Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2011

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 107

Full-Text Articles in Physical Sciences and Mathematics

Learning Author’S Writing Pattern System By Automata, Qun Yu Jul 2011

Learning Author’S Writing Pattern System By Automata, Qun Yu

Master's Projects

The purpose of the report is to document our project’s theory, implementation and test results. The project works on an automata-based learning system which models authors’ writing characters with automatons. Since there were pervious works done by Dr. T.Y. Lin and Ms. S.X. Zhang, we continue on ALERGIA algorithm analysis and initial common pattern study in this project. Although every author has his/her own writing style, such as sentence length and word frequency etc, there are always some similarities in writing style. We hypothesize that common strings fogged the expected test result, just like the noise in radio wave. This …


Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li Jul 2011

Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li

Master's Projects

Content Distribution via Internet has become increasingly popular right now. Compared with centralized file distribution system using FTP and HTTP protocols, P2P (Peer to Peer) is more cost-effective. Furthermore, it could help save on bandwidth costs and to handle pick demands. Among many P2P protocols, BitTorrent is one of the most popular protocols right now. The BitTorrent network uses tit-for-tat as a method of seeking Pareto efficiency. However, seeders who contribute more to BitTorrent network than leechers are not incentivized to stay online and upload to others. This paper discusses an incentive mechanism which rewards seeder, who stays in a …


Social Network Leverage Search, Payal Gupta Jul 2011

Social Network Leverage Search, Payal Gupta

Master's Projects

Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …


Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde Jun 2011

Efficient Unfolding Pattern Recognition In Single Molecule Force Spectroscopy Data, Bill Andreopoulos, Dirk Labudde

Faculty Publications, Computer Science

BackgroundSingle-molecule force spectroscopy (SMFS) is a technique that measures the force necessary to unfold a protein. SMFS experiments generate Force-Distance (F-D) curves. A statistical analysis of a set of F-D curves reveals different unfolding pathways. Information on protein structure, conformation, functional states, and inter- and intra-molecular interactions can be derived.ResultsIn the present work, we propose a pattern recognition algorithm and apply our algorithm to datasets from SMFS experiments on the membrane protein bacterioRhodopsin (bR). We discuss the unfolding pathways found in bR, which are characterised by main peaks and side peaks. A main peak is the result of the pairwise …


Making Connections Between Science And Equity: A Motivation To Teach Science In Elementary Grades, Grinell Smith, Colette Rabin Apr 2011

Making Connections Between Science And Equity: A Motivation To Teach Science In Elementary Grades, Grinell Smith, Colette Rabin

Faculty Publications

Teacher quality is among the strongest correlates of student outcomes. However, only about a quarter of the nation’s elementary teachers consider themselves qualified to teach science. In this descriptive and exploratory study, we investigated whether helping pre-service teacher candidates explore connections between science and issues of equity, particularly around sustainability issues, could help them see the importance of teaching science to their students more often. Qualitative and quantitative data were collected from 59 students enrolled in revised science methods courses at a large public university. Our findings suggest that positioning science instruction thusly was perceived as a strong motivator to …


Thermodynamics Of The Antiferromagnetic Heisenberg Model On The Checkerboard Lattice, Ehsan Khatami, Maros Rigol Apr 2011

Thermodynamics Of The Antiferromagnetic Heisenberg Model On The Checkerboard Lattice, Ehsan Khatami, Maros Rigol

Faculty Publications

Employing numerical linked-cluster expansions (NLCEs) along with exact diagonalizations of finite clusters with periodic boundary condition, we study the energy, specific heat, entropy, and various susceptibilities of the antiferromagnetic Heisenberg model on the checkerboard lattice. NLCEs, combined with extrapolation techniques, allow us to access temperatures much lower than those accessible to exact diagonalization and other series expansions. We show that the high-temperature peak in specific heat decreases as the frustration increases, consistent with the large amount of unquenched entropy in the region around maximum classical frustration, where the nearest-neighbor and next-nearest-neighbor exchange interactions (J and J′, respectively) have the same …


Dynamic Code Checksum Generator, Ashish Sharma Apr 2011

Dynamic Code Checksum Generator, Ashish Sharma

Master's Projects

A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker tries to change the code in an executable file, a checksum can be used to detect the tampering. While it is easy to compute a checksum for any static file, it is possible for an attacker to tamper with an executable file as it is being loaded into memory, or after it has been loaded. Therefore, it would be more useful to checksum an executable file dynamically only after the file has been loaded into memory. However, checksumming dynamic code is …


Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar Apr 2011

Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar

Master's Projects

Substitution ciphers normally use prefix free codes ­ there is no code word which is the prefix of some other code word. Prefix free codes are used for encryption because it makes the decryption process easier at the receiver's end.
In this project, we study the feasibility of substitution ciphers with non­prefix codes. The advantage of using non­prefix codes is that extracting statistical information is more difficult. However, the ciphertext is nontrivial to decrypt.
We present a dynamic programming technique for decryption and verify that the plaintext can be recovered. This shows that substitution ciphers with non­prefix codes are feasible. …


Video Chat Application For Facebook, Shirali Chokshi Apr 2011

Video Chat Application For Facebook, Shirali Chokshi

Master's Projects

This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook.


Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju Apr 2011

Recipe Suggestion Tool, Sakuntala Padmapriya Gangaraju

Master's Projects

ABSTRACT
There is currently a great need for a tool to search cooking recipes based on ingredients. Current search engines do not provide this feature. Most of the recipe search results in current websites are not efficiently clustered based on relevance or categories resulting in a user getting lost in the huge search results presented.
Clustering in information retrieval is used for higher efficiency and better presentation of information to the user. Clustering puts similar documents in the same cluster. If a document is relevant to a query, then the documents in the same cluster are also relevant.
The goal …


Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi Apr 2011

Smart Search: A Firefox Add-On To Compute A Web Traffic Ranking, Vijaya Pamidi

Master's Projects

Search engines results are typically ordered according to some notion of importance of a web page as well as relevance of the content of a web page to a query. Web page importance is usually calculated based on some graph theoretic properties of the web. Another common technique to measure page importance is to make use of the traffic that goes to a particular web page as measured by a browser toolbar. Currently, there are some traffic ranking tools available like www.alexa.com, www.ranking.com, www.compete.com that give such analytic as to the number of users who visit a web site. Alexa …


User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev Apr 2011

User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev

Master's Projects

The dawn of the laptop era presents new challenges to the computing research community. Performance is no longer the end all be all of computing research because a new, significant requirement has cropped up: reducing the power consumption and improving battery usage. The key restriction to mobility is the constant need to be near a power outlet to recharge the laptop battery. Thus, extending battery life without compromising performance is a pressing concern.
A research named as "iGreen" was proposed to stimulate power consumption awareness and behavioral change among laptop users via interactive energy-usage feedback with college students as the …


Decompiler For Pseudo Code Generation, Ankit Patel Apr 2011

Decompiler For Pseudo Code Generation, Ankit Patel

Master's Projects

Decompiling is an area of interest for researchers in the field of software reverse engineering. When the source code from a high-level programming language is compiled, it loses a great deal of information, including code structure, syntax, and punctuation.
The purpose of this research is to develop an algorithm that can efficiently decompile assembly language into pseudo C code. There are tools available that claim to extract high-level code from an executable file, but the results of these tools tend to be inaccurate and unreadable.
Our proposed algorithm can decompile assembly code to recover many basic high-level programming structures, including …


Fbchatters: A Facebook Application For Gtalk, Ronak Shah Apr 2011

Fbchatters: A Facebook Application For Gtalk, Ronak Shah

Master's Projects

The motto of this project is to provide accessibility to Google talk (gtalk) service within a Facebook account by creating Facebook application called FBchatters and also by creating Firefox plug-in called FBchatters. Most of all internet users have account on Facebook and Google. Social network site, Facebook has more than 600 million users and half of them log on to Facebook in any given day [1]. Google also has 170 million users who are using gmail and gtalk services every day. There are lot of users who do chatting simultaneously on Facebook and Gtalk. Also, Google talk provides a facility …


Model-Controller Interfacing Using Struts-Based Web Application, Deepti Bhardwaj Apr 2011

Model-Controller Interfacing Using Struts-Based Web Application, Deepti Bhardwaj

Master's Projects

StrutsHib IDE is an IDE for interfacing the model and controller of a MVC architecture based applications. It is developed using Java-based technologies such as the Struts framework, Hibernate and jQuery. The StrutsHib IDE is a web application. This project implements the part of StrutsHib IDE that makes it easy to create model and controller components. Moreover, it automates the process of database creation for web applications which means the user does not have to be a database expert when dealing with databases. Finally, StrutsHib IDE takes all the advantages of a web-based application and provides lot of flexibility to …


