Matching Items (20)
Filtering by

Clear all filters

Description

The process of learning a new skill can be time consuming and difficult for both the teacher and the student, especially when it comes to computer modeling. With so many terms and functionalities to familiarize oneself with, this task can be overwhelming to even the most knowledgeable student. The purpose

The process of learning a new skill can be time consuming and difficult for both the teacher and the student, especially when it comes to computer modeling. With so many terms and functionalities to familiarize oneself with, this task can be overwhelming to even the most knowledgeable student. The purpose of this paper is to describe the methodology used in the creation of a new set of curricula for those attempting to learn how to use the Dynamic Traffic Simulation Package with Multi-Resolution Modeling. The current DLSim curriculum currently relates information via high-concept terms and complicated graphics. The information in this paper aims to provide a streamlined set of curricula for new users of DLSim, including lesson plans and improved infographics.

ContributorsMills, Alexander (Author) / Zhou, Xuesong (Thesis director) / Chen, Yinong (Committee member) / Barrett, The Honors College (Contributor) / Computing and Informatics Program (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description
Phishing is one of most common and effective attack vectors in modern cybercrime. Rather than targeting a technical vulnerability in a computer system, phishing attacks target human behavioral or emotional tendencies through manipulative emails, text messages, or phone calls. Through PyAntiPhish, I attempt to create my own version of an

Phishing is one of most common and effective attack vectors in modern cybercrime. Rather than targeting a technical vulnerability in a computer system, phishing attacks target human behavioral or emotional tendencies through manipulative emails, text messages, or phone calls. Through PyAntiPhish, I attempt to create my own version of an anti-phishing solution, through a series of experiments testing different machine learning classifiers and URL features. With an end-goal implementation as a Chromium browser extension utilizing Python-based machine learning classifiers (those available via the scikit-learn library), my project uses a combination of Python, TypeScript, Node.js, as well as AWS Lambda and API Gateway to act as a solution capable of blocking phishing attacks from the web browser.
ContributorsYang, Branden (Author) / Osburn, Steven (Thesis director) / Malpe, Adwith (Committee member) / Ahn, Gail-Joon (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2024-05
Description

Machine learning has a near infinite number of applications, of which the potential has yet to have been fully harnessed and realized. This thesis will outline two departments that machine learning can be utilized in, and demonstrate the execution of one methodology in each department. The first department that will

Machine learning has a near infinite number of applications, of which the potential has yet to have been fully harnessed and realized. This thesis will outline two departments that machine learning can be utilized in, and demonstrate the execution of one methodology in each department. The first department that will be described is self-play in video games, where a neural model will be researched and described that will teach a computer to complete a level of Super Mario World (1990) on its own. The neural model in question was inspired by the academic paper “Evolving Neural Networks through Augmenting Topologies”, which was written by Kenneth O. Stanley and Risto Miikkulainen of University of Texas at Austin. The model that will actually be described is from YouTuber SethBling of the California Institute of Technology. The second department that will be described is cybersecurity, where an algorithm is described from the academic paper “Process Based Volatile Memory Forensics for Ransomware Detection”, written by Asad Arfeen, Muhammad Asim Khan, Obad Zafar, and Usama Ahsan. This algorithm utilizes Python and the Volatility framework to detect malicious software in an infected system.

ContributorsBallecer, Joshua (Author) / Yang, Yezhou (Thesis director) / Luo, Yiran (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
Description
The purpose of the thesis project is to address the rising issue of fake real estate listings and scams prevalent in listing platforms by developing an advanced program that employs various data verification methods to identify potential fraudulent listings. With the rise of online real estate transactions, the need for

The purpose of the thesis project is to address the rising issue of fake real estate listings and scams prevalent in listing platforms by developing an advanced program that employs various data verification methods to identify potential fraudulent listings. With the rise of online real estate transactions, the need for establishing trust and credibility between buyer and seller has never been more important. This research will create a system that will protect potential buyers from falling victim to fake listings and shield sellers from purchasing on scam-related platforms. Through analysis, the program will identify any inconsistency and warning signs that may indicate a fake listing. This thesis project aims to enhance the overall integrity and dependability of real estate listing platforms, fostering a secure environment for buyers and sellers to participate in online property transactions.
ContributorsAguilar, Javier (Author) / Osburn, Steven (Thesis director) / Malpe, Adwith (Committee member) / Barrett, The Honors College (Contributor) / Department of Finance (Contributor) / Computer Science and Engineering Program (Contributor)
Created2024-05
Description
The thesis explores the avenues of machine learning principles in object detection using TensorFlow 2 Object Detection API Libraries for implementation. Integrating object detection capabilities into ESP-32 cameras can enhance functionality in the capstone dragster application and potential applications, such as autonomous robots. The research implements the TensorFlow 2 Object

