Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

API

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 34

Full-Text Articles in Physical Sciences and Mathematics

The Social Pot: A Social Media Application, Reid Long Apr 2024

The Social Pot: A Social Media Application, Reid Long

Honors Projects

The Social Pot is a web application that allows a user to post to Instagram and X simultaneously from one place. The user creates a Social Pot Account and from there can set their Instagram username and password within the home page. Once the user attempts to post, it will redirect them to login to X which once successful will make the tweet. Used the API 'instagram-private-api'. User needed to give access to my X Project which in turn gave an Auth token (via X redirect URL). The auth token was then sent to my endpoint in order to get …


The Social Pot: A Social Media Application, Reid Long Mar 2024

The Social Pot: A Social Media Application, Reid Long

ASPIRE 2024

The Social Pot is a web application that allows a user to post to Instagram and X simultaneously from one place. The user creates a Social Pot Account and from there can set their Instagram username and password within the home page. Once the user attempts to post, it will redirect them to login to X which once successful will make the tweet. Used the API 'instagram-private-api'. User needed to give access to my X Project which in turn gave an Auth token (via X redirect URL). The auth token was then sent to my endpoint in order to get …


Booc Api Test, Anthony Castellletto Nov 2023

Booc Api Test, Anthony Castellletto

Benefits of Ocean Observing Catalog (BOOC)

This is just a test to see if I can read data from a published case through the Digital Commons API. Just ignore this case.

Tony Castelletto


Personalized Health Care In A Data-Driven Era: A Post–Covid-19 Retrospective, Arnob Zahid, Ravishankar Sharma May 2023

Personalized Health Care In A Data-Driven Era: A Post–Covid-19 Retrospective, Arnob Zahid, Ravishankar Sharma

All Works

No abstract provided.


Discord Api Wrapper, Joshua Brown Jan 2023

Discord Api Wrapper, Joshua Brown

Williams Honors College, Honors Research Projects

Discordwrap is a Python library that abstracts the Discord API so that developers can easily integrate their existing projects with Discord. This paper outlines Discordwrap's creation, from start to finish, including implementation as well as key design decisions, such as the decision to provide a functional library interface rather than an object-oriented one.


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao Aug 2022

Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao

Research Collection School Of Computing and Information Systems

Context based API recommendation is an important way to help developers find the needed APIs effectively and efficiently. For effective API recommendation, we need not only a joint view of both structural and textual code information, but also a holistic view of correlated API usage in control and data flow graph as a whole. Unfortunately, existing API recommendation methods exploit structural or textual code information separately. In this work, we propose a novel API recommendation approach called APIRec-CST (API Recommendation by Combining Structural and Textual code information). APIRec-CST is a deep learning model that combines the API usage with the …


On The Effectiveness Of Pretrained Models For Api Learning, Mohammad Abdul Hadi, Imam Nur Bani Yusuf, Thung Ferdian, Gia Kien Luong, Lingxiao Jiang, Fatemeh H. Fard, David Lo May 2022

On The Effectiveness Of Pretrained Models For Api Learning, Mohammad Abdul Hadi, Imam Nur Bani Yusuf, Thung Ferdian, Gia Kien Luong, Lingxiao Jiang, Fatemeh H. Fard, David Lo

Research Collection School Of Computing and Information Systems

Developers frequently use APIs to implement certain functionalities, such as parsing Excel Files, reading and writing text files line by line, etc. Developers can greatly benefit from automatic API usage sequence generation based on natural language queries for building applications in a faster and cleaner manner. Existing approaches utilize information retrieval models to search for matching API sequences given a query or use RNN-based encoder-decoder to generate API sequences. As it stands, the first approach treats queries and API names as bags of words. It lacks deep comprehension of the semantics of the queries. The latter approach adapts a neural …


Development Of Scent Detection And Categorization Algorithm Using Gas Chromatography And Machine Learning, Alex Driehaus Jan 2022

Development Of Scent Detection And Categorization Algorithm Using Gas Chromatography And Machine Learning, Alex Driehaus

Mahurin Honors College Capstone Experience/Thesis Projects

There are many looking to connect human senses to quantifiable data. Scents are categorized by their descriptions into scent families. These include citrus, floral, and woody. Similar descriptors designate similar families, while different descriptors correlate with different families. Dravnieks compiled an Atlas of chemical descriptors [1]. Such descriptors are cinnamon, fruity, and cadaverous. By analyzing the applicability of these descriptors, the chemicals will be sorted into their scent families.

