Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (4)
- Computer Engineering (3)
- Databases and Information Systems (3)
- Other Computer Engineering (2)
- Artificial Intelligence and Robotics (1)
-
- Civil and Environmental Engineering (1)
- Computer and Systems Architecture (1)
- Data Science (1)
- Electrical and Computer Engineering (1)
- Information Security (1)
- Numerical Analysis and Scientific Computing (1)
- Systems Architecture (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Transportation Engineering (1)
- Keyword
-
- Thesis; University of North Florida; UNF; Dissertations (8)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (7)
- Academic -- UNF -- Computer science (1)
- Academic -- UNF -- Computing; EvoSuite plugin tool -- Testing; Automating software testing; Genetic algorithms (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
-
- Academic -- UNF -- Computing; Web Analytics; Active Analytics; Google Analytics (1)
- Academic -- UNF -- Computing; code clone; clone detection; topic modeling; machine learning; software refactoring; software engineering; Latent Dirichlet Allocation -- Testing; Topic models -- Testing; Generative statistical models -- Testing; Code clone detection -- Statistical models; Code clone detection -- Software; CloneTM -- Testing (1)
- Academic -- UNF -- Computing; gate; automate; ciri; f-measure; human rights; u.s. department of state (1)
- Academic -- UNF -- Computing; music; collaborative filtering; collective intelligence; content-based filtering; MFCC; recommend; information retrieval; database; Pandora; Last.fm; music recommendation system; UNF (1)
- Academic -- UNF -- Computing; offloading (1)
- Academic – UNF – Computing (1)
- Academic – UNF – Master of Science in Computer and Information Sciences; Dissertations (1)
- Aiolos (1)
- Cuckoo (1)
- Deep Learning, Road Surface Markings, Road Safety, YOLOv5, Aerial Images (1)
- Dissertations, Academic -- UNF -- Computing (1)
- Dissertations, Academic -- UNF -- Master of Science in Computer and Information Sciences (1)
- Dynamic offloading framework (1)
- Mobile offloading framework (1)
- Thesis (1)
- Thesis; University of North Florida; UNF; Dissertations; Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations; Academic -- UNF -- Computing; Security; IT Security; Software Engineering (1)
- UNF (1)
- UNF; University of North Florida; Department of Computer and Information Sciences; Dissertations (1)
- University of North Florida (1)
- Web Services; Conceptual Model; Trustworthiness; Scenario-based Evaluation; Service Selection; Trust (1)
Articles 1 - 12 of 12
Full-Text Articles in Software Engineering
Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo
Extracting Road Surface Marking Features From Aerial Images Using Deep Learning, Michael Kimollo
UNF Graduate Theses and Dissertations
The traffic and roadway safety agencies spend significant efforts each year collecting roadway data, including lane configurations and other road surface marking data, such as areas with school zone markings, sidewalks, left turns, right turns, bicycle lanes, etc., for safety analysis and planning purposes. The current manual data collection methods pose significant operational and quality control challenges as they are costly and prone to errors. In addition to that the manual data collection is labor intensive and takes too much time involving high equipment costs, questionable data accuracy guarantees, and concerns about the safety of the crew.
This study aims …
A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan
A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan
UNF Graduate Theses and Dissertations
In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based …
Active Analytics: Suggesting Navigational Links To Users Based On Temporal Analytics Data, Jacob Koza
Active Analytics: Suggesting Navigational Links To Users Based On Temporal Analytics Data, Jacob Koza
UNF Graduate Theses and Dissertations
Front-end developers are tasked with keeping websites up-to-date while optimizing user experiences and interactions. Tools and systems have been developed to give these individuals granular analytic insight into who, with what, and how users are interacting with their sites. These systems maintain a historical record of user interactions that can be leveraged for design decisions. Developing a framework to aggregate those historical usage records and using it to anticipate user interactions on a webpage could automate the task of optimizing web pages. In this research a system called Active Analytics was created that takes Google Analytics historical usage data and …
Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner
Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner
UNF Graduate Theses and Dissertations
This thesis involves parsing document-based reports from the United States Human Rights Reports and rating the human practices for various countries based on the CIRI (Cingranelli-Richards) Human Rights Data Project dataset. The United States Human Rights Reports are annual reports that cover internationally recognized human rights practices regarding individual, civil, political, and worker rights. Students, scholars, policymakers, and analysts used the CIRI data for practical and research purposes. CIRI analyzed the annual reports from 1981 to 2011 and then stopped releasing the dataset for any further years, but a possible reason is due to the manual process of scouring the …
Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour
Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour
UNF Graduate Theses and Dissertations
Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow …
Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier
Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier
UNF Graduate Theses and Dissertations
Finding a way to automate the generation of test data is a crucial aspect of software testing. Testing comprises 50% of all software development costs [Korel90]. Finding a way to automate testing would greatly reduce cost and labor involved in the task of software testing. One of the ways to automate software testing is to automate the generation of test data inputs. For example, in statement coverage, creating test cases that will cover all of the conditions required when testing that program would be costly and time-consuming if undertaken manually. Therefore, a way must be found that allows the automation …
Integrating Security Into The Undergraduate Software Engineering Curriculum, Robert Evans
Integrating Security Into The Undergraduate Software Engineering Curriculum, Robert Evans
UNF Graduate Theses and Dissertations
This research included a thorough examination of the existing software assurance or what is commonly called software security knowledge, methodologies and what information security technologies is currently being recommended by the information technology community. Finally it is demonstrated how this security knowledge could be incorporated into the curriculum for undergraduate software engineering.
A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman
A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman
UNF Graduate Theses and Dissertations
Recommendation systems make it easier for an individual to navigate through large datasets by recommending information relevant to the user. Companies such as Facebook, LinkedIn, Twitter, Netflix, Amazon, Pandora, and others utilize these types of systems in order to increase revenue by providing personalized recommendations. Recommendation systems generally use one of the two techniques: collaborative filtering (i.e., collective intelligence) and content-based filtering.
Systems using collaborative filtering recommend items based on a community of users, their preferences, and their browsing or shopping behavior. Examples include Netflix, Amazon shopping, and Last.fm. This approach has been proven effective due to increased popularity, and …
Trustworthiness Of Web Services, Britto N. Arockiasamy
Trustworthiness Of Web Services, Britto N. Arockiasamy
UNF Graduate Theses and Dissertations
Workflow systems orchestrate various business tasks to attain an objective. Web services can be leveraged to handle individual tasks. Before anyone intends to leverage service components, it is imperative and essential to evaluate the trustworthiness of these services. Therefore, choosing a trustworthy service has become an important decision while designing a workflow system. Trustworthiness can be defined as the likelihood of a service functioning as it is intended.
Selection of a service that satisfies business goals involves collecting relevant information such as security mechanisms, reliability, performance and availability. It is important to arrive at total trustworthiness, which incorporates all of …
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
UNF Graduate Theses and Dissertations
Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved …
Improving The Knowledge-Based Expert System Lifecycle, Lucien Millette
Improving The Knowledge-Based Expert System Lifecycle, Lucien Millette
UNF Graduate Theses and Dissertations
Knowledge-based expert systems are used to enhance and automate manual processes through the use of a knowledge base and modern computing power. The traditional methodology for creating knowledge-based expert systems has many commonly encountered issues that can prevent successful implementations. Complications during the knowledge acquisition phase can prevent a knowledge-based expert system from functioning properly. Furthermore, the time and resources required to maintain a knowledge-based expert system once implemented can become problematic. There are several concepts that can be integrated into a proposed methodology to improve the knowledge-based expert system lifecycle to create a more efficient process. These methods are …
A Test Suite Generator For Struts Based Applications, Gregory M. Jackson
A Test Suite Generator For Struts Based Applications, Gregory M. Jackson
UNF Graduate Theses and Dissertations
Testing web-based enterprise applications requires the use of automated testing frameworks. The testing framework's ability to run suites of test cases through development ensures enhancements work as required and have not caused defects in previously developed sub systems. Open source testing frameworks like JUnit and Cactus have addressed the requirements to test web-based enterprise applications, however they do not address the generation of test cases based on direct analysis of the code under test.
This paper presents a tool to generate test cases for web-based enterprise applications. The generator focuses on creating test cases used to test applications built on …