Realtime Event Detection In Sports Sensor Data With Machine Learning,
2022
University of New Hampshire, Durham
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Honors Theses and Capstones
Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …
Decoding Cyclic Codes Via Gröbner Bases,
2022
Colby College
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Honors Theses
In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …
Interpretable Machine Learning For Self-Service High-Risk Decision Making,
2022
Central Washington University
Interpretable Machine Learning For Self-Service High-Risk Decision Making, Charles Recaido
All Master's Theses
This research contributes to interpretable machine learning via visual knowledge discovery in General Line Coordinates (GLC). The concepts of hyperblocks as interpretable dataset units and GLC are combined to create a visual self-service machine learning model. Two variants of GLC known as Dynamic Scaffold Coordinates (DSC) are proposed. DSC1 and DSC2 can map in a lossless manner multiple dataset attributes to a single two-dimensional (X, Y) Cartesian plane using a dynamic scaffolding graph construction algorithm.
Hyperblock analysis is used to determine visually appealing dataset attribute orders and to reduce line occlusion. It is shown that hyperblocks can generalize decision tree …
Virtual Machine For Spartangold,
2022
San Jose State University
Virtual Machine For Spartangold, William Wang
Master's Projects
The field of blockchain and cryptocurrencies can be both difficult to grasp and improve upon, which makes aids that can assist in these tasks very useful. SpartanGold is a simplified blockchain-based cryptocurrency created at San Jose State University as a learning aid for blockchain and cryptocurrencies. In its current state, it closely resembles Bitcoin, and it is also easily expandable to implement other features.
This project extends SpartanGold with a virtual machine resembling the Ethereum Virtual Machine. Implementing this feature results in SpartanGold having Ethereum- related features, which would allow the cryptocurrency to both be a helpful learning aid for …
Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns,
2022
San Jose State University
Analysis Of Public Sentiment Of Covid-19 Pandemic, Vaccines, And Lockdowns, Devinesh Singh
Master's Projects
CoV-2 pandemic prompted lockdown measures to be implemented worldwide; these directives were implemented nationwide to stunt the spread of the infection. Throughout the lockdowns, millions of individuals resorted to social media for entertainment, communicate with friends and family, and express their opinions about the pandemic. Simultaneously, social media aided in the dissemination of misinformation, which has proven to be a threat to global health. Sentiment analysis, a technique used to analyze textual data, can be used to gain an overview of public opinion behind CoV-2 from Twitter and TikTok. The primary focus of the project is to build a deep …
The Amorphous Nature Of Hackers: An Exploratory Study,
2022
University of New Haven
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Timestamp Estimation From Outdoor Scenes,
2022
Department of Computer Information Technology, Purdue University
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Annual ADFSL Conference on Digital Forensics, Security and Law
The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …
A Lightweight Reliably Quantified Deepfake Detection Approach,
2022
The University of Hong Kong, Department of Computer Science
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av,
2022
Bachelor of Information Security, MEPhI; Moscow, Russia
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices,
2022
Purdue University
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation,
2022
School of Science, Edith Cowan University
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Sportiasts,
2022
The University of Akron
Sportiasts, Yuvraj Subedi
Williams Honors College, Honors Research Projects
Sportiasts is an online platform that connects sports enthusiasts. This platform explores the most recent back-end tool: Django and PostgreSQL to provide sports enthusiasts a platform to connect with each other. This platform is versatile and dynamic for the users to have their best experience connecting with sports communities. Anyone with sports interests can use this application to explore, connect, and create sports communities.
Urdu Text Summarization Using Machine Learning,
2022
Institute of Business Administration
Urdu Text Summarization Using Machine Learning, Nabeel Hassan
MSCS Research Projects/Theses
Text summarization is a formidable challenge in Natural Language Processing (NLP) because it requires precise text analysis, such as semantic and lexical analysis, to produce a good summary. A good summary must contain valuable information and must be concise while considering aspects such as non-redundancy, relevance, coverage, coherence, and readability.
