Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), 2018 Universitas Muihammadiyah Sidoarjo, Indonesia
Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno
Elinvo (Electronics, Informatics, and Vocational Education)
Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …
Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, 2018 , Indonesia
Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno
Elinvo (Electronics, Informatics, and Vocational Education)
Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …
Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, 2018 University of New Orleans
Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch
University of New Orleans Theses and Dissertations
This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It …
Predicting Software Fault Proneness Using Machine Learning, 2018 The University of Western Ontario
Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey
Electronic Thesis and Dissertation Repository
Context: Continuous Integration (CI) is a DevOps technique which is widely used in practice. Studies show that its adoption rates will increase even further. At the same time, it is argued that maintaining product quality requires extensive and time consuming, testing and code reviews. In this context, if not done properly, shorter sprint cycles and agile practices entail higher risk for the quality of the product. It has been reported in literature [68], that lack of proper test strategies, poor test quality and team dependencies are some of the major challenges encountered in continuous integration and deployment.
Objective: The objective …
Pantry: A Macro Library For Python, 2018 San Jose State University
Pantry: A Macro Library For Python, Derek Pang
Master's Projects
Python lacks a simple way to create custom syntax and constructs that goes outside of its own syntax rules. A paradigm that allows for these possibilities to exist within languages is macros. Macros allow for a shorter set of syntax to expand into a longer set of instructions at compile-time. This gives the capability to evolve the language to fit personal needs.
Pantry, implements a hygienic text-substitution macro system for Python. Pantry achieves this through the introduction of an additional preparsing step that utilizes parsing and lexing of the source code. Pantry proposes a way to simply declare a pattern …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, 2018 The University of Western Ontario
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Gradubique: An Academic Transcript Database Using Blockchain Architecture, 2018 San Jose State University
Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen
Master's Projects
Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …
Open Source Foundations For Spatial Decision Support Systems, 2018 CUNY Hunter College
Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht
Publications and Research
Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …
Multi-Task Zipping Via Layer-Wise Neuron Sharing, 2018 Singapore Management University
Multi-Task Zipping Via Layer-Wise Neuron Sharing, Xiaoxi He, Zimu Zhou, Lothar Thiele
Research Collection School Of Computing and Information Systems
Future mobile devices are anticipated to perceive, understand and react to the world on their own by running multiple correlated deep neural networks on-device. Yet the complexity of these neural networks needs to be trimmed down both within-model and cross-model to fit in mobile storage and memory. Previous studies squeeze the redundancy within a single model. In this work, we aim to reduce the redundancy across multiple models. We propose Multi-Task Zipping (MTZ), a framework to automatically merge correlated, pre-trained deep neural networks for cross-model compression. Central in MTZ is a layer-wise neuron sharing and incoming weight updating scheme that …
Phr: Patient Health Record, 2018 University of Nebraska at Omaha
Phr: Patient Health Record, Quinn Nelson
Theses/Capstones/Creative Projects
The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …
Eye Pressure Monitior, 2018 California Polytechnic State University, San Luis Obispo
Eye Pressure Monitior, Andrea Nella Levy
Computer Engineering
The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …
Social Software Development: Insights And Solutions, 2018 Singapore Management University
Social Software Development: Insights And Solutions, Abhishek Sharma
Dissertations and Theses Collection (Open Access)
Over last few decades, the way software is developed has changed drastically. From being an activity performed by developers working individually to develop standalone programs, it has transformed into a highly collaborative and cooperative activity. Software development today can be considered as a participatory culture, where developers coordinate and engage together to develop software while continuously learning from one another and creating knowledge.
In order to support their communication and collaboration needs, software developers often use a variety of social media channels. These channels help software developers to connect with like-minded developers and explore collaborations on software projects of interest. …
Comparison Mining From Text, 2018 Singapore Management University
Comparison Mining From Text, Maksim Tkachenko
Dissertations and Theses Collection (Open Access)
Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.
If …
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, 2018 University of New Mexico
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Computer Science ETDs
Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, 2018 California Polytechnic State University, San Luis Obispo
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Master's Theses
Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …
Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, 2018 Ho Chi Minh City University of Technology
Fogfly: A Traffic Light Optimization Solution Based On Fog Computing, Quang Tran Minh, Chanh Minh Tran, Tuan An Le, Binh Thai Nguyen, Triet Minh Tran, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
This paper provides a fog-based approach to solving the traffic light optimization problem which utilizes the Adaptive Traffic Signal Control (ATSC) model. ATSC systems demand the ability to strictly reflect real-time traffic state. The proposed fog computing framework, namely FogFly, aligns with this requirement by its natures in location-awareness, low latency and affordability to the changes in traffic conditions. As traffic data is updated timely and processed at fog nodes deployed close to data sources (i.e., vehicles at intersections) traffic light cycles can be optimized efficiently while virtualized resources available at network edges are efficiently utilized. Evaluation results show that …
Mobility-Driven Ble Transmit-Power Adaptation For Participatory Data Muling, 2018 Singapore Management University
Mobility-Driven Ble Transmit-Power Adaptation For Participatory Data Muling, Chung-Kyun Han, Archan Misra, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
This paper analyzes a human-centric framework, called SmartABLE, for easy retrieval of the sensor values from pervasively deployed smart objects in a campus-like environment. In this framework, smartphones carried by campus occupants act as data mules, opportunistically retrieving data from nearby BLE (Bluetooth Low Energy) equipped smart object sensors and relaying them to a backend repository. We focus specifically on dynamically varying the transmission power of the deployed BLE beacons, so as to extend their operational lifetime without sacrificing the frequency of sensor data retrieval. We propose a memetic algorithm-based power adaptation strategy that can handle deployments of thousands of …
Perflearner: Learning From Bug Reports To Understand And Generate Performance Test Frames, 2018 University of Kentucky
Perflearner: Learning From Bug Reports To Understand And Generate Performance Test Frames, Xue Han, Tingting Yu, David Lo
Research Collection School Of Computing and Information Systems
Software performance is important for ensuring the quality of software products. Performance bugs, defined as programming errors that cause significant performance degradation, can lead to slow systems and poor user experience. While there has been some research on automated performance testing such as test case generation, the main idea is to select workload values to increase the program execution times. These techniques often assume the initial test cases have the right combination of input parameters and focus on evolving values of certain input parameters. However, such an assumption may not hold for highly configurable real-word applications, in which the combinations …
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, 2018 Singapore Management University
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel
Research Collection School Of Computing and Information Systems
As countries turn into Smart Nations, Infocom Technology plays a key role in enhancing their competitiveness through high skilled workforces. Reaching to younger generations and attracting them to computing programs such as Information Systems (IS) and Computer Science (CS) is a key challenge faced by universities. Many high quality students from junior colleges either don’t choose IS programs or choose IS programs as their last option during the application process. A School of Information Systems (SIS) from a large metropolitan university decided to implement an innovative outreach program to attract high quality high school aka Junior College (JC) students. JC …
Privacy-Preserving Remote User Authentication With K-Times Untraceability, 2018 Singapore Management University
Privacy-Preserving Remote User Authentication With K-Times Untraceability, Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert H. Deng, Albert Ching, Weiwei Liu
Research Collection School Of Computing and Information Systems
Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an authority (typically a server) in an anonymous and k-times untraceable manner. We define the formal security models for a generic k-RUA construction that guarantees user authenticity, anonymity and user privacy. We provide a concrete instantiation of k-RUA having the following properties: (1) a third party cannot impersonate an authorized user by producing valid transcripts for the user while conversing …