Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (76)
- Artificial Intelligence and Robotics (44)
- Other Computer Sciences (19)
- Information Security (17)
- OS and Networks (10)
-
- Graphics and Human Computer Interfaces (7)
- Data Science (5)
- Databases and Information Systems (5)
- Art and Design (4)
- Arts and Humanities (4)
- Chemistry (4)
- Game Design (4)
- Meteorology (4)
- Oceanography and Atmospheric Sciences and Meteorology (4)
- Earth Sciences (3)
- Public Affairs, Public Policy and Public Administration (3)
- Social and Behavioral Sciences (3)
- Transportation (3)
- Environmental Sciences (2)
- Geology (2)
- Physics (2)
- Programming Languages and Compilers (2)
- Biogeochemistry (1)
- Computer Engineering (1)
- Engineering (1)
- Robotics (1)
- Sustainability (1)
- Theory and Algorithms (1)
- Urban Studies and Planning (1)
- Keyword
-
- Machine Learning (7)
- Deep Learning (4)
- Natural Language Processing (3)
- Neural networks (3)
- Android malware (2)
-
- BERT (2)
- Blockchain (2)
- CNN (2)
- CNNs (2)
- Data augmentation (2)
- Driver distraction (2)
- Eye tracking (2)
- Eye-tracking (2)
- ML (Machine Learning) (2)
- Machine learning (2)
- Normalization (2)
- Recurrent Neural Networks (2)
- Recurrent neural networks (2)
- SVM (2)
- SpartanGold (2)
- Transformers (2)
- Word2Vec (2)
- 3D mesh Reconstruction (1)
- 5G V2X (1)
- AI (Artificial Intelligence) (1)
- API (Application programming interface) (1)
- API Calls (1)
- Adversarial Attacks (1)
- Air Traffic Control (1)
- Airport Assignment (1)
- Publication
- Publication Type
Articles 61 - 90 of 93
Full-Text Articles in Physical Sciences and Mathematics
Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni
Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni
Master's Projects
Social media platforms are one of the primary resources for information as it is easily accessible, low in cost, and provides a high rate of information spread. Online social media (OSM) have become the main source of news information around the world, but because of the distributed nature of the web, it has increased the risk of fake news spread. Fake news is misleading information that is published as real news. Therefore, identifying fake news and flagging them as such, as well as detecting sources that generate them is an ongoing task for researchers and OSM companies. Bots are artificial …
Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena
Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena
Master's Projects
Digital networking sites such as Twitter give a global platform for users to discuss and express their own experiences with others. People frequently use social media to share their daily experiences, local news, and activities with others. Many rescue services and agencies frequently monitor this sort of data to identify crises and limit the danger of loss of life. During a natural catastrophe, many tweets are made in reference to the tragedy, making it a hot topic on Twitter. Tweets containing natural disaster phrases but do not discuss the event itself are not informational and should be labeled as non-disaster …
Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy
Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy
Master's Projects
Deep learning is one of the most advanced machine learning techniques, and its prominence has increased in recent years. Language processing, predictions in medical research and pattern recognition are few of the numerous fields in which it is widely utilized. Numerous modern medical applications benefit greatly from the implementation of machine learning (ML) models and the disruptive innovations in the entire modern health care system. It is extensively used for constructing accurate and robust statistical models from large volumes of medical data collected from a variety of sources in contemporary healthcare systems [1]. Due to privacy concerns that restrict access …
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Master's Projects
Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.
