Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Master's Projects

Theses/Dissertations

Discipline
Keyword
Publication Year

Articles 31 - 60 of 850

Full-Text Articles in Physical Sciences and Mathematics

Macruby: User Defined Macro Support For Ruby, Arushi Singh Jan 2023

Macruby: User Defined Macro Support For Ruby, Arushi Singh

Master's Projects

Ruby does not have a way to create custom syntax outside what the language already offers. Macros allow custom syntax creation. They achieve this by code generation that transforms a small set of instructions into a larger set of instructions. This gives programmers the opportunity to extend the language based on their own custom needs.

Macros are a form of meta-programming that helps programmers in writing clean and concise code. MacRuby is a hygienic macro system. It works by parsing the Abstract Syntax Tree(AST) and replacing macro references with expanded Ruby code. MacRuby offers an intuitive way to declare macro …


Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu Jan 2023

Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu

Master's Projects

Computer Vision has been quickly transforming the way we live and work. One of its sub- domains, i.e., Facial Recognition has also been advancing at a rapid pace. However, the development of machine learning models that power these systems has been marred by social biases, which open the door to various societal issues. The objective of this project is to address these issues and ensure that computer vision systems are unbiased and fair to all individuals. To achieve this, we have created a web tool that uses three image classifiers (implemented using CNNs) to classify images into categories based on …


Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade Jan 2023

Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade

Master's Projects

Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …


Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada Jan 2023

Static Taint Analysis Via Type-Checking In Typescript, Abhijn Chadalawada

Master's Projects

With the widespread use of web applications across the globe, and the ad- vancements in web technologies in recent years, these applications have grown more ubiquitous and sophisticated than ever before. Modern web applications face the constant threat of numerous web security risks given their presence on the internet and the massive influx of data from external sources. This paper presents a novel method for analyzing taint through type-checking and applies it to web applications in the context of preventing online security threats. The taint analysis technique is implemented in TypeScript using its built-in type-checking features, and then integrated into …


Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani Jan 2023

Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani

Master's Projects

Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …


Container Caching Optimization Based On Explainable Deep Reinforcement Learning, Divyashree Jayaram Jan 2023

Container Caching Optimization Based On Explainable Deep Reinforcement Learning, Divyashree Jayaram

Master's Projects

Serverless edge computing environments use lightweight containers to run IoT services on a need basis i.e only when a service is requested. These containers experience a cold start up latency when starting up. One probable solution to reduce the startup delay is container caching on the edge nodes. Edge nodes are nodes that are closer in proximity to the IoT devices. Efficient container caching strategies are required since the resource availability on these edge devices is limited. Because of this constraint on resources, the container caching strategies should also take proper resource utilization into account. This project tries to further …


Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong Jan 2023

Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong

Master's Projects

Sign language recognition (SLR) has long been a studied subject and research field within the Computer Vision domain. Appearance-based and pose-based approaches are two ways to tackle SLR tasks. Various models from traditional to current state-of-the-art including HOG-based features, Convolutional Neural Network, Recurrent Neural Network, Transformer, and Graph Convolutional Network have been utilized to tackle the area of SLR. While classifying alphabet letters in sign language has shown high accuracy rates, recognizing words presents its set of difficulties including the large vocabulary size, the subtleties in body motions and hand orientations, and regional dialects and variations. The emergence of deep …


Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana Jan 2023

Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana

Master's Projects

Road accidents occur frequently due to driving distractions all around the world. A driving simulator has been created to explore the cognitive effects of distractions while driving in order to address this problem. The purpose of this study is to discover the distraction-causing elements and how they affect driving performance. The simulator offers a secure and regulated setting for carrying out tests while being distracted by different visual distractions, such as solving mathematical equations and number memorizations.

Several trials have been conducted in the studies, which were carried out under varied circumstances like varying driving sceneries and by displaying different …


Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia Jan 2023

Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia

Master's Projects

Yelp is a popular social media platform that has gained much traction over the last few years. The critical feature of Yelp is it has information about any small or large-scale business, as well as reviews received from customers. The reviews have both a 1 to 5 star rating, as well as text. For a particular business, any user can view the reviews, but the stars are what most users check because it is an easy and fast way to decide. Therefore, the star rating is a good metric to measure a particular business’s value. However, there are other attributes …


Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni Jan 2023

Twitter Bot Detection Using Nlp And Graph Classification, Warada Jayant Kulkarni

Master's Projects

Social media platforms are one of the primary resources for information as it is easily accessible, low in cost, and provides a high rate of information spread. Online social media (OSM) have become the main source of news information around the world, but because of the distributed nature of the web, it has increased the risk of fake news spread. Fake news is misleading information that is published as real news. Therefore, identifying fake news and flagging them as such, as well as detecting sources that generate them is an ongoing task for researchers and OSM companies. Bots are artificial …


Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena Jan 2023

Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena

Master's Projects

Digital networking sites such as Twitter give a global platform for users to discuss and express their own experiences with others. People frequently use social media to share their daily experiences, local news, and activities with others. Many rescue services and agencies frequently monitor this sort of data to identify crises and limit the danger of loss of life. During a natural catastrophe, many tweets are made in reference to the tragedy, making it a hot topic on Twitter. Tweets containing natural disaster phrases but do not discuss the event itself are not informational and should be labeled as non-disaster …


Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy Jan 2023

Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy

Master's Projects

Deep learning is one of the most advanced machine learning techniques, and its prominence has increased in recent years. Language processing, predictions in medical research and pattern recognition are few of the numerous fields in which it is widely utilized. Numerous modern medical applications benefit greatly from the implementation of machine learning (ML) models and the disruptive innovations in the entire modern health care system. It is extensively used for constructing accurate and robust statistical models from large volumes of medical data collected from a variety of sources in contemporary healthcare systems [1]. Due to privacy concerns that restrict access …


Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli Jan 2023

Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli

Master's Projects

Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.

To recognize attacks and common occurrences, machine learning techniques such as …


Codeval, Aditi Agrawal Jan 2023

Codeval, Aditi Agrawal

Master's Projects

Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …


The Bias Report: An Automated News Aggregator For Political Bias Classification And News Summarization, Anant Joshi Jan 2023

The Bias Report: An Automated News Aggregator For Political Bias Classification And News Summarization, Anant Joshi

Master's Projects

Political polarization is on the rise in the US, driven in large part by divisive news that goes viral on the Internet. Specifically, many media outlets use slanted language and publish misinformation in order to drive user traffic and engagement. Almost 80% of US citizens get their news from online sources, but there is a lack of public safeguards against biased news. A large amount of news is published online every day by media organizations, and it is impossible to manually analyze this amount of data. There is a clear need for automated, public-facing solutions in the current political climate …


Resource Coordination Learning For End-To-End Network Slicing Under Limited State Visibility, Xiang Liu Jan 2023

Resource Coordination Learning For End-To-End Network Slicing Under Limited State Visibility, Xiang Liu

Master's Projects

This paper discusses a resource coordination problem under limited state visibility to realize end-to-end network slices that are hosted by multiple network domains. We formulate this resource coordination problem as a special type of the multi- armed bandit (MAB) problem called the combinatorial multi-armed bandit (CMAB) problem. Based on this formulation, we convert the problem to a regret minimization problem with a linear objective function and solve it by adapting the Learning with Linear Rewards (LLR) algorithm. In this paper, we present a new hybrid approach that incorporates state reports, which include partial resource information in each domain, into the …


Navigating Classic Atari Games With Deep Learning, Ayan Abhiranya Singh Jan 2023

Navigating Classic Atari Games With Deep Learning, Ayan Abhiranya Singh

Master's Projects

Games for the Atari 2600 console provide great environments for testing reinforcement learning algorithms. In reinforcement learning algorithms, an agent typically learns about its environment via the delivery of periodic rewards. Deep Q-Learning, a variant of Q-Learning, utilizes neural networks which train a Q-function to predict the highest future reward given an input state and action. Deep Q-learning has shown great results in training agents to play Atari 2600 games like Space Invaders and Breakout. However, Deep Q-Learning has historically struggled with learning how to play games with greater emphasis on exploration and delayed rewards, like Ms. PacMan. In this …


Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar Jan 2023

Enhancing Facial Emotion Recognition Using Image Processing With Cnn, Sourabh Deokar

Master's Projects

Facial expression recognition (FER) has been a challenging task in computer vision for decades. With recent advancements in deep learning, convolutional neural networks (CNNs) have shown promising results in this field. However, the accuracy of FER using CNNs heavily relies on the quality of the input images and the size of the dataset. Moreover, even in pictures of the same person with the same expression, brightness, backdrop, and stance might change. These variations are emphasized when comparing pictures of individuals with varying ethnic backgrounds and facial features, which makes it challenging for deep-learning models to classify. In this paper, we …


Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik Jan 2023

Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik

Master's Projects

Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.

This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …


3d Ar Reconstruction, Sneh Arvind Kothari Jan 2023

3d Ar Reconstruction, Sneh Arvind Kothari

Master's Projects

The goal of the project is to improve the shopping experience for users by using augmented reality technology. People generally want opinions from others when buying shoes offline. Clicking and sending images of a shoe is not an ideal solution as it does not give the complete feel of the shoe. We developed the 3D AR Reconstruction app to make this process better. A user of our app clicks photos of the shoe. This image data is converted to form a mesh that can be shared. On receiving a model the user can open it in the app and interact …


Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen Jan 2023

Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen

Master's Projects

Machine translation (MT) aims to translate texts with minimal human involvement, and the utilization of machine learning methods is pivotal to its success. Sentence-level and paragraph-level translations were well-explored in the past decade, such as the Transformer and its variations, but less research was done on the document level. From reading a piece of news in a different language to trying to understand foreign research, document-level translation can be helpful.

This project utilizes a hierarchical attention (HAN) mechanism to abstract context information making document-level translation possible. It further utilizes the Big Bird attention mask in the hope of reducing memory …


Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang Jan 2023

Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang

Master's Projects

As machine learning and deep learning models become ubiquitous, it is inevitable that there will be attempts to exploit such models in various attack scenarios. For example, in a steganographic based attack, information would be hidden in a learning model, which might then be used to gain unauthorized access to a computer, or for other malicious purposes. In this research, we determine the steganographic capacity of various classic machine learning and deep learning models. Specifically, we determine the number of low-order bits of the trained parameters of a given model that can be altered without significantly affecting the performance of …


Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton Jan 2023

Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton

Master's Projects

We examine whether machine learning and deep learning techniques can classify World War II era ciphers when only ciphertext is provided. Among the ciphers considered are Enigma, M-209, Sigaba, Purple, and Typex. For our machine learning models, we test a variety of features including the raw ciphertext letter sequence, histograms, and n-grams. The classification is approached in two scenarios. The first scenario considers fixed plaintext encrypted with fixed keys and the second scenario considers random plaintext encrypted with fixed keys. The results show that histograms are the best feature and classic machine learning methods are more appropriate for this kind …


Concept Drift Detection In Android Malware, Inderpreet Singh Jan 2023

Concept Drift Detection In Android Malware, Inderpreet Singh

Master's Projects

Machine learning and deep learning algorithms have been successfully applied to the problems of malware detection, classification, and analysis. However, most of such studies have been limited to applying learning algorithms to a static snapshot of malware, which fails to account for concept drift, that is, the non-stationary nature of the data. In practice, models need to be updated whenever a sufficient level of concept drift has occurred. In this research, we consider concept drift detection in the context of Android malware. We train a series of Support Vector Machines (SVM) over sliding windows of time and compare the resulting …


Keystroke Dynamics And User Identification, Atharva Sharma Jan 2023

Keystroke Dynamics And User Identification, Atharva Sharma

Master's Projects

We consider the potential of keystroke dynamics for user identification and authentication. We work with a fixed-text dataset, and focus on clustering users based on the difficulty of distinguishing their typing characteristics. After obtaining a confusion matrix, we cluster users into different levels of classification difficulty based on their typing patterns. Our goal is to create meaningful clusters that enable us to apply appropriate authentication methods to specific user clusters, resulting in an optimized balance between security and efficiency. We use a novel feature engineering method that generates image-like features from keystrokes and employ multiclass Convolutional Neural Networks (CNNs) to …


Spam Comments Detection In Youtube Videos, Priyusha Kotta Jan 2023

Spam Comments Detection In Youtube Videos, Priyusha Kotta

Master's Projects

This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …


A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde Jan 2023

A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde

Master's Projects

Previous attempts to bring the data of the internet to environments that do not have continuous connectivity to the internet have made use of special hardware which requires additional expenditure on installation. We will develop a software-based infrastructure running on existing Android smartphones to exchange application data between a disconnected user’s phone and corresponding application servers on the internet. The goal of this project is to implement client and server modules for this infrastructure to run on a disconnected phone and the internet respectively. These modules will multiplex application data to be sent into packages and distribute the data present …


Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara Jan 2023

Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara

Master's Projects

Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …


Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare Jan 2023

Visualizing Classification Errors And Mislabeling In Machine Learning, Vedashree Bhandare

Master's Projects

Deep neural networks have gained popularity and achieved high performance across multiple domains like medical decision-making, autonomous vehicles, decision support systems, etc. Despite this achievement, the internal workings of these models are opaque and are considered as black boxes due to their nested and non-linear structure. This opaque nature of the deep neural networks makes it difficult to interpret the reason behind their output, thus reducing trust and verifiability of the system where these models are applied. This paper explains a systematic approach to identify the clusters with most misclassifications or false label annotations. For this research, we extracted the …


Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham Jan 2023

Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham

Master's Projects

The volume of air traffic is increasing exponentially every day. The Air Traffic Control (ATC) at the airport has to handle aircraft runway assignments for landing and takeoff and airspace maintenance by directing passing aircraft through the airspace safely. If any aircraft is facing a technical issue or problem and is in a state of emergency, it requires expedited landing to respond to that emergency. The ATC gives this aircraft priority to landing and assistance. This process is very strenuous as the ATC has to deal with multiple aspects along with the emergency aircraft. It is the duty of the …