Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (62)
- Artificial Intelligence and Robotics (35)
- Other Computer Sciences (15)
- Information Security (11)
- Art and Design (9)
-
- Arts and Humanities (9)
- Game Design (9)
- Databases and Information Systems (5)
- Physics (5)
- OS and Networks (4)
- Social and Behavioral Sciences (4)
- Software Engineering (4)
- Theory and Algorithms (4)
- Public Affairs, Public Policy and Public Administration (3)
- Systems Architecture (3)
- Transportation (3)
- Atomic, Molecular and Optical Physics (2)
- Chemistry (2)
- Condensed Matter Physics (2)
- Data Science (2)
- Engineering (2)
- Environmental Sciences (2)
- Graphics and Human Computer Interfaces (2)
- Oceanography and Atmospheric Sciences and Meteorology (2)
- Astrophysics and Astronomy (1)
- Bioinformatics (1)
- Civil and Environmental Engineering (1)
- Computer Engineering (1)
- Defense and Security Studies (1)
- Keyword
-
- Machine learning (5)
- Physics and Astronomy (4)
- Machine Learning (3)
- Video Games (3)
- Applied Data Science (2)
-
- Deep Learning (2)
- Feature extraction (2)
- Malware (2)
- Malware Classification (2)
- Mild Cognitive Impairment (2)
- Segmentation (2)
- Sentiment analysis (2)
- Task analysis (2)
- Twitter (2)
- Visualization (2)
- Word2Vec (2)
- 3D convolutions (1)
- AI (1)
- Ad Spam (1)
- Air quality management (1)
- Almost prime (1)
- Alzheimer's Disease (1)
- Anchor links (1)
- Android (1)
- Astronomy (1)
- Autonomous Driving (1)
- Benchmarking (1)
- Benefits Of Playing Video Games (1)
- BiLSTM (1)
- Big Data (1)
- Publication
- Publication Type
Articles 31 - 60 of 75
Full-Text Articles in Physical Sciences and Mathematics
Probabilistic And Machine Learning Enhancement To Conn Toolbox, Gayathri Hanuma Ravali Kuppachi
Probabilistic And Machine Learning Enhancement To Conn Toolbox, Gayathri Hanuma Ravali Kuppachi
Master's Projects
Clinical depression is a state of mind where the person suffers from persevering and overpowering sorrow. Existing examinations have exhibited that the course of action of arrangement in the brain of patients with clinical depression has a weird framework topology structure. In the earlier decade, resting-state images of the brain have been under the radar a. Specifically, the topological relationship of the brain aligned with graph hypothesis has discovered a strong connection in patients experiencing clinical depression. However, the systems to break down brain networks still have a couple of issues to be unwound. This paper attempts to give a …
Higher-Order Link Prediction Using Graph Embeddings, Neeraj Chavan
Higher-Order Link Prediction Using Graph Embeddings, Neeraj Chavan
Master's Projects
Link prediction is an emerging field that predicts if two nodes in a network are likely to be connected or not in the near future. Networks model real-world systems using pairwise interactions of nodes. However, many of these interactions may involve more than two nodes or entities simultaneously. For example, social interactions often occur in groups of people, research collaborations are among more than two authors, and biological networks describe interactions of a group of proteins. An interaction that consists of more than two entities is called a higher-order structure. Predicting the occurrence of such higher-order structures helps us solve …
Detection Of Mild Cognitive Impairment Using Diffusion Compartment Imaging, Matthew Jones
Detection Of Mild Cognitive Impairment Using Diffusion Compartment Imaging, Matthew Jones
Master's Projects
The result of applying the Neurite Orientation Density and Dispersion Index (NODDI) algorithm to improve the prediction accuracy for patients diagnosed with MCI is reported. Calculations were carried out using a collection of 68 patients (34 control and 34 with MCI) gathered from the Alzheimer’s Disease Neuroimaging Initiative database (ADNI). Patient data includes the use of high-resolution Magnetic Resonance Images as with as Diffusion Tensor Imaging. A Linear Regression accuracy of 83% was observed using the added NODDI summary statistic: Orientation Dispersion Index (ODI). A statistically significant difference in groups was found between control patients and patients with MCI with …
Yoga Pose Classification Using Deep Learning, Shruti Kothari
Yoga Pose Classification Using Deep Learning, Shruti Kothari
Master's Projects
Human pose estimation is a deep-rooted problem in computer vision that has exposed many challenges in the past. Analyzing human activities is beneficial in many fields like video- surveillance, biometrics, assisted living, at-home health monitoring etc. With our fast-paced lives these days, people usually prefer exercising at home but feel the need of an instructor to evaluate their exercise form. As these resources are not always available, human pose recognition can be used to build a self-instruction exercise system that allows people to learn and practice exercises correctly by themselves. This project lays the foundation for building such a system …
Sentiment Analysis For Troll Activity Detection On Sina Weibo, Zidong Jiang
Sentiment Analysis For Troll Activity Detection On Sina Weibo, Zidong Jiang
Master's Projects
The impact of social media on the modern world is difficult to overstate. Virtually all companies and public figures have social media accounts on popular platforms such as Twitter and Facebook. In China, the micro-blogging service provider Sina Weibo is the most popular such service. To overcome negative publicity, Weibo trolls the so called Water Army can be hired to post deceptive comments.
