Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,854 Full-Text Articles 3,559 Authors 705,104 Downloads 143 Institutions

All Articles in Software Engineering

Faceted Search

2,854 full-text articles. Page 1 of 104.

Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, Wei MINN 2020 Singapore Management University

Experimental Comparison Of Features And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Wei Minn

Research Collection School Of Information Systems

Android platform has dominated the smart phone market for years now and, consequently, gained a lot of attention from attackers. Malicious apps (malware) pose a serious threat to the security and privacy of Android smart phone users. Available approaches to detect mobile malware based on machine learning rely on features extracted with static analysis or dynamic analysis techniques. Dif- ferent types of machine learning classi ers (such as support vector machine and random forest) deep learning classi ers (based on deep neural networks) are then trained on extracted features, to produce models that can be used to detect mobile malware ...


Bubble-In Digital Testing System, Chaz Hampton 2020 California State University, San Bernardino

Bubble-In Digital Testing System, Chaz Hampton

Electronic Theses, Projects, and Dissertations

Bubble-In is a cloud-based test-taking system build for students and teachers. The Bubble-In system is a test-taking application that interfaces with a cloud server. The mobile applications have been built for Android and Apple devices and the webserver is hosted on Digital Ocean VPS run with Nginx. The Bubble-In application is equipped with anti-cheating mechanisms such as question-answer key scrambling, not allowing screenshots, screen recording, or leaving the application. The tests students take are sent to the webserver to be graded and have statistics calculated and displayed in easy to use format for the test creator. Instructors can use the ...


Exploring Usage Of Web Resources Through A Model Of Api Learning, Finn Voichick 2020 Washington University in St. Louis

Exploring Usage Of Web Resources Through A Model Of Api Learning, Finn Voichick

Engineering and Applied Science Theses & Dissertations

Application programming interfaces (APIs) are essential to modern software development, and new APIs are frequently being produced. Consequently, software developers must regularly learn new APIs, which they typically do on the job from online resources rather than in a formal educational context. The Kelleher–Ichinco COIL model, an acronym for “Collection and Organization of Information for Learning,” was recently developed to model the entire API learning process, drawing from information foraging theory, cognitive load theory, and external memory research. We ran an exploratory empirical user study in which participants performed a programming task using the React API with the goal ...


Javafx Application, Pengfei Huang 2020 Minnesota State University Moorhead

Javafx Application, Pengfei Huang

Student Academic Conference

Developing java GUI application by using JavaFX.


Server Score, Zachary Buresh 2020 Minnesota State University Moorhead

Server Score, Zachary Buresh

Student Academic Conference

This presentation is in regards to the Android mobile application that I developed in the Kotlin programming language named "Server Score". The app helps waiters/waitresses calculate, track, and predict performance related statistics on the job.


Dfl-Opt: A Daily Fantasy Lineup Optimizer, Francis Aurori 2020 Montclair State University

Dfl-Opt: A Daily Fantasy Lineup Optimizer, Francis Aurori

Department of Computer Science Faculty Scholarship and Creative Works

[Background] Daily fantasy sports (DFS) are a variety of fantasy sports where contests take place in a matter of days or hours rather than over a whole season. A disparity exists between skilled professionals and casual participants in the creation of line-ups (i.e. teams) w.r.t their chances of winning in these contests. The purpose of the current project was to create a user-friendly, open source platform (named DFL-Opt) for participants of all skill levels to utilize in the creation of DFS line-ups. In addition, efficacy of the DFL-Opt platform was determined by playing the lineups generated by ...


Repairing Deep Neural Networks: Fix Patterns And Challenges, Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan 2020 Iowa State University

Repairing Deep Neural Networks: Fix Patterns And Challenges, Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan

Computer Science Publications

Significant interest in applying Deep Neural Network (DNN) has fueled the need to support engineering of software that uses DNNs. Repairing software that uses DNNs is one such unmistakable SE need where automated tools could be beneficial; however, we do not fully understand challenges to repairing and patterns that are utilized when manually repairing DNNs. What challenges should automated repair tools address? What are the repair patterns whose automation could help developers? Which repair patterns should be assigned a higher priority for building automated bug repair tools? This work presents a comprehensive study of bug fix patterns to address these ...


Meta-Analysis Of Biological Research Literature, Evan Suggs 2020 University of Tennessee at Chattanooga

Meta-Analysis Of Biological Research Literature, Evan Suggs

Honors Theses

Comparative studies have been powerful tools in generating a broad understanding about the evolution of animal social systems but they currently rely on the slow, manual process of reading thousands of abstracts and papers from research databases. A web application was created for researchers conducting a comparative survey, in order to speed up their research. This web application automates the retrieval of research papers and their selection process. Using previously obtained data sets on the orders Artiodacytla and Lagomorph, a machine learning application was created to classify the papers. These techniques and tools should greatly increase the speed at which ...


Using Taint Analysis And Reinforcement Learning (Tarl) To Repair Autonomous Robot Software, Damian Lyons, Saba Zahra 2020 Fordham University

Using Taint Analysis And Reinforcement Learning (Tarl) To Repair Autonomous Robot Software, Damian Lyons, Saba Zahra

Faculty Publications

It is important to be able to establish formal performance bounds for autonomous systems. However, formal verification techniques require a model of the environment in which the system operates; a challenge for autonomous systems, especially those expected to operate over longer timescales. This paper describes work in progress to automate the monitor and repair of ROS-based autonomous robot software written for an a-priori partially known and possibly incorrect environment model. A taint analysis method is used to automatically extract the data-flow sequence from input topic to publish topic, and instrument that code. A unique reinforcement learning approximation of MDP utility ...


Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-pink TAN, Hwee Xian TAN, Tih-Shih Lee, Tze Pin Ng 2020 Singapore Management University

Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-Pink Tan, Hwee Xian Tan, Tih-Shih Lee, Tze Pin Ng

Research Collection School Of Information Systems

Background: Dementia is a global epidemic and incurs substantial burden on the affected families and the health care system. A window of opportunity for intervention is the predementia stage known as mild cognitive impairment (MCI). Individuals often present to services late in the course of their disease and more needs to be done for early detection; sensor technology is a potential method for detection.Objective: The aim of this cross-sectional study was to establish the feasibility and acceptability of utilizing sensors in the homes of senior citizens to detect changes in behaviors unobtrusively.Methods: We recruited 59 community-dwelling seniors (aged ...


Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown 2020 University of Arkansas, Fayetteville

Applying Imitation And Reinforcement Learning To Sparse Reward Environments, Haven Brown

Computer Science and Computer Engineering Undergraduate Honors Theses

The focus of this project was to shorten the time it takes to train reinforcement learning agents to perform better than humans in a sparse reward environment. Finding a general purpose solution to this problem is essential to creating agents in the future capable of managing large systems or performing a series of tasks before receiving feedback. The goal of this project was to create a transition function between an imitation learning algorithm (also referred to as a behavioral cloning algorithm) and a reinforcement learning algorithm. The goal of this approach was to allow an agent to first learn to ...


Speech Processing In Computer Vision Applications, Nicholas Waterworth 2020 University of Arkansas, Fayetteville

Speech Processing In Computer Vision Applications, Nicholas Waterworth

Computer Science and Computer Engineering Undergraduate Honors Theses

Deep learning has been recently proven to be a viable asset in determining features in the field of Speech Analysis. Deep learning methods like Convolutional Neural Networks facilitate the expansion of specific feature information in waveforms, allowing networks to create more feature dense representations of data. Our work attempts to address the problem of re-creating a face given a speaker's voice and speaker identification using deep learning methods. In this work, we first review the fundamental background in speech processing and its related applications. Then we introduce novel deep learning-based methods to speech feature analysis. Finally, we will present ...


Identifying Privacy Policy In Service Terms Using Natural Language Processing, Ange-Thierry Ishimwe 2020 University of Arkansas, Fayetteville

Identifying Privacy Policy In Service Terms Using Natural Language Processing, Ange-Thierry Ishimwe

Computer Science and Computer Engineering Undergraduate Honors Theses

Ever since technology (tech) companies realized that people's usage data from their activities on mobile applications to the internet could be sold to advertisers for a profit, it began the Big Data era where tech companies collect as much data as possible from users. One of the benefits of this new era is the creation of new types of jobs such as data scientists, Big Data engineers, etc. However, this new era has also raised one of the hottest topics, which is data privacy. A myriad number of complaints have been raised on data privacy, such as how much ...


Dependency Mapping Software For Jira, Project Management Tool, Bentley Lager 2020 University of Arkansas, Fayetteville

Dependency Mapping Software For Jira, Project Management Tool, Bentley Lager

Computer Science and Computer Engineering Undergraduate Honors Theses

Efficiently managing a software development project is extremely important in industry and is often overlooked by the software developers on a project. Pieces of development work are identified by developers and are then handed off to project managers, who are left to organize this information. Project managers must organize this to set expectations for the client, and ensure the project stays on track and on budget. The main block in this process are dependency chains between tasks. Dependency chains can cause a project to take much longer than anticipated or result in the under utilization of developers on a project ...


Emotional Awareness During Bug Fixes – A Pilot Study, JADA LORO, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Ph.D. 2020 University of Nebraska - Lincoln

Emotional Awareness During Bug Fixes – A Pilot Study, Jada Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Ph.D.

UCARE Research Products

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.

Research Question: Can we determine emotional state of a developer using biometric sensors during debugging?


Mapping And Simulating Standing Wave Patterns In A Microwave Oven, Sana Ahmed 2020 Susquehanna University

Mapping And Simulating Standing Wave Patterns In A Microwave Oven, Sana Ahmed

Senior Scholars Day

The goal of our project was to map the standing wave patterns in a microwave oven cavity using experimentation. The next task was then to view the standing wave patterns utilizing computer simulations. In a related project done by one of the group members, a microwave oven was used to find the speed of light. He placed chocolate into the microwave cavity, let the chocolate melt at the antinodes of the standing waves. He then measured the distance between the melted spots, multiplied the distance by the frequency of the microwave and found the speed of light. However, while finding ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray 2020 CUNY Hunter College

An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray

Publications and Research

Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential ...


Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell 2020 Liberty University

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell

Senior Honors Theses

With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age. There is no such thing as safe computing, and it is inevitable that security breaches will occur. Thus, security professionals and practices focus on two areas: security, preventing a breach from occurring, and resiliency, minimizing the damages once a breach has occurred. One of the most important practices for adding resiliency to source code is through obfuscation, a method of re-writing the code to a form that is virtually unreadable. This makes the ...


Gradual Program Analysis, Samuel Estep 2020 Liberty University

Gradual Program Analysis, Samuel Estep

Senior Honors Theses

Dataflow analysis and gradual typing are both well-studied methods to gain information about computer programs in a finite amount of time. The gradual program analysis project seeks to combine those two techniques in order to gain the benefits of both. This thesis explores the background information necessary to understand gradual program analysis, and then briefly discusses the research itself, with reference to publication of work done so far. The background topics include essential aspects of programming language theory, such as syntax, semantics, and static typing; dataflow analysis concepts, such as abstract interpretation, semilattices, and fixpoint computations; and gradual typing theory ...


Digital Commons powered by bepress