Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2023

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 93

Full-Text Articles in Physical Sciences and Mathematics

Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi Jan 2023

Sign Language Recognition Using A Hybrid Machine Learning Model, Peeyusha Shivayogi

Master's Projects

Sign Language is a visual language used by millions of people around the world. American Sign Language (ASL) is one of the most popular sign languages and the third most popular language in the United States. Automatic recognition of ASL signs can help bridge the communication gap between deaf and hearing individuals. In this project, we explore the use of deep learning models for ASL sign recognition, using the MNIST dataset as a benchmark. We preprocessed the data by reshaping the images to the input layer size of the models and normalized the pixel values. We evaluated five popular deep-learning …


Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri Jan 2023

Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri

Master's Projects

Increasing reliance on digital services and the limitations of traditional authentication methods have necessitated the development of more advanced and secure user authentication methods. For user authentication and intrusion detection, mouse dynamics, a form of behavioral biometrics, offers a promising and non-invasive method. This paper presents a comprehensive study on ML-Based User Authentication Through Mouse Dynamics.

This project proposes a novel framework integrating sophisticated techniques such as embeddings extraction using Transformer models with cutting-edge machine learning algorithms such as Recurrent Neural Networks (RNN). The project aims to accurately identify users based on their distinct mouse behavior and detect unauthorized access …


Insecure Deserialization Detection In Python, Aneesh Verma Jan 2023

Insecure Deserialization Detection In Python, Aneesh Verma

Master's Projects

The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …


Classification Of Darknet Traffic By Application Type, Shruti Sharma Jan 2023

Classification Of Darknet Traffic By Application Type, Shruti Sharma

Master's Projects

The darknet is frequently exploited for illegal purposes and activities, which makes darknet traffic detection an important security topic. Previous research has focused on various classification techniques for darknet traffic using machine learning and deep learning. We extend previous work by considering the effectiveness of a wide range of machine learning and deep learning technique for the classification of darknet traffic by application type. We consider the CICDarknet2020 dataset, which has been used in many previous studies, thus enabling a direct comparison of our results to previous work. We find that XGBoost performs the best among the classifiers that we …


Vehicle-Based Disconnected Data Distribution, Aditya Singhania Jan 2023

Vehicle-Based Disconnected Data Distribution, Aditya Singhania

Master's Projects

The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks

(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …


Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni Jan 2023

Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni

Master's Projects

Many businesses, including Facebook, Netflix, and YouTube, rely heavily on a recommendation system. Recommendation systems are algorithms that attempt to provide consumers with relevant suggestions for items such as movies, videos, or reels (microvideos) to watch, hashtags for their posts, songs to listen to, and products to purchase. In many businesses, recommender systems are essential because they can generate enormous amounts of revenue and make the platform stand out when compared to others. Reels are a feature of the social media platforms that enable users to create and share videos of up to sixty seconds in length. Individuals, businesses, and …


Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao Jan 2023

Application Of Knowledge Graph Techniques On Textbooks, Yutong Yao

Master's Projects

Textbooks are written and organized in a way that facilitates learning and understanding. Sections like glossary terms at the end of a textbook provide guidance on the topic of interest. However, it takes manual effort to create the index terms in the glossary that highlight the key referenced terminologies and related terms. Knowledge graphs, which have been used to represent and even reason over data and knowledge, can potentially capture textbook’s important terms, concepts, and their relations. Popular since the initial introduction by Google Knowledge Graphs (KGs), they combine graph and data to capture and model enormous amounts of relational …


Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee Jan 2023

Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee

Master's Projects

Coral Reefs and their diverse array of life forms play a vital role in maintaining the health of our planet's environment. However, due to their fragility, it can be challenging to study the reefs without damaging their delicate ecosystem. To address this issue, researchers have employed non-invasive methods such as using Autonomous Reef Monitoring Structures (ARMS) plates to monitor biodiversity. Data was collected as genetic samples from the plates, and high-resolution photographs were taken. To make the best use of this image data, scientists have turned to machine learning and computer vision. Prior to this study, MASKR-CNN was utilized as …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy Jan 2023

Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy

Master's Projects

Malware detection is vital as it ensures that a computer is safe from any kind of malicious software that puts users at risk. Too many variants of these malicious software are being introduced everyday at increased speed. Thus, to guarantee security of computer systems, huge advancements in the field of malware detection are made and one such approach is to use machine learning for malware detection. Even though machine learning is very powerful, it is prone to adversarial attacks. In this project, we will try to apply adversarial attacks on malware detection models. To perform these attacks, fake samples that …


Job Tailored Resume Content Generation, Sumedh Kale Jan 2023

Job Tailored Resume Content Generation, Sumedh Kale

Master's Projects

Generally candidates apply to multiple jobs with a single resume and do not tend to customize their resume to match the job description. This hampers their chances of getting a resume shortlisted for the job. The project aims to help such candidates build job tailored resumes that help them create a customized and targeted resume for a specific job or industry. The tool specifically targets candidates’ employment history, for resume content generation. We then use natural language processing

(NLP) techniques to extract and organize this data into a structured format for the dataset. We experiment with multiple variations of the …


Location And Environment Aware Mmwave Beam Selection Using Vision Transformer, Srajan Gupta Jan 2023

Location And Environment Aware Mmwave Beam Selection Using Vision Transformer, Srajan Gupta

Master's Projects

5G networks explore mmWave technology to achieve faster data transfer and higher network capacity. The reduced coverage area of mmWaves creates the need to deploy large antenna arrays. However, beam sweeping across a large number of antenna arrays typically involves high overhead and latency. In a vehicle-to- everything (V2X) system, beam selection becomes a frequent process in the case when vehicles are moving at high speed, leading to frequent connection delays. Modern-day vehicular systems are integrated with advanced sensors like global positioning system

(GPS), light detection and ranging (LIDAR), radio detection and ranging (RADAR), etc. Machine learning models can be …


Multi-Label Text Classification With Transfer Learning, Likhitha Yelamanchili Jan 2023

Multi-Label Text Classification With Transfer Learning, Likhitha Yelamanchili

Master's Projects

Multi-label text categorization is a crucial task in Natural Language Processing, where each text instance can be simultaneously assigned to numerous labels. This project's goal is to assess how well several deep learning models perform on a real-world dataset for multi-label text classification. We employed data augmentation techniques like Synonym Substitution and Random Word Substitution to address the problem of data imbalance. We conducted experiments on a toxic comment classification dataset to evaluate the effectiveness of several deep learning models including Bi-LSTM, GRU, and Bi-GRU, as well as fine- tuned pre-trained BERT models. Many metrics, including log loss, recall@k, and …


Nft Artifact Prediction Using Machine Learning, Rishabh Pandey Jan 2023

Nft Artifact Prediction Using Machine Learning, Rishabh Pandey

Master's Projects

NFT Prediction Systems are web applications that provide their users with valuable insights about the artifact. These insights are useful for investors and collectors to make better decisions about their purchases. This project builds upon the same concept of prediction by developing a web application to dynamically provide recommendations based on user input and training an ML model to predict their cost. Preliminary work for the prediction system involved data collection, pre-processing, analysis, and filtering of large datasets from diverse sources. The project focused on the development of a user- friendly UI to enable seamless categorization of search results generated …


The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta Jan 2023

The New Student: The Enhancement Of An Ebook To Support Emotional Connection, Rebecca Zumaeta

Master's Projects

EBooks are a form of multimedia applications that encourage cognitive learning. Multimedia can also influence readers to have a deeper connection to the story. Understanding the influence of a static picture book versus an animated and audio guided eBook can prove valuable in developing learning media and other forms of content. In this research we take a published children's book and apply the content into a multimedia eBook. The purpose of the creation of the eBook is to compare the interest of a reader on a story when static format, when some multimedia is added and when the story is …


Malware Classification Using Graph Neural Networks, Manasa Mananjaya Jan 2023

Malware Classification Using Graph Neural Networks, Manasa Mananjaya

Master's Projects

Word embeddings are widely recognized as important in natural language pro- cessing for capturing semantic relationships between words. In this study, we conduct experiments to explore the effectiveness of word embedding techniques in classifying malware. Specifically, we evaluate the performance of Graph Neural Network (GNN) applied to knowledge graphs constructed from opcode sequences of malware files. In the first set of experiments, Graph Convolution Network (GCN) is applied to knowledge graphs built with different word embedding techniques such as Bag-of-words, TF-IDF, and Word2Vec. Our results indicate that Word2Vec produces the most effective word embeddings, serving as a baseline for comparison …


Automated Evaluation For Distributed System Assignments, Nimesh Nischal Jan 2023

Automated Evaluation For Distributed System Assignments, Nimesh Nischal

Master's Projects

A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …


Cirrus Microphysical Properties And The Controlling Factors Using A Machine Learning Approach, Derek D. Ngo Jan 2023

Cirrus Microphysical Properties And The Controlling Factors Using A Machine Learning Approach, Derek D. Ngo

Master's Theses

Cirrus clouds are located at high altitudes and are composed of ice crystals. The unique location of cirrus clouds and their large variability in-cloud microphysical properties allow them to have either warming or cooling effects on Earth’s surface and affect the Earth’s energy budget on a global scale. The examination of cirrus radiative effects is further complicated by multiple factors affecting their formation and evolution, including the effects of thermodynamic, dynamic, aerosol, and chemical tracer variables. In this work, we developed a composite aircraft-based in-situ observation dataset based on seven National Science Foundation (NSF) and five NASA flight campaigns that …


Cloud Phase Distribution At A Global-Scale And The Governing Factors Using Satellite And In-Situ Airborne Observations, Dao Wang Jan 2023

Cloud Phase Distribution At A Global-Scale And The Governing Factors Using Satellite And In-Situ Airborne Observations, Dao Wang

Master's Theses

Cloud thermodynamic phase distributions play a crucial role in accurately representing cloud radiative effects and feedback in a changing climate. The partitioning of cloud thermodynamic phases (ice, liquid, and mixed phase) significantly influences Earth's surface temperature and its ability to mitigate the impact of global warming. Satellite-based cloud phase data are frequently used for the evaluation of global climate models, yet validation of them against in-situ observations is still lacking. This study examines global cloud phase distributions and their determinant factors by validating three satellite-based cloud phase products against an extensive in-situ airborne dataset. CALIPSO exhibits the most similar ice …


Personalized Tweet Recommendation Using Users’ Image Preferences, Shashwat Avinash Kadam Jan 2023

Personalized Tweet Recommendation Using Users’ Image Preferences, Shashwat Avinash Kadam

Master's Projects

In the era of information explosion, the vast amount of data on social media platforms can overwhelm users. Not only does this information explosion contain irrelevant content, but also intentionally fabricated articles and images. As a result, personalized recommendation systems have become increasingly important to help users navigate and make sense of this data. We propose a novel technique to use users’ image preferences to recommend tweets. We extract vital information by analyzing images liked by users and use it to recommend tweets from Twitter. As many images online have no descriptive metadata associated with them, in this framework, we …


Robust Cache System For Web Search Engine Yioop, Rushikesh Padia Jan 2023

Robust Cache System For Web Search Engine Yioop, Rushikesh Padia

Master's Projects

Caches are the most effective mechanism utilized by web search engines to optimize the performance of search queries. Search engines employ caching at multiple levels to improve its performance, for example, caching posting list and caching result set. Caching query results reduces overhead of processing frequent queries and thus saves a lot of time and computing power. Yioop is an open-source web search engine which utilizes result cache to optimize searches. The current implementation utilizes a single dynamic cache based on Marker’s algorithm. The goal of the project is to improve the performance of cache in Yioop. To choose a …


Macruby: User Defined Macro Support For Ruby, Arushi Singh Jan 2023

Macruby: User Defined Macro Support For Ruby, Arushi Singh

Master's Projects

Ruby does not have a way to create custom syntax outside what the language already offers. Macros allow custom syntax creation. They achieve this by code generation that transforms a small set of instructions into a larger set of instructions. This gives programmers the opportunity to extend the language based on their own custom needs.

