Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2133 Full-Text Articles 2389 Authors 523022 Downloads 99 Institutions

All Articles in Software Engineering

Faceted Search

2133 full-text articles. Page 5 of 69.

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk 2017 Boise State University

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk

International Journal of Undergraduate Community Engagement

In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.


Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly 2017 The University of Akron

Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly

Honors Research Projects

Cameron Reilly

Major: Computer Science Management Track

Project Sponsor: Michael Collard

What’s Good?

“What’s Good?” is an iOS application that uses augmented reality to present information about nearby restaurants to the user in real time. Users can hold up their device and look through their camera to see information presented above the restaurant including it’s name, average cost, and average review rating. The user’s location is gathered and used in tandem with the Zomato API to select what data display as those dining locations are currently near the user. Using the gyroscope, compass, and accelerometer to ...


Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier 2017 University of North Florida

Genetic Algorithms As A Viable Method Of Obtaining Branch Coverage, Jason Ross Frier

UNF Theses and Dissertations

Finding a way to automate the generation of test data is a crucial aspect of software testing. Testing comprises 50% of all software development costs [Korel90]. Finding a way to automate testing would greatly reduce cost and labor involved in the task of software testing. One of the ways to automate software testing is to automate the generation of test data inputs. For example, in statement coverage, creating test cases that will cover all of the conditions required when testing that program would be costly and time-consuming if undertaken manually. Therefore, a way must be found that allows the automation ...


An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. ElYamany, Miriam AM Capretz, Girma T. Bitsuamlak 2017 Western University

An Ensemble Learning Framework For Anomaly Detection In Building Energy Consumption, Daniel B. Araya, Katarina Grolinger, Hany F. Elyamany, Miriam Am Capretz, Girma T. Bitsuamlak

Electrical and Computer Engineering Publications

During building operation, a significant amount of energy is wasted due to equipment and human-related faults. To reduce waste, today's smart buildings monitor energy usage with the aim of identifying abnormal consumption behaviour and notifying the building manager to implement appropriate energy-saving procedures. To this end, this research proposes a new pattern-based anomaly classifier, the collective contextual anomaly detection using sliding window (CCAD-SW) framework. The CCAD-SW framework identifies anomalous consumption patterns using overlapping sliding windows. To enhance the anomaly detection capacity of the CCAD-SW, this research also proposes the ensemble anomaly detection (EAD) framework. The EAD is a generic ...


A Technical History Of The Sei, Larry Druffel 2017 Carnegie Mellon University

A Technical History Of The Sei, Larry Druffel

Software Engineering Institute

This report chronicles the technical accomplishments of the Software Engineering Institute and its impact on the Department of Defense software community, as well as on the broader software engineering community. The technical accomplishments of the SEI are interwoven with the technical developments in the broader software engineering community. The described technical work is organized into areas of importance to the mission of the SEI: Real-Time Embedded Systems, Education and Training, Management, Security, Software Engineering Methods, Software Architecture, and Computer Forensics


Grace's Inheritance, James Noble, Andrew P. Black, Kim B. Bruce, Michael Homer, Timothy Jones 2017 Victoria University of Wellington

Grace's Inheritance, James Noble, Andrew P. Black, Kim B. Bruce, Michael Homer, Timothy Jones

Computer Science Faculty Publications and Presentations

This article is an apologia for the design of inheritance in the Grace educational programming language: it explains how the design of Grace’s inheritance draws from inheritance mechanisms in predecessor languages, and defends that design as the best of the available alternatives. For simplicity, Grace objects are generated from object constructors, like those of Emerald, Lua, and Javascript; for familiarity, the language also provides classes and inheritance, like Simula, Smalltalk and Java. The design question we address is whether or not object constructors can provide an inheritance semantics similar to classes.


K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler 2017 University of Montana

K-Mer Analysis Pipeline For Classification Of Dna Sequences From Metagenomic Samples, Russell Kaehler

Graduate Student Theses, Dissertations, & Professional Papers

Biological sequence datasets are increasing at a prodigious rate. The volume of data in these datasets surpasses what is observed in many other fields of science. New developments wherein metagenomic DNA from complex bacterial communities is recovered and sequenced are producing a new kind of data known as metagenomic data, which is comprised of DNA fragments from many genomes. Developing a utility to analyze such metagenomic data and predict the sample class from which it originated has many possible implications for ecological and medical applications. Within this document is a description of a series of analytical techniques used to process ...


Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan 2017 University of Massachusetts Amherst

Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan

Masters Theses

Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.

State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to ...


Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2017 CUNY Hunter College

Automated Refactoring Of Legacy Java Software To Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Java 8 default methods, which allow interfaces to contain (instance) method implementations, are useful for the skeletal implementation software design pattern. However, it is not easy to transform existing software to exploit default methods as it requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods to preserve type-correctness and confirm semantics preservation. In this paper, we present an efficient, fully-automated, type constraint-based refactoring approach that assists developers in taking advantage of enhanced interfaces for their legacy Java software. The approach features an extensive ...


Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe 2017 CUNY Hunter College

Detecting Broken Pointcuts Using Structural Commonality And Degree Of Interest, Raffi T. Khatchadourian, Awais Rashid, Hidehiko Masuhara, Takuya Watanabe

Publications and Research

Pointcut fragility is a well-documented problem in Aspect-Oriented Programming; changes to the base-code can lead to join points incorrectly falling in or out of the scope of pointcuts. Deciding which pointcuts have broken due to base-code changes is a daunting venture, especially in large and complex systems. We present an automated approach that recommends pointcuts that are likely to require modification due to a particular base-code change, as well as ones that do not. Our hypothesis is that join points selected by a pointcut exhibit common structural characteristics. Patterns describing such commonality are used to recommend pointcuts that have potentially ...


Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Wee-Seng SOH, Hwee-Pink TAN 2017 Singapore Management University

Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Wee-Seng Soh, Hwee-Pink Tan

Research Collection School Of Information Systems

We address the problem of transferring bulk data in environmentally-powered wireless sensor networks where duty cycle compliance is critical for their uninterrupted operation. We propose Pump-and-Nap, a packet train forwarding technique that maximizes throughput while simultaneously enforcing compliance to dynamic duty cycle limitations. A node using Pump-and-Nap operates by pumping a train of packets followed by a napping period where the node forgoes any transmission. Pump-and-Nap employs an adaptive controller to periodically compute the optimal capacity, that is, the maximum number of packets a node can receive and transmit in a train, given its duty cycle constraint. The controller uses ...


The Disciple: A Talking Platformer, Benjamin Sernau 2017 Bard College

The Disciple: A Talking Platformer, Benjamin Sernau

Senior Projects Spring 2017

Working in Unity to create a two-dimensional platformer with a Natural Language Generation system, I have considered a new way in which Artificial Intelligence may affect gameplay. The resulting project, The Disciple, takes input from the environment of the game and offers successfully a sentence relevant to what occurs within the game's world. The sentences this system generates are diverse enough so that, while the Natural Language Generation system may restate what it has said, already, it does not utter the same sentence twice in a row. Often, the Natural Language Generation system selects a phrase I have written ...


Collective Entity Linking In Tweets Over Space And Time, Wen Haw CHONG, Ee-peng LIM 2017 Singapore Management University

Collective Entity Linking In Tweets Over Space And Time, Wen Haw Chong, Ee-Peng Lim

Research Collection School Of Information Systems

We propose collective entity linking over tweets that are close in space and time. This exploits the fact that events or geographical points of interest often result in related entities being mentioned in spatio-temporal proximity. Our approach directly applies to geocoded tweets. Where geocoded tweets are overly sparse among all tweets, we use a relaxed version of spatial proximity which utilizes both geocoded and non-geocoded tweets linked by common mentions. Entity linking is affected by noisy mentions extracted and incomplete knowledge bases. Moreover, to perform evaluation on the entity linking results, much manual annotation of mentions is often required. To ...


A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook 2017 Edith Cowan University

A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook

Theses: Doctorates and Masters

A widely accepted, and incorrect, assumption towards hearing accessibility in video games is that deaf and hard of hearing (DHH) users are those who encounter the least barriers and are generally well catered for. Rapid advancement in video game technology has seen video game sound evolve from simple blips generated by internal circuitry to fully realised digital audio used to convey critical information. To accommodate the DHH, this information needs to be conveyed in an alternative manner. However, evidence suggests existing accessible design solutions for the DHH lack specificity and are insufficient. Thus, the inability to hear, or hear well ...