Gas chromatography generates sample-specific signals of voltage over time. Chromatograms of known scents will serve as a basis for a convolutional neural network. This algorithm will be trained on these signals …


"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao Jan 2022

"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao

Research Collection School Of Computing and Information Systems

In the daily development process, developers often need assistance in finding a sequence of APIs to accomplish their development tasks. Existing deep learning models, which have recently been developed for recommending one single API, can be adapted by using encoder-decoder models together with beam search to generate API sequence recommendations. However, the generated API sequence recommendations heavily rely on the probabilities of API suggestions at each decoding step, which do not take into account other domain-specific factors (e.g., whether an API suggestion satisfies the program syntax and how diverse the API sequence recommendations are). Moreover, it is difficult for developers …


C2 Microservices Api: Ch4rl3sch4l3m4gn3, Thai H. Nguyễn Jan 2022

C2 Microservices Api: Ch4rl3sch4l3m4gn3, Thai H. Nguyễn

School of Computer Science & Engineering Undergraduate Publications

In the 21st century, cyber-based attackers such as advance persistent threats are leveraging bots in the form of botnets to conduct a plethora of cyber-attacks. While there are several social engineering techniques used to get targets to unknowingly download these bots, it is the command-and-control techniques advance persistent threats use to control their bots that is of critical interest to the author. In this research paper, the author aims to develop a command-and-control microservice application programming interface infrastructure to facilitate botnet command-and-control attack simulations. To achieve this the author will develop a simple bot skeletal framework, utilize the latest …


Symphas: A Modular Api For Phase-Field Modeling Using Compile-Time Symbolic Algebra, Steven A. Silber Aug 2021

Symphas: A Modular Api For Phase-Field Modeling Using Compile-Time Symbolic Algebra, Steven A. Silber

Electronic Thesis and Dissertation Repository

The phase-field method is a common approach to qualitative analysis of phase transitions. It allows visualizing the time evolution of a phase transition, providing valuable insight into the underlying microstructure and the dynamical processes that take place. Although the approach is applied in a diverse range of fields, from metal-forming to cardiac modelling, there are a limited number of software tools available that allow simulating any phase-field problem and that are highly accessible. To address this, a new open source API and software package called SymPhas is developed for simulating phase-field and phase-field crystal in 1-, 2- and 3-dimensions. Phase-field …


Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon Aug 2021

Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon

Research Collection Library

Self-checkout kiosks have become a staple feature of many modern and digitized libraries. These devices are used by library patrons for self-service item loans. Most implementations are not new, in fact many of these systems are simple, straight forward and work as intended. But behind this useful technology, there is a security concern on authentication that has to be addressed.

In my proposed presentation, I will discuss the risk factors of self-checkout kiosks and propose a solution using Alma APIs. I will address the technical shortcomings of the current implementations, compared to the proposed solution, and where the weakest link …


Online Marketplace, Devin Hopkins Jan 2021

Online Marketplace, Devin Hopkins

Williams Honors College, Honors Research Projects

The goal of this project was to create a website that helped a common person search for items from online marketplaces, such as eBay, Amazon, or Facebook Marketplace. The intention was to ease the burden of needing to search several different websites for the same product. Currently, if a person wants to look for a specific item on multiple different marketplaces, they must go to each marketplace individually and search for it. They must enter their specifications repeatedly and load virtually the same web page multiple times. This project’s goal was to condense that so the user would only have …


Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi Oct 2020

Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi

UBT International Conference

Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a …


Smartcitecon: Implicit Citation Context Extraction From Academic Literature Using Unsupervised Learning, Chenrui Gao, Haoran Cui, Li Zhang, Jiamin Wang, Wei Lu, Jian Wu Jan 2020

Smartcitecon: Implicit Citation Context Extraction From Academic Literature Using Unsupervised Learning, Chenrui Gao, Haoran Cui, Li Zhang, Jiamin Wang, Wei Lu, Jian Wu

Computer Science Faculty Publications

We introduce SmartCiteCon (SCC), a Java API for extracting both explicit and implicit citation context from academic literature in English. The tool is built on a Support Vector Machine (SVM) model trained on a set of 7,058 manually annotated citation context sentences, curated from 34,000 papers in the ACL Anthology. The model with 19 features achieves F1=85.6%. SCC supports PDF, XML, and JSON files out-of-box, provided that they are conformed to certain schemas. The API supports single document processing and batch processing in parallel. It takes about 12–45 seconds on average depending on the format to process a …


The Security Layer, Mark Thomas O'Neill Jan 2019

The Security Layer, Mark Thomas O'Neill

Theses and Dissertations

Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other features insecurely. To make matters worse, system administrators and users are powerless to fix …


A Large-Scale Analysis Of How Openssl Is Used In Open-Source Software, Scott Jared Heidbrink Mar 2018

A Large-Scale Analysis Of How Openssl Is Used In Open-Source Software, Scott Jared Heidbrink

Theses and Dissertations

As vulnerabilities become more common the security of applications are coming under increased scrutiny. In regards to Internet security, recent work discovers that many vulnerabilities are caused by TLS library misuse. This misuse is attributed to large and confusing APIs and developer misunderstanding of security generally. Due to these problems there is a desire for simplified TLS libraries and security handling. However, as of yet there is no analysis of how the existing APIs are used, beyond how incorrect usage motivates the need to replace them. We provide an analysis of contemporary usage of OpenSSL across 410 popular secure applications. …


Design And Implementation Of Triveni: A Process-Algebraic Api For Threads + Events, Christopher P. Colby, Lalita Jategaonkar Jagaeesan, Radhakrishnan Jagadeesan, Konstantin Laufer, Carlos Puchol Oct 2017

Design And Implementation Of Triveni: A Process-Algebraic Api For Threads + Events, Christopher P. Colby, Lalita Jategaonkar Jagaeesan, Radhakrishnan Jagadeesan, Konstantin Laufer, Carlos Puchol

Konstantin Läufer

We describe Triveni, a framework and API for integrating threads and events. The design of Triveni is based on an algebra, including preemption combinators, of processes. Triveni is compatible with existing threads standards, such as Pthreads and Java threads, and with the event models structured on the Observer pattern. We describe the software architecture and algorithms underlying a concrete implementation of Triveni in Java. This environment includes specification based testing of safety properties. The results described in the paper have been used to integrate process-algebraic methods into (concurrent) object orientated programming.


Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly Jan 2017

Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly

Williams Honors College, Honors Research Projects

Cameron Reilly

Major: Computer Science Management Track

Project Sponsor: Michael Collard

What’s Good?

“What’s Good?” is an iOS application that uses augmented reality to present information about nearby restaurants to the user in real time. Users can hold up their device and look through their camera to see information presented above the restaurant including it’s name, average cost, and average review rating. The user’s location is gathered and used in tandem with the Zomato API to select what data display as those dining locations are currently near the user. Using the gyroscope, compass, and accelerometer to tell the exact orientation …


Api Recommendation System For Software Development, Ferdian Thung Aug 2016

Api Recommendation System For Software Development, Ferdian Thung

Research Collection School Of Computing and Information Systems

Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the API methods and putting the right parameters inside them. In this work, I plan to automatically recommend relevant APIs to developers. This API recommendation can be divided into multiple stages. First, we can recommend relevant …


Simple Macro: Addon For World Of Warcraft, Yemane Gebreyesus Jun 2015

Simple Macro: Addon For World Of Warcraft, Yemane Gebreyesus

Computer Engineering

This senior project was started to try and solve a problem within World of Warcraft. That particular problem is the underdeveloped default macro interface, which Simple Macro aims to remedy by creating a more user-friendly interface that is accessible by a wider audience. It employs a click through method of accessing and editing data to reduce the amount of typing necessary. The addon also has a feature to specifically help players that want to change a target in certain groups of macros all at once. The project was developed in both Lua and XML.


Meshpotato: A C++/Python Api For Production Volumetric Rendering, Kevin Coley May 2014

Meshpotato: A C++/Python Api For Production Volumetric Rendering, Kevin Coley

All Theses

MeshPotato is a production volume rendering API written in C++. Its purpose is to simplify the creation of high quality volumetric effects such as fire, smoke, clouds and explosions. MeshPotato has been designed to be extensible and flexible for quick changes. Python bindings have been implemented with this library to allow for tools that are scripted and integrated within popular 3D modeling applications such as Maya and Houdini. The design of MeshPotato is discussed along with its plugin system, volume rendering API and some results from using the tool.


Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum Apr 2014

Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum

Computer Science Theses & Dissertations

Web archives have contained the cultural history of the web for many years, but they still have a limited capability for access. Most of the web archiving research has focused on crawling and preservation activities, with little focus on the delivery methods. The current access methods are tightly coupled with web archive infrastructure, hard to replicate or integrate with other web archives, and do not cover all the users' needs. In this dissertation, we focus on the access methods for archived web data to enable users, third-party developers, researchers, and others to gain knowledge from the web archives. We build …


Modeler: Web Api Modeling Tool, Yegor Pomortsev Mar 2014

Modeler: Web Api Modeling Tool, Yegor Pomortsev

Computer Science and Software Engineering

This report presents the API Modeler system, a tool for creating and modifying web APIs models, within the context of the API modeling problem, and how it serves to solve several common use-cases and scenarios for interacting with web API models. The report describes the motivation for Modeler, its design and implementation, related tools, and possible future improvements to the system.


Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse Dec 2010

Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse

Theses and Dissertations

Complex concurrent APIs are difficult to reason about annually due to the exponential growth in the number of feasible schedules. Testing against reference solutions of these APIs is equally difficult as reference solutions implement an unknown set of allowed behaviors, and programmers have no way to directly control schedules or API internals to expose or reproduce errors. The work in this paper mechanically generates a drop-in replacement for a concurrent API from a formal specification. The specification is a guarded command system with first-order logic that is compiled into a core calculus. The term rewriting system is connected to actual …


Slides: Drilling Waste, Blake Scott Oct 2010

Slides: Drilling Waste, Blake Scott

Opportunities and Obstacles to Reducing the Environmental Footprint of Natural Gas Development in Uintah Basin (October 14)

Presenter: Blake Scott, Scott Environmental Services, Inc.

24 slides


Innovation In The Programmable Web: Characterizing The Mashup Ecosystem, C. Jason Woodard, Shuli Yu Dec 2008

Innovation In The Programmable Web: Characterizing The Mashup Ecosystem, C. Jason Woodard, Shuli Yu

Research Collection School Of Computing and Information Systems

This paper investigates the structure and dynamics of the Web 2.0 software ecosystem by analyzing empirical data on web service APIs and mashups. Using network analysis tools to visualize the growth of the ecosystem from December 2005 to 2007, we find that the APIs are organized into three tiers, and that mashups are often formed by combining APIs across tiers. Plotting the cumulative distribution of mashups to APIs reveals a power-law relationship, although the tail is short compared to previously reported distributions of book and movie sales. While this finding highlights the dominant role played by the most popular APIs …


Slides: Nepa And Adaptive Management, Denise A. Dragoo May 2004

Slides: Nepa And Adaptive Management, Denise A. Dragoo

Best Management Practices and Adaptive Management in Oil and Gas Development (May 12-13)

Presenter: Denise A. Dragoo, Partner, Snell & Wilmer L.L.P., Salt Lake City, UT

22 slides


Mpijava: An Object-Oriented Java Interface To Mpi, Mark Baker, Bryan Carpenter, Geoffrey C. Fox, Sung Hoon Ko Jan 1999

Mpijava: An Object-Oriented Java Interface To Mpi, Mark Baker, Bryan Carpenter, Geoffrey C. Fox, Sung Hoon Ko

Northeast Parallel Architecture Center

A basic prerequisite for parallel programming is a good communication API. The recent interest in using Java for scientific and engineering application has led to several international efforts to produce a message passing interface to support parallel computation. In this paper we describe and then discuss the syntax, functionality and performance of one such interface, mpiJava, an object-oriented Java interface to MPI. We first discuss the design of the mpiJava API and the issues associated with its development. We then move on to briefly outline the steps necessary to 'port' mpiJava onto a range of operating systems, including Windows NT, …