A lot of research, time, effort, and funding has been invested in the English language, as it is the global language for communication, but not so much in low resource languages like Urdu. This project intends to develop an application that addresses this problem. It also provides Parts of Speech …
Predicting League Of Legends Ranked Games Outcome,
2022
Bard College
Predicting League Of Legends Ranked Games Outcome, Ngoc Linh Chi Nguyen
Senior Projects Spring 2022
League of Legends (LoL) is the one of most popular multiplayer online battle arena (MOBA) games in the world. For LoL, the most competitive way to evaluate a player’s skill level, below the professional Esports level, is competitive ranked games. These ranked games utilize a matchmaking system based on the player’s ranks to form a fair team for each game. However, a rank game's outcome cannot necessarily be predicted using just players’ ranks, there are a significant number of different variables impacting a rank game depending on how well each team plays. In this paper, I propose a method to …
¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom,
2022
Bard College
¿Quién Soy Yo? [Who Am I?]: Exploring Identity Through Analyzing Afro-Cuban Poetry And Creative Coding In A Post-Secondary Spanish Literature Classroom, F. Megumi Kivuva
Senior Projects Spring 2022
With efforts to broaden participation in computing by integrating CS education into humanities and developing more critical pedagogy, this research focuses on teaching computing in a post-secondary Spanish literature class through analyzing Afro-Cuban poetry. Its goal was to evaluate how participants may use Twine to reflect on Afro-Cuban poetry and their own identities. A group of 5 participants, one professor, and five students, learned how to use Twine to create interactive narratives reflecting on “El apellido,” a poem by Afro-Cuban poet Nicolás Guillén. Through analyzing researcher notes, participants’ projects, post-workshop surveys, and interviews, the research revealed that students were able …
Humanizing Computational Literature Analysis Through Art-Based Visualizations,
2022
University of Denver
Humanizing Computational Literature Analysis Through Art-Based Visualizations, Alexandria Leto
Electronic Theses and Dissertations
Inequalities in gender representation and characterization in fictional works are issues that have long been discussed by social scientists. This work addresses these inequalities with two interrelated components. First, it contributes a sentiment and word frequency analysis task focused on gender-specific nouns and pronouns in 15,000 fictional works taken from the online library, Project Gutenberg. This analysis allows for both quantifying and offering further insight on the nature of this disparity in gender representation. Then, the outcomes of the analysis are harnessed to explore novel data visualization formats using computational and studio art techniques. Our results call attention to the …
Poriferal Vision: Deep Transfer Learning-Based Sponge Spicules Identification & Taxonomic Classification,
2022
San Jose State University
Poriferal Vision: Deep Transfer Learning-Based Sponge Spicules Identification & Taxonomic Classification, Sudhin Domala
Master's Projects
The phylum Porifera includes the aquatic organisms known as sponges. Sponges are classified into four classes: Calcarea, Hexactinellida, Demospongiae, and Homoscleromorpha. Within Demospongiae and Hexactinellida, sponges’ skeletons are needle-like spicules made of silica. With a wide variety of shapes and sizes, these siliceous spicules’ morphology plays a pivotal role in assessing and understanding sponges' taxonomic diversity and evolution. In marine ecosystems, when sponges die their bodies disintegrate over time, but their spicules remain in the sediments as fossilized records that bear ample taxonomic information to reconstruct the evolution of sponge communities and sponge phylogeny.
Traditional methods of identifying spicules from …
Deep Learning Detection In The Visible And Radio Spectrums,
2022
West Virginia University
Deep Learning Detection In The Visible And Radio Spectrums, Greg Clancy Murray
Graduate Theses, Dissertations, and Problem Reports
Deep learning models with convolutional neural networks are being used to solve some of the most difficult problems in computing today. Complicating factors to the use and development of deep learning models include lack of availability of large volumes of data, lack of problem specific samples, and the lack variations in the specific samples available. The costs to collect this data and to compute the models for the task of detection remains a inhibitory condition for all but the most well funded organizations. This thesis seeks to approach deep learning from a cost reduction and hybrid perspective — incorporating techniques …
Classifying Blood Glucose Levels Through Noninvasive Features,
2022
West Virginia University
Classifying Blood Glucose Levels Through Noninvasive Features, Rishi Reddy
Graduate Theses, Dissertations, and Problem Reports
Blood glucose monitoring is a key process in the prevention and management of certain chronic diseases, such as diabetes. Currently, glucose monitoring for those interested in their blood glucose levels are confronted with options that are primarily invasive and relatively costly. A growing topic of note is the development of non-invasive monitoring methods for blood glucose. This development holds a significant promise for improvement to the quality of life of a significant portion of the population and is overall met with great enthusiasm from the scientific community as well as commercial interest. This work aims to develop a potential pipeline …
Proxy Re-Encryption In Blockchain-Based Application,
2022
San Jose State University
Proxy Re-Encryption In Blockchain-Based Application, Wangcheng Yuan
Master's Projects
Nowadays, blockchain-based technology has risen to a new dimension. With the advantage of the decentralized identity, data are transferred through decentralized and public ledgers. Those new contracts provide great visibility. However, there is still a need to keep some data private in many cases. Those private data should be encrypted while still benefiting from the decentralized on-chain protocol. Securing those private data in such a decentralized blockchain-based system is thus a critical problem. Our solution provides a decentralized protocol that lets users grant access to their private data with proxy re-encryption in SpartanGold (a blockchain-based cryptocurrency). We implement a third-party …