Mri-Based Susceptibility Mapping For In-Vivo Iron And Blood Oximetry Measurements, Hannah Erdevig 2017 University of Colorado, Boulder

Mri-Based Susceptibility Mapping For In-Vivo Iron And Blood Oximetry Measurements, Hannah Erdevig

Undergraduate Honors Theses

MRI is increasingly used in mapping tissue susceptibility to identify cerebral microbleeds associated with traumatic brain injury and pathological iron deposits associated with neurodegenerative diseases such as Parkinson's and Alzheimer's disease [1,2]. Accurate measurement is important for determining oxygen and iron content in blood vessels and tissue in the brain, which are in turn used for noninvasive clinical diagnosis and treatment assessments. Magnetic field distortions with a resolution of a few parts per billion can be measured using MRI phase maps. The field distortion map can then be inverted to obtain a quantitative susceptibility map. The primary ...


Software Development For Home Energy Audits: Reducing Energy Consumption In Harrisonburg Through Technology, Brantley E. Gilbert 2017 James Madison University

Software Development For Home Energy Audits: Reducing Energy Consumption In Harrisonburg Through Technology, Brantley E. Gilbert

Senior Honors Projects, 2010-current

Fossil fuels play a vital role in our daily lives. Oil, natural gas, and coal powers our cars, heats our homes and water, and are used by power companies to generate the massive amounts of electricity used every day by the United States. However, this reliance on a finite source of energy is not sustainable. Fossil fuels such as these are non-renewable resources whose production will eventually be unable to keep up with the rate of consumption. Furthermore, the extraction of the stored energy in these fuels through combustion releases harmful substances into the environment, including toxins and greenhouse gases ...


Enhancing The Learning Experience -- Use Of Video Game Technology For Teaching Japanese Language, Craig A. DeCampli Mr. 2017 James Madison University

Enhancing The Learning Experience -- Use Of Video Game Technology For Teaching Japanese Language, Craig A. Decampli Mr.

Senior Honors Projects, 2010-current

The Japanese language is challenging to learn, especially for native speakers of Indo- European languages. The three components of written Japanese -- Hiragana, Katakana, and Kanji – include 2,136 Kanji characters, and 46 each for Katakana and Hiragana. Teaching Japanese – generally through repetition – can lead to student boredom and affect success. Research shows that video games can at least provide a more enjoyable learning experience. Despite this fact, there are a lack of video games for teaching Japanese characters. Using the Unity game engine and the C# programming language, a video game for enhancing the learning of students studying Japanese as ...


An Affordable Vr Environment, Matthew R. Petty 8351517 2017 James Madison University

An Affordable Vr Environment, Matthew R. Petty 8351517

Senior Honors Projects, 2010-current

Virtual Reality is a powerful technology with the ability to affect our senses in powerful ways. Traditionally used for entertainment, we argue that it can be used for educational purposes as well. In order to get virtual reality into the classroom, we must address its cost and portability, as well as improve the interaction that users experience with the virtual environment. Our solution, a Unity program installed on an iPhone and a Mac, attempts to solve these issues. A technical demo was created that functions and can be interfaced with. While this solution is a proof of concept, its consequences ...


Sensor-Driven Detection Of Social Isolation In Community-Dwelling Elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, Hwee-Pink TAN 2017 Singapore Management University

Sensor-Driven Detection Of Social Isolation In Community-Dwelling Elderly, W K P Neranjana Nadee Rodrigo Goonawardene, Xiaoping Toh, Hwee-Pink Tan

Research Collection School Of Information Systems

Ageing-in-place, the ability to age holistically in the community, is increasingly gaining recognition as a solution to address resource limitations in the elderly care sector. Effective elderly care models require a personalised and all-encompassing approach to caregiving. In this regard, sensor technologies have gained attention as an effective means to monitor the wellbeing of elderly living alone. In this study, we seek to investigate the potential of non-intrusive sensor systems to detect socially isolated community dwelling elderly. Using a mixed method approach, our results showed that sensor-derived features such as going-out behavior, daytime napping and time spent in the living ...


The Moral Implications Of Software Piracy, Kyle Hamrick 2016 Olivet Nazarene University

The Moral Implications Of Software Piracy, Kyle Hamrick

Student Scholarship - Computer Science

Computer software is integrated into almost every aspect of our professional and personal lives. Much of this software requires payment for use and is legally protected by the copyright system. This paper examines and analyzes the arguments pertaining to the moral use of protected software (digital piracy). The three arguments presented are the “victimless crime” argument, the “noble justification” argument, and the “willing but unable argument.” These three arguments claim that piracy is morally justified in certain cases, and claim that software providers are not harmed in such situations. The three arguments are tested against counter-arguments, and it is discovered ...


Digital Commons powered by bepress