Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Proton beams Therapeutic use (4)
- Diagnostic imaging (3)
- Image processing (3)
- Android (2)
- Application software Development (2)
-
- Computer software Development (2)
- Empirical study (2)
- Protons Therapeutic use (2)
- Radiosurgery (2)
- Radiotherapy (2)
- Requirements engineering (2)
- Software Engineering (2)
- Software engineering (2)
- Traceability (2)
- 3d printing (1)
- 4586 (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Accessibility (1)
- Accessible Computing (1)
- Agile methodology (1)
- Agile software development (1)
- Aircraft (1)
- Application Development (1)
- Application Security (1)
- Application development (1)
- Application software Development. (1)
- Augmented Reality (1)
- Augmented reality (1)
- Autonomic Management (1)
- Publication
-
- Electronic Thesis and Dissertation Repository (12)
- Theses Digitization Project (6)
- Computer Engineering (3)
- Master's Theses (3)
- University of New Orleans Theses and Dissertations (3)
-
- Computer Science and Software Engineering (2)
- Masters Theses (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- Chancellor’s Honors Program Projects (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations and Theses Collection (Open Access) (1)
- Mechanical Engineering (1)
- Theses and Dissertations--Computer Science (1)
- Theses: Doctorates and Masters (1)
- UNF Graduate Theses and Dissertations (1)
- Undergraduate Honors Theses (1)
- Undergraduate University Honors Capstones (1)
Articles 1 - 30 of 42
Full-Text Articles in Physical Sciences and Mathematics
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
Electronic Thesis and Dissertation Repository
This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms. …
Missing Requirements Information And Its Impact On Software Architectures: A Case Study, Md Rounok Salehin
Missing Requirements Information And Its Impact On Software Architectures: A Case Study, Md Rounok Salehin
Electronic Thesis and Dissertation Repository
[Context & motivation] In the development of large, software-intensive systems, the system’s requirements are seldom, if ever, concluded upon prior to commencing with systems architecture. Research shows that, in order to manage development and domain complexities, instances of requirements engineering (RE) and systems architecting (SA) processes tend to inter-weave. [Question/problem] However, missing requirements information can cause one to create (or recreate) the needed information during different SA activities. While backtracking in the software development process is known to be costly, the costs associated with missing requirements in the SA process have not been investigated empirically. [Principal ideas/results] We …
A Modular Approach To The Development Of Interactive Augmented Reality Applications., Nelson J. Andre
A Modular Approach To The Development Of Interactive Augmented Reality Applications., Nelson J. Andre
Electronic Thesis and Dissertation Repository
Augmented reality (AR) technologies are becoming increasingly popular as a result of the increase in the power of mobile computing devices. Emerging AR applications have the potential to have an enormous impact on industries such as education, healthcare, research, training and entertainment. There are currently a number of augmented reality toolkits and libraries available for the development of these applications; however, there is currently no standard tool for development. In this thesis we propose a modular approach to the organization and development of AR systems in order to enable the creation novel AR experiences. We also investigate the incorporation of …
Redesign Of Johar: A Framework For Developing Accessible Applications, Oladapo Oyebode
Redesign Of Johar: A Framework For Developing Accessible Applications, Oladapo Oyebode
Electronic Thesis and Dissertation Repository
As the population of disabled people continues to grow, designing accessible applications is still a challenge, since most applications are incompatible with assistive technologies used by disabled people to interact with the computer. This accessibility issue is usually caused by the reluctance of software engineers or developers to include complete accessibility features in their applications, which in turn is often due to the extra cost and development effort required to dynamically adapt applications to a wide range of disabilities. Our aim to resolve accessibility issues led to the design and implementation of the "Johar" framework, which facilitates the development of …
Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth
Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth
Computer Science and Software Engineering
This project explores the use of an inexpensive 3D camera for the acquisition and reconstruction of mid-size objects. The disparity of objects between stereo image pairs are used to calculate depth and generate a depth map. The depth map is used to generate a point cloud representation of the object from a single view. Finally, point clouds are generated from several views of an object and then aligned and merged into a seamless 360-degree point cloud.
Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence
Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence
Computer Science and Computer Engineering Undergraduate Honors Theses
For various reasons, circumstances might arise in which an investigator, enlisting the help of a system administrator, needs access to an instance of MySQL that is password protected by an individual system user. If this password is unknown and the user is uncooperative or unavailable, alternative means must be utilized to gain access to the data stored within the program. Two main approaches will be explored, each with its pros and cons. In one case, the password can be bypassed entirely, granting the investigator unfettered access to the program data. The second method allows a narrower look at only some …
Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong
Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong
Master's Theses
Software permeates every aspect of our modern lives. In many applications, such in the software for airplane flight controls, or nuclear power control systems software failures can have catastrophic consequences. As we place so much trust in software, how can we know if it is trustworthy? Through software assurance, we can attempt to quantify just that.