Centralized Security Protocol For Wireless Sensor Networks, Li Yang Apr 2011

Centralized Security Protocol For Wireless Sensor Networks, Li Yang

Master's Projects

Wireless Sensor Networks (WSN) is an exciting new technology with applications in military, industry, and healthcare. These applications manage sensitive information in potentially hostile environments. Security is a necessity, but building a WSN protocol is difficult. Nodes are energy and memory constrained devices intended to last months. Attackers are physically able to compromise nodes and attack the network from within. The solution is Centralized Secure Low Energy Adaptive Clustering Hierarchy (CSLEACH). CSLEACH provides security, energy efficiency, and memory efficiency. CSLEACH takes a centralized approach by leveraging the gateways resources to extend the life of a network as well as provide …


Similarity Tests For Metamorphic Virus Detection, Mahim Patel Apr 2011

Similarity Tests For Metamorphic Virus Detection, Mahim Patel

Master's Projects

A metamorphic computer virus generates copies of itself using code morphing techniques. A new virus has the same functionality as the parent but it has a different internal structure. The goal of the metamorphic virus writer is to produce viral copies that have no common signature. If the viral copies are sufficiently different, they can evade signature detection, which is the most widely-used anti-virus technique.
In previous research, hidden Markov models (HMMs) have been used to detect some metamorphic viruses. However, recent research has shown that it is possible for carefully designed metamorphic viruses to evade HMM-based detection.
In this …


Robust Watermarking Using Hidden Markov Models, Mausami Mungale Apr 2011

Robust Watermarking Using Hidden Markov Models, Mausami Mungale

Master's Projects

Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars. Prevention is a difficult problem since digital documents are easy to copy and distribute. Watermarking is a possible defense against software piracy. A software watermark consists of information embedded in the software, which allows it to be identified. A watermark can act as a deterrent to unauthorized copying, since it can be used to provide evidence for legal action against those responsible for piracy.
In this project, we present a novel software watermarking scheme that …


Improving Molecular Fingerprint Similarity Via Enhanced Folding, Victor Chen Apr 2011

Improving Molecular Fingerprint Similarity Via Enhanced Folding, Victor Chen

Master's Projects

Drug discovery depends on scientists finding similarity in molecular fingerprints to the drug target. A new way to improve the accuracy of molecular fingerprint folding is presented. The goal is to alleviate a growing challenge due to excessively long fingerprints. This improved method generates a new shorter fingerprint that is more accurate than the basic folded fingerprint. Information gathered during preprocessing is used to determine an optimal attribute order. The most commonly used blocks of bits can then be organized and used to generate a new improved fingerprint for more optimal folding. We thenapply the widely usedTanimoto similarity search algorithm …


Bittorrent Traffic Detection With Deep Packet Inspection And Deep Flow Inspection, Raymond Wong Apr 2011

Bittorrent Traffic Detection With Deep Packet Inspection And Deep Flow Inspection, Raymond Wong

Master's Projects

The peer-to-peer (P2P) technology has been well developed with the internet networking and BitTorrent (BT) is one of the very popular P2P sharing protocols widely used. BT network traffic detection has become very challenging in recent years due to smarter peer-to-peer applications. During my CS297 project, a new improved detection method based on Deep Packet Inspection (DPI) and Deep Flow Inspection (DFI) was proposed for detecting BT packets. The preliminary experiments show promising results in terms of detection rate. In my CS298 project, the proposed method is implemented in C and Matlab. In addition, the detection rate and performance of …


Metamorphic Detection Via Emulation, Sushant Priyadarshi Apr 2011

Metamorphic Detection Via Emulation, Sushant Priyadarshi

Master's Projects

In parallel with improvements in anti-virus technologies, computer virus writers have developed innovative viruses that are challenging to detect. Metamorphic viruses change their appearance from one generation to another by using various code obfuscation techniques. Today, signature detection is the most common method used in anti-virus products, but well designed metamorphic viruses cannot be detected using signatures. Hence, there is a need for a more robust anti-virus technology.
To counter metamorphic virus, a very successful tool based on hidden Markov models (HMM) has been previously developed. This tool was able to detect all hacker produced metamorphic viruses on which it …


Users Positions In Social Networks, Jasim Qazi Apr 2011

Users Positions In Social Networks, Jasim Qazi

Master's Projects

Social networks are a new phase in human interaction: using
technology to connect people online, the social nehvorks of today have
become a central part of the lives of millions of people. People use social
networks for sharing various infonrmation with their friends and family. This
information can take the forn of text, video, images, sound etc. and it is what
forms the collection of dats in social networks.

