Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 3926

Full-Text Articles in Physical Sciences and Mathematics

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu Sep 2024

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu

Research Collection School Of Computing and Information Systems

This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …


Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He Jul 2024

Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …


Henna Chatbot Capstone Review, Kobe Norcross Jun 2024

Henna Chatbot Capstone Review, Kobe Norcross

University Honors Theses

This thesis reviews the development of the Henna Chatbot, an AI-powered DEI consultant designed to provide personalized feedback to organizations. Sponsored by DEI consultant Arsh Haque, the project aims to address gaps in current DEI software, which often lacks team-specific feedback. The Henna Chatbot leverages GPT-3.5 Turbo to create an affordable SaaS platform where organizations can train Henna with their DEI values, and Henna will help organizations stay aligned with those values. The project spanned twenty weeks and was completed by a team of eight computer science students at Portland State University. The development process followed Agile methodologies, emphasizing effective …


The Institutional Challenges Of A Quantified Self Study An Attempt To Ascertain How Data Collected From A Mobile Device Can Be An Indicator Of Personal Mental Health Over Time., Julian E. Lazaras Jun 2024

The Institutional Challenges Of A Quantified Self Study An Attempt To Ascertain How Data Collected From A Mobile Device Can Be An Indicator Of Personal Mental Health Over Time., Julian E. Lazaras

University Honors Theses

The adoption of an application of new technology always comes with a bias, this is never more true for the case of human behavioral analytics within higher education. While movements such as the quantified self movement make strides to reinterpret the realm of data analytics, psychology, and computer science, there are inevitably limitations to the adoption and application of such approaches within the standard realm of research. Herein is presented a case where an effort to evaluate the prospect of use of mobile phone data as secondary indicators of personal mental health through the lens of data analysis was put …


Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha Jun 2024

Cards With Class: Formalizing A Simplified Collectible Card Game, Dan Ha

University Honors Theses

Collectible card games (CCGs) have been a wildly popular game genre since the release of Wizards of the Coast’s Magic: The Gathering. These games revolve around their thousands of cards and the hundreds of thousands of interactions they can create with their many effects. For designers, it is an incredibly demanding task to ensure that every single card works properly and that each card’s text unambiguously conveys its intended behavior in all cases. The task only grows more difficult over time as the number of cards in the game grows and card effects become more complex or experimental. If the …


The Robot On The Hill, James Ryan Jun 2024

The Robot On The Hill, James Ryan

College of Computing and Digital Media Dissertations

“The Robot on the Hill” is a rogue-like autobattler that procedurally models the state of the individual in the information age. The game abruptly transitions between diverse framings - a hill, a bedroom, a pond, a chessboard, the void - in order to highlight the disjointedness that is present in the informationalizing of self and reality. It dialogues with Byung Chul Han and Heidegger to portray what Han describes as a ‘narrative crisis’ in modernity and the devaluation of experience. When the value of experience diminishes and disintegrates, “all that is left is bare life, a kind of survival.” …


Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude Jun 2024

Ethical Considerations Toward Protestware, Marc Cheong, Raula Kula, Christoph Treude

Research Collection School Of Computing and Information Systems

This article looks into possible scenarios where developers might consider turning their free and open source software into protestware. Using different frameworks commonly used in artificial intelligence (AI) ethics, we extend the applications of AI ethics to the study of protestware.


Virtual Field Environments Capstone Software Review, Ashton Sawyer Jun 2024

Virtual Field Environments Capstone Software Review, Ashton Sawyer

University Honors Theses

This is a review of the Virtual Field Environments computer science capstone project, sponsored by geology professor Rick Hugo. The tool aims to create and render VFEs, interactable 360° environments hosted on the web that are used as virtual field trips for K-12 students. This essay discusses the development process, including understanding requirements, tool and technology selection, problem-solving, and decision-making strategies. It also highlights the differences between the capstone and the other core computer science courses, and how those differences help to prepare students for the workforce. The project was completed over the course of twenty weeks by a team …


Auditory Ace Mobile Application Capstone Review, Makayla Smith Jun 2024

Auditory Ace Mobile Application Capstone Review, Makayla Smith

University Honors Theses

This paper describes the development process and outcomes of my 2023-2024 Capstone Project, Auditory Ace, a self-directed auditory training mobile application for individuals with cochlear implants. Recognizing the limitations of current market offerings, Dr. Timothy Anderson created a Capstone project proposal to develop an accessible auditory training mobile application. The Capstone team that took on this proposal consisted of Darya Haines, Dustin Huynh, Jordan Nguyen, Nihar Koppolu, Scott Thorkelson, Sienna Day, and myself, Layla Smith. This paper is structured to follow the Agile software development methodology, which we used to develop Auditory Ace, reviewing in detail every major choice we …


Lang2views Capstone: The Importance Of A Conscientious Team Lead, Joseph D. Wornath Jun 2024

Lang2views Capstone: The Importance Of A Conscientious Team Lead, Joseph D. Wornath

University Honors Theses

This review essay reflects the Lang2views capstone project from the perspective of a team lead. The Lang2views capstone project was a web-based user interface designed to simplify how the Lang2views corporation localizes videos into other languages for their clients. Our capstone group was split into three subgroups: front-end, back-end, and DevOps. The strategy for completing the project went through a major change midway through development wherein we changed our software development methodology from a more rigid Waterfall-type approach to a more flexible Agile methodology. Because of this, many of the initially planned features had to be reevaluated as out of …


A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug May 2024

A Nlp Approach To Automating The Generation Of Surveys For Market Research, Anav Chug

Honors College Theses

Market Research is vital but includes activities that are often laborious and time consuming. Survey questionnaires are one possible output of the process and market researchers spend a lot of time manually developing questions for focus groups. The proposed research aims to develop a software prototype that utilizes Natural Language Processing (NLP) to automate the process of generating survey questions for market research. The software uses a pre-trained Open AI language model to generate multiple choice survey questions based on a given product prompt, send it to a targeted email list, and also provides a real-time analysis of the responses …


Machine Learning: Face Recognition, Mohammed E. Amin May 2024

Machine Learning: Face Recognition, Mohammed E. Amin

Publications and Research

This project explores the cutting-edge intersection of machine learning (ML) and face recognition (FR) technology, utilizing the OpenCV library to pioneer innovative applications in real-time security and user interface enhancement. By processing live video feeds, our system encodes visual inputs and employs advanced face recognition algorithms to accurately identify individuals from a database of photos. This integration of machine learning with OpenCV not only showcases the potential for bolstering security systems but also enriches user experiences across various technological platforms. Through a meticulous examination of unique facial features and the application of sophisticated ML algorithms and neural networks, our project …


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta May 2024

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Large Language Models For Qualitative Research In Software Engineering: Exploring Opportunities And Challenges, Muneera Bano, Rashina Hoda, Didar Zowghi, Christoph Treude May 2024

Large Language Models For Qualitative Research In Software Engineering: Exploring Opportunities And Challenges, Muneera Bano, Rashina Hoda, Didar Zowghi, Christoph Treude

Research Collection School Of Computing and Information Systems

The recent surge in the integration of Large Language Models (LLMs) like ChatGPT into qualitative research in software engineering, much like in other professional domains, demands a closer inspection. This vision paper seeks to explore the opportunities of using LLMs in qualitative research to address many of its legacy challenges as well as potential new concerns and pitfalls arising from the use of LLMs. We share our vision for the evolving role of the qualitative researcher in the age of LLMs and contemplate how they may utilize LLMs at various stages of their research experience.


Breathpro: Monitoring Breathing Mode During Running With Earables, Changshuo Hu, Thivya Kandappu, Yang Liu, Cecilia Mascolo, Dong Ma May 2024

Breathpro: Monitoring Breathing Mode During Running With Earables, Changshuo Hu, Thivya Kandappu, Yang Liu, Cecilia Mascolo, Dong Ma

Research Collection School Of Computing and Information Systems

Running is a popular and accessible form of aerobic exercise, significantly benefiting our health and wellness. By monitoring a range of running parameters with wearable devices, runners can gain a deep understanding of their running behavior, facilitating performance improvement in future runs. Among these parameters, breathing, which fuels our bodies with oxygen and expels carbon dioxide, is crucial to improving the efficiency of running. While previous studies have made substantial progress in measuring breathing rate, exploration of additional breathing monitoring during running is still lacking. In this work, we fill this gap by presenting BreathPro, the first breathing mode monitoring …


Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton May 2024

Exploring The Relationship Between Anxiety And Virtual Reality Sickness, David Wesley Woolverton

<strong> Theses and Dissertations </strong>

As virtual reality (VR) becomes more commonly used in education, it is important to understand the technology’s weakness and mitigate any potential negative effects on student success. One adverse side-effect of VR use is simulation-induced motion sickness, known in the context of VR as VR sickness. Previous research by Howard and Van Zandt (2021) found that possessing a phobia had a significant positive correlation with VR sickness, but only if the phobia is triggered by the simulation, suggesting that symptoms are actually connected to the anxiety the phobia induces. This study explored the hypothesized correlation between anxiety and VR sickness, …


An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo May 2024

An Evaluation Of Heart Rate Monitoring With In-Ear Microphones Under Motion, Kayla-Jade Butkow, Ting Dang, Andrea Ferlini, Dong Ma, Yang Liu, Cecilia Mascolo

Research Collection School Of Computing and Information Systems

With the soaring adoption of in-ear wearables, the research community has started investigating suitable in-ear heart rate detection systems. Heart rate is a key physiological marker of cardiovascular health and physical fitness. Continuous and reliable heart rate monitoring with wearable devices has therefore gained increasing attention in recent years. Existing heart rate detection systems in wearables mainly rely on photoplethysmography (PPG) sensors, however, these are notorious for poor performance in the presence of human motion. In this work, leveraging the occlusion effect that enhances low-frequency bone-conducted sounds in the ear canal, we investigate for the first time in-ear audio-based motion-resilient …


The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi May 2024

The Quantitative Analysis And Visualization Of Nfl Passing Routes, Sandeep Chitturi

Computer Science and Computer Engineering Undergraduate Honors Theses

The strategic planning of offensive passing plays in the NFL incorporates numerous variables, including defensive coverages, player positioning, historical data, etc. This project develops an application using an analytical framework and an interactive model to simulate and visualize an NFL offense's passing strategy under varying conditions. Using R-programming and data management, the model dynamically represents potential passing routes in response to different defensive schemes. The system architecture integrates data from historical NFL league years to generate quantified route scores through designed mathematical equations. This allows for the prediction of potential passing routes for offensive skill players in response to the …


Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan May 2024

Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan

Computer Science and Computer Engineering Undergraduate Honors Theses

As traditional centralized social media platforms face growing concerns over data privacy, censorship, and lack of user control, there has been an increasing interest in decentralized alternatives. This thesis explores the design and implementation of a decentralized social media application by integrating two key technologies: Solid and the InterPlanetary File System (IPFS). Solid, led by Sir Tim Berners-Lee, enables users to store and manage their personal data in decentralized "Pods," giving them ownership over their digital identities. IPFS, a peer-to-peer hypermedia protocol, facilitates decentralized file storage and sharing, ensuring content availability and resilience against censorship. By leveraging these technologies, the …


Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz May 2024

Factors Influencing Performance Of Students In Software Automated Test Tools Course, Susmita Haldar, Mary Pierce, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Formal software testing education is important for building efficient QA professionals. Various aspects of quality assurance approaches are usually covered in courses for training software testing students. Automated Test Tools is one of the core courses in the software testing post-graduate curriculum due to the high demand for automated testers in the workforce. It is important to understand which factors are affecting student performance in the automated testing course to be able to assist the students early on based on their needs. Various metrics that are considered for predicting student performance in this testing course are student engagement, grades on …


Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi May 2024

Comparative Predictive Analysis Of Stock Performance In The Tech Sector, Asaad Sendi

University of New Orleans Theses and Dissertations

This study compares the performance of deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Transformer, in predicting stock prices across five companies (AAPL, CSCO, META, MSFT, and TSLA) from July 2019 to July 2023. Key findings reveal that GRU models generally exhibit the lowest Mean Absolute Error (MAE), indicating higher precision, particularly notable for CSCO with a remarkably low MAE. While LSTM models often show slightly higher MAE values, they outperform Transformer models in capturing broader trends and variance in stock prices, as evidenced by higher R-squared (R2) values. Transformer models generally exhibit higher MAE …


Graph-Based And Anomaly Detection Learning Models For Just-In-Time Defect Prediction, Aradhana Soni May 2024

Graph-Based And Anomaly Detection Learning Models For Just-In-Time Defect Prediction, Aradhana Soni

Doctoral Dissertations

Efficiently identifying and resolving software defects is essential for producing high quality software. Early and accurate prediction of these defects plays a pivotal role in maintaining software quality. This dissertation focuses on advancing software defect prediction methodologies and practical applications by incorporating graph-based learning techniques and generative adversarial-based anomaly detection techniques. First, we present a novel approach to software defect prediction by introducing a graph-based defect ratio (GDR). This innovative metric leverages the intricate graph structure that captures the interdependencies among developers, commits, and repositories, offering a promising alternative to standard traditional features. This study highlights the potential for graph-based …


Easier Air Alert Platform: A Design And Approach To Creating A Distributed Air Quality Monitoring And Alert System, Bryceton Bible May 2024

Easier Air Alert Platform: A Design And Approach To Creating A Distributed Air Quality Monitoring And Alert System, Bryceton Bible

Masters Theses

This thesis presents the design approach, development and implementation of the Elders Alert System for Imminent Environmental Risk (EASIER) project, an air quality monitoring and alert system aiming to improve the health and wellness of under-served elder communities, as a part of the Tennessee Valley Authority Connected Communities initiative for Environmental Justice. The EASIER project provides homes with a fully integrated, connected system capable of real-time air quality monitoring, notifications and descriptions of potential air quality risks, and educational material to empower these community members to take charge of their own air health. Further, EASIER aims to inform relevant family/friends …


A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes Apr 2024

A System Of Communication Between Two Computers Using Novel Frequency Shift Keying Techniques, Jared Reyes

Honors Thesis

Frequency shift keying (FSK) is an old but powerful form of modulation that powered much of the early modems of the 1960’s, and the author felt inspired to make his own version of audio binary FSK modulation. He researched the general history and legacy of the Bell 103, a modem using FSK that defined telecommunication for the next few decades. Using research of the most common English characters of recent emails to determine which English characters should have the shortest bit length, a novel character encoding standard was created using variable bit rate. In addition, he has created a modulation …


Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk Apr 2024

Semantic Segmentation Of Point Cloud Sequences Using Point Transformer V3, Marion Sisk

Master's Theses

Semantic segmentation of point clouds is a basic step for many autonomous systems including automobiles. In autonomous driving systems, LiDAR sensors are frequently used to produce point cloud sequences that allow the system to perceive the environment and navigate safely. Modern machine learning techniques for segmentation have predominately focused on single-scan segmentation, however sequence segmentation has often proven to perform better on common segmentation metrics. Using the popular Semantic KITTI dataset, we show that by providing point cloud sequences to a segmentation pipeline based on Point Transformer v3, we increase the segmentation performance between seven and fifteen percent when compared …


Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales Apr 2024

Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales

ATU Research Symposium

Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …


Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy Apr 2024

Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy

ATU Research Symposium

JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …