Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 12 of 12
Full-Text Articles in Engineering
Finserv Android Application, Harsh Piyushkumar Shah
Finserv Android Application, Harsh Piyushkumar Shah
Electronic Theses, Projects, and Dissertations
The FINSERV Android application is a mobile tool designed for individuals to manage and track their finances. In financially complex world, many people struggle to maintain a clear overview of their income, expenses, and financial goals. This application aims to bridge that gap by providing users with a powerful and user-friendly platform to efficiently monitor and optimize their personal finances.
With the Personal Finance Tracking Android Application, users can effortlessly track their income and expenses, categorize transactions, and gain valuable insights into their spending patterns. The application offers features such as expense categorization and real-time expense tracking.
To enhance usability …
Implementing Test Automation With Selenium Webdriver, Ramana Inturi
Implementing Test Automation With Selenium Webdriver, Ramana Inturi
Graduate Theses, Dissertations, and Problem Reports
Many software programs, such as applications for designing, modeling, simulating, and analyzing systems, are now commonly available as web-based applications. The testing of such sophisticated web applications is highly challenging and can be extremely tedious and error-prone if done manually. Recently automation tools have become increasingly used for testing web-based applications, as they minimize human involvement and repetitive work.
For this problem report project, we have built and implemented an automation testing framework for web applications. The project specifically uses a tool called Selenium WebDriver, which has been used to develop the testing framework. By using this framework, testers may …
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Efficacy Of Reported Issue Times As A Means For Effort Estimation, Paul Phillip Maclean
Graduate Theses, Dissertations, and Problem Reports
Software effort is a measure of manpower dedicated to developing and maintaining and software. Effort estimation can help project managers monitor their software, teams, and timelines. Conversely, improper effort estimation can result in budget overruns, delays, lost contracts, and accumulated Technical Debt (TD). Issue Tracking Systems (ITS) have become mainstream project management tools, with over 65,000 companies using Jira alone. ITS are an untapped resource for issue resolution effort research. Related work investigates issue effort for specific issue types, usually Bugs or similar. They model their developer-documented issue resolution times using features from the issues themselves. This thesis explores a …
Predicting Imports In Java Code With Graph Neural Networks, Aleksandr Fedchin
Predicting Imports In Java Code With Graph Neural Networks, Aleksandr Fedchin
Senior Projects Spring 2020
Programmers tend to split their code into multiple files or sub-modules. When a program is executed, these sub-modules interact to produce the desired effect. One can, therefore, represent programs with graphs, where each node corresponds to some file and each edge corresponds to some relationship between files, such as two files being located in the same package or one file importing the content of another. This project trains Graph Neural Networks on such graphs to learn to predict future imports in Java programs and shows that Graph Neural Networks outperform various baseline methods by a wide margin.
Bpm: Blz Package Manager, Kenneth Huang
Bpm: Blz Package Manager, Kenneth Huang
Computer Engineering
bpm (BLZ Package Manager) is a package manager for the open-source programming language BLZ, built in Java. It allows users of the BLZ programming language to create and upload their own packages, as well as downloading necessary dependency packages for their packages. To do this, the program communicates with the “cardiovascular”, a web server designed for users to upload and download BLZ packages.
The program has three primary functions. The first one, “init”, initializes a package directory for use with the package manager. Part of this initialization is creating a “heartbeat” meta file, which holds information about the package’s name, …
Autonomous Driving Platform Performance Analysis, Charles R. Rickarby
Autonomous Driving Platform Performance Analysis, Charles R. Rickarby
Honors Theses and Capstones
Through data analysis of various plots and figures it will be possible to determine the best control parameters to get the best performance out of the autonomous driving platform. This data, presented in this thesis, will show quantitatively what the best control strategies are through comparison of different versions of the platform.
Tournament Wizard: Simple And Lightweight Software For Running Fencing Tournaments, John Ryan Daley
Tournament Wizard: Simple And Lightweight Software For Running Fencing Tournaments, John Ryan Daley
Computer Science and Software Engineering
Many sports use technology to assist in officiating and administration. Fencing tournament organizers use specialized software to help determine how their matches occur, and to help them administer a tournament. However, the software most commonly used to run these tournaments has some significant limitations, and is not well-suited for use with small events. As a former President of Cal Poly’s Fencing Club, I have had a chance to interact with one popular application for running fencing tournaments a number of times, and made note of its shortcomings. These included issues with operating system compatibility, license transference, and amount of space …
Rfid Microscope Lab, Patricia Carranza
Rfid Microscope Lab, Patricia Carranza
Computer Engineering
The RFID Microscope Lab is a new exhibit created for the San Luis Obispo Children's Museum. The goal of the project is to create a modern, interactive exhibit that will teach children about different natural specimens through the use of technology. A computer, custom software, and RFID technology, will be used to display facts, microscopic images, and short videos of ten different specimens.
Rapdb: The Rapid Social Application Deployment Service, Lance Tyler, Matthew Morris
Rapdb: The Rapid Social Application Deployment Service, Lance Tyler, Matthew Morris
Computer Science and Software Engineering
No abstract provided.
Chinese To English Introductory Cover Letter Generator, Jason L. Stine
Chinese To English Introductory Cover Letter Generator, Jason L. Stine
Liberal Arts and Engineering Studies
The Chinese to English Introductory Cover Letter Generator allows Chinese computer users who know little to no English automatically generate a self-introductory cover letter in good English. As an example, professors in English-speaking countries are increasingly receiving emails from students abroad in countries like China, and these students often need to introduce themselves in order to support their reasons for their message. Unfortunately, more often than not these letters contain poorly written English. This software aims to help solve this issue. Using a combination of a “sentence template” system and intelligent natural language processing software, the program assembles each paragraph …
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Jess – A Java Security Scanner For Eclipse, Russell Spitler
Honors Theses
Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.
Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.
This void is what inspired JeSS, Java …
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
Theses: Doctorates and Masters
Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …