Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Master's Projects

Discipline
Keyword
Publication Year

Articles 1 - 30 of 818

Full-Text Articles in Physical Sciences and Mathematics

Vehicle-Based Disconnected Data Distribution, Aditya Singhania Jan 2023

Vehicle-Based Disconnected Data Distribution, Aditya Singhania

Master's Projects

The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks

(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …


Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade Jan 2023

Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade

Master's Projects

Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …


Macruby: User Defined Macro Support For Ruby, Arushi Singh Jan 2023

Macruby: User Defined Macro Support For Ruby, Arushi Singh

Master's Projects

Ruby does not have a way to create custom syntax outside what the language already offers. Macros allow custom syntax creation. They achieve this by code generation that transforms a small set of instructions into a larger set of instructions. This gives programmers the opportunity to extend the language based on their own custom needs.

Macros are a form of meta-programming that helps programmers in writing clean and concise code. MacRuby is a hygienic macro system. It works by parsing the Abstract Syntax Tree(AST) and replacing macro references with expanded Ruby code. MacRuby offers an intuitive way to declare macro …


Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah Jan 2023

Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah

Master's Projects

In recent years, social cognitive theory has emphasized the role of cognitive processes in shaping perceptions and behavior related to gender bias. By examining the impact of targeted training interventions, this study seeks to better understand the influence of such processes on decision-making in the context of character selection. This human-computer interaction study explores the potential of intervention-based training to untraining gender bias in character selection. With an increasing need to address gender bias in various domains, understanding the impact of gender-based training becomes crucial. According to our hypothesis, exposure to masculine characters would boost people’s preference for female- intellectualized …


3d Ar Reconstruction, Sneh Arvind Kothari Jan 2023

3d Ar Reconstruction, Sneh Arvind Kothari

Master's Projects

The goal of the project is to improve the shopping experience for users by using augmented reality technology. People generally want opinions from others when buying shoes offline. Clicking and sending images of a shoe is not an ideal solution as it does not give the complete feel of the shoe. We developed the 3D AR Reconstruction app to make this process better. A user of our app clicks photos of the shoe. This image data is converted to form a mesh that can be shared. On receiving a model the user can open it in the app and interact …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


Insecure Deserialization Detection In Python, Aneesh Verma Jan 2023

Insecure Deserialization Detection In Python, Aneesh Verma

Master's Projects

The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …


Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara Jan 2023

Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara

Master's Projects

Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …


Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar Jan 2023

Dynamic Predictions Of Thermal Heating And Cooling Of Silicon Wafer, Hitesh Kumar

Master's Projects

Neural Networks are now emerging in every industry. All the industries are trying their best to exploit the benefits of neural networks and deep learning to make predictions or simulate their ongoing process with the use of their generated data. The purpose of this report is to study the heating pattern of a silicon wafer and make predictions using various machine learning techniques. The heating of the silicon wafer involves various factors ranging from number of lamps, wafer properties and points taken in consideration to capture the heating temperature. This process involves dynamic inputs which facilitates the heating of the …


Hate Speech Detection In Hindi, Pranjali Prakash Bansod Jan 2023

Hate Speech Detection In Hindi, Pranjali Prakash Bansod

Master's Projects

Social media is a great place to share one’s thoughts and to express oneself. Very often the same social media platforms become a means for spewing hatred.The large amount of data being shared on these platforms make it difficult to moderate the content shared by users. In a diverse country like India hate is present on social media in all regional languages, making it even more difficult to detect hate because of a lack of enough data to train deep/ machine learning models to make them understand regional languages.This work is our attempt at tackling hate speech in Hindi. We …


Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia Jan 2023

Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia

Master's Projects

Yelp is a popular social media platform that has gained much traction over the last few years. The critical feature of Yelp is it has information about any small or large-scale business, as well as reviews received from customers. The reviews have both a 1 to 5 star rating, as well as text. For a particular business, any user can view the reviews, but the stars are what most users check because it is an easy and fast way to decide. Therefore, the star rating is a good metric to measure a particular business’s value. However, there are other attributes …


Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli Jan 2023

Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli

Master's Projects

Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.

