Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 79

Full-Text Articles in Physical Sciences and Mathematics

Ice Crystal Formation And Evolution In Five Campaigns: Start08, Hippo Global, Dc3, Predict And Torero, Minghui Diao, Joshua Digangi, Anthony O’Brien, Mark Zondlo Dec 2013

Ice Crystal Formation And Evolution In Five Campaigns: Start08, Hippo Global, Dc3, Predict And Torero, Minghui Diao, Joshua Digangi, Anthony O’Brien, Mark Zondlo

Faculty Publications, Meteorology and Climate Science

In order to understand the microphysical properties of cirrus clouds, it is important to understand the formation and evolution of the environments where ice crystals form and reside on the microscale (~100 m). Uncertainties remain in simulating/parameterizing the evolution of ice crystals, which require more analyses in the Lagrangian view. However, most in situ observations are in the Eulerian view and are restricted from examining the lifecycle of cirrus clouds. In this work, a new method of Diao et al. GRL (2013)* is used to separate out five phases of ice crystal evolution, using the horizontal spatial relationships between ice …


Community College Consortium Promotes Open Educational Practices Through Outreach And Collaboration, Una T. Daly, Lisa Storm, Barbara Illowsky Oct 2013

Community College Consortium Promotes Open Educational Practices Through Outreach And Collaboration, Una T. Daly, Lisa Storm, Barbara Illowsky

SJSU Open Access Conference

The Community College Consortium for Open Educational Resources (CCCOER) is a community of practice focused on awareness and promoting best practices for OER discovery and adoption including open textbooks, open MOOCs, and open repositories to enhance learning and teaching. Through monthly outreach webinars with OER leaders and online advisory meetings, the community shares their projects and expertise encouraging collaboration across institutions, disciplines, and higher education sectors. Hear from the consortium director and two leaders of the community college OER movement.

• Una Daly, Director of Community College Outreach, OpenCourseWare Consortium. Building a community to promote awareness and shared knowledge of …


Metamorphic Detection Using Function Call Graph Analysis, Prasad Deshpande Oct 2013

Metamorphic Detection Using Function Call Graph Analysis, Prasad Deshpande

Master's Projects

Well-designed metamorphic malware can evade many commonly used malware detection techniques including signature scanning. In this research, we consider a score based on function call graph analysis. We test this score on several challenging classes of metamorphic malware and we show that the resulting detection rates yield an improvement over previous research.


Hidden Markov Models For Malware Classification, Chinmayee Annachhatre Oct 2013

Hidden Markov Models For Malware Classification, Chinmayee Annachhatre

Master's Projects

Malware is a software which is developed for malicious intent. Malware is a rapidly evolving threat to the computing community. Although many techniques for malware classification have been proposed, there is still the lack of a comprehensible and useful taxonomy to classify malware samples. Previous research has shown that hidden Markov model (HMM) analysis is useful for detecting certain types of malware. In this research, we consider the related problem of malware classification based on HMMs. We train HMMs for a variety of malware generators and a variety of compilers. More than 9000 malware samples are then scored against each …


Higher Order Pwm For Modeling Transcription Factor Binding Sites, Dhivya Srinivasan Oct 2013

Higher Order Pwm For Modeling Transcription Factor Binding Sites, Dhivya Srinivasan

Master's Projects

Traditional Position Weight Matrices (PWMs) that are used to model Transcription Factor Binding Sites (TFBS) assume independence among different positions in the binding site. In reality, this may not necessarily be the case. A better way to model TFBS is to consider the distribution of dinucleotides or trinucleotides instead of just mononucleotides, thus taking neighboring nucleotides into account. We can therefore, extend the single nucleotide PWM to a dinucleotide PWM or an even higher-order PWM to correctly estimate the dependencies among the nucleotides in a given sequence. The purpose of this project is to develop an algorithm to implement higher-order …


Compression-Based Analysis Of Metamorphic Malware, Jared Lee Oct 2013

Compression-Based Analysis Of Metamorphic Malware, Jared Lee

Master's Projects

Recent work has presented a technique based on structural entropy measurement as an effective way to detect metamorphic malware. The technique uses two steps, file segmentation and sequence comparison, to calculate file similarity. In another previous work, it was observed that similar malware have similar measures of Kolmogorov complexity. A proposed method of estimating Kolmogorov complexity was to calculate the compression ratio of a given malware which could then be used to cluster the malicious software. Malware detection has also been attempted through the use of adaptive data compression and showed promising results. In this paper, we attempt to combine …


Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam Oct 2013

Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam

Master's Projects

Metamorphic malware changes its internal structure with each infection, while maintaining its original functionality. Such malware can be difficult to detect using static techniques, since there may be no common signature across infections. In this research we apply a score based on Singular Value Decomposition (SVD) to the problem of metamorphic detection. SVD is a linear algebraic technique which is applicable to a wide range of problems, including facial recognition. Previous research has shown that a similar facial recognition technique yields good results when applied to metamorphic malware detection. We present experimental results and we analyze the effectiveness and efficiency …


San José State University Building Editor, Viet Trinh Oct 2013

San José State University Building Editor, Viet Trinh

Master's Projects

The San José State University (SJSU) Building Editor is a graphic application that renders the SJSU architectures in a multidimensional space and simulates the flows of people evacuating in the buildings under different circumstances. For a given building, the goals of this application are to analyze a density of people on each floor, to predict bottlenecks in each structure, and to simulate an optimal evacuation plan in case of an emergency for selected SJSU buildings that are visualized in multidimensional models. This report describes in detail functionalities of the application, studies key points in its implementation, and analyzes the application’s …


Pattern Discovery Of Sequential Symbolic Data Using Automata With An Application To Author Identification, Nikhil Kalantri Oct 2013

Pattern Discovery Of Sequential Symbolic Data Using Automata With An Application To Author Identification, Nikhil Kalantri

Master's Projects

Author Identification is the process of identifying a piece of text to ascertain if it has an inherent writing style or pattern based on a certain author. Almost all literary books can be accredited to a certain author since it has been signed. However, there also exist a plethora of unfinished books or manuscripts that could be attributed to a range of possible authors. For example, William Shakespeare has written many plays that have not been signed by him. In order to assess the importance of such texts that do not bear the authors signature, it could be vital to …


Access Control In A Social Networking Environment, Mallika Perepa Oct 2013

Access Control In A Social Networking Environment, Mallika Perepa

Master's Projects

Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point was Yioop [1], a PHP-based search engine. The ability to create social groups was added to Yioop. The Grouping feature is enhanced by adding additional features like: blogs and pages for each individual user and as well as for groups of users. Access control is provided to every group and each user within a group based on the ownership of the group or …


Repetitive Component Based Motion Learning With Kinect, Govind Kalyankar Oct 2013

Repetitive Component Based Motion Learning With Kinect, Govind Kalyankar

Master's Projects

Today’s world wants quick, smart and cost effective solutions to their problems. People want to learn everything online. They are interested in learning new techniques and every kind of art in a limited amount of time because they are busy with their own work and have very short time to take in class instructor led training. This is an attempt to fulfill the same so that the people can easily learn and master a new kind of art by themselves by using Kinect. The focus of this project is to master Kung-Fu, an ancient form of Chinese Martial Arts. Kung-Fu …


Pattern Recognition Of Dna Sequences Using Automata With Application To Species Distinction, Parnika P. Achrekar Oct 2013

Pattern Recognition Of Dna Sequences Using Automata With Application To Species Distinction, Parnika P. Achrekar

Master's Projects

"Darwin wasn't just provocative in saying that we descend from the apes—he didn't go far enough, we are apes in every way, from our long arms and tailless bodies to our habits and temperament." said Frans de Waal, a primate scientist at Emory University in Atlanta, Georgia. 1.3 million Species have been named and analyzed by scientists. This project focuses on capturing various nucleotide sequences of various species and determining the similarity and differences between them. Finite state automata have been used to accomplish this. The automata for a DNA genome is created using Alergia algorithm and is used as …


Determining Spread Of Diseases Using Social Networking Data, Jiten P. Oswal Oct 2013

Determining Spread Of Diseases Using Social Networking Data, Jiten P. Oswal

Master's Projects

“Hi, in a weeks, there will be high possibility you may get infected by flu. Please go to take a flu shot.” – This is a sample warning to some users in Twitter about the spreading of flu to people from specific location. Twitter may already be used to plan social lives, interact with celebrities and communicate with friends. But now data from the social networking sites could have a far more serious use like tracking diseases and learning about their spread. Using this kind of data, I will help Health Agencies to personalize the prediction and warn the general …


Finite-Temperature Properties Of Strongly Correlated Fermions In The Honeycomb Lattice, Baoming Tang, Thereza Paiva, Ehsan Khatami, Marchos Rigol Sep 2013

