Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Theses/Dissertations

2013

Institution
Keyword
Publication

Articles 1 - 30 of 42

Full-Text Articles in Physical Sciences and Mathematics

On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar Dec 2013

On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar

Electronic Thesis and Dissertation Repository

This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms. …


Missing Requirements Information And Its Impact On Software Architectures: A Case Study, Md Rounok Salehin Dec 2013

Missing Requirements Information And Its Impact On Software Architectures: A Case Study, Md Rounok Salehin

Electronic Thesis and Dissertation Repository

[Context & motivation] In the development of large, software-intensive systems, the system’s requirements are seldom, if ever, concluded upon prior to commencing with systems architecture. Research shows that, in order to manage development and domain complexities, instances of requirements engineering (RE) and systems architecting (SA) processes tend to inter-weave. [Question/problem] However, missing requirements information can cause one to create (or recreate) the needed information during different SA activities. While backtracking in the software development process is known to be costly, the costs associated with missing requirements in the SA process have not been investigated empirically. [Principal ideas/results] We …


A Modular Approach To The Development Of Interactive Augmented Reality Applications., Nelson J. Andre Dec 2013

A Modular Approach To The Development Of Interactive Augmented Reality Applications., Nelson J. Andre

Electronic Thesis and Dissertation Repository

Augmented reality (AR) technologies are becoming increasingly popular as a result of the increase in the power of mobile computing devices. Emerging AR applications have the potential to have an enormous impact on industries such as education, healthcare, research, training and entertainment. There are currently a number of augmented reality toolkits and libraries available for the development of these applications; however, there is currently no standard tool for development. In this thesis we propose a modular approach to the organization and development of AR systems in order to enable the creation novel AR experiences. We also investigate the incorporation of …


Redesign Of Johar: A Framework For Developing Accessible Applications, Oladapo Oyebode Dec 2013

Redesign Of Johar: A Framework For Developing Accessible Applications, Oladapo Oyebode

Electronic Thesis and Dissertation Repository

As the population of disabled people continues to grow, designing accessible applications is still a challenge, since most applications are incompatible with assistive technologies used by disabled people to interact with the computer. This accessibility issue is usually caused by the reluctance of software engineers or developers to include complete accessibility features in their applications, which in turn is often due to the extra cost and development effort required to dynamically adapt applications to a wide range of disabilities. Our aim to resolve accessibility issues led to the design and implementation of the "Johar" framework, which facilitates the development of …


Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth Dec 2013

Reconstructing Point Clouds Of Mid-Size Objects, Spencer Woodworth

Computer Science and Software Engineering

This project explores the use of an inexpensive 3D camera for the acquisition and reconstruction of mid-size objects. The disparity of objects between stereo image pairs are used to calculate depth and generate a depth map. The depth map is used to generate a point cloud representation of the object from a single view. Finally, point clouds are generated from several views of an object and then aligned and merged into a seamless 360-degree point cloud.


Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence Dec 2013

Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence

Computer Science and Computer Engineering Undergraduate Honors Theses

For various reasons, circumstances might arise in which an investigator, enlisting the help of a system administrator, needs access to an instance of MySQL that is password protected by an individual system user. If this password is unknown and the user is uncooperative or unavailable, alternative means must be utilized to gain access to the data stored within the program. Two main approaches will be explored, each with its pros and cons. In one case, the password can be bypassed entirely, granting the investigator unfettered access to the program data. The second method allows a narrower look at only some …


Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong Dec 2013

Can Clustering Improve Requirements Traceability? A Tracelab-Enabled Study, Brett Taylor Armstrong

Master's Theses

Software permeates every aspect of our modern lives. In many applications, such in the software for airplane flight controls, or nuclear power control systems software failures can have catastrophic consequences. As we place so much trust in software, how can we know if it is trustworthy? Through software assurance, we can attempt to quantify just that.

Building complex, high assurance software is no simple task. The difficult information landscape of a software engineering project can make verification and validation, the process by which the assurance of a software is assessed, very difficult. In order to manage the inevitable information overload …


Vortex, Charles F. Armstrong, Dimitri Yacoub, Alexander B. Sayers Dec 2013

Vortex, Charles F. Armstrong, Dimitri Yacoub, Alexander B. Sayers

Chancellor’s Honors Program Projects

No abstract provided.


Object Detection Using Contrast Enhancement And Dynamic Noise Reduction, Justin Lee Baker Dec 2013

Object Detection Using Contrast Enhancement And Dynamic Noise Reduction, Justin Lee Baker

UNLV Theses, Dissertations, Professional Papers, and Capstones

Edge detection is one of the most important steps a computer must perform to gain understanding of an object in a digital image either from disk or from video feed. Edge detection allows for the computer to describe the shape of the objects in an image and create a pixel boundary defining what is considered part of an object, and what is not. Cannys edge detection algorithm is one of the most robust and accurate of these edge detection algorithms. However, as with many algorithms in image processing, there are many cases where the algorithm does not perform as well …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Reliability Models Applied To Smartphone Applications, Sonia Meskini Aug 2013

Reliability Models Applied To Smartphone Applications, Sonia Meskini

Electronic Thesis and Dissertation Repository

Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper Aug 2013

Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper

University of New Orleans Theses and Dissertations

A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …


Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward Aug 2013

Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward

University of New Orleans Theses and Dissertations

Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …


Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise Aug 2013

Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise

Masters Theses

An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.


Maps Of Lessons Learnt In Requirements Engineering, Ibtehal Noorwali Jun 2013

Maps Of Lessons Learnt In Requirements Engineering, Ibtehal Noorwali

Electronic Thesis and Dissertation Repository

Both researchers and practitioners have emphasized the importance of learning from past experiences and its consequential impact on project time, cost, and quality. However, from the survey we conducted of requirements engineering (RE) practitioners, over 70\% of the respondents stated that they seldom use RE lessons in the RE process, though 85\% of these would use such lessons if readily available. Our observation, however, is that RE lessons are scattered, mainly implicitly, in the literature and practice, which obviously, does not help the situation. We, therefore, present ``maps” of RE lessons which would highlight weak (dark) and strong (bright) areas …


Channels: Easy Video Content Consumption, Alexander R. Ledwith Jun 2013

Channels: Easy Video Content Consumption, Alexander R. Ledwith

Computer Engineering

The idea for this project is to take a user’s digital movie and television show library, and organize the individual videos into lists that will continuously and concurrently play like cable TV channels. This means that when a list of channels is switched to, video content will automatically start playing, possibly in the middle, based on a schedule. It should serve the needs of the user by allowing the user to quickly watch any of their existing channels, easily add a new channel based on chosen criteria or manual selection, and easily add new video content. In addition, the product …


Protocases, Christopher M. Polis Jun 2013

Protocases, Christopher M. Polis

Computer Engineering

Design and implementation of a 3D printing web application.


Gravity Evolved, Clark Duvall Jun 2013

Gravity Evolved, Clark Duvall

Computer Science and Software Engineering

Gravity Evolved is a galactic physics game, created for mobile devices. In the game, you make your own solar system by creating planets, and then placing weapons on the planets. The physics of these planets and projectiles shot by the weapons are then simulated. Gravity Evolved has a Battle mode, where your solar system is pitted against an opposing solar system. In Battle mode, you earn money to unlock, create, and upgrade items in your solar system. Gravity Evolved will be on the Apple App Store and Google Play Store in the summer of 2013.


Integrated Collision Avoidance System Sensor Evaluation Final Design Project, Alex F. Graebe, Bridgette S. Kimball, Drew T. Lavoise Jun 2013

Integrated Collision Avoidance System Sensor Evaluation Final Design Project, Alex F. Graebe, Bridgette S. Kimball, Drew T. Lavoise

Mechanical Engineering

Following the development of Aircraft Collision Avoidance Technology (ACAT) by the National Aeronautics and Space Administration (NASA), a need arose to transition the life-saving technology to aid the general aviation community. Considering the realistic cost of implementation, it was decided that the technology should be adapted to function on any smartphone, using that device as an end-to-end solution to sense, process, and alert the pilot to imminent threats. In September of 2012, the SAS (Sense and Survive) Senior Project Team at California Polytechnic University (Cal Poly), San Luis Obispo was assigned the task of using smartphone technology to accurately sense …


Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes Jun 2013

Misheard Me Oronyminator: Using Oronyms To Validate The Correctness Of Frequency Dictionaries, Jennifer G. Hughes

Master's Theses

In the field of speech recognition, an algorithm must learn to tell the difference between "a nice rock" and "a gneiss rock". These identical-sounding phrases are called oronyms. Word frequency dictionaries are often used by speech recognition systems to help resolve phonetic sequences with more than one possible orthographic phrase interpretation, by looking up which oronym of the root phonetic sequence contains the most-common words.

Our paper demonstrates a technique used to validate word frequency dictionary values. We chose to use frequency values from the UNISYN dictionary, which tallies each word on a per-occurance basis, using a proprietary text corpus, …


Localizing State-Dependent Faults Using Associated Sequence Mining, Shaimaa Ali May 2013

Localizing State-Dependent Faults Using Associated Sequence Mining, Shaimaa Ali

Electronic Thesis and Dissertation Repository

In this thesis we developed a new fault localization process to localize faults in object oriented software. The process is built upon the "Encapsulation'' principle and aims to locate state-dependent discrepancies in the software's behavior. We experimented with the proposed process on 50 seeded faults in 8 subject programs, and were able to locate the faulty class in 100% of the cases when objects with constant states were taken into consideration, while we missed 24% percent of the faults when these objects were not considered. We also developed a customized data mining technique "Associated sequence mining'' to be used in …


Web 2.0 Technologies In The Software Development Process., Jocelyn Borgers May 2013

Web 2.0 Technologies In The Software Development Process., Jocelyn Borgers

Undergraduate Honors Theses

Software engineers must communicate with many different people, likely in different locations, in order to create a successful piece of software. Social media can be used to communicate quickly and efficiently to minimize miscommunications and facilitate collaboration in the software development process. Research in this area has been sparse but significant because initial findings show that social media is being used in innovative ways to improve software development. Surveys of what social media some companies are currently using along with information about new social media systems indicate possible uses for these technologies on future software development projects such as documentation …


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …


Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova May 2013

Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova

UNLV Theses, Dissertations, Professional Papers, and Capstones

This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …


An Architecture For Believable Socially Aware Agents, Arvand Dorgoly Apr 2013

An Architecture For Believable Socially Aware Agents, Arvand Dorgoly

Electronic Thesis and Dissertation Repository

The main focus of this thesis is to solve the believability problem in video game agents by integrating necessary psychological and sociological foundations by means of role based architecture. Our design agent also has the capability to reason and predict the decisions of other actors by using its own mental model. The agent has a separate mental model for every actor.


Integrated Development And Parallelization Of Automated Dicentric Chromosome Identification Software To Expedite Biodosimetry Analysis, Yanxin Li Apr 2013

Integrated Development And Parallelization Of Automated Dicentric Chromosome Identification Software To Expedite Biodosimetry Analysis, Yanxin Li

Electronic Thesis and Dissertation Repository

Manual cytogenetic biodosimetry lacks the ability to handle mass casualty events. We present an automated dicentric chromosome identification (ADCI) software utilizing parallel computing technology. A parallelization strategy combining data and task parallelism, as well as optimization of I/O operations, has been designed, implemented, and incorporated in ADCI. Experiments on an eight-core desktop show that our algorithm can expedite the process of ADCI by at least four folds. Experiments on Symmetric Computing, SHARCNET, Blue Gene/Q multi-processor computers demonstrate the capability of parallelized ADCI to process thousands of samples for cytogenetic biodosimetry in a few hours. This increase in speed underscores the …


Sensual Cultures: Exploring Sensory Orientation, Lauren Sonnenstrahl Benedict Apr 2013

Sensual Cultures: Exploring Sensory Orientation, Lauren Sonnenstrahl Benedict

Undergraduate University Honors Capstones

We use our senses every day, consciously or unconsciously, based on our cultural needs and preferences. These sensory orientations shape and are shaped by what a given culture defines as acceptable. For this reason, different sensory orientations result in different strengths and areas of emphasis and de-emphasis. Becoming aware of different sensory orientations and their associated cultures allows us to realize what we are missing in our own sensory orientations that inform our cultural habits. Familiarity with various sensory orientations may cultivate greater cultural acceptance as well. To analyze and illustrate such differences, an educational app for iPads was created …


Fuzzy Expert-Cocomo Risk Assessment And Effort Contingency Model In Software Project Management, Ekananta Manalif Mar 2013

Fuzzy Expert-Cocomo Risk Assessment And Effort Contingency Model In Software Project Management, Ekananta Manalif

Electronic Thesis and Dissertation Repository

Software development can be considered to be the most uncertain project when compared to other types of projects due to the uncertainty in the customer requirements, the complexity of the process, and the intangible nature of the product. In order to increase the likelihood of success in managing a software project, the project manager(s) must invest more time and effort in the project planning phase. The two main activities in project planning phase are effort estimation and risk management which has to be executed together because the accuracy of the effort estimation is highly dependent on the size and nature …


Senior Project Report - Doctest, Stephen Weessies Mar 2013

Senior Project Report - Doctest, Stephen Weessies

Computer Engineering

DocTest is a program that, simply put, allows a programmer or user to document STANAG 4586 (a standard for unmanned aerial vehicle interoperability) messages and test the vehicle system at Lockheed Martin [5]. The program is extensible to allow for further development aiding our software team to do what they do best and not get bogged down in tedious but necessary documentation. DocTest is also used to aid in testing, keeping track of the issues and bugs found and creating a document that captures each issue so an issue is not missed or forgotten. This program was made for use …