Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

192,261 Full-Text Articles 233,873 Authors 47,230,550 Downloads 392 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

192,261 full-text articles. Page 4 of 5103.

Human Activity Recognition Based On Multimodal Body Sensing, Anish Hemant Narkhede 2019 San Jose State University

Human Activity Recognition Based On Multimodal Body Sensing, Anish Hemant Narkhede

Master's Projects

In the recent years, human activity recognition has been widely popularized by a lot of smartphone manufacturers and fitness tracking companies. It has allowed us to gain a deeper insight into our physical health on a daily basis. However, with the evolution of fitness tracking devices and smartphones, the amount of data that is being captured by these devices is growing exponentially. This paper aims at understanding the process of dimensionality reduction such as PCA so that the data can be used to make meaningful predictions along with novel techniques using autoencoders with different activation functions. The paper also looks ...


A Course In Harmonic Analysis, Jason Murphy 2019 Missouri University of Science and Technology

A Course In Harmonic Analysis, Jason Murphy

Course Materials

These notes were written to accompany the courses Math 6461 and Math 6462 (Harmonic Analysis I and II) at Missouri University of Science & Technology during the 2018-2019 academic year. The goal of these notes is to provide an introduction to a range of topics and techniques in harmonic analysis, covering material that is interesting not only to students of pure mathematics, but also to those interested in applications in computer science, engineering, physics, and so on.


Chatbots With Personality Using Deep Learning, Susmit Gaikwad 2019 San Jose State University

Chatbots With Personality Using Deep Learning, Susmit Gaikwad

Master's Projects

Natural Language Processing (NLP) requires the computational modelling of the complex relationships of the syntax and semantics of a language. While traditional machine learning methods are used to solve NLP problems, they cannot imitate the human ability for language comprehension. With the growth in deep learning, these complexities within NLP are easier to model, and be used to build many computer applications. A particular example of this is a chatbot, where a human user has a conversation with a computer program, that generates responses based on the user’s input. In this project, we study the methods used in building ...


Javascript Metamorphic Malware Detection Using Machine Learning Techniques, Aakash Wadhwani 2019 San Jose State University

Javascript Metamorphic Malware Detection Using Machine Learning Techniques, Aakash Wadhwani

Master's Projects

Various factors like defects in the operating system, email attachments from unknown sources, downloading and installing a software from non-trusted sites make computers vulnerable to malware attacks. Current antivirus techniques lack the ability to detect metamorphic viruses, which vary the internal structure of the original malware code across various versions, but still have the exact same behavior throughout. Antivirus software typically relies on signature detection for identifying a virus, but code morphing evades signature detection quite effectively.

JavaScript is used to generate metamorphic malware by changing the code’s Abstract Syntax Tree without changing the actual functionality, making it very ...


Malware Analysis On Pdf, Shubham Shashishekhar Pachpute 2019 San Jose State University

Malware Analysis On Pdf, Shubham Shashishekhar Pachpute

Master's Projects

Cyber-attacks are growing day by day and attackers are finding new techniques to cause harm to their target by spreading worms and malware. In the world of innovations and new technologies coming out every day, it creates a possibility of attacking a system and exploiting the vulnerabilities present in the system. One of the methods used for the spread of malware is the Portable Document Format (PDF) files. Due to the flexible nature of these files, it is becoming a sweet spot for the attackers to embed the malware easily into the PDF files. In this report, we are going ...


Next Level: A Course Recommender System Based On Career Interests, Shehba Shahab 2019 San Jose State University

Next Level: A Course Recommender System Based On Career Interests, Shehba Shahab

Master's Projects

Skills-based hiring is a talent management approach that empowers employers to align recruitment around business results, rather than around credentials and title. It starts with employers identifying the particular skills required for a role, and then screening and evaluating candidates’ competencies against those requirements. With the recent rise in employers adopting skills-based hiring practices, it has become integral for students to take courses that improve their marketability and support their long-term career success. A 2017 survey of over 32,000 students at 43 randomly selected institutions found that only 34% of students believe they will graduate with the skills and ...


Real-Time Data Processing With Lambda Architecture, Omkar Ashok Malusare 2019 San Jose State University

Real-Time Data Processing With Lambda Architecture, Omkar Ashok Malusare

Master's Projects

Data has evolved immensely in recent years, in type, volume and velocity. There are several frameworks to handle the big data applications. The project focuses on the Lambda Architecture proposed by Marz and its application to obtain real-time data processing. The architecture is a solution that unites the benefits of the batch and stream processing techniques. Data can be historically processed with high precision and involved algorithms without loss of short-term information, alerts and insights. Lambda Architecture has an ability to serve a wide range of use cases and workloads that withstands hardware and human mistakes. The layered architecture enhances ...