Finite-Temperature Properties Of Strongly Correlated Fermions In The Honeycomb Lattice, Baoming Tang, Thereza Paiva, Ehsan Khatami, Marchos Rigol

Ehsan Khatami

We study finite-temperature properties of strongly interacting fermions in the honeycomb lattice using numerical linked-cluster expansions and determinantal quantum Monte Carlo simulations. We analyze a number of thermodynamic quantities, including the entropy, the specific heat, uniform and staggered spin susceptibilities, short-range spin correlations, and the double occupancy at and away from half filling. We examine the viability of adiabatic cooling by increasing the interaction strength for homogeneous as well as for trapped systems. For the homogeneous case, this process is found to be more efficient at finite doping than at half filling. That, in turn, leads to an efficient adiabatic …


Finite-Temperature Properties Of Strongly Correlated Fermions In The Honeycomb Lattice, Baoming Tang, Thereza Paiva, Ehsan Khatami, Marchos Rigol Sep 2013

Finite-Temperature Properties Of Strongly Correlated Fermions In The Honeycomb Lattice, Baoming Tang, Thereza Paiva, Ehsan Khatami, Marchos Rigol

Faculty Publications

We study finite-temperature properties of strongly interacting fermions in the honeycomb lattice using numerical linked-cluster expansions and determinantal quantum Monte Carlo simulations. We analyze a number of thermodynamic quantities, including the entropy, the specific heat, uniform and staggered spin susceptibilities, short-range spin correlations, and the double occupancy at and away from half filling. We examine the viability of adiabatic cooling by increasing the interaction strength for homogeneous as well as for trapped systems. For the homogeneous case, this process is found to be more efficient at finite doping than at half filling. That, in turn, leads to an efficient adiabatic …


Case Studies Of Tropical Cyclones And Phytoplankton Blooms Over Atlantic And Pacific Regions, Ashley Merritt-Takeuchi, Sen Chiao Sep 2013

Case Studies Of Tropical Cyclones And Phytoplankton Blooms Over Atlantic And Pacific Regions, Ashley Merritt-Takeuchi, Sen Chiao

Faculty Publications, Meteorology and Climate Science

This study investigates phytoplankton blooms following the passage of tropical cyclones in the Atlantic and Pacific Ocean basins. The variables of sea surface temperature (SST), chlorophyll (Chl-a), precipitation, and storm surface winds were monitored for two case studies, Typhoon Xangsane (2006) and Hurricane Earl (2010). Strong near-surface wind from tropical cyclones creates internal friction, which causes deep nutrient enriched waters to displace from the bottom of the ocean floor up toward the surface. In return, the abundance of upwelled nutrients near the surface provides an ideal environment for the growth of biological substances such as chlorophyll and phytoplankton. The inverse …


Fluctuation-Dissipation Theorem In An Isolated System Of Quantum Dipolar Bosons After A Quench, Ehsan Khatami, Guido Pupillo, Mark Srednicki, Marcos Rigol Jul 2013

Fluctuation-Dissipation Theorem In An Isolated System Of Quantum Dipolar Bosons After A Quench, Ehsan Khatami, Guido Pupillo, Mark Srednicki, Marcos Rigol

Faculty Publications

We examine the validity of fluctuation-dissipation relations in isolated quantum systems taken out of equilibrium by a sudden quench. We focus on the dynamics of trapped hard-core bosons in one-dimensional lattices with dipolar interactions whose strength is changed during the quench. We find indications that fluctuation-dissipation relations hold if the system is nonintegrable after the quench, as well as if it is integrable after the quench if the initial state is an equilibrium state of a nonintegrable Hamiltonian. On the other hand, we find indications that they fail if the system is integrable both before and after quenching.


Evolution Of Ice Crystal Regions On The Microscale Based On In Situ Observations, Minghui Diao, Mark Zondlo, Andrew Heymsfield, Stuart Beaton, David Rogers Jul 2013

Evolution Of Ice Crystal Regions On The Microscale Based On In Situ Observations, Minghui Diao, Mark Zondlo, Andrew Heymsfield, Stuart Beaton, David Rogers

