Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 19801 - 19830 of 302428

Full-Text Articles in Physical Sciences and Mathematics

Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi Jan 2023

Image Classification Using Ensemble Modeling And Deep Learning, Kaneesha Gandhi

Master's Projects

With the advances in technology, image classification has become one of the core areas of interest for researchers in the field of computer vision. We, humans, experience great levels of visuals in our day-to-day lives. The human eye is a powerful tool that not only lets us capture images around us but also aids in remembering, distinguishing, and interpreting these visuals. Comprehending the images that the user perceives is an important application in the fields of artificial intelligence, smart security systems, and areas of virtual reality. Recent advances in machine learning and neural networks have led to more precise and …


Modeling Repairable System Failure Data Using Nhpp Reliability Growth Mode., Eunice Ofori-Addo Jan 2023

Modeling Repairable System Failure Data Using Nhpp Reliability Growth Mode., Eunice Ofori-Addo

EWU Masters Thesis Collection

Stochastic point processes have been widely used to describe the behaviour of repairable systems. The Crow nonhomogeneous Poisson process (NHPP) often known as the Power Law model is regarded as one of the best models for repairable systems. The goodness-of-fit test rejects the intensity function of the power law model, and so the log-linear model was fitted and tested for goodness-of-fit. The Weibull Time to Failure recurrent neural network (WTTE-RNN) framework, a probabilistic deep learning model for failure data, is also explored. However, we find that the WTTE-RNN framework is only appropriate failure data with independent and identically distributed interarrival …


Fairy Shrimp (Anostraca) In The Vernal Pools Of Eastern Washington, Megan Garvey Jan 2023

Fairy Shrimp (Anostraca) In The Vernal Pools Of Eastern Washington, Megan Garvey

EWU Masters Thesis Collection

Vernal pools are ephemeral wetlands that retain water annually from winter and spring precipitation and snowmelt but are dry the rest of the year. Though important habitats and sources of freshwater biodiversity, they are little accounted for in wetland conservation and restoration practices. Like much of the world’s wetlands, they have seen a significant decline from anthropogenic impacts and conversion for alternative land use. Pools are also at significant risk due to the impacts of climate change and invasive species. These small temporary water bodies perform vital ecosystem services and are host to rare and endemic species. Anostraca, or fairy …


A Hierarchical Approach To Improve The Ant Colony Optimization Algorithm, Bryan J. Fischer Jan 2023

A Hierarchical Approach To Improve The Ant Colony Optimization Algorithm, Bryan J. Fischer

EWU Masters Thesis Collection

The ant colony optimization algorithm (ACO) is a fast heuristic-based method for finding favorable solutions to the traveling salesman problem (TSP). When the data set reaches larger values however, the ACO runtime increases dramatically. As a result, clustering nodes into groups is an effective way to reduce the size of the problem while leveraging the advantages of the ACO algorithm. The method for recombining groups of nodes is explored by treating the graph as a hierarchy of clusters, and modifying the original ACO heuristic to operate on a hypergraph. This method of using hierarchical clustering is significantly faster than the …


Solitons And Their Applications In Physics, B. A. Yount Jan 2023

Solitons And Their Applications In Physics, B. A. Yount

EWU Masters Thesis Collection

No abstract provided.


Baseline Data For Assessing Beaver Dam Analogs As A Restoration Tool In Fire-Affected Tributaries Of The Methow And Okanogan Watersheds, Katelin Killoy Jan 2023

Baseline Data For Assessing Beaver Dam Analogs As A Restoration Tool In Fire-Affected Tributaries Of The Methow And Okanogan Watersheds, Katelin Killoy

EWU Masters Thesis Collection

Incised streams are disconnected from their floodplains and no longer store water effectively. This leads to diminished ecosystem function, loss of critical riparian and aquatic habitats, and reduced biodiversity. Beaver dams improve incised streams by raising surface and groundwater levels, leading to reconnected floodplains. When beaver establishment is not feasible, Beaver Dam Analogs (BDAs) may be used to mitigate damage from stream incision and facilitate beaver establishment. However, it is unclear how effective BDAs are at mimicking natural beaver dams, especially on streams affected by high-intensity wildfires. The objective of my research is to collect baseline data needed to assess …


Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara Jan 2023

Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara

Master's Projects

Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …


Nft Artifact Prediction Using Machine Learning, Rishabh Pandey Jan 2023

Nft Artifact Prediction Using Machine Learning, Rishabh Pandey

Master's Projects

NFT Prediction Systems are web applications that provide their users with valuable insights about the artifact. These insights are useful for investors and collectors to make better decisions about their purchases. This project builds upon the same concept of prediction by developing a web application to dynamically provide recommendations based on user input and training an ML model to predict their cost. Preliminary work for the prediction system involved data collection, pre-processing, analysis, and filtering of large datasets from diverse sources. The project focused on the development of a user- friendly UI to enable seamless categorization of search results generated …


Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik Jan 2023

Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik

Master's Projects

Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.

