Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 2285

Full-Text Articles in Software Engineering

Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp Aug 2018

Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp

Keyboard Graduate Theses & Dissertations

Modern music tutoring software and mobile instructional applications have great potential to help students practice at home effectively. They can offer extensive feedback on what the student is getting right and wrong and have adopted a gamified design with levels, badges, and other game-like elements to help gain wider appeal among students. Despite their advantages for motivating students and creating a safe practice environment, no current music instruction software demonstrates any knowledge about a student’s level of mastery. This can lead to awkward pedagogy and user frustration. Applying Bayesian Knowledge Tracing to tutoring systems provides an ideal way to ...


Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed May 2018

Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results towards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.


Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi May 2018

Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi

The African Journal of Information Systems

The storage and retrieval of information are important functions of information systems (IS). These IS functions have been realized for decades, due to the maturity of the relational database technology. In recent years, the concept of Semantic Information System (SIS) has emerged as IS in which information is represented with explicit semantic based on its meaning rather than its syntax to enable its automatic and intelligent processing by computers. At present, there is a shortage of discussions on the topic of semantic data storage in IS as compared to the relational database storage counterpart. This study uses a combination of ...


A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson May 2018

A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson

University of New Orleans Theses and Dissertations

Often times groups of domain experts, such as scientists and engineers, will develop their own software modules for specialized computational tasks. When these users determine there is a need to integrate the data and computations used in their specialized components with an enterprise data management system, interoperability between the enterprise system and the specialized components rather than re-implementation allows for faster implementation and more flexible change management by shifting the onus of changes to the scientific components to the subject matter experts rather than the enterprise information technology team. The Jython-based RESTful web service API was developed to leverage code ...


Applications Of Varying Leadership Structures For Software Engineering Teams, Elliot Sandfort May 2018

Applications Of Varying Leadership Structures For Software Engineering Teams, Elliot Sandfort

Honors Theses, University of Nebraska-Lincoln

This thesis explores the similarities and differences between applications of managing software engineering teams in Design Studio and the state of the practice. Information about the leadership structure of Design Studio teams was gathered over 3 semesters of Design Studio experiences with two companies: Hudl and TD Ameritrade. Information about leadership concepts in the state of the practice was gathered from experiences and observations with three different companies: Hudl, Garmin, and TD Ameritrade. From these experiences and observations, it can be concluded that the leadership structure of Design Studio is valuable as a student learning experience, and with proper consideration ...


Cslc Tutoring Portal, Brian Hodges May 2018

Cslc Tutoring Portal, Brian Hodges

Theses/Capstones/Creative Projects

A web portal designed for the Computer Science Learning Center to track students requesting help


Ksugo, Chase Godwin May 2018

Ksugo, Chase Godwin

Honors College Capstones and Theses

KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.


A Home Security System Based On Smartphone Sensors, Michael Mahler May 2018

A Home Security System Based On Smartphone Sensors, Michael Mahler

Theses and Dissertations

Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured ...


The Open World Microorganism, Stephen Thompson Apr 2018

The Open World Microorganism, Stephen Thompson

Stephen Thompson

Video games have been creating sprawling open world experiences for years, but as of yet none have ventured to create an authentic inner cell experience, using our knowledge of cells to recreate digitally what it would be like to shrink smaller than one and step inside. The benefits this application could yield are manifold, so this paper references the necessary ingredients and draws up the blueprints for the first three-dimensional, fully explorable, customizable, and interactive microorganism: an invention which could usher in a new age of biological literacy using technology already employed by many video games. The first part of ...


Fit Buddy Prototype And Ksugo Mobile App, Albert Lim Apr 2018

Fit Buddy Prototype And Ksugo Mobile App, Albert Lim

Honors College Capstones and Theses

The purpose of my Honors Capstone project is to deliver a mobile app prototype that is focused on improving the student experience at Kennesaw State University (KSU), called Fit Buddy. There are three key concepts that will be covered in this Proof of Concept project: social networking, fitness, and IoT (Internet of Things) usages.

Additionally, the purpose of the CS Capstone project is to deliver a mobile app that is focused on improving the faculty, student, and guest experience at KSU, called KSUGo. The primary objective and purpose in creating this stems from KSU’s many resourceful outlets, which we ...


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh Apr 2018

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Seismology And Volcanology: Exploration Of Volcanoes, Long-Periods, And Machines - Predicting Volcano Eruption Using Signature Seismic Data, Kyle Killion, Rajeev Kumar, Celia J. Taylor, Gabriele Morra Apr 2018

Seismology And Volcanology: Exploration Of Volcanoes, Long-Periods, And Machines - Predicting Volcano Eruption Using Signature Seismic Data, Kyle Killion, Rajeev Kumar, Celia J. Taylor, Gabriele Morra

SMU Data Science Review

Abstract. Seismo-volcanologists manually isolate and verify long-period waves and Strombolian events using seismic and acoustic waves. This is a very detailed and time-consuming process. This project is to employ machine learning algorithms to find models which locate long-period and Strombolian signatures automatically. By comparing the timing of seismic and acoustic waves, clustering techniques effectively isolated big volcanic events and aided in the further refinement of techniques to capture the hundreds of typical daily Strombolian events at Villarrica volcano. Within the research, we utilized the unsupervised machine learning environment to locate a group of signatures for customizing machine learned long-period signature ...


A Framework For Modelling User Activity Preferences, Roberto Barboza Junior Apr 2018

A Framework For Modelling User Activity Preferences, Roberto Barboza Junior

Electronic Thesis and Dissertation Repository

The availability of location data increases every day and brings the opportunity to mine these data and extract valuable knowledge about human behaviour. More specifically, these data may contain information about users’ activities, which can enable, for example, services to improve advertising campaigns or enhance the user experience of a mobile application. However, several techniques ignore the fact that users’ context other than location and time, such as weather conditions, influences their behaviour. Moreover, several studies focus only on a single data source, addressing either data collected without any type of user interaction, such as GPS data, or data spontaneously ...


Lee Honors College Mobile Application, James Ward Apr 2018

Lee Honors College Mobile Application, James Ward

Honors Theses

In the spring of 2018 three Computer Science students Benjamin Campbell, James Ward, and Peter Shutt created a mobile application. This app was developed over the span of two semesters for their senior design project; a capstone to their degrees.

Their client, The Lee Honors College at Western Michigan University --referred to as LHC and WMU respectively hereafter-- has a plethora of academic and social information, and a large demand for access to it. This information includes building hours, contact information, health resources, a LHC specific course catalog, social media posts, event descriptions, and much more. The volume of information ...


Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara Apr 2018

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara Apr 2018

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Using Github In Large Software Engineering Classes: An Exploratory Case Study, Miroslav Tushev Apr 2018

Using Github In Large Software Engineering Classes: An Exploratory Case Study, Miroslav Tushev

LSU Master's Theses

GitHub has been recently used in Software Engineering (SE) classes to facilitate col- laboration in student team projects. The underlying tenet is that the technical and social feature of GitHub can help students to communicate and collaborate more effectively as a team as well as help teachers to evaluate individual student contribution more objectively. To shed more light on this, in this case study, we explore the benefits and drawbacks of using GitHub in SE classes. Our study is conducted in a software engineering class of 91 students divided into 18 teams. Our research method includes an entry and an ...


Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems Apr 2018

Understanding Natural Keyboard Typing Using Convolutional Neural Networks On Mobile Sensor Data, Travis Siems

Computer Science and Engineering Theses and Dissertations

Mobile phones and other devices with embedded sensors are becoming increasingly ubiquitous. Audio and motion sensor data may be able to detect information that we did not think possible. Some researchers have created models that can predict computer keyboard typing from a nearby mobile device; however, certain limitations to their experiment setup and methods compelled us to be skeptical of the models’ realistic prediction capability. We investigate the possibility of understanding natural keyboard typing from mobile phones by performing a well-designed data collection experiment that encourages natural typing and interactions. This data collection helps capture realistic vulnerabilities of the security ...


Octopus: An Online Topic-Aware Influence Analysis System For Social Networks, Ju Fan, Jiarong Qiu, Yuchen Li, Qingfei Meng, Dongxiang Zhang, Guoliang Li, Kian-Lee Tan, Xiaoyong Du Apr 2018

Octopus: An Online Topic-Aware Influence Analysis System For Social Networks, Ju Fan, Jiarong Qiu, Yuchen Li, Qingfei Meng, Dongxiang Zhang, Guoliang Li, Kian-Lee Tan, Xiaoyong Du

Research Collection School Of Information Systems

The wide adoption of social networks has broughta new demand on influence analysis. This paper presents OCTOPUSthat offers social network users and analysts valuableinsights through topic-aware social influence analysis services.OCTOPUS has the following novel features. First, OCTOPUSprovides a user-friendly interface that allows users to employsimple and easy-to-use keywords to perform influence analysis.Second, OCTOPUS provides three powerful keyword-basedtopic-aware influence analysis tools: keyword-based influentialuser discovery, personalized influential keywords suggestion,and interactive influential path exploration. These tools cannot only discover influential users, but also provide insights onhow the users influence the network. Third, OCTOPUS enablesonline influence analysis, which provides end-users with ...


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated ...


Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed Mar 2018

Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results to- wards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.


Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu Mar 2018

Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu

Student Research and Creative Activity Fair

The goal of this study is to improve the safety of first responders during an emergency hazardous material (hazmat) incident.

  • A first responder (FR) is an individual who arrives first during a hazmat incident and takes the initiative to act in order to minimize the risk to public health and property from such incidents. Often first responders are firefighters.
  • The reports of National Fire Protection Association recorded a national average of more than 30,000 firefighter injuries between 2010-16 (National Fire Protection Association, 2017).
  • According to the US Fire Administration, an average fatality of 120 firefighters were recorded between 2010-16 ...


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst Mar 2018

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...


Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach Le, Ferdian Thung, David Lo, Claire Le Goues Mar 2018

Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach Le, Ferdian Thung, David Lo, Claire Le Goues

Research Collection School Of Information Systems

The primary goal of Automated Program Repair (APR) is to automatically fix buggy software, to reduce the manual bug-fix burden that presently rests on human developers. Existing APR techniques can be generally divided into two families: semantics- vs. heuristics-based. Semantics-based APR uses symbolic execution and test suites to extract semantic constraints, and uses program synthesis to synthesize repairs that satisfy the extracted constraints. Heuristic-based APR generates large populations of repair candidates via source manipulation, and searches for the best among them. Both families largely rely on a primary assumption that a program is correctly patched if the generated patch leads ...


Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui Fan, Xin Xia, David Lo, Shanping Li Mar 2018

Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui Fan, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Modern Code Review (MCR) has been widely used by open source and proprietary software projects. Inspecting code changes consumes reviewers much time and effort since they need to comprehend patches, and many reviewers are often assigned to review many code changes. Note that a code change might be eventually abandoned, which causes waste of time and effort. Thus, a tool that predicts early on whether a code change will be merged can help developers prioritize changes to inspect, accomplish more things given tight schedule, and not waste reviewing effort on low quality changes. In this paper, motivated by the above ...


A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed Feb 2018

A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed

Electrical and Computer Engineering Publications

We have been thinking about other aspects of software engineering for many years; the missing link in engineering software is the soft skills set, essential in the software development process. Although soft skills are among the most important aspects in the creation of software, they are often overlooked by educators and practitioners. One of the main reasons for the oversight is that soft skills are usually related to social and personality factors, i.e., teamwork, motivation, commitment, leadership, multi-culturalism, emotions, interpersonal skills, etc. This editorial is a manifesto declaring the importance of soft skills in software engineering with the intention ...


Risk-Sensitive Stochastic Orienteering Problems For Trip Optimization In Urban Environments, Pradeep Varakantham, Akshat Kumar, Hoong Chuin Lau Feb 2018

Risk-Sensitive Stochastic Orienteering Problems For Trip Optimization In Urban Environments, Pradeep Varakantham, Akshat Kumar, Hoong Chuin Lau

Research Collection School Of Information Systems

Orienteering Problems (OPs) are used to model many routing and trip planning problems. OPs are a variantof the well-known traveling salesman problem where the goal is to compute the highest reward path thatincludes a subset of vertices and has an overall travel time less than a specified deadline. However, the applicabilityof OPs is limited due to the assumption of deterministic and static travel times. To that end, Campbellet al. extended OPs to Stochastic OPs (SOPs) to represent uncertain travel times (Campbell et al. 2011). Inthis article, we make the following key contributions: (1) We extend SOPs to Dynamic SOPs (DSOPs ...


Rule-Based Specification Mining Leveraging Learning To Rank, Zherui Cao, Yuan Tian, Bui Tien Duy Le, David Lo Feb 2018

Rule-Based Specification Mining Leveraging Learning To Rank, Zherui Cao, Yuan Tian, Bui Tien Duy Le, David Lo

Research Collection School Of Information Systems

Software systems are often released without formal specifications. To deal with the problem of lack of and outdated specifications, rule-based specification mining approaches have been proposed. These approaches analyze execution traces of a system to infer the rules that characterize the protocols, typically of a library, that its clients must obey. Rule-based specification mining approaches work by exploring the search space of all possible rules and use interestingness measures to differentiate specifications from false positives. Previous rule-based specification mining approaches often rely on one or two interestingness measures, while the potential benefit of combining multiple available interestingness measures is not ...


The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid Jan 2018

The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid

Open Dartmouth: Faculty Open Access Articles

Algorithms for predicting recidivism are commonly used to assess a criminal defendant’s likelihood of committing a crime. These predictions are used in pretrial, parole, and sentencing decisions. Proponents of these systems argue that big data and advanced machine learning make these analyses more accurate and less biased than humans. We show, however, that the widely used commercial risk assessment software COMPAS is no more accurate or fair than predictions made by people with little or no criminal justice expertise. We further show that a simple linear predictor provided with only two features is nearly equivalent to COMPAS with its ...