Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, 2019 CUNY Graduate Center
Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed
Publications and Research
The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results to- wards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.
Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara
Publications and Research
Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...
Visualize To Realize: Improving Safety Of First Responders, 2018 University of Nebraska at Omaha
Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu
Student Research and Creative Activity Fair
The goal of this study is to improve the safety of first responders during an emergency hazardous material (hazmat) incident.
- A first responder (FR) is an individual who arrives first during a hazmat incident and takes the initiative to act in order to minimize the risk to public health and property from such incidents. Often first responders are firefighters.
- The reports of National Fire Protection Association recorded a national average of more than 30,000 firefighter injuries between 2010-16 (National Fire Protection Association, 2017).
- According to the US Fire Administration, an average fatality of 120 firefighters were recorded between 2010-16 ...
Cora: Commingled Remains And Analytics – An Open Community Ecosystem, 2018 University of Nebraska at Omaha
Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst
Student Research and Creative Activity Fair
Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...
The Accuracy, Fairness, And Limits Of Predicting Recidivism, 2018 Dartmouth College
The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid
Open Dartmouth: Faculty Open Access Articles
Algorithms for predicting recidivism are commonly used to assess a criminal defendant’s likelihood of committing a crime. These predictions are used in pretrial, parole, and sentencing decisions. Proponents of these systems argue that big data and advanced machine learning make these analyses more accurate and less biased than humans. We show, however, that the widely used commercial risk assessment software COMPAS is no more accurate or fair than predictions made by people with little or no criminal justice expertise. We further show that a simple linear predictor provided with only two features is nearly equivalent to COMPAS with its ...
Software Engineering Lecture Notes (Student Version), 2018 Plymouth State University
Software Engineering Lecture Notes (Student Version), Kyle Burke
Open Educational Resources
Lecture notes for an upper-level undergraduate software engineering course, with a strong focus on software design. Students taking this course should have already completed a data structures course. These notes are designed to be used with Dale Skrien’s text Object Oriented Design using Java.
Universality Of Egoless Behavior Of Software Engineering Students, 2018 Michigan University
Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz
Electrical and Computer Engineering Publications
Software organizations have relied on process and technology initiatives to compete in a highly globalized world. Unfortunately, that has led to little or no success. We propose that the organizations start working on people initiatives, such as inspiring egoless behavior among software developers. This paper proposes a multi-stage approach to develop egoless behavior and discusses the universality of the egoless behavior by studying cohorts from three different countries, i.e., Japan, India, and Canada. The three stages in the approach are self-assessment, peer validation, and action plan development. The paper covers the first stage of self-assssment using an instrument based ...
Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), 2018 Iowa State University
Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe
Veterinary Diagnostic and Production Animal Medicine Conference Proceedings and Presentations
The second meeting of the International Collaboration for Automation of Systematic Reviews (ICASR) was held 3–4 October 2016 in Philadelphia, Pennsylvania, USA. ICASR is an interdisciplinary group whose aim is to maximize the use of technology for conducting rapid, accurate, and efficient systematic reviews of scientific evidence. Having automated tools for systematic review should enable more transparent and timely review, maximizing the potential for identifying and translating research findings to practical application. The meeting brought together multiple stakeholder groups including users of summarized research, methodologists who explore production processes and systematic review quality, and technologists such as software developers ...
Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, 2018 Iowa State University
Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi Senthilarumugamveilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette
Mechanical Engineering Conference Presentations, Papers, and Proceedings
In healthcare, a tremendous amount of clinical and laboratory tests, imaging, prescription and medication data are being collected. Big data analytics on these data aim at early detection of disease which will help in developing preventive measures and in improving patient care. Parkinson disease is the second-most common neurodegenerative disorder in the United States. To find a cure for Parkinson's disease biological, clinical and behavioral data of different cohorts are collected, managed and propagated through Parkinson’s Progression Markers Initiative (PPMI). Applying big data technology to this data will lead to the identification of the potential biomarkers of Parkinson ...
