Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2020

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 75

Full-Text Articles in Physical Sciences and Mathematics

Probabilistic And Machine Learning Enhancement To Conn Toolbox, Gayathri Hanuma Ravali Kuppachi May 2020

Probabilistic And Machine Learning Enhancement To Conn Toolbox, Gayathri Hanuma Ravali Kuppachi

Master's Projects

Clinical depression is a state of mind where the person suffers from persevering and overpowering sorrow. Existing examinations have exhibited that the course of action of arrangement in the brain of patients with clinical depression has a weird framework topology structure. In the earlier decade, resting-state images of the brain have been under the radar a. Specifically, the topological relationship of the brain aligned with graph hypothesis has discovered a strong connection in patients experiencing clinical depression. However, the systems to break down brain networks still have a couple of issues to be unwound. This paper attempts to give a …


Higher-Order Link Prediction Using Graph Embeddings, Neeraj Chavan May 2020

Higher-Order Link Prediction Using Graph Embeddings, Neeraj Chavan

Master's Projects

Link prediction is an emerging field that predicts if two nodes in a network are likely to be connected or not in the near future. Networks model real-world systems using pairwise interactions of nodes. However, many of these interactions may involve more than two nodes or entities simultaneously. For example, social interactions often occur in groups of people, research collaborations are among more than two authors, and biological networks describe interactions of a group of proteins. An interaction that consists of more than two entities is called a higher-order structure. Predicting the occurrence of such higher-order structures helps us solve …


Detection Of Mild Cognitive Impairment Using Diffusion Compartment Imaging, Matthew Jones May 2020

Detection Of Mild Cognitive Impairment Using Diffusion Compartment Imaging, Matthew Jones

Master's Projects

The result of applying the Neurite Orientation Density and Dispersion Index (NODDI) algorithm to improve the prediction accuracy for patients diagnosed with MCI is reported. Calculations were carried out using a collection of 68 patients (34 control and 34 with MCI) gathered from the Alzheimer’s Disease Neuroimaging Initiative database (ADNI). Patient data includes the use of high-resolution Magnetic Resonance Images as with as Diffusion Tensor Imaging. A Linear Regression accuracy of 83% was observed using the added NODDI summary statistic: Orientation Dispersion Index (ODI). A statistically significant difference in groups was found between control patients and patients with MCI with …


Yoga Pose Classification Using Deep Learning, Shruti Kothari May 2020

Yoga Pose Classification Using Deep Learning, Shruti Kothari

Master's Projects

Human pose estimation is a deep-rooted problem in computer vision that has exposed many challenges in the past. Analyzing human activities is beneficial in many fields like video- surveillance, biometrics, assisted living, at-home health monitoring etc. With our fast-paced lives these days, people usually prefer exercising at home but feel the need of an instructor to evaluate their exercise form. As these resources are not always available, human pose recognition can be used to build a self-instruction exercise system that allows people to learn and practice exercises correctly by themselves. This project lays the foundation for building such a system …


Sentiment Analysis For Troll Activity Detection On Sina Weibo, Zidong Jiang May 2020

Sentiment Analysis For Troll Activity Detection On Sina Weibo, Zidong Jiang

Master's Projects

The impact of social media on the modern world is difficult to overstate. Virtually all companies and public figures have social media accounts on popular platforms such as Twitter and Facebook. In China, the micro-blogging service provider Sina Weibo is the most popular such service. To overcome negative publicity, Weibo trolls the so called Water Army can be hired to post deceptive comments.

In recent years, troll detection and sentiment analysis have been studied, but we are not aware of any research that considers troll detection based on sentiment analysis. In this research, we focus on troll detection via sentiment …


Using Deep Learning And Linguistic Analysis To Predict Fake News Within Text, John Nguyen May 2020

Using Deep Learning And Linguistic Analysis To Predict Fake News Within Text, John Nguyen

Master's Projects

The spread of information about current events is a way for everybody in the world to learn and understand what is happening in the world. In essence, the news is an important and powerful tool that could be used by various groups of people to spread awareness and facts for the good of mankind. However, as information becomes easily and readily available for public access, the rise of deceptive news becomes an increasing concern. The reason is due to the fact that it will cause people to be misled and thus could affect the livelihood of themselves or others. The …


Ai Quantification Of Language Puzzle To Language Learning Generalization, Harita Shroff May 2020

Ai Quantification Of Language Puzzle To Language Learning Generalization, Harita Shroff

Master's Projects

Online language learning applications provide users multiple ways/games to learn a new language. Some of the ways include rearranging words in the foreign language sentences, filling in the blanks, providing flashcards, and many more. Primarily this research focused on quantifying the effectiveness of these games in learning a new language. Secondarily my goal for this project was to measure the effectiveness of exercises for transfer learning in machine translation. Currently, very little research has been done in this field except for the research conducted by the online platforms to provide assurance to their users [12]. Machine learning has been used …