As social networks gain popularity and as more and more people start
using social networks, it has become more important now to understand the
inner structures of social networks and understand …


Association Rule Mining -- Geometry And Parallel Computing Approach, Dongyi Jia Apr 2011

Association Rule Mining -- Geometry And Parallel Computing Approach, Dongyi Jia

Master's Projects

Mining association rules is a very important aspect in data mining fields. The process to mine association rules not only take much time, but also take huge computing source. How to fast and efficiently find the large itemsets is a crucial point in the association rule algorithms. This paper will focus on two algorithms research and implementation in parallel computing environments. One is Bitmap Combination algorithm, the other is Bitmap FP-Growth algorithm. Compared to Apriori algorithm, both Bitmap Combination and Bitmap FP-Growth algorithms don’t need generate candidate items, avoids costly database scans. Both algorithms need to translate the original database …


Automated Penetration Testing, Neha Samant Apr 2011

Automated Penetration Testing, Neha Samant

Master's Projects

Penetration testing is used to search for vulnerabilities that might exist in a system. The testing usually involves simulating different types of attacks on the target system. This type of testing provides an organized and controlled way to identify security shortcomings. The resources and time required for comprehensive testing can make penetration testing cost intensive. Consequently, such tests are usually only performed during important milestones.
In this project we have automated the penetration testing process for several protocol-based attacks. Our automated penetration testing application covers several attacks based on HTTP, SIP and TCP/IP. The objective of this work is to …


Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik Apr 2011

Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik

Master's Projects

In this internet and smart-phone era paper books are almost obsolete. Many developers have come up with the eBooks which can be read online on computer or on a smart-phone. Users can now access them offline any time without carrying a bulky pBook (Paper Book). The stable eBook application should restrict and control the use of contents to protect the copyrights. Encryption and enforcement of digital policies are generally managed by Digital Rights Management (DRM). The stable system for online as well as offline readers safeguard the intellectual properties for authors, publishers by providing a protection to their digital content, …


An Executable Packer, Neel Bavishi Apr 2011

An Executable Packer, Neel Bavishi

Master's Projects

This thesis addresses the topic of development and advancement of the Packer technology. It aims to prove that with the implementation of advanced code encryption and cryptographic techniques in conjunction with standard packing
methods, testing binaries with anti-virus will become increasingly difficult.
Study on this topic reveals that the idea of encoding data has already been established, but it is still not fully incorporated into a technique to pack an executable file. There are some noticeable defects as un-packer tools have also made a great advancement in the field of dynamic analysis. The addition of new capability to recognize emulation …


Medical Analysis Question And Answering Application For Internet Enabled Mobile Devices, Loc Nguyen Apr 2011

Medical Analysis Question And Answering Application For Internet Enabled Mobile Devices, Loc Nguyen

Master's Projects

Mobile devices such as smart phones, the iPhone, and the iPad have become more popular in recent years. With access to the Internet through cellular or WIFI networks, these mobile devices can make use of the great source of information available on the Internet. Unlike a desktop or laptop computer, an Internet enabled mobile device is designed to be carried around and available to the owner almost instantly at any moment of the day. Despite having such great advantage and potential, searching for information with a mobile device remains a difficult task. Mobile device users have to juggle between different …


Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy Apr 2011

Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy

Master's Projects

Web caching techniques have been widely used with the objective of caching as many web pages and web objects in the proxy server cache as possible to improve network performance. Web pre-fetching schemes have also been widely discussed where web pages and web objects are pre-fetched into the proxy server cache. This paper presents an approach that integrates web caching and web pre-fetching approach to improve the performance of proxy server’s cache.


Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski Apr 2011

Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski

Master's Projects

Genes that encode novel proteins are constantly being discovered and added to databases, but the speed with which their structures are being determined is not keeping up with this rate of discovery. Currently, homology and threading methods perform the best for protein structure prediction, but they are not appropriate to use for all proteins. Still, the best way to determine a protein's structure is through biological experimentation. This research looks into possible methods and relations that pertain to ab initio protein structure prediction. The study includes the use of positional and transitional probabilities of amino acids obtained from a non-redundant …


Rna Secondary Structure Prediction Tool, Meenakshee Mali Apr 2011

Rna Secondary Structure Prediction Tool, Meenakshee Mali

Master's Projects

Ribonucleic Acid (RNA) is one of the major macromolecules essential to all forms of life. Apart from the important role played in protein synthesis, it performs several important functions such as gene regulation, catalyst of biochemical reactions and modification of other RNAs. In some viruses, instead of DNA, RNA serves as the carrier of genetic information. RNA is an interesting subject of research in the scientific community. It has lead to important biological discoveries. One of the major problems researchers are trying to solve is the RNA structure prediction problem. It has been found that the structure of RNA is …