Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

40,989 Full-Text Articles 45,740 Authors 15,140,944 Downloads 331 Institutions

All Articles in Computer Sciences

Faceted Search

40,989 full-text articles. Page 4 of 1326.

Presentation Attack Detection In Facial Biometric Authentication, Hardik Kumar 2021 San Jose State University

Presentation Attack Detection In Facial Biometric Authentication, Hardik Kumar

Master's Projects

Biometric systems are referred to those structures that enable recognizing an individual, or specifically a characteristic, using biometric data and mathematical algorithms. These are known to be widely employed in various organizations and companies, mostly as authentication systems. Biometric authentic systems are usually much more secure than a classic one, however they also have some loopholes. Presentation attacks indicate those attacks which spoof the biometric systems or sensors. The presentation attacks covered in this project are: photo attacks and deepfake attacks. In the case of photo attacks, it is observed that interactive action check like Eye Blinking proves efficient in ...


Cyberbullying Classification Based On Social Network Analysis, Anqi Wang 2021 San Jose State University

Cyberbullying Classification Based On Social Network Analysis, Anqi Wang

Master's Projects

With the popularity of social media platforms such as Facebook, Twitter, and Instagram, people widely share their opinions and comments over the Internet. Exten- sive use of social media has also caused a lot of problems. A representative problem is Cyberbullying, which is a serious social problem, mostly among teenagers. Cyber- bullying occurs when a social media user posts aggressive words or phrases to harass other users, and that leads to negatively affects on their mental and social well-being. Additionally, it may ruin the reputation of that media. We are considering the problem of detecting posts that are aggressive. Moreover ...


Classifying Illegal Advertisements On The Darknet Using Nlp, Karan Shashin Shah 2021 San Jose State University

Classifying Illegal Advertisements On The Darknet Using Nlp, Karan Shashin Shah

Master's Projects

The Darknet has become a place to conduct various illegal activities like child labor, contract murder, drug selling while staying anonymous. Traditionally, international and government agencies try to control these activities, but most of those actions are manual and time-consuming. Recently, various researchers developed Machine Learning (ML) approaches trying to aid in the process of detecting illegal activities. The above problem can benefit by using different Natural Language Processing (NLP) techniques. More specifically, researchers have used various classical topic modeling techniques like bag of words, N-grams, Term Frequency, Term Frequency Inverse Document Frequency (TF-IDF) to represent features and train machine ...


Malware Classification With Bert, Joel Lawrence Alvares 2021 San Jose State University

Malware Classification With Bert, Joel Lawrence Alvares

Master's Projects

Malware Classification is used to distinguish unique types of malware from each other.

This project aims to carry out malware classification using word embeddings which are used in Natural Language Processing (NLP) to identify and evaluate the relationship between words of a sentence. Word embeddings generated by BERT and Word2Vec for malware samples to carry out multi-class classification. BERT is a transformer based pre- trained natural language processing (NLP) model which can be used for a wide range of tasks such as question answering, paraphrase generation and next sentence prediction. However, the attention mechanism of a pre-trained BERT model can ...


Higher-Order Link Prediction Using Node And Subgraph Embeddings, Kalpnil Anjan 2021 San Jose State University

Higher-Order Link Prediction Using Node And Subgraph Embeddings, Kalpnil Anjan

Master's Projects

Social media, academia collaborations, e-commerce websites, biological structures, and other real-world networks are modeled as graphs to represent their entities and relationships in an abstract way. Such graphs are becoming more complex and informative, and by analyzing them we can solve various problems and find hidden insights. Some applications include predicting relationships and potential links between nodes, classifying nodes, and finding the most influential nodes in the graph, etc.

A large amount of research is being done in the field of predicting links between two nodes. However, predicting a future relationship among three or more nodes in a graph is ...


Fake Malware Opcodes Generation Using Hmm And Different Gan Algorithms, Harshit Trehan 2021 San Jose State University

Fake Malware Opcodes Generation Using Hmm And Different Gan Algorithms, Harshit Trehan

Master's Projects

Malware, or malicious software, is a program that is intended to harm systems. In the past decade, the number of malware attacks have grown and, more importantly, evolved. Many researchers have successfully integrated cutting edge Machine Learning techniques to combat this ever present and growing threat to cyber and information security. One big challenge faced by many researchers is the lack of enough data to train machine learning models and specifically deep neural networks properly. Generative modelling has proven to be very efficient at generating synthesized data that can match the actual data distribution.

In this project, we aim to ...