The Evolution Of Requirements Practices In Software Startups, 2017 Universidade Nova de Lisboa
The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo
Characterizing Data Dependence Constraints For Dynamic Reliability Using N-Queens Attack Domains, 2017 Iowa State University
Characterizing Data Dependence Constraints For Dynamic Reliability Using N-Queens Attack Domains, Eric W. D. Rozier, Kristin Yvonne Rozier, Ulya Bayram
Kristin Yvonne Rozier
As data centers attempt to cope with the exponential growth of data, new techniques for intelligent, software-defined data centers (SDDC) are being developed to confront the scale and pace of changing resources and requirements. For cost-constrained environments, like those increasingly present in scientific research labs, SDDCs also may provide better reliability and performability with no additional hardware through the use of dynamic syndrome allocation. To do so, the middleware layers of SDDCs must be able to calculate and account for complex dependence relationships to determine an optimal data layout. This challenge is exacerbated by the growth of constraints on the ...
Underwater Acoustic Signal Analysis Toolkit, 2017 University of New Orleans, New Orleans
Underwater Acoustic Signal Analysis Toolkit, Kirk Bienvenu Jr
University of New Orleans Theses and Dissertations
This project started early in the summer of 2016 when it became evident there was a need for an effective and efficient signal analysis toolkit for the Littoral Acoustic Demonstration Center Gulf Ecological Monitoring and Modeling (LADC-GEMM) Research Consortium. LADC-GEMM collected underwater acoustic data in the northern Gulf of Mexico during the summer of 2015 using Environmental Acoustic Recording Systems (EARS) buoys. Much of the visualization of data was handled through short scripts and executed through terminal commands, each time requiring the data to be loaded into memory and parameters to be fed through arguments. The vision was to develop ...
A Study Of Repetitiveness Of Code Changes In Software Evolution, 2017 Iowa State University
A Study Of Repetitiveness Of Code Changes In Software Evolution, Hoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan
In this paper, we present a large-scale study of repetitiveness of code changes in software evolution. We collected a large data set of 2,841 Java projects, with 1.7 billion source lines of code (SLOC) at the latest revisions, 1.8 million code change revisions (0.4 million fixes), 6.2 million changed files, and 2.5 billion changed SLOCs. A change is considered repeated within or cross-project if it matches another change having occurred in the history of the project or another project, respectively. We report the following important findings. First, repetitiveness of changes could be as high ...
Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, 2017 The University of Western Ontario
Rendering Real-Time Dashboards Using A Graphql-Based Ui Architecture, Naresh Eeda
Electronic Thesis and Dissertation Repository
With the increase in the complexity of the systems being built and demand in the quality of service by the customers, developing and providing highly efficient real-time systems is one of the biggest challenges today for software enterprises. BluemixTM ─ IBM’s cloud offering implemented on Cloud Foundry, an open source “Platform as a Service” (PaaS), is an example of such a system. Currently, there are approx. 26 infrastructural services running in the background from where the data is fetched and is rendered on different dashboards of the system. However, the system suffers from performance issues.
This thesis explores the ...
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, 2017 University of Nebraska-Lincoln
Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad
Computer Science and Engineering: Theses, Dissertations, and Student Research
In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible ...
Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, 2017 Xidian University
Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu
Research Collection School Of Information Systems
Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...
Web Application For Graduate Course Recommendation System, 2017 California State University, San Bernardino
Web Application For Graduate Course Recommendation System, Sayali Dhumal
Electronic Theses, Projects, and Dissertations
The main aim of the course advising system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The recommendation path displays the list of courses a student can take in each quarter from the first quarter after admission until the graduation quarter. The courses are filtered as per the student’s interest obtained from a questionnaire asked to the student.
The business logic involves building the recommendation algorithm. Also, the application is functionality-tested end-to-end by using nightwatch.js which is built on top of node.js. Test cases are written ...
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., 2017 University of East London
Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr
Journal of International Technology and Information Management
The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any ...
Secure Server-Aided Top-K Monitoring, 2017 Guilin University of Electronic Technology
Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding
Research Collection School Of Information Systems
In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to ...
A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, 2017 Southern Adventist University
A Restful Framework For Writing, Running, And Evaluating Code In Multiple Academic Settings, Christopher Ban
MS in Computer Science Project Reports
In academia, students and professors want a well-structured and implemented framework for writing and running code in both testing and learning environments. The current limitations of the paper and pencil medium have led to the creation of many different online grading systems. However, no known system provides all of the essential features our client is interested in. Our system, developed in conjunction with Doctor Halterman, offers the ability to build modules from flat files, allow code to be compiled and run in the browser, provide users with immediate feedback, support multiple languages, and offer a module designed specifically for an ...