Faculty Publications, Meteorology and Climate Science

[1] Microphysical properties of cirrus clouds largely influence their atmospheric radiative forcing. However, uncertainties remain in simulating/parameterizing the evolution of ice crystals. These uncertainties require more analyses in the Lagrangian view, yet most in situ observations are in the Eulerian view. Here we demonstrate a new method to separate out five phases of ice crystal evolution, using the horizontal spatial relationships between ice supersaturated regions (ISSRs) and ice crystal regions (ICRs). Based on global in situ data sets, we show that the samples of clear-sky ISSRs, ice crystal formation/growth, and evaporation/sedimentation are ~20%, 10%, and 70% of the total ISSR …


Validation Of Airs/Amsu - A Water Vapor And Temperature Data With In Situ Aircraft Observations From The Surface To Ut/Ls From 87°N–67°S, Minghui Diao, Loayeh Jumbam, Justin Sheffield, Eric Wood, Mark Zondlo Jun 2013

Validation Of Airs/Amsu - A Water Vapor And Temperature Data With In Situ Aircraft Observations From The Surface To Ut/Ls From 87°N–67°S, Minghui Diao, Loayeh Jumbam, Justin Sheffield, Eric Wood, Mark Zondlo

Faculty Publications, Meteorology and Climate Science

[1] Validation of the Atmospheric Infrared Sounder (AIRS)/Advanced Microwave Sounding Unit (AMSU-A) data set with in situ observations provides useful information on its application to climate and weather studies. However, different space/time averaging windows have been used in past studies, and questions remain on the variation of errors in space, such as between land/ocean and the Northern/Southern Hemispheres. In this study, in situ aircraft measurements of water vapor and temperature are compared with the AIRS/AMSU-A retrievals (Version 5 Level 2) from 87°N to 67°S and from the surface to the upper troposphere and lower stratosphere (UT/LS). By using a smaller …


Electronic Spectral Properties Of The Two-Dimensional Infinite-U Hubbard Model, Ehsan Khatami, Daniel Hansen, Edward Perepelitsky, Marcos Rigol, Sriram Shastry Apr 2013

Electronic Spectral Properties Of The Two-Dimensional Infinite-U Hubbard Model, Ehsan Khatami, Daniel Hansen, Edward Perepelitsky, Marcos Rigol, Sriram Shastry

Faculty Publications

A strong-coupling series expansion for the Green's function and the extremely correlated Fermi liquid (ECFL) theory are used to calculate the moments of the electronic spectral functions of the infinite-U Hubbard model. Results from these two complementary methods agree very well at both low densities, where the ECFL solution is the most accurate, and at high to intermediate temperatures, where the series converge. We find that a modified first moment, which underestimates the contributions from the occupied states and is accessible in the series through the time-dependent Green's function, best describes the peak location of the spectral function in the …


Yioop Full Historical Indexing In Cache Navigation, Akshat Kukreti Apr 2013

Yioop Full Historical Indexing In Cache Navigation, Akshat Kukreti

Master's Projects

This project adds new cache-related features to Yioop, an Open Source, PHP-based search engine. Search engines often maintain caches of pages downloaded by their crawler. Commercial search engines like Google display a link to the cached version of a web page along with the search results for that particular web page. The first feature enables users to navigate through Yioop's entire cache. When a cached page is displayed along with its contents, links to cached pages saved in the past are also displayed. The feature also enables users to navigate cache history based on year and month. This feature is …


Cloud Storage Performance And Security Analysis With Hadoop And Gridftp, Wei-Li Liu Apr 2013

Cloud Storage Performance And Security Analysis With Hadoop And Gridftp, Wei-Li Liu

Master's Projects

Even though cloud server has been around for a few years, most of the web hosts today have not converted to cloud yet. If the purpose of the cloud server is distributing and storing files on the internet, FTP servers were much earlier than the cloud. FTP server is sufficient to distribute content on the internet. Therefore, is it worth to shift from FTP server to cloud server? The cloud storage provider declares high durability and availability for their users, and the ability to scale up for more storage space easily could save users tons of money. However, does it …


Application Of Secretary Algorithm To Dynamic Load Balancing In User-Space On Multicore Systems, Kyoung-Hwan Yun Apr 2013

Application Of Secretary Algorithm To Dynamic Load Balancing In User-Space On Multicore Systems, Kyoung-Hwan Yun

Master's Projects

In recent years, multicore processors have been so prevalent in many types of
systems and are now widely used even in commodities for a wide range of applications.
Although multicore processors are clearly a popular hardware solution to problems that
were not possible with traditional single-core processors, taking advantage of them are
inevitably met by software challenges. As Amdahl’s law puts it, the performance gain is
limited by the percentage of the software that cannot be run in parallel on multiple cores.
Even when an application is “embarrassingly” parallelized by a careful design of
algorithm and implementation, load balancing of …


Enhanced Clustering Of Technology Tweets, Ananth Gopal Apr 2013

Enhanced Clustering Of Technology Tweets, Ananth Gopal

Master's Projects

Ever since Twitter has been widely accepted and has become an immensely popular micro blogging website, it is being used as a primary source of news; be it related to sports, entertainment, politics or technology by several users. It has been proven earlier that the elimination of stop words has a positive impact on the clustering of technology related tweets. The focus of this paper is to enhance the quality of clustering of the technology related Tweets by developing a semi-automated approach to eliminating stop words and by making use of a combination of Canopy and K-means clustering algorithms. The …


Automated Rtl Generator, Rohit Kulkarni Apr 2013

Automated Rtl Generator, Rohit Kulkarni

Master's Projects

Code generation is a vast topic and has been discussed and implemented for quite a while now. It has been also been a topic of debate as to what is an ideal code generator and how an ideal code generator can be created. The biggest challenge while creating a code generator is to maintain a balance between the amount of freedom given to the user and the restrictions imposed on the code generated. These two seemed to be very conflicting requirements while designing the Automated RTL Code Generator. If the code generator tries to be rigid and sticks to well-defined …


Using Social Networks For Assessing Company Sales And Marketing Programs, Vance Tomchalk Apr 2013

Using Social Networks For Assessing Company Sales And Marketing Programs, Vance Tomchalk

Master's Projects

During the course of an extended sales period for a company’s given product line, there are many events that affect the success of its sales. Some of these events include economic downturns, unforeseen shortages and delays that effect the supply chain for the product, and product quality issues that change the perception of the product as a safe and cost-effective choice. In many instances, these events can be tracked by analyzing the signals and messaging present in the social networking media. This analysis requires careful consideration, which the metrics provided by software tools and algorithms lend considerable aid.


Entropy And State Visualization For Automation Design And Evaluation Prototyping Toolset, Rohit Deshmukh Apr 2013

Entropy And State Visualization For Automation Design And Evaluation Prototyping Toolset, Rohit Deshmukh

Master's Projects

Automation Design and Evaluation Prototyping Toolset (ADEPT) is a plugin developed on the Eclipse Rich Client Platform(RCP). ADEPT can be used by domain expert designers to create and modify testable prototypes. The aim of the project is to enhance ADEPT by adding dynamic visualizations to the ADEPT user interface. Three types of visualizations are implemented in this project. Table view is helpful to view the hierarchy and nesting of Logic Tables. The State visualization displays all the states in a selected Logic Table. Entropy visualization is a subset of State visualization and displays limited number of states having lowest Entropy …


Http Attack Detection Using N-Gram Analysis, Adityaram Oza Apr 2013

Http Attack Detection Using N-Gram Analysis, Adityaram Oza

Master's Projects

Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis. Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three n- gram based techniques to the problem of HTTP attack detection. The goal of such techniques is to provide a first line of defense by filtering out the vast majority of benign HTTP traffic. We analyze our techniques in terms of accuracy of attack detection and performance. We show …


User Profiling In Gui Based Windows Systems For Intrusion Detection, Arshi Agrawal Apr 2013

User Profiling In Gui Based Windows Systems For Intrusion Detection, Arshi Agrawal

Master's Projects

Intrusion detection is the process of identifying any unauthorized access to a sys- tem. This process inspects user behavior to identify any possible attack or intrusion. There exists two type of intrusion detection systems (IDSs): signature-based IDS and anomaly-based IDS. This project concentrates on anomaly-based intrusion detection technique. This technique is based on the deviation of intruder’s actions from the authenticated user’s actions. Much previous research has focused on the deviation of command line input in UNIX systems. However, these techniques fail to detect attacks on modern GUI- based systems, where typical user activities include mouse movements and keystrokes. Our …


Cloud Services For An Android Based Home Security System, Karthik Challa Apr 2013

Cloud Services For An Android Based Home Security System, Karthik Challa

Master's Projects

This report talks in detail about an android based application designed for a home security system. The home security system is a tablet device developed using the android framework. The home security system makes use of sensors and a central device to secure an area. Currently the devices are standalone and require the users to be physically present to operate the devices with no interaction possible between two different devices. The system is also limited by its computational resources and storage capacity. For this project, I have developed a cloud based client server architecture to address these limitations and also …