Low Power Mobilenets Acceleration In Cuda And Opencl, Nikhil Lahoti 2019 San Jose State University

Low Power Mobilenets Acceleration In Cuda And Opencl, Nikhil Lahoti

Master's Projects

Convolutional Neural Network (CNN) has been used widely for the tasks of object recognition and facial recognition because of their remarkable results on these common visual tasks. In order to evaluate the performance of CNN for embedded devices effectively, it is essential to provide a comprehensive benchmark evaluation environment. Even though there are many benchmark suites available for use, but these benchmark suites require installation of various packages and proprietary libraries. This creates a bottleneck in using them in applications which are executed on resource constraint devices like embedded devices.

In this paper, we propose an evaluation platform which can ...


Speaker Recognition Using Machine Learning Techniques, Abhishek Manoj Sharma 2019 San Jose State University

Speaker Recognition Using Machine Learning Techniques, Abhishek Manoj Sharma

Master's Projects

Speaker recognition is a technique of identifying the person talking to a machine using the voice features and acoustics. It has multiple applications ranging in the fields of Human Computer Interaction (HCI), biometrics, security, and Internet of Things (IoT). With the advancements in technology, hardware is getting powerful and software is becoming smarter. Subsequently, the utilization of devices to interact effectively with humans and performing complex calculations is also increasing. This is where speaker recognition is important as it facilitates a seamless communication between humans and computers. Additionally, the field of security has seen a rise in biometrics. At present ...


Detecting Cars In A Parking Lot Using Deep Learning, Samuel Ordonia 2019 San Jose State University

Detecting Cars In A Parking Lot Using Deep Learning, Samuel Ordonia

Master's Projects

Detection of cars in a parking lot with deep learning involves locating all objects of interest in a parking lot image and classifying the contents of all bounding boxes as cars. Because of the variety of shape, color, contrast, pose, and occlusion, a deep neural net was chosen to encompass all the significant features required by the detector to differentiate cars from not cars. In this project, car detection was accomplished with a convolutional neural net (CNN) based on the You Only Look Once (YOLO) model architectures. An application was built to train and validate a car detection CNN as ...


Ai Dining Suggestion App, Bao Pham 2019 San Jose State University

Ai Dining Suggestion App, Bao Pham

Master's Projects

Trying to decide what to eat can sometimes be challenging and time-consuming for people. Google and Yelp have large scale data sets of restaurant information as well as Application Program Interfaces (APIs) for using them. This restaurant data includes time, price range, traffic, temperature, etc. The goal of this project is to build an app that eases the process of finding a restaurant to eat. This app has a Tinder-like user friendly User Interface (UI) design to change the common way that lists of restaurants are presented to users on mobile apps. It also uses the help of Artificial Intelligence ...


Contract Builder Ethereum Application, Colin M. Fowler 2019 San Jose State University

Contract Builder Ethereum Application, Colin M. Fowler

Master's Projects

Developments in Blockchain, smart contract, and decentralized application (“dApps”) technology have enabled new types of software that can improve efficiency within law firms by increasing speed at which attorneys may draft and execute contracts. Smart contracts and dApps are self-executing software that reside on a blockchain. Custom smart contracts can be built in a modular manner in order to emulate contracts that are commonly generated and executed in law firms. Such contracts include those for the transfer of services, goods, and title. This article explores exactly how implementations of smart contracts for law firms may look.


Image Retrieval Using Image Captioning, Nivetha Vijayaraju 2019 San Jose State University

Image Retrieval Using Image Captioning, Nivetha Vijayaraju

Master's Projects

The rapid growth in the availability of the Internet and smartphones have resulted in the increase in usage of social media in recent years. This increased usage has thereby resulted in the exponential growth of digital images which are available. Therefore, image retrieval systems play a major role in fetching images relevant to the query provided by the users. These systems should also be able to handle the massive growth of data and take advantage of the emerging technologies, like deep learning and image captioning. This report aims at understanding the purpose of image retrieval and various research held in ...


Optimizing E-Commerce Product Classification Using Transfer Learning, Rashmeet Kaur Khanuja 2019 San Jose State University

Optimizing E-Commerce Product Classification Using Transfer Learning, Rashmeet Kaur Khanuja

Master's Projects

The global e-commerce market is snowballing at a rate of 23% per year. In 2017, retail e-commerce users were 1.66 billion and sales worldwide amounted to 2.3 trillion US dollars, and e-retail revenues are projected to grow to 4.88 trillion USD in 2021. With the immense popularity that e-commerce has gained over past few years comes the responsibility to deliver relevant results to provide rich user experience. In order to do this, it is essential that the products on the ecommerce website be organized correctly into their respective categories. Misclassification of products leads to irrelevant results for ...


Earmarked Utxo For Escrow Services And Two-Factor Authentication On The Blockchain, Jisha Pillai 2019 San Jose State University

Earmarked Utxo For Escrow Services And Two-Factor Authentication On The Blockchain, Jisha Pillai

Master's Projects

The security of accounts on the blockchain relies on securing private keys, but they are often lost or compromised due to loopholes in key management strategies or due to human error. With an increasing number of thefts in the last few years due to compromised wallets, the security of digital currency has become a significant concern, and no matter how sophisticated and secure mechanisms are put in place to avoid the security risks, it is impossible to achieve a 100% human compliance.

This project introduces a novel concept of Earmarked Unspent Transaction Outputs (EUTXOs). EUTXOs enable every user on the ...


An Empirical Comparison Of Different Machine, Piyush Bajaj 2019 San Jose State University

An Empirical Comparison Of Different Machine, Piyush Bajaj

Master's Projects

Sketching has been used by humans to visualize and narrate the aesthetics of the world for a long time. With the onset of touch devices and augmented technologies, it has attracted more and more attention in recent years. Recognition of free-hand sketches is an extremely cumbersome and challenging task due to its abstract qualities and lack of visual cues. Most of the previous work has been done to identify objects in real pictorial images using neural networks instead of a more abstract depiction of the same objects in sketch. This research aims at comparing the performance of different machine learning ...


Sensor - Based Human Activity Recognition Using Smartphones, Mustafa Badshah 2019 San Jose State University

Sensor - Based Human Activity Recognition Using Smartphones, Mustafa Badshah

Master's Projects

It is a significant technical and computational task to provide precise information regarding the activity performed by a human and find patterns of their behavior. Countless applications can be molded and various problems in domains of virtual reality, health and medical, entertainment and security can be solved with advancements in human activity recognition (HAR) systems. HAR is an active field for research for more than a decade, but certain aspects need to be addressed to improve the system and revolutionize the way humans interact with smartphones. This research provides a holistic view of human activity recognition system architecture and discusses ...


Advances In Measurement Error Modeling, Linh Nghiem 2019 Southern Methodist University

Advances In Measurement Error Modeling, Linh Nghiem

Statistical Science Theses and Dissertations

Measurement error in observations is widely known to cause bias and a loss of power when fitting statistical models, particularly when studying distribution shape or the relationship between an outcome and a variable of interest. Most existing correction methods in the literature require strong assumptions about the distribution of the measurement error, or rely on ancillary data which is not always available. This limits the applicability of these methods in many situations. Furthermore, new correction approaches are also needed for high-dimensional settings, where the presence of measurement error in the covariates adds another level of complexity to the desirable structure ...


082227555114 | Di Jual-Permen-Candy-B + Rasa Jeruk Jakarta, Noval Muhlisin 2019 Bryant University

082227555114 | Di Jual-Permen-Candy-B + Rasa Jeruk Jakarta, Noval Muhlisin

Noval Muhlisin

082227555114 | Di Jual-Permen-Candy-B + Rasa Jeruk Jakarta COD / Delivery Tangerang, Bekasi, Depok, Banten Terbaru Permen Obat Kuat Tahan Lama Pria Ampuh Untuk Membangkitkan Ereksi Pria Dan Tahan Lama Berhubungan Intim. Kami Toko Obat Kuat Pria Terlengkap Dan Sangat Aman Di Konsumsi Dari Usia 17 Tahan Sampai Usia 65 Tahun Tetap Hots.
KHASIAT DAN MANFAAT PERMEN CANDY B + COMPLEX AMPUH:
. Memperkuat fungsi ginjal.
. Menstabilkan hormon pria.
. Dapat membantu mengatasi stres.
. Mencegah penyakit kardiovaskular.
. Menjaga risiko radang radang sendi.
. Mengurangi risiko masalah prostat.
. Menjadikan pria lebih agresif saat berhubungan intim dengan pasangannya.
.Meluncurkan sistem imun kekebalan pda tubuh
. Menambah stamina dan energi pria ...


The Determinant Of A Complex Matrix And Gershgorin Circles, Florian Bünger, Siegfried M. Rump 2019 Hamburg University of Technology

The Determinant Of A Complex Matrix And Gershgorin Circles, Florian Bünger, Siegfried M. Rump

Electronic Journal of Linear Algebra

Each connected component of the Gershgorin circles of a matrix contains exactly as many eigenvalues as circles are involved. Thus, the Minkowski (set) product of all circles contains the determinant if all circles are disjoint. In [S.M. Rump. Bounds for the determinant by Gershgorin circles. Linear Algebra and its Applications, 563:215--219, 2019.], it was proved that statement to be true for real matrices whose circles need not to be disjoint. Moreover, it was asked whether the statement remains true for complex matrices. This note answers that in the affirmative. As a by-product, a parameterization of the outer loop ...


Digital Commons powered by bepress