Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Florida Institute of Technology

Theses/Dissertations

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith Dec 2022

Design Of Ethical Autonomous Agents For Unmanned Aerial Vehicles Using Fuzzy Logic, Gavin Giovanni Smith

Theses and Dissertations

Autonomous systems have, over the years become part of our everyday lives. These systems have been deployed to executed a diverse range of applications in different industries; finance, healthcare, military, and in particular, the flight industry. With the rise of UAVs, new opportunities arose, but with those opportunities came new pitfalls within any industry. For UAVs, one of the pitfalls came in the form of ethical decisionmaking, which led to a variety of questions. Can the Autonomous systems within UAVs be designed with ethics in mind? Which ethical guidelines would we use to implement such a system? How would we …


Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry Dec 2020

Refinements Of The Concept Of Privacy In Distributed Computing, Entisar Seedi Alshammry

Theses and Dissertations

In light of the tremendous development of technology in the modern world in which we live, privacy concerns are increasing, especially after the massive spread of distributed computing systems and the technologies that depend on it, whether in personal devices or public services. Hence, this research proposes refinements on the concept of privacy for enhancing the development of privacy-related strategies in distributed computing systems to address the elements of privacy. In particular, the study introduces the new concept of Privacy Appetite to describe and model the nature of the relationship between the intended disclosure of private information and gained value …


Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh May 2019

Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh

Theses and Dissertations

Design of a network is a challenging problem as it involves the integration of several complex components such as routers, servers, computers, smart devices. This is further complicated by the need to have robust security policies implemented to prevent violation of confidentiality as the networked devices interact. The design of such complex networked systems demand a more rigorous approach to the modeling and analysis, which can be inherited from the field of Software engineering. Presently, network or security engineers do not use a system/software engineering approach to design and build cybersecurity systems. Thus, we propose a system/software engineering approach to …


High Volume Test Automation With Yeager, Casey Doran Dec 2017

High Volume Test Automation With Yeager, Casey Doran

Theses and Dissertations

High Volume Automated Testing is a powerful family of software testing techniques which enable a variety of testing goals, including the discovery of hard-to-reproduce bugs, which can enable new levels of quality assurance when applied correctly. This thesis presents a software tool, Yeager, which may be used in conjunction with existing test code to execute tests similar to Long Sequence Regression Tests based on an inferred state-model of the system under test as provided by tester annotations of state transitions caused by individual test code snippets. The usefulness of the package is evaluated through the development and deployment of a …


A Survey Of Impact Analysis Tools For Effective Code Evolution, Stephanie Perez Day Galbo Apr 2017

A Survey Of Impact Analysis Tools For Effective Code Evolution, Stephanie Perez Day Galbo

Theses and Dissertations

Background: Software maintenance and evolution are becoming noticeably more im- portant activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, the activity of identifying the consequences of a change before the change is made, can help the developer under- stand the consequences of their potential changes and therefore make informed decisions about incremental changes, with the ultimate goal of minimizing negative impacts on the current baseline. To aid developers with impact analysis, there are a number of tools with a variety of capabilities to facilitate this process. Aim: In order to help …


Nat Traversal Techniques And Udp Keep-Alive Interval Optimization, Christopher Daniel Widmer Jul 2015

Nat Traversal Techniques And Udp Keep-Alive Interval Optimization, Christopher Daniel Widmer

Theses and Dissertations

NAT traversal presents a challenge to Peer to Peer (P2P) applications, as in many instances a third party is needed to help initiate communication between two hosts when one is behind one or more NAT devices. Much work has gone into facilitating communication across NATs using various protocols, and several standards have been developed to this end. This thesis explores the advantages and disadvantages of several of these standards, including protocols for interacting with the NAT device itself (NAT Port Mapping Protocol (NATPMP), Port Control Protocol (PCP), and Universal Plug and Play (UPnP)), and those using an external server to …


Distributed Gui Testing Of Ios Applications With Hadoopunit, Krissada Dechokul May 2014

Distributed Gui Testing Of Ios Applications With Hadoopunit, Krissada Dechokul

Theses and Dissertations

Smartphones have become an important medium of communication for millions of people. They have come to expect high-quality mobile applications, which have increased the importance of software testing in modern software development. While software testing can ensure the quality of a system under test (SUT), it has suffered from lengthy execution time, especially for system-level GUI testing. In general, system-level GUI testing can be time-consuming because it requires walking through every user interface element and every possible variation that users could experience through the GUI of the application. In addition, this type of testing exercises the SUT from the outside …


Mindshare: A Collaborative Peer-To-Peer System For Small Groups, Gareth Charles Farrington May 2005

Mindshare: A Collaborative Peer-To-Peer System For Small Groups, Gareth Charles Farrington

Theses and Dissertations

We present Mindshare, a system for small group collaboration using Peer to Peer networking technology. This paper details the motivation behind its design, how it benefits users and details of its construction and operation. The solution focuses on the needs of small collaborating groups with limited computing experience and resources. Mindshare allows the group to share an unlimited number of files and visualize them in unified hierarchical file system. Mindshare synchronizes the files between users without user input. Its robust design allows files to be shared even when the owner is offline and allows users to work with files from …


Quantifying Software Maintainability On Re-Engineered Translation Of Fortran To C++ Code, Zane Grey Tomlinson Jr. Jun 2004

Quantifying Software Maintainability On Re-Engineered Translation Of Fortran To C++ Code, Zane Grey Tomlinson Jr.

Theses and Dissertations

Due to the expanding existence of old software, legacy systems, and obsolete platforms with many industries, software re-engineering has become a widespread methodology that assists engineers and software practitioners with translating inflexible, unsupportable legacy software into maintainable software. Many companies today are investing in a variety of re-engineering techniques such as translation of source code to new code structures and target platforms to ensure future software maintenance can be performed in an efficient and effective manner. With sound re-engineering principles, the application of these techniques leverage the knowledge and previous engineering endeavors to mitigate risks and provide adequate performance to …


Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin May 2003

Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin

Theses and Dissertations

Software Life Cycle processes play a key role in the successful development of software products. Software processes continue to evolve as the field of software development progresses toward being a true engineering discipline. This theses has two objectives: (1) To apply software engineering knowledge gained during the pursuit of this degree toward the design and development of a complete, Software Engineering Institute (SEI) Capability Maturity Model (CMM) compliant process for the design phase of the software lifecycle. (2) To evaluate a Waterfall Lifecycle Model vs. an Iterative Lifecycle Model and compare SEI CM compliant processes to non-SEI CM compliant process …


Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff May 2003

Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff

Theses and Dissertations

Pair programming is touted by some software professionals as a style which allows developers to produce superior code in less time, and with fewer defects, than code produced by individuals. However, the acclaim for the pair methodology is not universal; some see it was a waste of effort which produces marginal improvements. Reported experiments which obtain quantitative results have typically been performed in an educational environment, and may not reflect actual workplace conditions. This thesis reports on an experiment using pair programing in an industrial setting. Its goal is to determine if this programming style can be used to increase …