In recent years, troll detection and sentiment analysis have been studied, but we are not aware of any research that considers troll detection based on sentiment analysis. In this research, we focus on troll detection via sentiment …
Using Deep Learning And Linguistic Analysis To Predict Fake News Within Text, John Nguyen
Using Deep Learning And Linguistic Analysis To Predict Fake News Within Text, John Nguyen
Master's Projects
The spread of information about current events is a way for everybody in the world to learn and understand what is happening in the world. In essence, the news is an important and powerful tool that could be used by various groups of people to spread awareness and facts for the good of mankind. However, as information becomes easily and readily available for public access, the rise of deceptive news becomes an increasing concern. The reason is due to the fact that it will cause people to be misled and thus could affect the livelihood of themselves or others. The …
Ai Quantification Of Language Puzzle To Language Learning Generalization, Harita Shroff
Ai Quantification Of Language Puzzle To Language Learning Generalization, Harita Shroff
Master's Projects
Online language learning applications provide users multiple ways/games to learn a new language. Some of the ways include rearranging words in the foreign language sentences, filling in the blanks, providing flashcards, and many more. Primarily this research focused on quantifying the effectiveness of these games in learning a new language. Secondarily my goal for this project was to measure the effectiveness of exercises for transfer learning in machine translation. Currently, very little research has been done in this field except for the research conducted by the online platforms to provide assurance to their users [12]. Machine learning has been used …
Video Synthesis From The Stylegan Latent Space, Lei Zhang
Video Synthesis From The Stylegan Latent Space, Lei Zhang
Master's Projects
Generative models have shown impressive results in generating synthetic images. However, video synthesis is still difficult to achieve, even for these generative models. The best videos that generative models can currently create are a few seconds long, distorted, and low resolution. For this project, I propose and implement a model to synthesize videos at 1024x1024x32 resolution that include human facial expressions by using static images generated from a Generative Adversarial Network trained on the human facial images. To the best of my knowledge, this is the first work that generates realistic videos that are larger than 256x256 resolution from single …
An Ai For A Modification Of Dou Di Zhu, Xuesong Luo
An Ai For A Modification Of Dou Di Zhu, Xuesong Luo
Master's Projects
We describe our implementation of AIs for the Chinese game Dou Di Zhu. Dou Di Zhu is a three-player game played with a standard 52 card deck together with two jokers. One player acts as a landlord and has the advantage of receiving three extra cards, the other two players play as peasants. We designed and implemented a Deep Q-learning Neural Network (DQN) agent to play the Dou Di Zhu. At the same time, we also designed and made a pure Q-learning based agent as well as a Zhou rule-based agent to compare with our main agent. We show the …
Computational Astronomy: Classification Of Celestial Spectra Using Machine Learning Techniques, Gayatri Milind Hungund
Computational Astronomy: Classification Of Celestial Spectra Using Machine Learning Techniques, Gayatri Milind Hungund
Master's Projects
Lightyears beyond the Planet Earth there exist plenty of unknown and unexplored stars and Galaxies that need to be studied in order to support the Big Bang Theory and also make important astronomical discoveries in quest of knowing the unknown. Sophisticated devices and high-power computational resources are now deployed to make a positive effort towards data gathering and analysis. These devices produce massive amount of data from the astronomical surveys and the data is usually in terabytes or petabytes. It is exhaustive to process this data and determine the findings in short period of time. Many details can be missed …
Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale
Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale
Master's Projects
Malware classification is an important and challenging problem in information security. Modern malware classification techniques rely on machine learning models that can be trained on a wide variety of features, including opcode sequences, API calls, and byte ��-grams, among many others. In this research, we implement hybrid machine learning techniques, where we train hidden Markov models (HMM) and compute Word2Vec encodings based on opcode sequences. The resulting trained HMMs and Word2Vec embedding vectors are then used as features for classification algorithms. Specifically, we consider support vector machine (SVM), ��-nearest neighbor
