to a dinucleotide PWM or an even higher-order PWM to correctly estimate the dependencies among the nucleotides in a given sequence. The purpose of this project is to develop an algorithm to implement higher-order …
Compression-Based Analysis Of Metamorphic Malware, Jared Lee
Compression-Based Analysis Of Metamorphic Malware, Jared Lee
Master's Projects
Recent work has presented a technique based on structural entropy measurement as an effective way to detect metamorphic malware. The technique uses two steps, file segmentation and sequence comparison, to calculate file similarity. In another previous work, it was observed that similar malware have similar measures of Kolmogorov complexity. A proposed method of estimating Kolmogorov complexity was to calculate the compression ratio of a given malware which could then be used to cluster the malicious software. Malware detection has also been attempted through the use of adaptive data compression and showed promising results. In this paper, we attempt to combine …
Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam
Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam
Master's Projects
Metamorphic malware changes its internal structure with each infection, while maintaining its original functionality. Such malware can be difficult to detect using static techniques, since there may be no common signature across infections. In this research we apply a score based on Singular Value Decomposition (SVD) to the problem of metamorphic detection. SVD is a linear algebraic technique which is applicable to a wide range of problems, including facial recognition. Previous research has shown that a similar facial recognition technique yields good results when applied to metamorphic malware detection. We present experimental results and we analyze the effectiveness and efficiency …
Pattern Discovery Of Sequential Symbolic Data Using Automata With An Application To Author Identification, Nikhil Kalantri
Pattern Discovery Of Sequential Symbolic Data Using Automata With An Application To Author Identification, Nikhil Kalantri
Master's Projects
Author Identification is the process of identifying a piece of text to ascertain if it has an inherent writing style or pattern based on a certain author. Almost all literary books can be accredited to a certain author since it has been signed. However, there also exist a plethora of unfinished books or manuscripts that could be attributed to a range of possible authors. For example, William Shakespeare has written many plays that have not been signed by him. In order to assess the importance of such texts that do not bear the authors signature, it could be vital to …
Pattern Recognition Of Dna Sequences Using Automata With Application To Species Distinction, Parnika P. Achrekar
Pattern Recognition Of Dna Sequences Using Automata With Application To Species Distinction, Parnika P. Achrekar
Master's Projects
"Darwin wasn't just provocative in saying that we descend from the apes—he didn't go far enough, we are apes in every way, from our long arms and tailless bodies to our habits and temperament." said Frans de Waal, a primate scientist at Emory University in Atlanta, Georgia. 1.3 million Species have been named and analyzed by scientists. This project focuses on capturing various nucleotide sequences of various species and determining the similarity and differences between them. Finite state automata have been used to accomplish this. The automata for a DNA genome is created using Alergia algorithm and is used as …
Access Control In A Social Networking Environment, Mallika Perepa
Access Control In A Social Networking Environment, Mallika Perepa
Master's Projects
Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point was Yioop [1], a PHP-based search engine. The ability to create social groups was added to Yioop. The Grouping feature is enhanced by adding additional features like: blogs and pages for each individual user and as well as for groups of users. Access control is provided to every group and each user within a group based on the ownership of the group or …
Motion Learning With Biomechanics Principles, Jing Sun
Motion Learning With Biomechanics Principles, Jing Sun
Master's Projects
This project gets the advantage of both biomechanics analysis and Kinect motion capturing, and develops a sports improvement solution with coaching evaluation. It focuses on sample movement patterns to do data quantity and quality analysis. And by combining with professional dedicated bio-mechanical principles, it is able to implement real time motion tracking, coaching and evaluation while motion capturing. We calculate some basic but important parameters from captured motion data, such as the rotation and translation of body segments, and then analyze motion flaws that hid behind it. So a deterministic model for specific movement pattern can be constructed as a …
Predicting Product Review Helpfulness Using Machine Learning And Specialized Classification Models, Scott Bolter
Predicting Product Review Helpfulness Using Machine Learning And Specialized Classification Models, Scott Bolter
Master's Projects
In this paper we focus on automatically classifying product reviews as either helpful or unhelpful using machine learning techniques, namely, SVM classifiers. Using LIBSVM and a set of Amazon product reviews from 25 product categories, we train models for each category to determine if a review will be helpful or unhelpful. Previous work has focused on training one classifier for all reviews in the data set, but we hypothesize that a distinct model for each of the 25 product types available in the review dataset will improve the accuracy of classification. ! Furthermore, we develop a framework to inform authors …
Cloud Storage Performance And Security Analysis With Hadoop And Gridftp, Wei-Li Liu
Cloud Storage Performance And Security Analysis With Hadoop And Gridftp, Wei-Li Liu
Master's Projects
