Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

San Jose State University

Neural networks

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi Jan 2023

Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi

Master's Projects

Sign Language is a visual language used by millions of people around the world. American Sign Language (ASL) is one of the most popular sign languages and the third most popular language in the United States. Automatic recognition of ASL signs can help bridge the communication gap between deaf and hearing individuals. In this project, we explore the use of deep learning models for ASL sign recognition, using the MNIST dataset as a benchmark. We preprocessed the data by reshaping the images to the input layer size of the models and normalized the pixel values. We evaluated five popular deep-learning …


Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena Jan 2023

Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena

Master's Projects

Digital networking sites such as Twitter give a global platform for users to discuss and express their own experiences with others. People frequently use social media to share their daily experiences, local news, and activities with others. Many rescue services and agencies frequently monitor this sort of data to identify crises and limit the danger of loss of life. During a natural catastrophe, many tweets are made in reference to the tragedy, making it a hot topic on Twitter. Tweets containing natural disaster phrases but do not discuss the event itself are not informational and should be labeled as non-disaster …


Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli Jan 2023

Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli

Master's Projects

Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.

To recognize attacks and common occurrences, machine learning techniques such as …


Taming The Data In The Internet Of Vehicles, Shahab Tayeb Jan 2022

Taming The Data In The Internet Of Vehicles, Shahab Tayeb

Mineta Transportation Institute

As an emerging field, the Internet of Vehicles (IoV) has a myriad of security vulnerabilities that must be addressed to protect system integrity. To stay ahead of novel attacks, cybersecurity professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, including Intrusion Detection System (IDSs), by implementing anomaly detection, which differentiates benign data packets from malicious ones. For an IDS to best predict anomalies, the model is trained on data that is typically pre-processed through normalization and feature selection/reduction. These pre-processing techniques play an important role in training a neural network to optimize …


Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur Dec 2019

Detecting Myocardial Infarctions Using Machine Learning Methods, Aniruddh Mathur

Master's Projects

Myocardial Infarction (MI), commonly known as a heart attack, occurs when one of the three major blood vessels carrying blood to the heart get blocked, causing the death of myocardial (heart) cells. If not treated immediately, MI may cause cardiac arrest, which can ultimately cause death. Risk factors for MI include diabetes, family history, unhealthy diet and lifestyle. Medical treatments include various types of drugs and surgeries which can prove very expensive for patients due to high healthcare costs. Therefore, it is imperative that MI is diagnosed at the right time. Electrocardiography (ECG) is commonly used to detect MI. ECG …


Robust Lightweight Object Detection, Siddharth Kumar May 2019

Robust Lightweight Object Detection, Siddharth Kumar

Master's Projects

Object detection is a very challenging problem in computer vision and has been a prominent subject of research for nearly three decades. There has been a promising in- crease in the accuracy and performance of object detectors ever since deep convolutional networks (CNN) were introduced. CNNs can be trained on large datasets made of high resolution images without flattening them, thereby using the spatial information. Their superior learning ability also makes them ideal for image classification and object de- tection tasks. Unfortunately, this power comes at the big cost of compute and memory. For instance, the Faster R-CNN detector required …


Human Activity Recognition Based On Multimodal Body Sensing, Anish Hemant Narkhede May 2019

Human Activity Recognition Based On Multimodal Body Sensing, Anish Hemant Narkhede

Master's Projects

In the recent years, human activity recognition has been widely popularized by a lot of smartphone manufacturers and fitness tracking companies. It has allowed us to gain a deeper insight into our physical health on a daily basis. However, with the evolution of fitness tracking devices and smartphones, the amount of data that is being captured by these devices is growing exponentially. This paper aims at understanding the process of dimensionality reduction such as PCA so that the data can be used to make meaningful predictions along with novel techniques using autoencoders with different activation functions. The paper also looks …


Chatbots With Personality Using Deep Learning, Susmit Gaikwad May 2019

Chatbots With Personality Using Deep Learning, Susmit Gaikwad

Master's Projects

Natural Language Processing (NLP) requires the computational modelling of the complex relationships of the syntax and semantics of a language. While traditional machine learning methods are used to solve NLP problems, they cannot imitate the human ability for language comprehension. With the growth in deep learning, these complexities within NLP are easier to model, and be used to build many computer applications. A particular example of this is a chatbot, where a human user has a conversation with a computer program, that generates responses based on the user’s input. In this project, we study the methods used in building chatbots, …


Cascaded Facial Detection Algorithms To Improve Recognition, Edmund Yee May 2017

Cascaded Facial Detection Algorithms To Improve Recognition, Edmund Yee

Master's Projects

The desire to be able to use computer programs to recognize certain biometric qualities of people have been desired by several different types of organizations. One of these qualities worked on and has achieved moderate success is facial detection and recognition. Being able to use computers to determine where and who a face is has generated several different algorithms to solve this problem with different benefits and drawbacks. At the backbone of each algorithm is the desire for it to be quick and accurate. By cascading face detection algorithms, accuracy can be improved but runtime will subsequently be increased. Neural …


Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song Jan 2017

Impact Of Reviewer Social Interaction On Online Consumer Review Fraud Detection, Kunal Goswami, Younghee Park, Chungsik Song

Faculty Publications

Background Online consumer reviews have become a baseline for new consumers to try out a business or a new product. The reviews provide a quick look into the application and experience of the business/product and market it to new customers. However, some businesses or reviewers use these reviews to spread fake information about the business/product. The fake information can be used to promote a relatively average product/business or can be used to malign their competition. This activity is known as reviewer fraud or opinion spam. The paper proposes a feature set, capturing the user social interaction behavior to identify fraud. …