Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 76

Full-Text Articles in Physical Sciences and Mathematics

From Pong To Narrative: The Evolution Of Ai In Gaming, Muhammad Assaf Dec 2023

From Pong To Narrative: The Evolution Of Ai In Gaming, Muhammad Assaf

ART 108: Introduction to Games Studies

As video games evolve, the role of artificial intelligence also referred to as AI has been essential. Games have come a long way from being small and having rudimentary logic to being extremely complex and narrative-driven. This research paper will dive into the vast history of AI in gaming, following its path from the simple ball-paddle mechanics of Pong, to the intricate entanglements presented in modern games such as Fortnite, Call of Duty, League of Legends, and more. The interplay between game design and AI development doesn’t just show how far we have come in technological advancement, but rather it …


Exploring The Shift In Player Enthusiasm Towards Games, David Daniel Dec 2023

Exploring The Shift In Player Enthusiasm Towards Games, David Daniel

ART 108: Introduction to Games Studies

Video games, providing a constant source of excitement have been an integral part of the lives of many enthusiasts, helping shape childhoods and providing a source of entertainment and social interaction between friends and strangers. From the joy of unboxing the Wii with siblings back in the day, all the way to playing multiplayer battle royales and among us with our friends over the pandemic, the gaming platform has been an ever changing and dynamic experience. However, with time, a noticeable split emerged among peers who once shared the same joy of running home and putting on the headset. Some …


An Analysis Of The Debate And How It Changed Everything: Narratology Vs. Ludology, Robert Veloya Dec 2023

An Analysis Of The Debate And How It Changed Everything: Narratology Vs. Ludology, Robert Veloya

ART 108: Introduction to Games Studies

Video games will rot your brain. Something that people have told us during its inception into the modern world; however, little did they know that the video game industry will one day take its place in the world as one of the best mediums to tell a story and challenge its audience. The video game industry is an ever-growing industry where innovation flows through its veins causing it to grow into a field that is more immersive and compelling. Video games have also evolved into a field of study, a discipline that dives deep into what makes them a unique …


Influence Of Pavement Conditions On Commercial Motor Vehicle Crashes, Stephen Arhin, Babin Manandhar, Adam Gatiba Dec 2023

Influence Of Pavement Conditions On Commercial Motor Vehicle Crashes, Stephen Arhin, Babin Manandhar, Adam Gatiba

Mineta Transportation Institute

Commercial motor vehicle (CMV) safety is a major concern in the United States, including the District of Columbia (DC), where CMVs make up 15% of traffic. This research uses a comprehensive approach, combining statistical analysis and machine learning techniques, to investigate the impact of road pavement conditions on CMV accidents. The study integrates traffic crash data from the Traffic Accident Reporting and Analysis Systems Version 2.0 (TARAS2) database with pavement condition data provided by the District Department of Transportation (DDOT). Data spanning from 2016 to 2020 was collected and analyzed, focusing on CMV routes in DC. The analysis employs binary …


Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks Nov 2023

Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks

Mineta Transportation Institute

There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …


What You Don't See: The Impact Of Hidden Game Mechanics On Players, Jan Virsunen Apr 2023

What You Don't See: The Impact Of Hidden Game Mechanics On Players, Jan Virsunen

ART 108: Introduction to Games Studies

Since the rise of technology in the early nineteen sixties the art of gaming became an increasingly popular form of entertainment for many people throughout the years. As time progressed so did the advancements in technology which allowed for video games to become more immersive, captivating, and complex. Due to these advancements in tech, it generated a wide variety of ways for developers to increase game complexities. However, as the complexity of video games has increased, so too has the number of hidden game mechanics. These game mechanics are seen as the underlying systems and rules that govern how the …


Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala Jan 2023

Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala

Master's Projects

Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …


Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah Jan 2023

Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah

Master's Projects

In recent years, social cognitive theory has emphasized the role of cognitive processes in shaping perceptions and behavior related to gender bias. By examining the impact of targeted training interventions, this study seeks to better understand the influence of such processes on decision-making in the context of character selection. This human-computer interaction study explores the potential of intervention-based training to untraining gender bias in character selection. With an increasing need to address gender bias in various domains, understanding the impact of gender-based training becomes crucial. According to our hypothesis, exposure to masculine characters would boost people’s preference for female- intellectualized …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung Jan 2023

Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung

Master's Projects

With the growing demand for gender-related data on diverse applications, including security systems for ascertaining an individual’s identity for border crossing, as well as marketing purposes of digging the potential customer and tailoring special discounts for them, gender classification has become an essential task within the field of computer vision and deep learning. There has been extensive research conducted on classifying human gender using facial expression, exterior appearance (e.g., hair, clothes), or gait movement. However, within the scope of our research, none have specifically focused gender classification on two-dimensional body joints. Knowing this, we believe that a new prediction pipeline …


Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar Jan 2023

Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar

Master's Projects

Neural Networks are now emerging in every industry. All the industries are trying their best to exploit the benefits of neural networks and deep learning to make predictions or simulate their ongoing process with the use of their generated data. The purpose of this report is to study the heating pattern of a silicon wafer and make predictions using various machine learning techniques. The heating of the silicon wafer involves various factors ranging from number of lamps, wafer properties and points taken in consideration to capture the heating temperature. This process involves dynamic inputs which facilitates the heating of the …


Image Captioning Using Reinforcement Learning, Venkat Teja Golamaru Jan 2023

Image Captioning Using Reinforcement Learning, Venkat Teja Golamaru

Master's Projects

Image captioning is a crucial technology with numerous applications, including enhancing accessibility for the visually impaired, developing automated image indexing and retrieval systems, and enriching social media experiences. However, accurately describing the content of an image in natural language remains a challenge, particularly in low-resource settings where data and computational power are limited. The most advanced image captioning architectures currently use encoder-decoder structures that incorporate a sequential recurrent prediction model. This study adopts a typical Convolutional Neural Network (CNN) encoder Recurrent Neural Network (RNN) decoder structure for image captioning, but it has framed the problem as a sequential decision-making task. …


Influence Maximization Based On Community Detection And Dominating Sets, Ameya Marathe Jan 2023

Influence Maximization Based On Community Detection And Dominating Sets, Ameya Marathe

Master's Projects

An online platform where various people come together to share information and communicate is called a social network. These platforms are set apart from other means of communication mostly because you can follow and interact also with different people even some you never met, comment on their posts, and re-sharing their posts. Companies such as Amazon and Walmart use these platforms daily for marketing purposes, like spreading information regarding new products and services they offer. They carefully select a subset of users, called influencers, who are usually the ones with high influence over the rest of the users. Influencers receive …


A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi Jan 2023

A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi

Master's Projects

The use of face masks due to the covid-19 pandemic has made surveillance of people very difficult. Since a mask covers most of the facial components, security cameras are rendered of little to no use in the identification of criminals. In order to realize what a face looks like behind a mask, we have to construct the facial features in the masked region. On a higher level, this falls under the field of image inpainting, i.e. filling missing regions of images or correcting irregularities in images. Current research on image inpainting shows promising results on images that have missing/incorrect patches …


Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir Jan 2023

Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir

Master's Projects

Information retrieval and data interpretation on the web, for the purpose of gaining knowledgeable insights, has been a widely researched topic from the onset of the world wide web or what is today popularly known as the internet. Web tables are structured tabular data present amidst unstructured, heterogenous data on the web. This makes web tables a rich source of information for a variety of tasks like data analysis, data interpretation, and information retrieval pertaining to extracting knowledge from information present on the web. Wikipedia tables which are a subset of web tables hold a huge amount of useful data, …


Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati Jan 2023

Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati

Master's Projects

Conventional ride-sharing services, such as Lyft and Uber, routinely match drivers with riders based on their proximity to each other, using GPS coordinates and mapping technology. The application then calculates the cost of the ride based on factors such as distance traveled and time spent in the car. The concept of six degrees of separation suggests that a maximum of 6 steps or relationships can connect any two individuals in the world. This idea could be applied to a ride-share service to provide a more personalized and efficient experience for users. Instead of just matching riders with drivers based on …


Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia Jan 2023

Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia

Master's Projects

Text-to-Speech (TTS) normalization is an essential component of natural language processing (NLP) that plays a crucial role in the production of natural-sounding synthesized speech. However, there are limitations to the TTS normalization procedure. Lengthy input sequences and variations in spoken language can present difficulties. The motivation behind this research is to address the challenges associated with TTS normalization by evaluating and comparing the performance of various models. The aim is to determine their effectiveness in handling language variations. The models include LSTM-GRU, Transformer, GCN-Transformer, GCNN-Transformer, Reformer, and a BERT language model that has been pre-trained. The research evaluates the performance …


Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi Jan 2023

Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi

Master's Projects

Sign Language is a visual language used by millions of people around the world. American Sign Language (ASL) is one of the most popular sign languages and the third most popular language in the United States. Automatic recognition of ASL signs can help bridge the communication gap between deaf and hearing individuals. In this project, we explore the use of deep learning models for ASL sign recognition, using the MNIST dataset as a benchmark. We preprocessed the data by reshaping the images to the input layer size of the models and normalized the pixel values. We evaluated five popular deep-learning …


Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri Jan 2023

Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri

Master's Projects

Increasing reliance on digital services and the limitations of traditional authentication methods have necessitated the development of more advanced and secure user authentication methods. For user authentication and intrusion detection, mouse dynamics, a form of behavioral biometrics, offers a promising and non-invasive method. This paper presents a comprehensive study on ML-Based User Authentication Through Mouse Dynamics.

This project proposes a novel framework integrating sophisticated techniques such as embeddings extraction using Transformer models with cutting-edge machine learning algorithms such as Recurrent Neural Networks (RNN). The project aims to accurately identify users based on their distinct mouse behavior and detect unauthorized access …


Insecure Deserialization Detection In Python, Aneesh Verma Jan 2023

Insecure Deserialization Detection In Python, Aneesh Verma

Master's Projects

The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …


Vehicle-Based Disconnected Data Distribution, Aditya Singhania Jan 2023

Vehicle-Based Disconnected Data Distribution, Aditya Singhania

Master's Projects

The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks

(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …


Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni Jan 2023

Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni

Master's Projects

Many businesses, including Facebook, Netflix, and YouTube, rely heavily on a recommendation system. Recommendation systems are algorithms that attempt to provide consumers with relevant suggestions for items such as movies, videos, or reels (microvideos) to watch, hashtags for their posts, songs to listen to, and products to purchase. In many businesses, recommender systems are essential because they can generate enormous amounts of revenue and make the platform stand out when compared to others. Reels are a feature of the social media platforms that enable users to create and share videos of up to sixty seconds in length. Individuals, businesses, and …


Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao Jan 2023

Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao

Master's Projects

Textbooks are written and organized in a way that facilitates learning and understanding. Sections like glossary terms at the end of a textbook provide guidance on the topic of interest. However, it takes manual effort to create the index terms in the glossary that highlight the key referenced terminologies and related terms. Knowledge graphs, which have been used to represent and even reason over data and knowledge, can potentially capture textbook’s important terms, concepts, and their relations. Popular since the initial introduction by Google Knowledge Graphs (KGs), they combine graph and data to capture and model enormous amounts of relational …


Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee Jan 2023

Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee

Master's Projects

Coral Reefs and their diverse array of life forms play a vital role in maintaining the health of our planet's environment. However, due to their fragility, it can be challenging to study the reefs without damaging their delicate ecosystem. To address this issue, researchers have employed non-invasive methods such as using Autonomous Reef Monitoring Structures (ARMS) plates to monitor biodiversity. Data was collected as genetic samples from the plates, and high-resolution photographs were taken. To make the best use of this image data, scientists have turned to machine learning and computer vision. Prior to this study, MASKR-CNN was utilized as …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy Jan 2023

Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy

Master's Projects

Malware detection is vital as it ensures that a computer is safe from any kind of malicious software that puts users at risk. Too many variants of these malicious software are being introduced everyday at increased speed. Thus, to guarantee security of computer systems, huge advancements in the field of malware detection are made and one such approach is to use machine learning for malware detection. Even though machine learning is very powerful, it is prone to adversarial attacks. In this project, we will try to apply adversarial attacks on malware detection models. To perform these attacks, fake samples that …


Job Tailored Resume Content Generation, Sumedh Kale Jan 2023

Job Tailored Resume Content Generation, Sumedh Kale

Master's Projects

Generally candidates apply to multiple jobs with a single resume and do not tend to customize their resume to match the job description. This hampers their chances of getting a resume shortlisted for the job. The project aims to help such candidates build job tailored resumes that help them create a customized and targeted resume for a specific job or industry. The tool specifically targets candidates’ employment history, for resume content generation. We then use natural language processing

(NLP) techniques to extract and organize this data into a structured format for the dataset. We experiment with multiple variations of the …


Location And Environment Aware Mmwave Beam Selection Using Vision Transformer, Srajan Gupta Jan 2023

Location And Environment Aware Mmwave Beam Selection Using Vision Transformer, Srajan Gupta

Master's Projects

5G networks explore mmWave technology to achieve faster data transfer and higher network capacity. The reduced coverage area of mmWaves creates the need to deploy large antenna arrays. However, beam sweeping across a large number of antenna arrays typically involves high overhead and latency. In a vehicle-to- everything (V2X) system, beam selection becomes a frequent process in the case when vehicles are moving at high speed, leading to frequent connection delays. Modern-day vehicular systems are integrated with advanced sensors like global positioning system

(GPS), light detection and ranging (LIDAR), radio detection and ranging (RADAR), etc. Machine learning models can be …


Multi-Label Text Classification With Transfer Learning, Likhitha Yelamanchili Jan 2023

Multi-Label Text Classification With Transfer Learning, Likhitha Yelamanchili

Master's Projects

Multi-label text categorization is a crucial task in Natural Language Processing, where each text instance can be simultaneously assigned to numerous labels. This project's goal is to assess how well several deep learning models perform on a real-world dataset for multi-label text classification. We employed data augmentation techniques like Synonym Substitution and Random Word Substitution to address the problem of data imbalance. We conducted experiments on a toxic comment classification dataset to evaluate the effectiveness of several deep learning models including Bi-LSTM, GRU, and Bi-GRU, as well as fine- tuned pre-trained BERT models. Many metrics, including log loss, recall@k, and …


Nft Artifact Prediction Using Machine Learning, Rishabh Pandey Jan 2023

Nft Artifact Prediction Using Machine Learning, Rishabh Pandey

Master's Projects

NFT Prediction Systems are web applications that provide their users with valuable insights about the artifact. These insights are useful for investors and collectors to make better decisions about their purchases. This project builds upon the same concept of prediction by developing a web application to dynamically provide recommendations based on user input and training an ML model to predict their cost. Preliminary work for the prediction system involved data collection, pre-processing, analysis, and filtering of large datasets from diverse sources. The project focused on the development of a user- friendly UI to enable seamless categorization of search results generated …