Even though cloud server has been around for a few years, most of the web hosts today have not converted to cloud yet. If the purpose of the cloud server is distributing and storing files on the internet, FTP servers were much earlier than the cloud. FTP server is sufficient to distribute content on the internet. Therefore, is it worth to shift from FTP server to cloud server? The cloud storage provider declares high durability and availability for their users, and the ability to scale up for more storage space easily could save users tons of money. However, does it …
Recommendation System For News Reader, Shweta Athalye
Recommendation System For News Reader, Shweta Athalye
Master's Projects
Recommendation Systems help users to find information and make decisions where they lack the required knowledge to judge a particular product. Also, the information dataset available can be huge and recommendation systems help in filtering this data according to users‟ needs. Recommendation systems can be used in various different ways to facilitate its users with effective information sorting. For a person who loves reading, this paper presents the research and implementation of a Recommendation System for a NewsReader Application using Android Platform. The NewsReader Application proactively recommends news articles as per the reading habits of the user, recorded over a …
Entropy And State Visualization For Automation Design And Evaluation Prototyping Toolset, Rohit Deshmukh
Entropy And State Visualization For Automation Design And Evaluation Prototyping Toolset, Rohit Deshmukh
Master's Projects
Automation Design and Evaluation Prototyping Toolset (ADEPT) is a plugin developed on the Eclipse Rich Client Platform(RCP). ADEPT can be used by domain expert designers to create and modify testable prototypes. The aim of the project is to enhance ADEPT by adding dynamic visualizations to the ADEPT user interface. Three types of visualizations are implemented in this project. Table view is helpful to view the hierarchy and nesting of Logic Tables. The State visualization displays all the states in a selected Logic Table. Entropy visualization is a subset of State visualization and displays limited number of states having lowest Entropy …
User Profiling In Gui Based Windows Systems For Intrusion Detection, Arshi Agrawal
User Profiling In Gui Based Windows Systems For Intrusion Detection, Arshi Agrawal
Master's Projects
Intrusion detection is the process of identifying any unauthorized access to a sys- tem. This process inspects user behavior to identify any possible attack or intrusion. There exists two type of intrusion detection systems (IDSs): signature-based IDS and anomaly-based IDS. This project concentrates on anomaly-based intrusion detection technique. This technique is based on the deviation of intruder’s actions from the authenticated user’s actions. Much previous research has focused on the deviation of command line input in UNIX systems. However, these techniques fail to detect attacks on modern GUI- based systems, where typical user activities include mouse movements and keystrokes. Our …
Analysis Of Parallel Montgomery Multiplication In Cuda, Yuheng Liu
Analysis Of Parallel Montgomery Multiplication In Cuda, Yuheng Liu
Master's Projects
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance will likely require accelerating point multiplication. In ECC, the Montgomery algorithm is widely used for point multiplication. The primary purpose of this project is to implement and analyze a parallel implementation of the Montgomery algorithm as it is used in ECC. Specifically, the performance of CPU-based Montgomery multiplication and a GPU-based implementation in CUDA are compared.
Automated Rtl Generator, Rohit Kulkarni
Automated Rtl Generator, Rohit Kulkarni
Master's Projects
Code generation is a vast topic and has been discussed and implemented for quite a while now. It has been also been a topic of debate as to what is an ideal code generator and how an ideal code generator can be created. The biggest challenge while creating a code generator is to maintain a balance between the amount of freedom given to the user and the restrictions imposed on the code generated. These two seemed to be very conflicting requirements while designing the Automated RTL Code Generator. If the code generator tries to be rigid and sticks to well-defined …
Mongodb Performance In The Cloud, Tudor Matei
Mongodb Performance In The Cloud, Tudor Matei
Master's Projects
Web applications are growing at a staggering rate every day. As web applications keep getting more complex, their data storage requirements tend to grow exponentially. Databases play an important role in the way web applications store their information. Mongodb is a document store database that does not have strict schemas that RDBMs require and can grow horizontally without performance degradation. MongoDB brings possibilities for different storage scenarios and allow the programmers to use the database as a storage that fits their needs, not the other way around. Scaling MongoDB horizontally requires tens to hundreds of servers, making it very difficult …
Yioop Full Historical Indexing In Cache Navigation, Akshat Kukreti
Yioop Full Historical Indexing In Cache Navigation, Akshat Kukreti
Master's Projects
This project adds new cache-related features to Yioop, an Open Source, PHP-based search engine. Search engines often maintain caches of pages downloaded by their crawler. Commercial search engines like Google display a link to the cached version of a web page along with the search results for that particular web page. The first feature enables users to navigate through Yioop's entire cache. When a cached page is displayed along with its contents, links to cached pages saved in the past are also displayed. The feature also enables users to navigate cache history based on year and month. This feature is …
Modular Approach To Big Data Using Neural Networks, Animesh Dutta
Modular Approach To Big Data Using Neural Networks, Animesh Dutta
Master's Projects
Machine learning can be used to recognize patterns, classify data into classes and make predictions. Neural Networks are one of the many machine learning tools that are capable of performing these tasks. The greatest challenges that we face while dealing with the IBM Watson dataset is the high amount of dimensionality, both in terms of the number of features the data has, as well the number of rows of data we are dealing with. The aim of the project is to identify a course of action that can be chosen when dealing with similar problems. The project aims at setting …
Big Data Analysis Using Amazon Web Services And Support Vector Machines, Dhruv Jalota
Big Data Analysis Using Amazon Web Services And Support Vector Machines, Dhruv Jalota
Master's Projects
This writing project aims to apply the supervised machine learning technique known as Support Vector Machines to a large labeled data set, to attempt to classify an unlabeled data set using the result of training on the labeled data set, and hence perform an analysis of the various results obtained using different Amazon Elastic Cloud Compute instances, sizes of input data set, and different parameters or kernels of the SVM tool. The given data set is relatively large for SVM and the tool being used, known as libsvm, having approximately 1.3 million training examples and 341 attributes with binary classification …
Using Social Networks For Assessing Company Sales And Marketing Programs, Vance Tomchalk
Using Social Networks For Assessing Company Sales And Marketing Programs, Vance Tomchalk
Master's Projects
During the course of an extended sales period for a company’s given product line, there are many events that affect the success of its sales. Some of these events include economic downturns, unforeseen shortages and delays that effect the supply chain for the product, and product quality issues that change the perception of the product as a safe and cost-effective choice. In many instances, these events can be tracked by analyzing the signals and messaging present in the social networking media. This analysis requires careful consideration, which the metrics provided by software tools and algorithms lend considerable aid.
Semantic Search Over Encrypted Data In Cloud Computing, Kam Ho Ho
Semantic Search Over Encrypted Data In Cloud Computing, Kam Ho Ho
Master's Projects
Cloud storage becomes more and more popular in the recent trend since it provides various benefits over the traditional storage solutions. Along with many benefits provided by cloud storage, many security problems arise in cloud storage which prevents enterprises from migrate their data to cloud storage. These security problems induce the data owners to encrypt all their sensitive data such as social security number (SSN), credit card information, and personal tax information before they can be stored in cloud storage. The encryption approach may have strengthened the data security of cloud data, but it degrades the data efficiency because the …
Enhanced Clustering Of Technology Tweets, Ananth Gopal
Enhanced Clustering Of Technology Tweets, Ananth Gopal
Master's Projects
Ever since Twitter has been widely accepted and has become an immensely popular micro blogging website, it is being used as a primary source of news; be it related to sports, entertainment, politics or technology by several users. It has been proven earlier that the elimination of stop words has a positive impact on the clustering of technology related tweets. The focus of this paper is to enhance the quality of clustering of the technology related Tweets by developing a semi-automated approach to eliminating stop words and by making use of a combination of Canopy and K-means clustering algorithms. The …
Cloud Services For An Android Based Home Security System, Karthik Challa
Cloud Services For An Android Based Home Security System, Karthik Challa
Master's Projects
This report talks in detail about an android based application designed for a home security system. The home security system is a tablet device developed using the android framework. The home security system makes use of sensors and a central device to secure an area. Currently the devices are standalone and require the users to be physically present to operate the devices with no interaction possible between two different devices. The system is also limited by its computational resources and storage capacity. For this project, I have developed a cloud based client server architecture to address these limitations and also …
Cloud Based Complaint Management Service, Ajinkya Amrute
Cloud Based Complaint Management Service, Ajinkya Amrute
Master's Projects
Complaint Management is important from both customer as well as business point of view. Complaints contain direct voice of the customer which provides companies a huge volume of data which can be used to improve the quality of the product the company is manufacturing. Hence it is necessary for the organizations to harness the data received via complaints. However as the data received via complaints is enormous it is not an easy task to manage the data received via complaints as the data keeps on expanding and multiplying. For implementing this difficult task of complaint management, websites were built but …
Http Attack Detection Using N-Gram Analysis, Adityaram Oza
Http Attack Detection Using N-Gram Analysis, Adityaram Oza
Master's Projects
Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis. Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three n- gram based techniques to the problem of HTTP attack detection. The goal of such techniques is to provide a first line of defense by filtering out the vast majority of benign HTTP traffic. We analyze our techniques in terms of accuracy of attack detection and performance. We show …
Mobile Presentation Of Unstructured Information, Shailesh Benake
Mobile Presentation Of Unstructured Information, Shailesh Benake
Master's Projects
Since the advent of online education in 1994 by CALCampus , many improvements have been made for effectiveness of e-learning. Video/audio conferencing, synchronous education system and many such advances in multimedia communication have made this system more popular among the masses. However with many online education websites, competing to make the same course, it’s important for user to find course structure of his interest. What makes even more challenging for a learner is, to decide how good will be the learning from a course provided by a particular site. For example open online course sites like edx.org, canvas.net, coursera.org etc …