Fake News Analysis And Graph Classification On A Covid-19 Twitter Dataset, Kriti Gupta 2021 San Jose State University

Fake News Analysis And Graph Classification On A Covid-19 Twitter Dataset, Kriti Gupta

Master's Projects

Earlier researches have showed that the spread of fake news through social media can have a huge impact to society and also to individuals in an extremely negative way. In this work we aim to study the spread of fake news compared to real news in a social network. We do that by performing classical social network analysis to discover various characteristics, and formulate the problem as a binary classification, where we have graphs modeling the spread of fake and real news. For our experiments we rely on how news are propagated through a popular social media services such as ...


Wildfire Risk Prediction For A Smart City, Rekha Rani 2021 San Jose State University

Wildfire Risk Prediction For A Smart City, Rekha Rani

Master's Projects

Wildfires are uncontrolled fires that may lead to the destruction of biodiversity, soil fertility, and human resources. There is a need for timely detection and prediction of wildfires to minimize their disastrous effects. In this research, we propose a wildfire prediction model that relies on multi-criteria decision making (MCDM) to explicitly evaluates multiple conflicting criteria in decision making and weave the wildfire risks into the city’s resiliency plan. We incorporate fuzzy set theory to handle imprecision and uncertainties. In the process, we create a new data set that includes California cities’ weather, vegetation, topography, and population density records. The ...


An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja 2021 CUNY Graduate Center

An Empirical Study Of Refactorings And Technical Debt In Machine Learning Systems, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja

Publications and Research

Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today’s data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processes. As with other complex systems, ML systems are prone to classic technical debt issues, especially when such systems are long-lived, but they also exhibit debt specific to these systems. Unfortunately, there is a gap of knowledge in how ML systems actually evolve and are maintained. In this paper, we fill this gap by studying refactorings, i.e., source-to-source semantics-preserving program transformations, performed ...


Gaming Disorder And Well-Being Among Emirati College Women, Marina Verlinden, Justin Thomas, Mahra Hasan Abdulla Ahamed Almansoori, Shamil Wanigaratne 2021 Zayed University

Gaming Disorder And Well-Being Among Emirati College Women, Marina Verlinden, Justin Thomas, Mahra Hasan Abdulla Ahamed Almansoori, Shamil Wanigaratne

All Works

Background: The present study examined Internet Gaming Disorder (IGD) and depressive symptom levels among a predominantly female sample of college students from the United Arab Emirates (UAE). Methods: IGD was assessed among two successive cohorts of students at the beginning of the academic year in 2016 and 2019, respectively. All participants (n = 412) completed the Internet Gaming Disorder Scale – Short-Form (IGDS9-SF) and the WHO-5 Well-being Index (WHO-5), a tool widely used for the screening and assessment of depressive symptomatology. Results: Mean IGDS9-SF scores (15.85, SD = 6.40) were fairly similar to those observed in other nations. The prevalence of ...


Sound In Video Games: How Sound Is An Important Aspect Of The Virtual Experience, James Boen 2021 San Jose State University

Sound In Video Games: How Sound Is An Important Aspect Of The Virtual Experience, James Boen

ART 108: Introduction to Games Studies

This paper will take the form of an analysis, with video games as the medium/text that will be analysed. Although analysis is typically reserved for poems, books, short stories, or plays, video games are simply a form of conveying ideas and a form of text that is representative of the 21st century. Video games is a rare medium that has an interactive element, which can alter/enhance the experience an audience member can have, even if there were the same audio/visual components in a film or play. In most forms of media with an audio component, the analysis ...


Has Excessive Violence In Video Games Gone Too Far?, Kyra SyCip 2021 San Jose State University

Has Excessive Violence In Video Games Gone Too Far?, Kyra Sycip

ART 108: Introduction to Games Studies

Numerous case studies and published research have led many gamers and non-gamers to wonder whether the excessive loads of violence found in video games is truly necessary for “fun” gameplay and entertainment. Controversies have been arising within famous video games such as the Grand Theft Auto series, Call Of Duty: Modern Warfare 2, and Six Days in Fallujah. These three games have been the subject of numerous present day debates and have sparked many arguments within the gaming community. As well as the debate of whether these games are indeed harmful to the player’s psychology and nature has yet ...


Detecting And Predicting Visual Affordance Of Objects In A Given Environment, Bhumika Kaur Matharu 2021 San Jose State University

Detecting And Predicting Visual Affordance Of Objects In A Given Environment, Bhumika Kaur Matharu

Master's Projects

The rapid growth of the development of autonomous robots is transforming the manufacturing and healthcare industry in many ways, but they still face many challenges. One of the challenges experienced by autonomous robots is their inability to manipulate an unknown object without human supervision. One way through which autonomous robots can manipulate an unknown object is affordance learning [1]. Affordance describes the action a user can perform on the object in given surroundings. This report describes our proposed model to detect and predict the affordance of an object from videos by leveraging the spatial-temporal feature extraction through ConvLSTM and Fully ...