To recognize attacks and common occurrences, machine learning techniques such as …


Classification Of Darknet Traffic By Application Type, Shruti Sharma Jan 2023

Classification Of Darknet Traffic By Application Type, Shruti Sharma

Master's Projects

The darknet is frequently exploited for illegal purposes and activities, which makes darknet traffic detection an important security topic. Previous research has focused on various classification techniques for darknet traffic using machine learning and deep learning. We extend previous work by considering the effectiveness of a wide range of machine learning and deep learning technique for the classification of darknet traffic by application type. We consider the CICDarknet2020 dataset, which has been used in many previous studies, thus enabling a direct comparison of our results to previous work. We find that XGBoost performs the best among the classifiers that we …


Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu Jan 2023

Bias Detector Tool For Face Datasets Using Image Recognition, Jatin Vamshi Battu

Master's Projects

Computer Vision has been quickly transforming the way we live and work. One of its sub- domains, i.e., Facial Recognition has also been advancing at a rapid pace. However, the development of machine learning models that power these systems has been marred by social biases, which open the door to various societal issues. The objective of this project is to address these issues and ensure that computer vision systems are unbiased and fair to all individuals. To achieve this, we have created a web tool that uses three image classifiers (implemented using CNNs) to classify images into categories based on …


Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee Jan 2023

Analyzing Improvement Of Mask R-Cnn On Arms Plates (And Sponges And Coral), James Lee

Master's Projects

Coral Reefs and their diverse array of life forms play a vital role in maintaining the health of our planet's environment. However, due to their fragility, it can be challenging to study the reefs without damaging their delicate ecosystem. To address this issue, researchers have employed non-invasive methods such as using Autonomous Reef Monitoring Structures (ARMS) plates to monitor biodiversity. Data was collected as genetic samples from the plates, and high-resolution photographs were taken. To make the best use of this image data, scientists have turned to machine learning and computer vision. Prior to this study, MASKR-CNN was utilized as …


Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy Jan 2023

Federated Learning For Protecting Medical Data Privacy, Abhishek Reddy Punreddy

Master's Projects

Deep learning is one of the most advanced machine learning techniques, and its prominence has increased in recent years. Language processing, predictions in medical research and pattern recognition are few of the numerous fields in which it is widely utilized. Numerous modern medical applications benefit greatly from the implementation of machine learning (ML) models and the disruptive innovations in the entire modern health care system. It is extensively used for constructing accurate and robust statistical models from large volumes of medical data collected from a variety of sources in contemporary healthcare systems [1]. Due to privacy concerns that restrict access …


Malware Classification Using Graph Neural Networks, Manasa Mananjaya Jan 2023

Malware Classification Using Graph Neural Networks, Manasa Mananjaya

Master's Projects

Word embeddings are widely recognized as important in natural language pro- cessing for capturing semantic relationships between words. In this study, we conduct experiments to explore the effectiveness of word embedding techniques in classifying malware. Specifically, we evaluate the performance of Graph Neural Network (GNN) applied to knowledge graphs constructed from opcode sequences of malware files. In the first set of experiments, Graph Convolution Network (GCN) is applied to knowledge graphs built with different word embedding techniques such as Bag-of-words, TF-IDF, and Word2Vec. Our results indicate that Word2Vec produces the most effective word embeddings, serving as a baseline for comparison …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena Jan 2023

Leveraging Tweets For Rapid Disaster Response Using Bert-Bilstm-Cnn Model, Satya Pranavi Manthena

Master's Projects

Digital networking sites such as Twitter give a global platform for users to discuss and express their own experiences with others. People frequently use social media to share their daily experiences, local news, and activities with others. Many rescue services and agencies frequently monitor this sort of data to identify crises and limit the danger of loss of life. During a natural catastrophe, many tweets are made in reference to the tragedy, making it a hot topic on Twitter. Tweets containing natural disaster phrases but do not discuss the event itself are not informational and should be labeled as non-disaster …