Building complex, high assurance software is no simple task. The difficult information landscape of a software engineering project can make verification and validation, the process by which the assurance of a software is assessed, very difficult. In order to manage the inevitable information overload …
Vortex, Charles F. Armstrong, Dimitri Yacoub, Alexander B. Sayers
Vortex, Charles F. Armstrong, Dimitri Yacoub, Alexander B. Sayers
Chancellor’s Honors Program Projects
No abstract provided.
Object Detection Using Contrast Enhancement And Dynamic Noise Reduction, Justin Lee Baker
Object Detection Using Contrast Enhancement And Dynamic Noise Reduction, Justin Lee Baker
UNLV Theses, Dissertations, Professional Papers, and Capstones
Edge detection is one of the most important steps a computer must perform to gain understanding of an object in a digital image either from disk or from video feed. Edge detection allows for the computer to describe the shape of the objects in an image and create a pixel boundary defining what is considered part of an object, and what is not. Cannys edge detection algorithm is one of the most robust and accurate of these edge detection algorithms. However, as with many algorithms in image processing, there are many cases where the algorithm does not perform as well …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
University of New Orleans Theses and Dissertations
A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
University of New Orleans Theses and Dissertations
Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
Maps Of Lessons Learnt In Requirements Engineering, Ibtehal Noorwali
Maps Of Lessons Learnt In Requirements Engineering, Ibtehal Noorwali
Electronic Thesis and Dissertation Repository
Both researchers and practitioners have emphasized the importance of learning from past experiences and its consequential impact on project time, cost, and quality. However, from the survey we conducted of requirements engineering (RE) practitioners, over 70\% of the respondents stated that they seldom use RE lessons in the RE process, though 85\% of these would use such lessons if readily available. Our observation, however, is that RE lessons are scattered, mainly implicitly, in the literature and practice, which obviously, does not help the situation. We, therefore, present ``maps” of RE lessons which would highlight weak (dark) and strong (bright) areas …
Channels: Easy Video Content Consumption, Alexander R. Ledwith
Channels: Easy Video Content Consumption, Alexander R. Ledwith
Computer Engineering
The idea for this project is to take a user’s digital movie and television show library, and organize the individual videos into lists that will continuously and concurrently play like cable TV channels. This means that when a list of channels is switched to, video content will automatically start playing, possibly in the middle, based on a schedule. It should serve the needs of the user by allowing the user to quickly watch any of their existing channels, easily add a new channel based on chosen criteria or manual selection, and easily add new video content. In addition, the product …
Protocases, Christopher M. Polis
Protocases, Christopher M. Polis
Computer Engineering
Design and implementation of a 3D printing web application.
Gravity Evolved, Clark Duvall
Gravity Evolved, Clark Duvall
Computer Science and Software Engineering
Gravity Evolved is a galactic physics game, created for mobile devices. In the game, you make your own solar system by creating planets, and then placing weapons on the planets. The physics of these planets and projectiles shot by the weapons are then simulated. Gravity Evolved has a Battle mode, where your solar system is pitted against an opposing solar system. In Battle mode, you earn money to unlock, create, and upgrade items in your solar system. Gravity Evolved will be on the Apple App Store and Google Play Store in the summer of 2013.
Integrated Collision Avoidance System Sensor Evaluation Final Design Project, Alex F. Graebe, Bridgette S. Kimball, Drew T. Lavoise
Integrated Collision Avoidance System Sensor Evaluation Final Design Project, Alex F. Graebe, Bridgette S. Kimball, Drew T. Lavoise
Mechanical Engineering
Following the development of Aircraft Collision Avoidance Technology (ACAT) by the National Aeronautics and Space Administration (NASA), a need arose to transition the life-saving technology to aid the general aviation community. Considering the realistic cost of implementation, it was decided that the technology should be adapted to function on any smartphone, using that device as an end-to-end solution to sense, process, and alert the pilot to imminent threats. In September of 2012, the SAS (Sense and Survive) Senior Project Team at California Polytechnic University (Cal Poly), San Luis Obispo was assigned the task of using smartphone technology to accurately sense …
Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes
Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes
Master's Theses
In the field of speech recognition, an algorithm must learn to tell the difference between "a nice rock" and "a gneiss rock". These identical-sounding phrases are called oronyms. Word frequency dictionaries are often used by speech recognition systems to help resolve phonetic sequences with more than one possible orthographic phrase interpretation, by looking up which oronym of the root phonetic sequence contains the most-common words.
Our paper demonstrates a technique used to validate word frequency dictionary values. We chose to use frequency values from the UNISYN dictionary, which tallies each word on a per-occurance basis, using a proprietary text corpus, …
Localizing State-Dependent Faults Using Associated Sequence Mining, Shaimaa Ali
Localizing State-Dependent Faults Using Associated Sequence Mining, Shaimaa Ali
Electronic Thesis and Dissertation Repository
In this thesis we developed a new fault localization process to localize faults in object oriented software. The process is built upon the "Encapsulation'' principle and aims to locate state-dependent discrepancies in the software's behavior. We experimented with the proposed process on 50 seeded faults in 8 subject programs, and were able to locate the faulty class in 100% of the cases when objects with constant states were taken into consideration, while we missed 24% percent of the faults when these objects were not considered. We also developed a customized data mining technique "Associated sequence mining'' to be used in …
Web 2.0 Technologies In The Software Development Process., Jocelyn Borgers
Web 2.0 Technologies In The Software Development Process., Jocelyn Borgers
Undergraduate Honors Theses
Software engineers must communicate with many different people, likely in different locations, in order to create a successful piece of software. Social media can be used to communicate quickly and efficiently to minimize miscommunications and facilitate collaboration in the software development process. Research in this area has been sparse but significant because initial findings show that social media is being used in innovative ways to improve software development. Surveys of what social media some companies are currently using along with information about new social media systems indicate possible uses for these technologies on future software development projects such as documentation …
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …
Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova
Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova
UNLV Theses, Dissertations, Professional Papers, and Capstones
This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …
An Architecture For Believable Socially Aware Agents, Arvand Dorgoly
An Architecture For Believable Socially Aware Agents, Arvand Dorgoly
Electronic Thesis and Dissertation Repository
The main focus of this thesis is to solve the believability problem in video game agents by integrating necessary psychological and sociological foundations by means of role based architecture. Our design agent also has the capability to reason and predict the decisions of other actors by using its own mental model. The agent has a separate mental model for every actor.
Integrated Development And Parallelization Of Automated Dicentric Chromosome Identification Software To Expedite Biodosimetry Analysis, Yanxin Li
Electronic Thesis and Dissertation Repository
Manual cytogenetic biodosimetry lacks the ability to handle mass casualty events. We present an automated dicentric chromosome identification (ADCI) software utilizing parallel computing technology. A parallelization strategy combining data and task parallelism, as well as optimization of I/O operations, has been designed, implemented, and incorporated in ADCI. Experiments on an eight-core desktop show that our algorithm can expedite the process of ADCI by at least four folds. Experiments on Symmetric Computing, SHARCNET, Blue Gene/Q multi-processor computers demonstrate the capability of parallelized ADCI to process thousands of samples for cytogenetic biodosimetry in a few hours. This increase in speed underscores the …
Sensual Cultures: Exploring Sensory Orientation, Lauren Sonnenstrahl Benedict
Sensual Cultures: Exploring Sensory Orientation, Lauren Sonnenstrahl Benedict
Undergraduate University Honors Capstones
We use our senses every day, consciously or unconsciously, based on our cultural needs and preferences. These sensory orientations shape and are shaped by what a given culture defines as acceptable. For this reason, different sensory orientations result in different strengths and areas of emphasis and de-emphasis. Becoming aware of different sensory orientations and their associated cultures allows us to realize what we are missing in our own sensory orientations that inform our cultural habits. Familiarity with various sensory orientations may cultivate greater cultural acceptance as well. To analyze and illustrate such differences, an educational app for iPads was created …
Fuzzy Expert-Cocomo Risk Assessment And Effort Contingency Model In Software Project Management, Ekananta Manalif
Fuzzy Expert-Cocomo Risk Assessment And Effort Contingency Model In Software Project Management, Ekananta Manalif
Electronic Thesis and Dissertation Repository
Software development can be considered to be the most uncertain project when compared to other types of projects due to the uncertainty in the customer requirements, the complexity of the process, and the intangible nature of the product. In order to increase the likelihood of success in managing a software project, the project manager(s) must invest more time and effort in the project planning phase. The two main activities in project planning phase are effort estimation and risk management which has to be executed together because the accuracy of the effort estimation is highly dependent on the size and nature …
Senior Project Report - Doctest, Stephen Weessies
Senior Project Report - Doctest, Stephen Weessies
Computer Engineering
DocTest is a program that, simply put, allows a programmer or user to document STANAG 4586 (a standard for unmanned aerial vehicle interoperability) messages and test the vehicle system at Lockheed Martin [5]. The program is extensible to allow for further development aiding our software team to do what they do best and not get bogged down in tedious but necessary documentation. DocTest is also used to aid in testing, keeping track of the issues and bugs found and creating a document that captures each issue so an issue is not missed or forgotten. This program was made for use …