Macros are a form of meta-programming that helps programmers in writing clean and concise code. MacRuby is a hygienic macro system. It works by parsing the Abstract Syntax Tree(AST) and replacing macro references with expanded Ruby code. MacRuby offers an intuitive way to declare macro …


Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu Jan 2023

Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu

Master's Projects

Computer Vision has been quickly transforming the way we live and work. One of its sub- domains, i.e., Facial Recognition has also been advancing at a rapid pace. However, the development of machine learning models that power these systems has been marred by social biases, which open the door to various societal issues. The objective of this project is to address these issues and ensure that computer vision systems are unbiased and fair to all individuals. To achieve this, we have created a web tool that uses three image classifiers (implemented using CNNs) to classify images into categories based on …


Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade Jan 2023

Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade

Master's Projects

Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …


Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada Jan 2023

Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada

Master's Projects

With the widespread use of web applications across the globe, and the ad- vancements in web technologies in recent years, these applications have grown more ubiquitous and sophisticated than ever before. Modern web applications face the constant threat of numerous web security risks given their presence on the internet and the massive influx of data from external sources. This paper presents a novel method for analyzing taint through type-checking and applies it to web applications in the context of preventing online security threats. The taint analysis technique is implemented in TypeScript using its built-in type-checking features, and then integrated into …


Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani Jan 2023

Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani

Master's Projects

Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …


Container Caching Optimization Based On Explainable Deep Reinforcement Learning, Divyashree Jayaram Jan 2023

Container Caching Optimization Based On Explainable Deep Reinforcement Learning, Divyashree Jayaram

Master's Projects

Serverless edge computing environments use lightweight containers to run IoT services on a need basis i.e only when a service is requested. These containers experience a cold start up latency when starting up. One probable solution to reduce the startup delay is container caching on the edge nodes. Edge nodes are nodes that are closer in proximity to the IoT devices. Efficient container caching strategies are required since the resource availability on these edge devices is limited. Because of this constraint on resources, the container caching strategies should also take proper resource utilization into account. This project tries to further …


Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong Jan 2023

Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong

Master's Projects

Sign language recognition (SLR) has long been a studied subject and research field within the Computer Vision domain. Appearance-based and pose-based approaches are two ways to tackle SLR tasks. Various models from traditional to current state-of-the-art including HOG-based features, Convolutional Neural Network, Recurrent Neural Network, Transformer, and Graph Convolutional Network have been utilized to tackle the area of SLR. While classifying alphabet letters in sign language has shown high accuracy rates, recognizing words presents its set of difficulties including the large vocabulary size, the subtleties in body motions and hand orientations, and regional dialects and variations. The emergence of deep …


Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana Jan 2023

Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana

Master's Projects

Road accidents occur frequently due to driving distractions all around the world. A driving simulator has been created to explore the cognitive effects of distractions while driving in order to address this problem. The purpose of this study is to discover the distraction-causing elements and how they affect driving performance. The simulator offers a secure and regulated setting for carrying out tests while being distracted by different visual distractions, such as solving mathematical equations and number memorizations.

Several trials have been conducted in the studies, which were carried out under varied circumstances like varying driving sceneries and by displaying different …


Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia Jan 2023

Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia

Master's Projects

Yelp is a popular social media platform that has gained much traction over the last few years. The critical feature of Yelp is it has information about any small or large-scale business, as well as reviews received from customers. The reviews have both a 1 to 5 star rating, as well as text. For a particular business, any user can view the reviews, but the stars are what most users check because it is an easy and fast way to decide. Therefore, the star rating is a good metric to measure a particular business’s value. However, there are other attributes …