To recognize attacks and common occurrences, machine learning techniques such as …
Codeval, Aditi Agrawal
Codeval, Aditi Agrawal
Master's Projects
Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …
The Bias Report: An Automated News Aggregator For Political Bias Classification And News Summarization, Anant Joshi
The Bias Report: An Automated News Aggregator For Political Bias Classification And News Summarization, Anant Joshi
Master's Projects
Political polarization is on the rise in the US, driven in large part by divisive news that goes viral on the Internet. Specifically, many media outlets use slanted language and publish misinformation in order to drive user traffic and engagement. Almost 80% of US citizens get their news from online sources, but there is a lack of public safeguards against biased news. A large amount of news is published online every day by media organizations, and it is impossible to manually analyze this amount of data. There is a clear need for automated, public-facing solutions in the current political climate …
Navigating Classic Atari Games With Deep Learning, Ayan Abhiranya Singh
Navigating Classic Atari Games With Deep Learning, Ayan Abhiranya Singh
Master's Projects
Games for the Atari 2600 console provide great environments for testing reinforcement learning algorithms. In reinforcement learning algorithms, an agent typically learns about its environment via the delivery of periodic rewards. Deep Q-Learning, a variant of Q-Learning, utilizes neural networks which train a Q-function to predict the highest future reward given an input state and action. Deep Q-learning has shown great results in training agents to play Atari 2600 games like Space Invaders and Breakout. However, Deep Q-Learning has historically struggled with learning how to play games with greater emphasis on exploration and delayed rewards, like Ms. PacMan. In this …
Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar
Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar
Master's Projects
Facial expression recognition (FER) has been a challenging task in computer vision for decades. With recent advancements in deep learning, convolutional neural networks (CNNs) have shown promising results in this field. However, the accuracy of FER using CNNs heavily relies on the quality of the input images and the size of the dataset. Moreover, even in pictures of the same person with the same expression, brightness, backdrop, and stance might change. These variations are emphasized when comparing pictures of individuals with varying ethnic backgrounds and facial features, which makes it challenging for deep-learning models to classify. In this paper, we …
Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik
Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik
Master's Projects
Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.
This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …
3d Ar Reconstruction, Sneh Arvind Kothari
3d Ar Reconstruction, Sneh Arvind Kothari
Master's Projects
The goal of the project is to improve the shopping experience for users by using augmented reality technology. People generally want opinions from others when buying shoes offline. Clicking and sending images of a shoe is not an ideal solution as it does not give the complete feel of the shoe. We developed the 3D AR Reconstruction app to make this process better. A user of our app clicks photos of the shoe. This image data is converted to form a mesh that can be shared. On receiving a model the user can open it in the app and interact …
Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen
Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen
Master's Projects
Machine translation (MT) aims to translate texts with minimal human involvement, and the utilization of machine learning methods is pivotal to its success. Sentence-level and paragraph-level translations were well-explored in the past decade, such as the Transformer and its variations, but less research was done on the document level. From reading a piece of news in a different language to trying to understand foreign research, document-level translation can be helpful.
This project utilizes a hierarchical attention (HAN) mechanism to abstract context information making document-level translation possible. It further utilizes the Big Bird attention mask in the hope of reducing memory …
Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang
Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang
Master's Projects
As machine learning and deep learning models become ubiquitous, it is inevitable that there will be attempts to exploit such models in various attack scenarios. For example, in a steganographic based attack, information would be hidden in a learning model, which might then be used to gain unauthorized access to a computer, or for other malicious purposes. In this research, we determine the steganographic capacity of various classic machine learning and deep learning models. Specifically, we determine the number of low-order bits of the trained parameters of a given model that can be altered without significantly affecting the performance of …
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Master's Projects
We examine whether machine learning and deep learning techniques can classify World War II era ciphers when only ciphertext is provided. Among the ciphers considered are Enigma, M-209, Sigaba, Purple, and Typex. For our machine learning models, we test a variety of features including the raw ciphertext letter sequence, histograms, and n-grams. The classification is approached in two scenarios. The first scenario considers fixed plaintext encrypted with fixed keys and the second scenario considers random plaintext encrypted with fixed keys. The results show that histograms are the best feature and classic machine learning methods are more appropriate for this kind …
Concept Drift Detection In Android Malware, Inderpreet Singh
Concept Drift Detection In Android Malware, Inderpreet Singh
Master's Projects
Machine learning and deep learning algorithms have been successfully applied to the problems of malware detection, classification, and analysis. However, most of such studies have been limited to applying learning algorithms to a static snapshot of malware, which fails to account for concept drift, that is, the non-stationary nature of the data. In practice, models need to be updated whenever a sufficient level of concept drift has occurred. In this research, we consider concept drift detection in the context of Android malware. We train a series of Support Vector Machines (SVM) over sliding windows of time and compare the resulting …
Spam Comments Detection In Youtube Videos, Priyusha Kotta
Spam Comments Detection In Youtube Videos, Priyusha Kotta
Master's Projects
This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …
A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde
A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde
Master's Projects
Previous attempts to bring the data of the internet to environments that do not have continuous connectivity to the internet have made use of special hardware which requires additional expenditure on installation. We will develop a software-based infrastructure running on existing Android smartphones to exchange application data between a disconnected user’s phone and corresponding application servers on the internet. The goal of this project is to implement client and server modules for this infrastructure to run on a disconnected phone and the internet respectively. These modules will multiplex application data to be sent into packages and distribute the data present …
Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara
Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara
Master's Projects
Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …
Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare
Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare
Master's Projects
Deep neural networks have gained popularity and achieved high performance across multiple domains like medical decision-making, autonomous vehicles, decision support systems, etc. Despite this achievement, the internal workings of these models are opaque and are considered as black boxes due to their nested and non-linear structure. This opaque nature of the deep neural networks makes it difficult to interpret the reason behind their output, thus reducing trust and verifiability of the system where these models are applied. This paper explains a systematic approach to identify the clusters with most misclassifications or false label annotations. For this research, we extracted the …
Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham
Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham
Master's Projects
The volume of air traffic is increasing exponentially every day. The Air Traffic Control (ATC) at the airport has to handle aircraft runway assignments for landing and takeoff and airspace maintenance by directing passing aircraft through the airspace safely. If any aircraft is facing a technical issue or problem and is in a state of emergency, it requires expedited landing to respond to that emergency. The ATC gives this aircraft priority to landing and assistance. This process is very strenuous as the ATC has to deal with multiple aspects along with the emergency aircraft. It is the duty of the …
Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He
Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He
Master's Projects
Nakamoto’s Bitcoin is the first decentralized digital cash system that utilizes a blockchain to manage transactions in its peer-to-peer network. The newer generation of blockchain systems, including Ethereum, extend their capabilities to support deployment of smart contracts within their peer-to-peer networks. However, smart contracts cannot acquire data from sources outside the blockchain since the blockchain network is isolated from the outside world. To obtain data from external sources, smart contracts must rely on Oracles, which are agents that bring data from the outside world to a blockchain network. However, guaranteeing that the oracle’s off-chain nodes are trustworthy remains a challenge. …
Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla
Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla
Master's Projects
This pilot study used a driving simulator experiment to look into how podcast consumption affects driving performance as a continuous distraction. Three volunteers conducted three trials in the study, each with a different driving scenario. Data analysis was done to compare two conditions. The first condition is the Audio, where volunteers listen to podcasts while driving. The second condition is no-audio condition.. The no-audi condition had nothing to play in the background. We used eye-tracking technology to gather gaze data. The study's findings using the post survey and eye fixation data indicate that listening to podcasts leads to continuous distraction …
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Master's Projects
Android malware detection based on machine learning (ML) is widely used by the mobile device security community. Machine learning models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such models make decisions. As a result, popular malware detection strategies remain black box models, which may result in a lack of accountability and trust in the decisions made. The field of explainable artificial intelligence (XAI) attempts to shed light on such black box models. In this research, we apply XAI techniques to ML-based Android malware detection systems. We train classic ML models …
Deep Learning Neural Machine Translation Conversational Agent, Abhishek Vaid
Deep Learning Neural Machine Translation Conversational Agent, Abhishek Vaid
Master's Projects
Neural Machine Translation (NMT) is a prominent natural language processing technique that is being used to develop conversational AI technology. However, most chatbots do not provide live API features and have list-based scripted responses. Most chatbots are majorly restricted by the training data on which they were trained on and have no knowledge of current events. This research project intends to research and develop an approach to providing live information. We experiment with various techniques in terms of the type of data being used to harness live capabilities. We optimize the hyperparameters that are needed for a Conversational AI agent …
Relationalnet Using Graph Neural Networks For Social Recommendations, Dharahas Tallapally
Relationalnet Using Graph Neural Networks For Social Recommendations, Dharahas Tallapally
Master's Projects
Traditional recommender systems create models that can predict user interests based on the user-item relationships. However, these systems often have limited performance due to sparse user behavior data. To address this challenge, researchers are now exploring models for social recommendation that can account for both user- user and user-item relationships based on social networks, and user past behavior, respectively. These models aim to understand each user’s behavior by considering their trusted neighbors and their influence on each other. Specifically, the potential embedding of each user is influenced by their trusted neighbors, who are, in turn, influenced by their own trusted …
Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi
Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi
Master's Projects
With the advances in technology, image classification has become one of the core areas of interest for researchers in the field of computer vision. We, humans, experience great levels of visuals in our day-to-day lives. The human eye is a powerful tool that not only lets us capture images around us but also aids in remembering, distinguishing, and interpreting these visuals. Comprehending the images that the user perceives is an important application in the fields of artificial intelligence, smart security systems, and areas of virtual reality. Recent advances in machine learning and neural networks have led to more precise and …
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
Master's Projects
Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …
Hate Speech Detection In Hindi, Pranjali Prakash Bansod
Hate Speech Detection In Hindi, Pranjali Prakash Bansod
Master's Projects
Social media is a great place to share one’s thoughts and to express oneself. Very often the same social media platforms become a means for spewing hatred.The large amount of data being shared on these platforms make it difficult to moderate the content shared by users. In a diverse country like India hate is present on social media in all regional languages, making it even more difficult to detect hate because of a lack of enough data to train deep/ machine learning models to make them understand regional languages.This work is our attempt at tackling hate speech in Hindi. We …
Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar
Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar
Master's Projects
Botnet is a network of infected computer systems called bots managed remotely by an attacker using bot controllers. Using distributed systems, botnets can be used for large-scale cyber attacks to execute unauthorized actions on the targeted system like phishing, distributed denial of service (DDoS), data theft, and crashing of servers. Common internet protocols used by normal systems for regular communication like hypertext transfer (HTTP) and internet relay chat (IRC) are also used by botnets. Thus, distinguishing botnet activity from normal activity can be challenging. To address this issue, this project proposes an approach to detect botnets using peculiar traits in …
Web Traffic Time Series Forecasting, Summanth Redde Mulkkalla
Web Traffic Time Series Forecasting, Summanth Redde Mulkkalla
Master's Projects
Online web traffic forecasting is one of the most crucial elements of maintaining and improving websites and digital platforms. Traffic patterns usually predict future online traffic, including page views, unique visitors, session duration, and bounce rates. However, it is challenging to forecast non-stationary online web traffic, particularly when the data has spikes or irregular patterns. This non-stationary property demands a more advanced forecasting technique. In this study, we provide a neural networkbased method, Spiking Neural Networks (SNNs), for dealing with the data spikes and irregular patterns in non-stationary data. In our study, we compared the forecasting results of SNNs with …
Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale
Context Aware Neural Machine Translation Using Graph Encoders, Saurabh Kale
Master's Projects
Machine translation presents its root in the domain of textual processing that focuses on the usage of computer software for the purpose of translation of sentences. Neural machine translation follows the same idea and integrates machine learning with the help of neural networks.Various techniques are being explored by researchers and are famously used by Google Translate, Bing Microsoft Translator, Deep Translator, etc. However, these neural machine translation techniques do not incorporate the context of the sentences and are only determined by the phrasesor sentence structure. This report explores the neural machine translation technique dedicated to context-aware translations. It also provides …