(��-NN), random forest (RF), and deep neural network (DNN) classifiers. …
Detection And Analysis Of Malware Evolution, Sunhera Barunkumar Paul
Detection And Analysis Of Malware Evolution, Sunhera Barunkumar Paul
Master's Projects
Malware is a malicious software that causes disruption, allows access to unapproved resources, or performs other unauthorized activity. Developing effective malware detection techniques is a critical aspect of information security. One difficulty that arises is that malware often evolves over time, due to changing goals of malware developers, or to counter advances in detection. This evolution can occur through various modifications in malware code. To maintain effective malware detection, it is necessary to detect and analyze malware evolution so that appropriate countermeasures can be taken. We perform a variety of experiments to detect points in time where a malware family …
Word Embedding Techniques For Malware Classification, Aniket Chandak
Word Embedding Techniques For Malware Classification, Aniket Chandak
Master's Projects
Word embeddings are often used in natural language processing as a means to quantify relationships between words. More generally, these same word embedding techniques can be used to quantify relationships between features. In this paper, we conduct a series of experiments that are designed to determine the effectiveness of word embedding in the context of malware classification. First, we conduct experiments where hidden Markov models (HMM) are directly applied to opcode sequences. These results serve to establish a baseline for comparison with our subsequent word embedding experiments. We then experiment with word embedding vectors derived from HMMs— a technique that …
Housing Market Crash Prediction Using Machine Learning And Historical Data, Parnika De
Housing Market Crash Prediction Using Machine Learning And Historical Data, Parnika De
Master's Projects
The 2008 housing crisis was caused by faulty banking policies and the use of credit derivatives of mortgages for investment purposes. In this project, we look into datasets that are the markers to a typical housing crisis. Using those data sets we build three machine learning techniques which are, Linear regression, Hidden Markov Model, and Long Short-Term Memory. After building the model we did a comparative study to show the prediction done by each model. The linear regression model did not predict a housing crisis, instead, it showed that house prices would be rising steadily and the R-squared score of …
Rehearsal Scheduling Problem, Thuan Bao
Rehearsal Scheduling Problem, Thuan Bao
Master's Projects
Scheduling is a common task that plays a crucial role in many industries such as manufacturing or servicing. In a competitive environment, effective scheduling is one of the key factors to reduce cost and increase productivity. Therefore, scheduling problems have been studied by many researchers over the past thirty years. Rehearsal scheduling problem (RSP) is similar to the popular resource-constrained project scheduling problem (RCPSP); however, it does not have activity precedence constraints and the resources’ availabilities are not fixed during processing time. RSP can be used to schedule rehearsal in theatre industry or to schedule group scheduling when each member …
Comparison Of Word2vec With Hash2vec For Machine Translation, Neha Gaikwad
Comparison Of Word2vec With Hash2vec For Machine Translation, Neha Gaikwad
Master's Projects
Machine Translation is the study of computer translation of a text written in one human language into text in a different language. Within this field, a word embedding is a mapping from terms in a language into small dimensional vectors which can be processed using mathematical operations. Two traditional word embedding approaches are word2vec, which uses a Neural Network, and hash2vec, which is based on a simpler hashing algorithm. In this project, we have explored the relative suitability of each approach to sequence to sequence text translation using a Recurrent Neural Network (RNN). We also carried out experiments to test …
Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun
Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun
Master's Projects
Natural Language Processing (NLP) is the process of computers analyzing on human languages. There are also many areas in NLP. Some of the areas include speech recognition, natural language understanding, and natural language generation.
Information retrieval and natural language processing for Asians languages has its own unique set of challenges not present for Indo-European languages. Some of these are text segmentation, named entity recognition in unsegmented text, and part of speech tagging. In this report, we describe our implementation of and experiments with improving the Chinese language processing sub-component of an open source search engine, Yioop. In particular, we rewrote …
Real-Time Ad Click Fraud Detection, Apoorva Srivastava
Real-Time Ad Click Fraud Detection, Apoorva Srivastava
Master's Projects
With the increase in Internet usage, it is now considered a very important platform for advertising and marketing. Digital marketing has become very important to the economy: some of the major Internet services available publicly to users are free, thanks to digital advertising. It has also allowed the publisher ecosystem to flourish, ensuring significant monetary incentives for creating quality public content, helping to usher in the information age. Digital advertising, however, comes with its own set of challenges. One of the biggest challenges is ad fraud. There is a proliferation of malicious parties and software seeking to undermine the ecosystem …
Load Balancing In Cloud Computing, Snehal Dhumal
Load Balancing In Cloud Computing, Snehal Dhumal
Master's Projects
Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time of …
Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma
Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma
Master's Projects
The field of information and computer security is rapidly developing in today’s world as the number of security risks is continuously being explored every day. The moment a new software or a product is launched in the market, a new exploit or vulnerability is exposed and exploited by the attackers or malicious users for different motives. Many attacks are distributed in nature and carried out by botnets that cause widespread disruption of network activity by carrying out DDoS (Distributed Denial of Service) attacks, email spamming, click fraud, information and identity theft, virtual deceit and distributed resource usage for cryptocurrency mining. …
Virtual Robot Locomotion On Variable Terrain With Adversarial Reinforcement Learning, Phong Nguyen
Virtual Robot Locomotion On Variable Terrain With Adversarial Reinforcement Learning, Phong Nguyen
Master's Projects
Reinforcement Learning (RL) is a machine learning technique where an agent learns to perform a complex action by going through a repeated process of trial and error to maximize a well-defined reward function. This form of learning has found applications in robot locomotion where it has been used to teach robots to traverse complex terrain. While RL algorithms may work well in training robot locomotion, they tend to not generalize well when the agent is brought into an environment that it has never encountered before. Possible solutions from the literature include training a destabilizing adversary alongside the locomotive learning agent. …
The Benefits Of Being The Player, Marc Velayo
The Benefits Of Being The Player, Marc Velayo
ART 108: Introduction to Games Studies
Gaming, specifically video games has affected everyone’s lives since its creation during the early 1970s. From being a form of entertainment to being an instructional material for class--the impact of gaming is highly visible in our society. The future of gaming is getting bigger--with the creation of various video games genres, consoles etc. Gaming is exponentially rising with the advancement of technology. With its exponential growth, video games or gaming should be used in our society not just as a form of entertainment, but as a tool for education and self-growth.
Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran
Using Color Thresholding And Contouring To Understand Coral Reef Biodiversity, Scott Vuong Tran
Master's Projects
This paper presents research outcomes of understanding coral reef biodiversity through the usage of various computer vision applications and techniques. It aims to help further analyze and understand the coral reef biodiversity through the usage of color thresholding and contouring onto images of the ARMS plates to extract groups of microorganisms based on color. The results are comparable to the manual markup tool developed to do the same tasks and shows that the manual process can be sped up using computer vision. The paper presents an automated way to extract groups of microorganisms based on color without the use of …
Implementing Tontinecoin, Prashant Pardeshi
Implementing Tontinecoin, Prashant Pardeshi
Master's Projects
One of the alternatives to proof-of-work (PoW) consensus protocols is proof-of- stake (PoS) protocols, which address its energy and cost related issues. But they suffer from the nothing-at-stake problem; validators (PoS miners) are bound to lose nothing if they support multiple blockchain forks. Tendermint, a PoS protocol, handles this problem by forcing validators to bond their stake and then seizing a cheater’s stake when caught signing multiple competing blocks. The seized stake is then evenly distributed amongst the rest of validators. However, as the number of validators increases, the benefit in finding a cheater compared to the cost of monitoring …
Land Registry On Blockchain, Mugdha Patil
Land Registry On Blockchain, Mugdha Patil
Master's Projects
The commercial real estate market is a significant part of the global economy, currently dominated by a small set of firms and organizations that lack transparency. The process of property transfers also requires third party intervention which is expensive. In many countries, the process of title transfers is problematic. We are still in the initial steps of digitization, due to the improvement required in terms of use of technology to represent assets in digital forms. Increase in liquidity of investments and purchases, proper management, documentation as well as ease of access is the future of real estate. Blockchain technologies have …
Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi
Understanding Impact Of Twitter Feed On Bitcoin Price And Trading Patterns, Ashrit Deebadi
Master's Projects
‘‘Cryptocurrency trading was one of the most exciting jobs of 2017’’. ‘‘Bit- coin’’,‘‘Blockchain’’, ‘‘Bitcoin Trading’’ were the most searched words in Google during 2017. High return on investment has attracted many people towards this crypto market. Existing research has shown that the trading price is completely based on speculation, and its trading volume is highly impacted by news media. This paper discusses the existing work to evaluate the sentiment and price of the cryptocurrency, the issues with the current trading models. It builds possible solutions to understand better the semantic orientation of text by comparing different machine learning techniques and …
Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya
Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya
Master's Projects
Relational databases like Oracle, MySQL, and Microsoft SQL Server offer trans- action processing as an integral part of their design. These databases have been a primary choice among developers for business-critical workloads that need the highest form of consistency. On the other hand, the distributed nature of NoSQL databases makes them suitable for scenarios needing scalability, faster data access, and flexible schema design. Recent developments in the NoSQL database community show that NoSQL databases have started to incorporate transactions in their drivers to let users work on business-critical scenarios without compromising the power of distributed NoSQL features [1].
MongoDB is …
How Do Video Games Affect The Brain?, Kenneth Lee
How Do Video Games Affect The Brain?, Kenneth Lee
ART 108: Introduction to Games Studies
Video games are a wildly popular past time in not only America, but other countries as well. Its popularity has done nothing but increase in an exponential fashion, engulfing more and more members of society in its reach; however, its gaining traction in combination with behavioral observations and frequent violent events compelled many to question its effects on those who play them. Some attribute tragedies like recent school shootings to the vast array of First Person Shooter(FPS) games, blaming it for engraining in adolescents’ and adults’ brains a sense of increased aggression and violence. Others praise educational games for stimulating …
Usage And Effects Of Video Games In Education, Kevin Sagara
Usage And Effects Of Video Games In Education, Kevin Sagara
ART 108: Introduction to Games Studies
In modern society, the act of playing games entices certain prejudices towards those who decide to participate in such activities. Those prejudices normally revolve around negative stereotypes where games are meant for non-social adults and are seen as something akin to addiction if gone too far. But how much gaming is needed to be considered as an addiction and what actual effects does it have on mental growth, social capabilities and academics? As a community revolving around technology as much as we are, understanding how video games play a role in our social space is an important aspect to growth. …
Recreating The Virtual Bullets That Pierces Through The Soul Of Gaming: Video Games And Its Cultural Perception On America’S Violent Homefrontier, Brandon Palomino
Recreating The Virtual Bullets That Pierces Through The Soul Of Gaming: Video Games And Its Cultural Perception On America’S Violent Homefrontier, Brandon Palomino
ART 108: Introduction to Games Studies
For the past fifty years, video games have been around as a form of entertainment we consume on a daily basis. Unlike the books and movies seen in pop culture today, video games take us on virtual journeys where people participate in unique gameplay objectives based on player involvement. Because the idea of player engagement was rare at the time, it was inevitable that video games would revolutionize the way we view entertainment onwards. With video games becoming increasingly popular throughout the years, the debate of whether they are truly violent in nature has rubbed many people like myself the …