Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2,240 Full-Text Articles 2,613 Authors 558,456 Downloads 113 Institutions

All Articles in Software Engineering

Faceted Search

2,240 full-text articles. Page 1 of 76.

Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed 2018 CUNY Graduate Center

Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results towards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.


Applications Of Varying Leadership Structures For Software Engineering Teams, Elliot Sandfort 2018 University of Nebraska-Lincoln

Applications Of Varying Leadership Structures For Software Engineering Teams, Elliot Sandfort

Honors Theses, University of Nebraska-Lincoln

This thesis explores the similarities and differences between applications of managing software engineering teams in Design Studio and the state of the practice. Information about the leadership structure of Design Studio teams was gathered over 3 semesters of Design Studio experiences with two companies: Hudl and TD Ameritrade. Information about leadership concepts in the state of the practice was gathered from experiences and observations with three different companies: Hudl, Garmin, and TD Ameritrade. From these experiences and observations, it can be concluded that the leadership structure of Design Studio is valuable as a student learning experience, and with proper consideration ...


Cslc Tutoring Portal, Brian Hodges 2018 University of Nebraska at Omaha

Cslc Tutoring Portal, Brian Hodges

Theses/Capstones/Creative Projects

A web portal designed for the Computer Science Learning Center to track students requesting help


Ksugo, Chase Godwin 2018 Kennesaw State University

Ksugo, Chase Godwin

Honors College Capstones and Theses

KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.


The Open World Microorganism, Stephen Thompson 2018 Liberty University

The Open World Microorganism, Stephen Thompson

Stephen Thompson

Video games have been creating sprawling open world experiences for years, but as of yet none have ventured to create an authentic inner cell experience, using our knowledge of cells to recreate digitally what it would be like to shrink smaller than one and step inside. The benefits this application could yield are manifold, so this paper references the necessary ingredients and draws up the blueprints for the first three-dimensional, fully explorable, customizable, and interactive microorganism: an invention which could usher in a new age of biological literacy using technology already employed by many video games. The first part of ...


Fit Buddy Prototype And Ksugo Mobile App, Albert Lim 2018 Kennesaw State University

Fit Buddy Prototype And Ksugo Mobile App, Albert Lim

Honors College Capstones and Theses

The purpose of my Honors Capstone project is to deliver a mobile app prototype that is focused on improving the student experience at Kennesaw State University (KSU), called Fit Buddy. There are three key concepts that will be covered in this Proof of Concept project: social networking, fitness, and IoT (Internet of Things) usages.

Additionally, the purpose of the CS Capstone project is to deliver a mobile app that is focused on improving the faculty, student, and guest experience at KSU, called KSUGo. The primary objective and purpose in creating this stems from KSU’s many resourceful outlets, which we ...


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh 2018 Louisiana State University

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Seismology And Volcanology: Exploration Of Volcanoes, Long-Periods, And Machines - Predicting Volcano Eruption Using Signature Seismic Data, Kyle Killion, Rajeev Kumar, Celia J. Taylor, Gabriele Morra 2018 Southern Methodist University

Seismology And Volcanology: Exploration Of Volcanoes, Long-Periods, And Machines - Predicting Volcano Eruption Using Signature Seismic Data, Kyle Killion, Rajeev Kumar, Celia J. Taylor, Gabriele Morra

SMU Data Science Review

Abstract. Seismo-volcanologists manually isolate and verify long-period waves and Strombolian events using seismic and acoustic waves. This is a very detailed and time-consuming process. This project is to employ machine learning algorithms to find models which locate long-period and Strombolian signatures automatically. By comparing the timing of seismic and acoustic waves, clustering techniques effectively isolated big volcanic events and aided in the further refinement of techniques to capture the hundreds of typical daily Strombolian events at Villarrica volcano. Within the research, we utilized the unsupervised machine learning environment to locate a group of signatures for customizing machine learned long-period signature ...


A Framework For Modelling User Activity Preferences, Roberto Barboza Junior 2018 The University of Western Ontario

A Framework For Modelling User Activity Preferences, Roberto Barboza Junior

Electronic Thesis and Dissertation Repository

The availability of location data increases every day and brings the opportunity to mine these data and extract valuable knowledge about human behaviour. More specifically, these data may contain information about users’ activities, which can enable, for example, services to improve advertising campaigns or enhance the user experience of a mobile application. However, several techniques ignore the fact that users’ context other than location and time, such as weather conditions, influences their behaviour. Moreover, several studies focus only on a single data source, addressing either data collected without any type of user interaction, such as GPS data, or data spontaneously ...


Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2018 CUNY Hunter College

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Using Github In Large Software Engineering Classes: An Exploratory Case Study, Miroslav Tushev 2018 Louisiana State University

Using Github In Large Software Engineering Classes: An Exploratory Case Study, Miroslav Tushev

LSU Master's Theses

GitHub has been recently used in Software Engineering (SE) classes to facilitate col- laboration in student team projects. The underlying tenet is that the technical and social feature of GitHub can help students to communicate and collaborate more effectively as a team as well as help teachers to evaluate individual student contribution more objectively. To shed more light on this, in this case study, we explore the benefits and drawbacks of using GitHub in SE classes. Our study is conducted in a software engineering class of 91 students divided into 18 teams. Our research method includes an entry and an ...


Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2018 CUNY Hunter College

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Automated Man-In-The-Middle Attack Against Wi-Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý 2018 Brno University of Technology, Brno, Czech Republic

Automated Man-In-The-Middle Attack Against Wi-Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated ...


Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed 2018 CUNY Graduate Center

Poster: Towards Safe Refactoring For Intelligent Parallelization Of Java 8 Streams, Yiming Tang, Raffi T. Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed

Publications and Research

The Java 8 Stream API sets forth a promising new programming model that incorporates functional-like, MapReduce-style features into a mainstream programming language. However, using streams correctly and efficiently may involve subtle considerations. In this poster, we present our ongoing work and preliminary results to- wards an automated refactoring approach that assists developers in writing optimal stream code. The approach, based on ordering and typestate analysis, determines when it is safe and advantageous to convert streams to parallel and optimize a parallel streams.


Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu 2018 University of Nebraska at Omaha

Visualize To Realize: Improving Safety Of First Responders, Vikas Sahu

Student Research and Creative Activity Fair

The goal of this study is to improve the safety of first responders during an emergency hazardous material (hazmat) incident.

  • A first responder (FR) is an individual who arrives first during a hazmat incident and takes the initiative to act in order to minimize the risk to public health and property from such incidents. Often first responders are firefighters.
  • The reports of National Fire Protection Association recorded a national average of more than 30,000 firefighter injuries between 2010-16 (National Fire Protection Association, 2017).
  • According to the US Fire Administration, an average fatality of 120 firefighters were recorded between 2010-16 ...


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole McElroy, Ryan Ernst 2018 University of Nebraska at Omaha

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...


A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed 2018 University of Western Ontario

A Call To Promote Soft Skills In Software Engineering, Luiz Fernando Capretz, Fahem Ahmed

Electrical and Computer Engineering Publications

We have been thinking about other aspects of software engineering for many years; the missing link in engineering software is the soft skills set, essential in the software development process. Although soft skills are among the most important aspects in the creation of software, they are often overlooked by educators and practitioners. One of the main reasons for the oversight is that soft skills are usually related to social and personality factors, i.e., teamwork, motivation, commitment, leadership, multi-culturalism, emotions, interpersonal skills, etc. This editorial is a manifesto declaring the importance of soft skills in software engineering with the intention ...


The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid 2018 Dartmouth College

The Accuracy, Fairness, And Limits Of Predicting Recidivism, Julie Dressel, Hany Farid

Open Dartmouth: Faculty Open Access Articles

Algorithms for predicting recidivism are commonly used to assess a criminal defendant’s likelihood of committing a crime. These predictions are used in pretrial, parole, and sentencing decisions. Proponents of these systems argue that big data and advanced machine learning make these analyses more accurate and less biased than humans. We show, however, that the widely used commercial risk assessment software COMPAS is no more accurate or fair than predictions made by people with little or no criminal justice expertise. We further show that a simple linear predictor provided with only two features is nearly equivalent to COMPAS with its ...


Software Engineering Lecture Notes (Student Version), Kyle Burke 2018 Plymouth State University

Software Engineering Lecture Notes (Student Version), Kyle Burke

Open Educational Resources

Lecture notes for an upper-level undergraduate software engineering course, with a strong focus on software design. Students taking this course should have already completed a data structures course. These notes are designed to be used with Dale Skrien’s text Object Oriented Design using Java.


Digital Commons powered by bepress