This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


Note On Illuminating Constant Width Bodies, Alexey Glazyrin Jan 2023

Note On Illuminating Constant Width Bodies, Alexey Glazyrin

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

Recently, Arman, Bondarenko, and Prymak constructed a constant width body in R n whose illumination number is exponential in n. In this note, we improve their bound by generalizing the construction. In particular, we construct a constant width body in R n whose illumination number is at least (τ + o(1))n, where τ ≈ 1.047.


Automated Evaluation For Distributed System Assignments, Nimesh Nischal Jan 2023

Automated Evaluation For Distributed System Assignments, Nimesh Nischal

Master's Projects

A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …


Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati Jan 2023

Rideshare Using Degrees Of Separation: A Social Network-Based Approach, Gokul Garikipati

Master's Projects

Conventional ride-sharing services, such as Lyft and Uber, routinely match drivers with riders based on their proximity to each other, using GPS coordinates and mapping technology. The application then calculates the cost of the ride based on factors such as distance traveled and time spent in the car. The concept of six degrees of separation suggests that a maximum of 6 steps or relationships can connect any two individuals in the world. This idea could be applied to a ride-share service to provide a more personalized and efficient experience for users. Instead of just matching riders with drivers based on …


Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia Jan 2023

Comparative Analysis Of Transformer-Based Models For Text-To-Speech Normalization, Pankti Dholakia

Master's Projects

Text-to-Speech (TTS) normalization is an essential component of natural language processing (NLP) that plays a crucial role in the production of natural-sounding synthesized speech. However, there are limitations to the TTS normalization procedure. Lengthy input sequences and variations in spoken language can present difficulties. The motivation behind this research is to address the challenges associated with TTS normalization by evaluating and comparing the performance of various models. The aim is to determine their effectiveness in handling language variations. The models include LSTM-GRU, Transformer, GCN-Transformer, GCNN-Transformer, Reformer, and a BERT language model that has been pre-trained. The research evaluates the performance …


Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana Jan 2023

Eye Movements Behaviors In A Driving Simulator During Simple And Complex Distractions, Pradeep Narayana

Master's Projects

Road accidents occur frequently due to driving distractions all around the world. A driving simulator has been created to explore the cognitive effects of distractions while driving in order to address this problem. The purpose of this study is to discover the distraction-causing elements and how they affect driving performance. The simulator offers a secure and regulated setting for carrying out tests while being distracted by different visual distractions, such as solving mathematical equations and number memorizations.

Several trials have been conducted in the studies, which were carried out under varied circumstances like varying driving sceneries and by displaying different …


High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru Jan 2023

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru

Master's Projects

Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …


Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen Jan 2023

Document-Level Machine Translation With Hierarchical Attention, Yu-Tang Shen

Master's Projects

Machine translation (MT) aims to translate texts with minimal human involvement, and the utilization of machine learning methods is pivotal to its success. Sentence-level and paragraph-level translations were well-explored in the past decade, such as the Transformer and its variations, but less research was done on the document level. From reading a piece of news in a different language to trying to understand foreign research, document-level translation can be helpful.

This project utilizes a hierarchical attention (HAN) mechanism to abstract context information making document-level translation possible. It further utilizes the Big Bird attention mask in the hope of reducing memory …


Malware Classification Using Graph Neural Networks, Manasa Mananjaya Jan 2023

Malware Classification Using Graph Neural Networks, Manasa Mananjaya

Master's Projects

Word embeddings are widely recognized as important in natural language pro- cessing for capturing semantic relationships between words. In this study, we conduct experiments to explore the effectiveness of word embedding techniques in classifying malware. Specifically, we evaluate the performance of Graph Neural Network (GNN) applied to knowledge graphs constructed from opcode sequences of malware files. In the first set of experiments, Graph Convolution Network (GCN) is applied to knowledge graphs built with different word embedding techniques such as Bag-of-words, TF-IDF, and Word2Vec. Our results indicate that Word2Vec produces the most effective word embeddings, serving as a baseline for comparison …


Spam Comments Detection In Youtube Videos, Priyusha Kotta Jan 2023

Spam Comments Detection In Youtube Videos, Priyusha Kotta

Master's Projects

This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …


Light Water Sustainability Program: Optimizing Information Automation Using A New Method Based On System-Theoretic Process Analysis, Jeffrey Joe, Larry Hettinger, Marvin Dainoff, Patrick Murray, Yusuke Yamani Jan 2023

Light Water Sustainability Program: Optimizing Information Automation Using A New Method Based On System-Theoretic Process Analysis, Jeffrey Joe, Larry Hettinger, Marvin Dainoff, Patrick Murray, Yusuke Yamani