Robust Cache System For Web Search Engine Yioop, Rushikesh Padia Jan 2023

Robust Cache System For Web Search Engine Yioop, Rushikesh Padia

Master's Projects

Caches are the most effective mechanism utilized by web search engines to optimize the performance of search queries. Search engines employ caching at multiple levels to improve its performance, for example, caching posting list and caching result set. Caching query results reduces overhead of processing frequent queries and thus saves a lot of time and computing power. Yioop is an open-source web search engine which utilizes result cache to optimize searches. The current implementation utilizes a single dynamic cache based on Marker’s algorithm. The goal of the project is to improve the performance of cache in Yioop. To choose a …


Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong Jan 2023

Video Sign Language Recognition Using Pose Extraction And Deep Learning Models, Shayla Luong

Master's Projects

Sign language recognition (SLR) has long been a studied subject and research field within the Computer Vision domain. Appearance-based and pose-based approaches are two ways to tackle SLR tasks. Various models from traditional to current state-of-the-art including HOG-based features, Convolutional Neural Network, Recurrent Neural Network, Transformer, and Graph Convolutional Network have been utilized to tackle the area of SLR. While classifying alphabet letters in sign language has shown high accuracy rates, recognizing words presents its set of difficulties including the large vocabulary size, the subtleties in body motions and hand orientations, and regional dialects and variations. The emergence of deep …


Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri Jan 2023

Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri

Master's Projects

Increasing reliance on digital services and the limitations of traditional authentication methods have necessitated the development of more advanced and secure user authentication methods. For user authentication and intrusion detection, mouse dynamics, a form of behavioral biometrics, offers a promising and non-invasive method. This paper presents a comprehensive study on ML-Based User Authentication Through Mouse Dynamics.

This project proposes a novel framework integrating sophisticated techniques such as embeddings extraction using Transformer models with cutting-edge machine learning algorithms such as Recurrent Neural Networks (RNN). The project aims to accurately identify users based on their distinct mouse behavior and detect unauthorized access …


Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy Jan 2023

Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy

Master's Projects

Malware detection is vital as it ensures that a computer is safe from any kind of malicious software that puts users at risk. Too many variants of these malicious software are being introduced everyday at increased speed. Thus, to guarantee security of computer systems, huge advancements in the field of malware detection are made and one such approach is to use machine learning for malware detection. Even though machine learning is very powerful, it is prone to adversarial attacks. In this project, we will try to apply adversarial attacks on malware detection models. To perform these attacks, fake samples that …


Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik Jan 2023

Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik

Master's Projects

Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.

This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …


Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung Jan 2023

Gender Classification Via Human Joints Using Convolutional Neural Network, Cheng-En Sung

Master's Projects

With the growing demand for gender-related data on diverse applications, including security systems for ascertaining an individual’s identity for border crossing, as well as marketing purposes of digging the potential customer and tailoring special discounts for them, gender classification has become an essential task within the field of computer vision and deep learning. There has been extensive research conducted on classifying human gender using facial expression, exterior appearance (e.g., hair, clothes), or gait movement. However, within the scope of our research, none have specifically focused gender classification on two-dimensional body joints. Knowing this, we believe that a new prediction pipeline …


A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde Jan 2023

A Data Delivery Mechanism For Disconnected Mobile Applications, Shashank Hegde

Master's Projects

Previous attempts to bring the data of the internet to environments that do not have continuous connectivity to the internet have made use of special hardware which requires additional expenditure on installation. We will develop a software-based infrastructure running on existing Android smartphones to exchange application data between a disconnected user’s phone and corresponding application servers on the internet. The goal of this project is to implement client and server modules for this infrastructure to run on a disconnected phone and the internet respectively. These modules will multiplex application data to be sent into packages and distribute the data present …


Codeval, Aditi Agrawal Jan 2023

Codeval, Aditi Agrawal

Master's Projects

Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …


Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani Jan 2023

Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani

Master's Projects

Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …


Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala Jan 2023

Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala

Master's Projects

Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …


Automated Evaluation For Distributed System Assignments, Nimesh Nischal Jan 2023

Automated Evaluation For Distributed System Assignments, Nimesh Nischal

Master's Projects

A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …