Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Theses/Dissertations

2018

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 54

Full-Text Articles in Physical Sciences and Mathematics

Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch Dec 2018

Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch

University of New Orleans Theses and Dissertations

This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It …


Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey Dec 2018

Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey

Electronic Thesis and Dissertation Repository

Context: Continuous Integration (CI) is a DevOps technique which is widely used in practice. Studies show that its adoption rates will increase even further. At the same time, it is argued that maintaining product quality requires extensive and time consuming, testing and code reviews. In this context, if not done properly, shorter sprint cycles and agile practices entail higher risk for the quality of the product. It has been reported in literature [68], that lack of proper test strategies, poor test quality and team dependencies are some of the major challenges encountered in continuous integration and deployment.

Objective: The objective …


Pantry: A Macro Library For Python, Derek Pang Dec 2018

Pantry: A Macro Library For Python, Derek Pang

Master's Projects

Python lacks a simple way to create custom syntax and constructs that goes outside of its own syntax rules. A paradigm that allows for these possibilities to exist within languages is macros. Macros allow for a shorter set of syntax to expand into a longer set of instructions at compile-time. This gives the capability to evolve the language to fit personal needs.

Pantry, implements a hygienic text-substitution macro system for Python. Pantry achieves this through the introduction of an additional preparsing step that utilizes parsing and lexing of the source code. Pantry proposes a way to simply declare a pattern …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen Dec 2018

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …


Social Software Development: Insights And Solutions, Abhishek Sharma Dec 2018

Social Software Development: Insights And Solutions, Abhishek Sharma

Dissertations and Theses Collection (Open Access)

Over last few decades, the way software is developed has changed drastically. From being an activity performed by developers working individually to develop standalone programs, it has transformed into a highly collaborative and cooperative activity. Software development today can be considered as a participatory culture, where developers coordinate and engage together to develop software while continuously learning from one another and creating knowledge.

In order to support their communication and collaboration needs, software developers often use a variety of social media channels. These channels help software developers to connect with like-minded developers and explore collaborations on software projects of interest. …


Comparison Mining From Text, Maksim Tkachenko Dec 2018

Comparison Mining From Text, Maksim Tkachenko

Dissertations and Theses Collection (Open Access)

Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.

If …


Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez Dec 2018

Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez

Computer Science ETDs

Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …


Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu Dec 2018

Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu

Master's Theses

Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo Sep 2018

Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo

Dissertations, Theses, and Capstone Projects

We explore low-cost solutions for efficiently improving the 3D pose estimation problem of a single camera moving in an unfamiliar environment. The visual odometry (VO) task -- as it is called when using computer vision to estimate egomotion -- is of particular interest to mobile robots as well as humans with visual impairments. The payload capacity of small robots like micro-aerial vehicles (drones) requires the use of portable perception equipment, which is constrained by size, weight, energy consumption, and processing power. Using a single camera as the passive sensor for the VO task satisfies these requirements, and it motivates the …


List, Sample, And Count, Ali Assarpour Sep 2018

List, Sample, And Count, Ali Assarpour

Dissertations, Theses, and Capstone Projects

Counting plays a fundamental role in many scientific fields including chemistry, physics, mathematics, and computer science. There are two approaches for counting, the first relies on analytical tools to drive closed form expression, while the second takes advantage of the combinatorial nature of the problem to construct an algorithm whose output is the number of structures. There are many algorithmic techniques for counting, they cover the explicit approach of counting by listing to the approximate approach of counting by sampling.

This thesis looks at counting three sets of objects. First, we consider a subclass of boolean functions that are monotone. …


Cloud Service Reliability And Usability Measurement, Abdullah Bokhary Aug 2018

Cloud Service Reliability And Usability Measurement, Abdullah Bokhary

Computer Science and Engineering Theses and Dissertations

Cloud computing has become a major resource for fulfilling people's computational and storage needs. Investing in these services requires measuring and assuring its quality in general, and reliability and usability are primary concerns. However, using traditional reliability models can be challenging because of the environmental constraints and limited data availability due to the heterogeneous environment and diverse stakeholders. Also, the quality of cloud service Application Programming Interfaces (APIs) has a direct impact on the usability and reliability of the service.

We developed a framework to measure reliability with alternative available information that most cloud providers offer in three stages: 1) …


Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa Aug 2018

Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa

Boise State University Theses and Dissertations

Describing scenes such as rooms, city streets, or routes, is a very common human task that requires the ability to identify and describe the scene sufficiently for a hearer to develop a mental model of the scene. When people talk about such scenes, they mention some objects of the scene at the exclusion of others. We call the mentioned objects salient objects as people consider them noticeable or important in comparison to other non-mentioned objects. In this thesis, we look at saliency of visual scenes and how visual saliency informs what can and should be said about a scene when …


Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton Aug 2018

Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton

Boise State University Theses and Dissertations

As storage needs continually increase, and network file systems become more common, the need arises for tools that efficiently copy to and from these types of file systems. Traditional copy tools like the Linux cp utility were originally created for traditional storage systems, where storage is managed by a single host machine. cp uses a single-threaded approach to copying files. Using a multi-threaded approach would likely not provide an advantage in this system since the disk accesses are the bottleneck for this type of operation. In a distributed file system the disk accesses are spread across multiple hosts, and many …


An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala Jul 2018

An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala

Honors College Theses

For many students entering college, meeting new people and studying are a common struggle. Study groups are generally recommended, especially if the groups are comprised of members with complementary personality traits. But the challenge still remains, how do freshmen or transfer students find and form these heterogeneous study groups. In order to help alleviate this issue, an Android application was developed to automatically create study groups for students. Using basic information provided by students upon registration, the algorithm is able to automatically find matching group members. The application was designed using an agile life cycle model over the course of …


The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson Jun 2018

The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson

Computer Engineering

Modern chess engines have the ability to augment their evaluation by using massive tables containing billions of positions and their memorized solutions. This report examines the importance of these tables to better understand the circumstances under which they should be used. The analysis conducted in this paper empirically examines differences in size and speed of memorized positions and their impacts on engine strength. Using this technique, situations where memorized tables improve play (and situations where they do not) are discovered.


Advanced Malware Detection For Android Platform, Ke Xu Jun 2018

Advanced Malware Detection For Android Platform, Ke Xu

Dissertations and Theses Collection (Open Access)

In the first quarter of 2018, 75.66% of smartphones sales were devices running An- droid. Due to its popularity, cyber-criminals have increasingly targeted this ecosys- tem. Malware running on Android severely violates end users security and privacy, allowing many attacks such as defeating two factor authentication of mobile bank- ing applications, capturing real-time voice calls and leaking sensitive information. In this dissertation, I describe the pieces of work that I have done to effectively de- tect malware on Android platform, i.e., ICC-based malware detection system (IC- CDetector), multi-layer malware detection system (DeepRefiner), and self-evolving and scalable malware detection system (DroidEvolver) …


Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson Jun 2018

Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson

Master's Theses

Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their own …


Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang Jun 2018

Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang

Master's Theses

With the emergence of big data, scientific data analysis and visualization (DAV) tools are critical components of the data science software ecosystem; the usability of these tools is becoming extremely important to facilitate next-generation scientific discoveries. JupyterLab has been considered as one of the best polyglot, web-based, open-source data science tools. As the next phase of extensible interface for the classic iPython Notebooks, this tool supports interactive data science and scientific computing across multiple programming languages with great performances. Despite these advantages, previous heuristics evaluation studies have shown that JupyterLab has some significant flaws in the data visualization side. The …


Detecting And Characterizing Self Hiding Behavior In Android Applications, Raina Samuel May 2018

Detecting And Characterizing Self Hiding Behavior In Android Applications, Raina Samuel

Theses

Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed up-front, which puts users at risk. This study focuses on characterization and detection of such techniques, e.g., hiding the app or removing traces, known as 'self hiding' (SH) behavior. SH behavior has not been studied per se - rather it has been reported on only as a byproduct of malware investigations. This gap is addressed via a study and suite of static analyses targeted at SH in Android apps. …


A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson May 2018

A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson

University of New Orleans Theses and Dissertations

Often times groups of domain experts, such as scientists and engineers, will develop their own software modules for specialized computational tasks. When these users determine there is a need to integrate the data and computations used in their specialized components with an enterprise data management system, interoperability between the enterprise system and the specialized components rather than re-implementation allows for faster implementation and more flexible change management by shifting the onus of changes to the scientific components to the subject matter experts rather than the enterprise information technology team. The Jython-based RESTful web service API was developed to leverage code …


A Home Security System Based On Smartphone Sensors, Michael Mahler May 2018

A Home Security System Based On Smartphone Sensors, Michael Mahler

Graduate Theses and Dissertations

Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured …


Ksugo, Chase Godwin May 2018

Ksugo, Chase Godwin

KSU Journey Honors College Capstones and Theses

KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.


Recommending Apis For Software Evolution, Ferdian Thung May 2018

Recommending Apis For Software Evolution, Ferdian Thung

Dissertations and Theses Collection (Open Access)

Softwares are constantly evolving. This evolution has been made easier through the use of Application Programming Interfaces (APIs). By leveraging APIs, developers reuse previously implemented functionalities and concentrate on writing new codes. These APIs may originate from either third parties or internally from other compo- nents of the software that are currently developed. In the first case, developers need to know how to find and use third party APIs. In the second case, developers need to be aware of internal APIs in their own software. In either case, there is often too much information to digest. For instance, finding the …


Cslc Tutoring Portal, Brian Hodges May 2018

Cslc Tutoring Portal, Brian Hodges

Theses/Capstones/Creative Projects

A web portal designed for the Computer Science Learning Center to track students requesting help


Budgeting In Student Life: An Educational Website, Heather Grunden Apr 2018

Budgeting In Student Life: An Educational Website, Heather Grunden

Honors Projects

An applied honors project in the form of a website prototype. The purpose of this website is to introduce college students to the concept of budgeting and to teach them the core steps of creating their own budget, since many existing budgeting applications are pay-to-use, and the free options tend to have little to no instruction.