Psychology Faculty Publications

This report describes the interim progress for research supporting the design and optimization of information automation systems for nuclear power plants. Much of the domestic nuclear fleet is currently focused on modernizing technologies and processes, including transitioning toward digitalization in the control room and elsewhere throughout the plant, along with a greater use of automation, artificial intelligence, robotics, and other emerging technologies. While there are significant opportunities to apply these technologies toward greater plant safety, efficiency, and overall cost-effectiveness, optimizing their design and avoiding potential safety and performance risks depends on ensuring that human-performance-related organizational and technical design issues are …


Vehicle-Based Disconnected Data Distribution, Aditya Singhania Jan 2023

Vehicle-Based Disconnected Data Distribution, Aditya Singhania

Master's Projects

The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks

(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …


Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala Jan 2023

Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala

Master's Projects

Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …


Codeval, Aditi Agrawal Jan 2023

Codeval, Aditi Agrawal

Master's Projects

Grading coding assignments call for a lot of work. There are numerous aspects of the code that need to be checked, such as compilation errors, runtime errors, the number of test cases passed or failed, and plagiarism. Automated grading tools for programming assignments can be used to help instructors and graders in evaluating the programming assignments quickly and easily. Creating the assignment on Canvas is again a time taking process and can be automated. We developed CodEval, which instantly grades the student assignment submitted on Canvas and provides feedback to the students. It also uploads, creates, and edits assignments, thereby …


Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham Jan 2023

Airport Assignment For Emergency Aircraft Using Reinforcement Learning, Saketh Kamatham

Master's Projects

The volume of air traffic is increasing exponentially every day. The Air Traffic Control (ATC) at the airport has to handle aircraft runway assignments for landing and takeoff and airspace maintenance by directing passing aircraft through the airspace safely. If any aircraft is facing a technical issue or problem and is in a state of emergency, it requires expedited landing to respond to that emergency. The ATC gives this aircraft priority to landing and assistance. This process is very strenuous as the ATC has to deal with multiple aspects along with the emergency aircraft. It is the duty of the …


A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi Jan 2023

A Novel Efficient Deep Learning Framework For Facial Inpainting - Face Reconstruction From Masked Images, Akshay Ravi

Master's Projects

The use of face masks due to the covid-19 pandemic has made surveillance of people very difficult. Since a mask covers most of the facial components, security cameras are rendered of little to no use in the identification of criminals. In order to realize what a face looks like behind a mask, we have to construct the facial features in the masked region. On a higher level, this falls under the field of image inpainting, i.e. filling missing regions of images or correcting irregularities in images. Current research on image inpainting shows promising results on images that have missing/incorrect patches …


Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir Jan 2023

Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir

Master's Projects

Information retrieval and data interpretation on the web, for the purpose of gaining knowledgeable insights, has been a widely researched topic from the onset of the world wide web or what is today popularly known as the internet. Web tables are structured tabular data present amidst unstructured, heterogenous data on the web. This makes web tables a rich source of information for a variety of tasks like data analysis, data interpretation, and information retrieval pertaining to extracting knowledge from information present on the web. Wikipedia tables which are a subset of web tables hold a huge amount of useful data, …


Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah Jan 2023

Untraining Gender Bias: An Eye-Tracking Study, Ripujit S. Bamrah

Master's Projects

In recent years, social cognitive theory has emphasized the role of cognitive processes in shaping perceptions and behavior related to gender bias. By examining the impact of targeted training interventions, this study seeks to better understand the influence of such processes on decision-making in the context of character selection. This human-computer interaction study explores the potential of intervention-based training to untraining gender bias in character selection. With an increasing need to address gender bias in various domains, understanding the impact of gender-based training becomes crucial. According to our hypothesis, exposure to masculine characters would boost people’s preference for female- intellectualized …


Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla Jan 2023

Driving Simulator : Driving Performance Under Distraction, Kaushik Pilligundla

Master's Projects

This pilot study used a driving simulator experiment to look into how podcast consumption affects driving performance as a continuous distraction. Three volunteers conducted three trials in the study, each with a different driving scenario. Data analysis was done to compare two conditions. The first condition is the Audio, where volunteers listen to podcasts while driving. The second condition is no-audio condition.. The no-audi condition had nothing to play in the background. We used eye-tracking technology to gather gaze data. The study's findings using the post survey and eye fixation data indicate that listening to podcasts leads to continuous distraction …


Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia Jan 2023

Yelp Restaurant Popularity Score Calculator, Sneh Bindesh Chitalia

Master's Projects

Yelp is a popular social media platform that has gained much traction over the last few years. The critical feature of Yelp is it has information about any small or large-scale business, as well as reviews received from customers. The reviews have both a 1 to 5 star rating, as well as text. For a particular business, any user can view the reviews, but the stars are what most users check because it is an easy and fast way to decide. Therefore, the star rating is a good metric to measure a particular business’s value. However, there are other attributes …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …