Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of North Florida

Discipline
Keyword
Publication Year

Articles 1 - 12 of 12

Full-Text Articles in Software Engineering

Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo Jan 2023

Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo

UNF Graduate Theses and Dissertations

The traffic and roadway safety agencies spend significant efforts each year collecting roadway data, including lane configurations and other road surface marking data, such as areas with school zone markings, sidewalks, left turns, right turns, bicycle lanes, etc., for safety analysis and planning purposes. The current manual data collection methods pose significant operational and quality control challenges as they are costly and prone to errors. In addition to that the manual data collection is labor intensive and takes too much time involving high equipment costs, questionable data accuracy guarantees, and concerns about the safety of the crew.

This study aims …


A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan Jan 2019

A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan

UNF Graduate Theses and Dissertations

In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based …


Active Analytics: Suggesting Navigational Links To Users Based On Temporal Analytics Data, Jacob Koza Jan 2019

Active Analytics: Suggesting Navigational Links To Users Based On Temporal Analytics Data, Jacob Koza

UNF Graduate Theses and Dissertations

Front-end developers are tasked with keeping websites up-to-date while optimizing user experiences and interactions. Tools and systems have been developed to give these individuals granular analytic insight into who, with what, and how users are interacting with their sites. These systems maintain a historical record of user interactions that can be leveraged for design decisions. Developing a framework to aggregate those historical usage records and using it to anticipate user interactions on a webpage could automate the task of optimizing web pages. In this research a system called Active Analytics was created that takes Google Analytics historical usage data and …


Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner Jan 2018

Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner

UNF Graduate Theses and Dissertations

This thesis involves parsing document-based reports from the United States Human Rights Reports and rating the human practices for various countries based on the CIRI (Cingranelli-Richards) Human Rights Data Project dataset. The United States Human Rights Reports are annual reports that cover internationally recognized human rights practices regarding individual, civil, political, and worker rights. Students, scholars, policymakers, and analysts used the CIRI data for practical and research purposes. CIRI analyzed the annual reports from 1981 to 2011 and then stopped releasing the dataset for any further years, but a possible reason is due to the manual process of scouring the …


Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour Jan 2018

Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour

UNF Graduate Theses and Dissertations

Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow …


Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier Jan 2017

Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier

UNF Graduate Theses and Dissertations

Finding a way to automate the generation of test data is a crucial aspect of software testing. Testing comprises 50% of all software development costs [Korel90]. Finding a way to automate testing would greatly reduce cost and labor involved in the task of software testing. One of the ways to automate software testing is to automate the generation of test data inputs. For example, in statement coverage, creating test cases that will cover all of the conditions required when testing that program would be costly and time-consuming if undertaken manually. Therefore, a way must be found that allows the automation …


Integrating Security Into The Undergraduate Software Engineering Curriculum, Robert Evans Jan 2015

Integrating Security Into The Undergraduate Software Engineering Curriculum, Robert Evans

UNF Graduate Theses and Dissertations

This research included a thorough examination of the existing software assurance or what is commonly called software security knowledge, methodologies and what information security technologies is currently being recommended by the information technology community. Finally it is demonstrated how this security knowledge could be incorporated into the curriculum for undergraduate software engineering.


A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman Jan 2014

A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman

UNF Graduate Theses and Dissertations

Recommendation systems make it easier for an individual to navigate through large datasets by recommending information relevant to the user. Companies such as Facebook, LinkedIn, Twitter, Netflix, Amazon, Pandora, and others utilize these types of systems in order to increase revenue by providing personalized recommendations. Recommendation systems generally use one of the two techniques: collaborative filtering (i.e., collective intelligence) and content-based filtering.

Systems using collaborative filtering recommend items based on a community of users, their preferences, and their browsing or shopping behavior. Examples include Netflix, Amazon shopping, and Last.fm. This approach has been proven effective due to increased popularity, and …


Trustworthiness Of Web Services, Britto N. Arockiasamy Jan 2014

Trustworthiness Of Web Services, Britto N. Arockiasamy

UNF Graduate Theses and Dissertations

Workflow systems orchestrate various business tasks to attain an objective. Web services can be leveraged to handle individual tasks. Before anyone intends to leverage service components, it is imperative and essential to evaluate the trustworthiness of these services. Therefore, choosing a trustworthy service has become an important decision while designing a workflow system. Trustworthiness can be defined as the likelihood of a service functioning as it is intended.

Selection of a service that satisfies business goals involves collecting relevant information such as security mechanisms, reliability, performance and availability. It is important to arrive at total trustworthiness, which incorporates all of …


Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju Jan 2013

Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju

UNF Graduate Theses and Dissertations

Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved …


Improving The Knowledge-Based Expert System Lifecycle, Lucien Millette Jan 2012

Improving The Knowledge-Based Expert System Lifecycle, Lucien Millette

UNF Graduate Theses and Dissertations

Knowledge-based expert systems are used to enhance and automate manual processes through the use of a knowledge base and modern computing power. The traditional methodology for creating knowledge-based expert systems has many commonly encountered issues that can prevent successful implementations. Complications during the knowledge acquisition phase can prevent a knowledge-based expert system from functioning properly. Furthermore, the time and resources required to maintain a knowledge-based expert system once implemented can become problematic. There are several concepts that can be integrated into a proposed methodology to improve the knowledge-based expert system lifecycle to create a more efficient process. These methods are …


A Test Suite Generator For Struts Based Applications, Gregory M. Jackson Jan 2004

A Test Suite Generator For Struts Based Applications, Gregory M. Jackson

UNF Graduate Theses and Dissertations

Testing web-based enterprise applications requires the use of automated testing frameworks. The testing framework's ability to run suites of test cases through development ensures enhancements work as required and have not caused defects in previously developed sub systems. Open source testing frameworks like JUnit and Cactus have addressed the requirements to test web-based enterprise applications, however they do not address the generation of test cases based on direct analysis of the code under test.

This paper presents a tool to generate test cases for web-based enterprise applications. The generator focuses on creating test cases used to test applications built on …