Video Synthesis From The Stylegan Latent Space, Lei Zhang May 2020

Video Synthesis From The Stylegan Latent Space, Lei Zhang

Master's Projects

Generative models have shown impressive results in generating synthetic images. However, video synthesis is still difficult to achieve, even for these generative models. The best videos that generative models can currently create are a few seconds long, distorted, and low resolution. For this project, I propose and implement a model to synthesize videos at 1024x1024x32 resolution that include human facial expressions by using static images generated from a Generative Adversarial Network trained on the human facial images. To the best of my knowledge, this is the first work that generates realistic videos that are larger than 256x256 resolution from single …


An Ai For A Modification Of Dou Di Zhu, Xuesong Luo May 2020

An Ai For A Modification Of Dou Di Zhu, Xuesong Luo

Master's Projects

We describe our implementation of AIs for the Chinese game Dou Di Zhu. Dou Di Zhu is a three-player game played with a standard 52 card deck together with two jokers. One player acts as a landlord and has the advantage of receiving three extra cards, the other two players play as peasants. We designed and implemented a Deep Q-learning Neural Network (DQN) agent to play the Dou Di Zhu. At the same time, we also designed and made a pure Q-learning based agent as well as a Zhou rule-based agent to compare with our main agent. We show the …


Computational Astronomy: Classification Of Celestial Spectra Using Machine Learning Techniques, Gayatri Milind Hungund May 2020

Computational Astronomy: Classification Of Celestial Spectra Using Machine Learning Techniques, Gayatri Milind Hungund

Master's Projects

Lightyears beyond the Planet Earth there exist plenty of unknown and unexplored stars and Galaxies that need to be studied in order to support the Big Bang Theory and also make important astronomical discoveries in quest of knowing the unknown. Sophisticated devices and high-power computational resources are now deployed to make a positive effort towards data gathering and analysis. These devices produce massive amount of data from the astronomical surveys and the data is usually in terabytes or petabytes. It is exhaustive to process this data and determine the findings in short period of time. Many details can be missed …


Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale May 2020

Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale

Master's Projects

Malware classification is an important and challenging problem in information security. Modern malware classification techniques rely on machine learning models that can be trained on a wide variety of features, including opcode sequences, API calls, and byte ��-grams, among many others. In this research, we implement hybrid machine learning techniques, where we train hidden Markov models (HMM) and compute Word2Vec encodings based on opcode sequences. The resulting trained HMMs and Word2Vec embedding vectors are then used as features for classification algorithms. Specifically, we consider support vector machine (SVM), ��-nearest neighbor

(��-NN), random forest (RF), and deep neural network (DNN) classifiers. …


Detection And Analysis Of Malware Evolution, Sunhera Barunkumar Paul May 2020

Detection And Analysis Of Malware Evolution, Sunhera Barunkumar Paul

Master's Projects

Malware is a malicious software that causes disruption, allows access to unapproved resources, or performs other unauthorized activity. Developing effective malware detection techniques is a critical aspect of information security. One difficulty that arises is that malware often evolves over time, due to changing goals of malware developers, or to counter advances in detection. This evolution can occur through various modifications in malware code. To maintain effective malware detection, it is necessary to detect and analyze malware evolution so that appropriate countermeasures can be taken. We perform a variety of experiments to detect points in time where a malware family …


Word Embedding Techniques For Malware Classification, Aniket Chandak May 2020

Word Embedding Techniques For Malware Classification, Aniket Chandak

Master's Projects

Word embeddings are often used in natural language processing as a means to quantify relationships between words. More generally, these same word embedding techniques can be used to quantify relationships between features. In this paper, we conduct a series of experiments that are designed to determine the effectiveness of word embedding in the context of malware classification. First, we conduct experiments where hidden Markov models (HMM) are directly applied to opcode sequences. These results serve to establish a baseline for comparison with our subsequent word embedding experiments. We then experiment with word embedding vectors derived from HMMs— a technique that …


Housing Market Crash Prediction Using Machine Learning And Historical Data, Parnika De May 2020

Housing Market Crash Prediction Using Machine Learning And Historical Data, Parnika De

Master's Projects

The 2008 housing crisis was caused by faulty banking policies and the use of credit derivatives of mortgages for investment purposes. In this project, we look into datasets that are the markers to a typical housing crisis. Using those data sets we build three machine learning techniques which are, Linear regression, Hidden Markov Model, and Long Short-Term Memory. After building the model we did a comparative study to show the prediction done by each model. The linear regression model did not predict a housing crisis, instead, it showed that house prices would be rising steadily and the R-squared score of …