American Sign Language Assistant, Charulata Lodha 2021 San Jose State University

American Sign Language Assistant, Charulata Lodha

Master's Projects

Our implementation of a prototype computer vision system to help the deaf and mute
communicate in a shopping setting. Our system uses live video feeds to recognize American Sign Language (ASL) gestures and notify shop clerks of deaf and mute patrons’ intents. It generates a video dataset in the Unity Game Engine of 3D humanoid models in a shop setting performing ASL signs. Our system uses OpenPose to detect and recognize the bone points of the human body
from the live feed. The system then represents the motion sequences as high dimensional skeleton joint point trajectories followed by a time-warping ...


Defending Vehicles Against Cyberthreats: Challenges And A Detection-Based Solution, Qilin Liu 2021 San Jose State University

Defending Vehicles Against Cyberthreats: Challenges And A Detection-Based Solution, Qilin Liu

Master's Projects

The lack of concern with security when vehicular network protocols were designed some thirty years ago is about to take its toll as vehicles become more connected and smart. Today as demands for more functionality and connectivity on vehicles continue to grow, a plethora of Electronic Control Units (ECUs) that are able to communicate to external networks are added to the automobile networks. The proliferation of ECU and the increasing autonomy level give drivers more control over their vehicles and make driving easier, but at the same time they expand the attack surface, bringing more vulnerabilities to vehicles that might ...


Automating Text Encapsulation Using Deep Learning, Anket Sah 2021 San Jose State University

Automating Text Encapsulation Using Deep Learning, Anket Sah

Master's Projects

Data is an important aspect in any form be it communication, reviews, news articles, social media data, machine or real-time data. With the emergence of Covid-19, a pandemic seen like no other in recent times, information is being poured in from all directions on the internet. At times it is overwhelming to determine which data to read and follow. Another crucial aspect is separating factual data from distorted data that is being circulated widely. The title or short description of this data can play a key role. Many times, these descriptions can deceive a user with unwanted information. The user ...


Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee 2021 San Jose State University

Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee

Master's Projects

The project introduces an Oracle, a failure detector, in Apache ZooKeeper and makes it fault-tolerant in a two-node system. The project demonstrates the Oracle authorizes the primary process to maintain the liveness when the majority’s rule becomes an obstacle to continue Apache ZooKeeper service. In addition to the property of accuracy and completeness from Chandra et al.’s research, the project proposes the property of see to avoid losing transactions and the property of mutual exclusion to avoid split-brain issues. The hybrid properties render not only more sounder flexibility in the implementation but also stronger guarantees on safety. Thus ...


Visual And Lingual Emotion Recognition Using Deep Learning Techniques, Akshay Kajale 2021 San Jose State University

Visual And Lingual Emotion Recognition Using Deep Learning Techniques, Akshay Kajale

Master's Projects

Emotion recognition has been an integral part of many applications like video games, cognitive computing, and human computer interaction. Emotion can be recognized by many sources including speech, facial expressions, hand gestures and textual attributes. We have developed a prototype emotion recognition system using computer vision and natural language processing techniques. Our goal hybrid system uses mobile camera frames and features abstracted from speech named Mel Frequency Cepstral Coefficient (MFCC) to recognize the emotion of a person. To acknowledge the emotions based on facial expressions, we have developed a Convolutional Neural Network (CNN) model, which has an accuracy of 68 ...


Translating Natural Language Queries To Sparql, Shreya Satish Bhajikhaye 2021 San Jose State University

Translating Natural Language Queries To Sparql, Shreya Satish Bhajikhaye

Master's Projects

The Semantic Web is an extensive knowledge base that contains facts in the form of RDF
triples. These facts are not easily accessible to the average user because to use them requires
an understanding of ontologies and a query language like SPARQL. Question answering systems
form a layer of abstraction on linked data to overcome these issues. These systems allow the
user to input a question in a natural language and receive the equivalent SPARQL query. The
user can then execute the query on the database to fetch the desired results. The standard
techniques involved in translating natural language questions ...


Machine Learning Using Serverless Computing, Vidish Naik 2021 San Jose State University

Machine Learning Using Serverless Computing, Vidish Naik

Master's Projects

Machine learning has been trending in the domain of computer science for quite some time. Newer and newer models and techniques are being developed every day. The adoption of cloud computing has only expedited the process of training machine learning. With its variety of services, cloud computing provides many options for training machine learning models. Leveraging these services is up to the user. Serverless computing is an important service offered by cloud service providers. It is useful for short tasks that are event-driven or periodic. Machine learning training can be divided into short tasks or batches to take advantage of ...


Digital Commons powered by bepress