The thesis explores the avenues of machine learning principles in object detection using TensorFlow 2 Object Detection API Libraries for implementation. Integrating object detection capabilities into ESP-32 cameras can enhance functionality in the capstone dragster application and potential applications, such as autonomous robots. The research implements the TensorFlow 2 Object Detection API, a widely used framework for training and deploying object detection models. By leveraging the pre-trained models available in the API, the system can detect a wide range of objects with high accuracy and speed. Fine-tuning these models using a custom dataset allows us to enhance their performance in detecting specific objects of interest. Experiments to identify strengths and weaknesses of each model's implementation before and after training using similar images were evaluated The thesis also explores the potential limitations and challenges of deploying object detection on real-time ESP-32 cameras, such as limited computational resources, costs, and power constraints. The results obtained from the experiments demonstrate the feasibility and effectiveness of implementing object detection on ESP-32 cameras using the TensorFlow2 Object Detection API. The system achieves satisfactory accuracy and real-time processing capabilities, making it suitable for various practical applications. Overall, this thesis provides a foundation for further advancements and optimizations in the integration of object detection capabilities into small, low-power devices such as ESP-32 cameras and a crossroad to explore its applicability for other image-capturing and processing devices in industrial, automotive, and defense sectors of industry.
ContributorsMani, Vinesh (Author) / Tsakalis, Konstantinos (Thesis director) / Jayasuriya, Suren (Committee member) / Barrett, The Honors College (Contributor) / Electrical Engineering Program (Contributor)
Created2024-05
Description
In this work, we explore the potential for realistic and accurate generation of hourly traffic volume with machine learning (ML), using the ground-truth data of Manhattan road segments collected by the New York State Department of Transportation (NYSDOT). Specifically, we address the following question– can we develop a ML algorithm

In this work, we explore the potential for realistic and accurate generation of hourly traffic volume with machine learning (ML), using the ground-truth data of Manhattan road segments collected by the New York State Department of Transportation (NYSDOT). Specifically, we address the following question– can we develop a ML algorithm that generalizes the existing NYSDOT data to all road segments in Manhattan?– by introducing a supervised learning task of multi-output regression, where ML algorithms use road segment attributes to predict hourly traffic volume. We consider four ML algorithms– K-Nearest Neighbors, Decision Tree, Random Forest, and Neural Network– and hyperparameter tune by evaluating the performances of each algorithm with 10-fold cross validation. Ultimately, we conclude that neural networks are the best-performing models and require the least amount of testing time. Lastly, we provide insight into the quantification of “trustworthiness” in a model, followed by brief discussions on interpreting model performance, suggesting potential project improvements, and identifying the biggest takeaways. Overall, we hope our work can serve as an effective baseline for realistic traffic volume generation, and open new directions in the processes of supervised dataset generation and ML algorithm design.
ContributorsOtstot, Kyle (Author) / De Luca, Gennaro (Thesis director) / Chen, Yinong (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsPardhe, Joshua (Author) / Lim, Kang Yi (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Watts College of Public Service & Community Solut (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsLim, Kang Yi (Author) / Pardhe, Joshua (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description

When creating computer vision applications, it is important to have a clear image of what is represented such that further processing has the best representation of the underlying data. A common factor that impacts image quality is blur, caused either by an intrinsic property of the camera lens or by

When creating computer vision applications, it is important to have a clear image of what is represented such that further processing has the best representation of the underlying data. A common factor that impacts image quality is blur, caused either by an intrinsic property of the camera lens or by introducing motion while the camera’s shutter is capturing an image. Possible solutions for reducing the impact of blur include cameras with faster shutter speeds or higher resolutions; however, both of these solutions require utilizing more expensive equipment, which is infeasible for instances where images are already captured. This thesis discusses an iterative solution for deblurring an image using an alternating minimization technique through regularization and PSF reconstruction. The alternating minimizer is then used to deblur a sample image of a pumpkin field to demonstrate its capabilities.

ContributorsSmith, Zachary (Author) / Espanol, Malena (Thesis director) / Ozcan, Burcin (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2023-05
Description
Semiconductor manufacturing produces a variety of particle defects on wafer surfaces, each defect having its own topology. Statistical trends among these topologies can be discovered by using unsupervised machine learning techniques such as K-means clustering. By employing four (4) different heuristics, the K-means algorithm can be optimized to generate clusters

Semiconductor manufacturing produces a variety of particle defects on wafer surfaces, each defect having its own topology. Statistical trends among these topologies can be discovered by using unsupervised machine learning techniques such as K-means clustering. By employing four (4) different heuristics, the K-means algorithm can be optimized to generate clusters of defect images that are well separated and highly congruent to the features extracted from the images. The result is the formation of clusters that demonstrate a high degree of qualitative similarity among the topologies of all the defects in the cluster. Further study should confirm which exact features are selected by the model by comparing trends in chemical or procedural analyses.
ContributorsGonilovic, Sanjin (Author) / Rolston, Nicholas (Thesis director) / Johnson, Jason (Committee member) / Barrett, The Honors College (Contributor) / Electrical Engineering Program (Contributor)
Created2024-05