Rehearsal Scheduling Problem, Thuan Bao May 2020

Rehearsal Scheduling Problem, Thuan Bao

Master's Projects

Scheduling is a common task that plays a crucial role in many industries such as manufacturing or servicing. In a competitive environment, effective scheduling is one of the key factors to reduce cost and increase productivity. Therefore, scheduling problems have been studied by many researchers over the past thirty years. Rehearsal scheduling problem (RSP) is similar to the popular resource-constrained project scheduling problem (RCPSP); however, it does not have activity precedence constraints and the resources’ availabilities are not fixed during processing time. RSP can be used to schedule rehearsal in theatre industry or to schedule group scheduling when each member …


Comparison Of Word2vec With Hash2vec For Machine Translation, Neha Gaikwad May 2020

Comparison Of Word2vec With Hash2vec For Machine Translation, Neha Gaikwad

Master's Projects

Machine Translation is the study of computer translation of a text written in one human language into text in a different language. Within this field, a word embedding is a mapping from terms in a language into small dimensional vectors which can be processed using mathematical operations. Two traditional word embedding approaches are word2vec, which uses a Neural Network, and hash2vec, which is based on a simpler hashing algorithm. In this project, we have explored the relative suitability of each approach to sequence to sequence text translation using a Recurrent Neural Network (RNN). We also carried out experiments to test …


Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun May 2020

Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun

Master's Projects

Natural Language Processing (NLP) is the process of computers analyzing on human languages. There are also many areas in NLP. Some of the areas include speech recognition, natural language understanding, and natural language generation.

Information retrieval and natural language processing for Asians languages has its own unique set of challenges not present for Indo-European languages. Some of these are text segmentation, named entity recognition in unsegmented text, and part of speech tagging. In this report, we describe our implementation of and experiments with improving the Chinese language processing sub-component of an open source search engine, Yioop. In particular, we rewrote …


Real-Time Ad Click Fraud Detection, Apoorva Srivastava May 2020

Real-Time Ad Click Fraud Detection, Apoorva Srivastava

Master's Projects

With the increase in Internet usage, it is now considered a very important platform for advertising and marketing. Digital marketing has become very important to the economy: some of the major Internet services available publicly to users are free, thanks to digital advertising. It has also allowed the publisher ecosystem to flourish, ensuring significant monetary incentives for creating quality public content, helping to usher in the information age. Digital advertising, however, comes with its own set of challenges. One of the biggest challenges is ad fraud. There is a proliferation of malicious parties and software seeking to undermine the ecosystem …


Load Balancing In Cloud Computing, Snehal Dhumal May 2020

Load Balancing In Cloud Computing, Snehal Dhumal

Master's Projects

Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time of …


Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma May 2020

Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma

Master's Projects

The field of information and computer security is rapidly developing in today’s world as the number of security risks is continuously being explored every day. The moment a new software or a product is launched in the market, a new exploit or vulnerability is exposed and exploited by the attackers or malicious users for different motives. Many attacks are distributed in nature and carried out by botnets that cause widespread disruption of network activity by carrying out DDoS (Distributed Denial of Service) attacks, email spamming, click fraud, information and identity theft, virtual deceit and distributed resource usage for cryptocurrency mining. …


Virtual Robot Locomotion On Variable Terrain With Adversarial Reinforcement Learning, Phong Nguyen May 2020

Virtual Robot Locomotion On Variable Terrain With Adversarial Reinforcement Learning, Phong Nguyen

Master's Projects

Reinforcement Learning (RL) is a machine learning technique where an agent learns to perform a complex action by going through a repeated process of trial and error to maximize a well-defined reward function. This form of learning has found applications in robot locomotion where it has been used to teach robots to traverse complex terrain. While RL algorithms may work well in training robot locomotion, they tend to not generalize well when the agent is brought into an environment that it has never encountered before. Possible solutions from the literature include training a destabilizing adversary alongside the locomotive learning agent. …


The Benefits Of Being The Player, Marc Velayo May 2020

The Benefits Of Being The Player, Marc Velayo

ART 108: Introduction to Games Studies

Gaming, specifically video games has affected everyone’s lives since its creation during the early 1970s. From being a form of entertainment to being an instructional material for class--the impact of gaming is highly visible in our society. The future of gaming is getting bigger--with the creation of various video games genres, consoles etc. Gaming is exponentially rising with the advancement of technology. With its exponential growth, video games or gaming should be used in our society not just as a form of entertainment, but as a tool for education and self-growth.


Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran May 2020

Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran

Master's Projects

This paper presents research outcomes of understanding coral reef biodiversity through the usage of various computer vision applications and techniques. It aims to help further analyze and understand the coral reef biodiversity through the usage of color thresholding and contouring onto images of the ARMS plates to extract groups of microorganisms based on color. The results are comparable to the manual markup tool developed to do the same tasks and shows that the manual process can be sped up using computer vision. The paper presents an automated way to extract groups of microorganisms based on color without the use of …


Implementing Tontinecoin, Prashant Pardeshi May 2020

Implementing Tontinecoin, Prashant Pardeshi

Master's Projects

One of the alternatives to proof-of-work (PoW) consensus protocols is proof-of- stake (PoS) protocols, which address its energy and cost related issues. But they suffer from the nothing-at-stake problem; validators (PoS miners) are bound to lose nothing if they support multiple blockchain forks. Tendermint, a PoS protocol, handles this problem by forcing validators to bond their stake and then seizing a cheater’s stake when caught signing multiple competing blocks. The seized stake is then evenly distributed amongst the rest of validators. However, as the number of validators increases, the benefit in finding a cheater compared to the cost of monitoring …


Land Registry On Blockchain, Mugdha Patil May 2020

Land Registry On Blockchain, Mugdha Patil

Master's Projects

The commercial real estate market is a significant part of the global economy, currently dominated by a small set of firms and organizations that lack transparency. The process of property transfers also requires third party intervention which is expensive. In many countries, the process of title transfers is problematic. We are still in the initial steps of digitization, due to the improvement required in terms of use of technology to represent assets in digital forms. Increase in liquidity of investments and purchases, proper management, documentation as well as ease of access is the future of real estate. Blockchain technologies have …


Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi May 2020

Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi

Master's Projects

‘‘Cryptocurrency trading was one of the most exciting jobs of 2017’’. ‘‘Bit- coin’’,‘‘Blockchain’’, ‘‘Bitcoin Trading’’ were the most searched words in Google during 2017. High return on investment has attracted many people towards this crypto market. Existing research has shown that the trading price is completely based on speculation, and its trading volume is highly impacted by news media. This paper discusses the existing work to evaluate the sentiment and price of the cryptocurrency, the issues with the current trading models. It builds possible solutions to understand better the semantic orientation of text by comparing different machine learning techniques and …


Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya May 2020

Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya

Master's Projects

Relational databases like Oracle, MySQL, and Microsoft SQL Server offer trans- action processing as an integral part of their design. These databases have been a primary choice among developers for business-critical workloads that need the highest form of consistency. On the other hand, the distributed nature of NoSQL databases makes them suitable for scenarios needing scalability, faster data access, and flexible schema design. Recent developments in the NoSQL database community show that NoSQL databases have started to incorporate transactions in their drivers to let users work on business-critical scenarios without compromising the power of distributed NoSQL features [1].

MongoDB is …


How Do Video Games Affect The Brain?, Kenneth Lee May 2020

How Do Video Games Affect The Brain?, Kenneth Lee

ART 108: Introduction to Games Studies

Video games are a wildly popular past time in not only America, but other countries as well. Its popularity has done nothing but increase in an exponential fashion, engulfing more and more members of society in its reach; however, its gaining traction in combination with behavioral observations and frequent violent events compelled many to question its effects on those who play them. Some attribute tragedies like recent school shootings to the vast array of First Person Shooter(FPS) games, blaming it for engraining in adolescents’ and adults’ brains a sense of increased aggression and violence. Others praise educational games for stimulating …


Usage And Effects Of Video Games In Education, Kevin Sagara May 2020

Usage And Effects Of Video Games In Education, Kevin Sagara

ART 108: Introduction to Games Studies

In modern society, the act of playing games entices certain prejudices towards those who decide to participate in such activities. Those prejudices normally revolve around negative stereotypes where games are meant for non-social adults and are seen as something akin to addiction if gone too far. But how much gaming is needed to be considered as an addiction and what actual effects does it have on mental growth, social capabilities and academics? As a community revolving around technology as much as we are, understanding how video games play a role in our social space is an important aspect to growth. …


Recreating The Virtual Bullets That Pierces Through The Soul Of Gaming: Video Games And Its Cultural Perception On America’S Violent Homefrontier, Brandon Palomino May 2020

Recreating The Virtual Bullets That Pierces Through The Soul Of Gaming: Video Games And Its Cultural Perception On America’S Violent Homefrontier, Brandon Palomino

ART 108: Introduction to Games Studies

For the past fifty years, video games have been around as a form of entertainment we consume on a daily basis. Unlike the books and movies seen in pop culture today, video games take us on virtual journeys where people participate in unique gameplay objectives based on player involvement. Because the idea of player engagement was rare at the time, it was inevitable that video games would revolutionize the way we view entertainment onwards. With video games becoming increasingly popular throughout the years, the debate of whether they are truly violent in nature has rubbed many people like myself the …