Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (7)
- Singapore Management University (4)
- Air Force Institute of Technology (3)
- Kennesaw State University (3)
- The University of Akron (3)
-
- Western University (3)
- Bard College (2)
- Boise State University (2)
- City University of New York (CUNY) (2)
- San Jose State University (2)
- Southern Methodist University (2)
- University of Denver (2)
- University of Nebraska at Omaha (2)
- University of New Mexico (2)
- University of New Orleans (2)
- University of North Florida (2)
- Virginia Commonwealth University (2)
- Bowling Green State University (1)
- Eastern Washington University (1)
- Georgia Southern University (1)
- Louisiana State University (1)
- Marshall University (1)
- New Jersey Institute of Technology (1)
- The College of Wooster (1)
- University of Arkansas, Fayetteville (1)
- Western Michigan University (1)
- Keyword
-
- Computer Science (5)
- Android (4)
- Website (3)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (2)
- Artificial intelligence (2)
-
- Computer vision (2)
- Daniel Felix Ritchie School of Engineering and Computer Science (2)
- Machine learning (2)
- Mobile (2)
- Natural language processing (2)
- PHP (2)
- Prototype (2)
- Python (2)
- Smartphone (2)
- Software (2)
- Software-Defined Networking (2)
- Thesis; University of North Florida; UNF; Dissertations (2)
- 3D printing (1)
- <p>Emergency management -- Planning.</p> <p>Information technology.</p> <p>Disaster relief.</p> (1)
- AOC Pathfinder (1)
- API recommendation (1)
- Academic -- UNF -- Computing; gate; automate; ciri; f-measure; human rights; u.s. department of state (1)
- Academic -- UNF -- Computing; offloading (1)
- Accelerometer (1)
- Accounting (1)
- Activity recognition (1)
- Aiolos (1)
- Algorithm (1)
- Algorithmic (1)
- Alpha (1)
- Publication
-
- Theses and Dissertations (5)
- Dissertations and Theses Collection (Open Access) (4)
- Master's Theses (4)
- Electronic Thesis and Dissertation Repository (3)
- Williams Honors College, Honors Research Projects (3)
-
- Boise State University Theses and Dissertations (2)
- Computer Engineering (2)
- Computer Science ETDs (2)
- Computer Science and Engineering Theses and Dissertations (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Theses and Dissertations (2)
- KSU Journey Honors College Capstones and Theses (2)
- Master's Projects (2)
- Theses/Capstones/Creative Projects (2)
- UNF Graduate Theses and Dissertations (2)
- University of New Orleans Theses and Dissertations (2)
- Computer Science and Software Engineering (1)
- EWU Masters Thesis Collection (1)
- Graduate Theses and Dissertations (1)
- Honors College Theses (1)
- Honors Projects (1)
- Honors Theses (1)
- LSU Master's Theses (1)
- Master of Science in Computer Science Theses (1)
- Senior Independent Study Theses (1)
- Senior Projects Fall 2018 (1)
- Senior Projects Spring 2018 (1)
- Theses (1)
- Theses, Dissertations and Capstones (1)
Articles 1 - 30 of 54
Full-Text Articles in Physical Sciences and Mathematics
Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch
Feasible Form Parameter Design Of Complex Ship Hull Form Geometry, Thomas L. Mcculloch
University of New Orleans Theses and Dissertations
This thesis introduces a new methodology for robust form parameter design of complex hull form geometry via constraint programming, automatic differentiation, interval arithmetic, and truncated hierarchical B- splines. To date, there has been no clearly stated methodology for assuring consistency of general (equality and inequality) constraints across an entire geometric form parameter ship hull design space. In contrast, the method to be given here can be used to produce guaranteed narrowing of the design space, such that infeasible portions are eliminated. Furthermore, we can guarantee that any set of form parameters generated by our method will be self consistent. It …
Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey
Predicting Software Fault Proneness Using Machine Learning, Sanjay Ghanathey
Electronic Thesis and Dissertation Repository
Context: Continuous Integration (CI) is a DevOps technique which is widely used in practice. Studies show that its adoption rates will increase even further. At the same time, it is argued that maintaining product quality requires extensive and time consuming, testing and code reviews. In this context, if not done properly, shorter sprint cycles and agile practices entail higher risk for the quality of the product. It has been reported in literature [68], that lack of proper test strategies, poor test quality and team dependencies are some of the major challenges encountered in continuous integration and deployment.
Objective: The objective …
Pantry: A Macro Library For Python, Derek Pang
Pantry: A Macro Library For Python, Derek Pang
Master's Projects
Python lacks a simple way to create custom syntax and constructs that goes outside of its own syntax rules. A paradigm that allows for these possibilities to exist within languages is macros. Macros allow for a shorter set of syntax to expand into a longer set of instructions at compile-time. This gives the capability to evolve the language to fit personal needs.
Pantry, implements a hygienic text-substitution macro system for Python. Pantry achieves this through the introduction of an additional preparsing step that utilizes parsing and lexing of the source code. Pantry proposes a way to simply declare a pattern …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen
Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen
Master's Projects
Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …
Eye Pressure Monitior, Andrea Nella Levy
Eye Pressure Monitior, Andrea Nella Levy
Computer Engineering
The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …
Social Software Development: Insights And Solutions, Abhishek Sharma
Social Software Development: Insights And Solutions, Abhishek Sharma
Dissertations and Theses Collection (Open Access)
Over last few decades, the way software is developed has changed drastically. From being an activity performed by developers working individually to develop standalone programs, it has transformed into a highly collaborative and cooperative activity. Software development today can be considered as a participatory culture, where developers coordinate and engage together to develop software while continuously learning from one another and creating knowledge.
In order to support their communication and collaboration needs, software developers often use a variety of social media channels. These channels help software developers to connect with like-minded developers and explore collaborations on software projects of interest. …
Comparison Mining From Text, Maksim Tkachenko
Comparison Mining From Text, Maksim Tkachenko
Dissertations and Theses Collection (Open Access)
Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.
If …
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Computer Science ETDs
Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Cleaver: Classification Of Everyday Activities Via Ensemble Recognizers, Samantha Hsu
Master's Theses
Physical activity can have immediate and long-term benefits on health and reduce the risk for chronic diseases. Valid measures of physical activity are needed in order to improve our understanding of the exact relationship between physical activity and health. Activity monitors have become a standard for measuring physical activity; accelerometers in particular are widely used in research and consumer products because they are objective, inexpensive, and practical. Previous studies have experimented with different monitor placements and classification methods. However, the majority of these methods were developed using data collected in controlled, laboratory-based settings, which is not reliably representative of real …
Phr: Patient Health Record, Quinn Nelson
Phr: Patient Health Record, Quinn Nelson
Theses/Capstones/Creative Projects
The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Computer Science ETDs
Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.
In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Master of Science in Computer Science Theses
With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …
Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo
Enhancing 3d Visual Odometry With Single-Camera Stereo Omnidirectional Systems, Carlos A. Jaramillo
Dissertations, Theses, and Capstone Projects
We explore low-cost solutions for efficiently improving the 3D pose estimation problem of a single camera moving in an unfamiliar environment. The visual odometry (VO) task -- as it is called when using computer vision to estimate egomotion -- is of particular interest to mobile robots as well as humans with visual impairments. The payload capacity of small robots like micro-aerial vehicles (drones) requires the use of portable perception equipment, which is constrained by size, weight, energy consumption, and processing power. Using a single camera as the passive sensor for the VO task satisfies these requirements, and it motivates the …
List, Sample, And Count, Ali Assarpour
List, Sample, And Count, Ali Assarpour
Dissertations, Theses, and Capstone Projects
Counting plays a fundamental role in many scientific fields including chemistry, physics, mathematics, and computer science. There are two approaches for counting, the first relies on analytical tools to drive closed form expression, while the second takes advantage of the combinatorial nature of the problem to construct an algorithm whose output is the number of structures. There are many algorithmic techniques for counting, they cover the explicit approach of counting by listing to the approximate approach of counting by sampling.
This thesis looks at counting three sets of objects. First, we consider a subclass of boolean functions that are monotone. …
Cloud Service Reliability And Usability Measurement, Abdullah Bokhary
Cloud Service Reliability And Usability Measurement, Abdullah Bokhary
Computer Science and Engineering Theses and Dissertations
Cloud computing has become a major resource for fulfilling people's computational and storage needs. Investing in these services requires measuring and assuring its quality in general, and reliability and usability are primary concerns. However, using traditional reliability models can be challenging because of the environmental constraints and limited data availability due to the heterogeneous environment and diverse stakeholders. Also, the quality of cloud service Application Programming Interfaces (APIs) has a direct impact on the usability and reliability of the service.
We developed a framework to measure reliability with alternative available information that most cloud providers offer in three stages: 1) …
Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa
Detecting Saliency By Combining Speech And Object Detection In Indoor Environments, Kiran Thapa
Boise State University Theses and Dissertations
Describing scenes such as rooms, city streets, or routes, is a very common human task that requires the ability to identify and describe the scene sufficiently for a hearer to develop a mental model of the scene. When people talk about such scenes, they mention some objects of the scene at the exclusion of others. We call the mentioned objects salient objects as people consider them noticeable or important in comparison to other non-mentioned objects. In this thesis, we look at saliency of visual scenes and how visual saliency informs what can and should be said about a scene when …
Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton
Performance, Scalability, And Robustness In Distributed File Tree Copy, Christopher Robert Sutton
Boise State University Theses and Dissertations
As storage needs continually increase, and network file systems become more common, the need arises for tools that efficiently copy to and from these types of file systems. Traditional copy tools like the Linux cp utility were originally created for traditional storage systems, where storage is managed by a single host machine. cp uses a single-threaded approach to copying files. Using a multi-threaded approach would likely not provide an advantage in this system since the disk accesses are the bottleneck for this type of operation. In a distributed file system the disk accesses are spread across multiple hosts, and many …
An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala
An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala
Honors College Theses
For many students entering college, meeting new people and studying are a common struggle. Study groups are generally recommended, especially if the groups are comprised of members with complementary personality traits. But the challenge still remains, how do freshmen or transfer students find and form these heterogeneous study groups. In order to help alleviate this issue, an Android application was developed to automatically create study groups for students. Using basic information provided by students upon registration, the algorithm is able to automatically find matching group members. The application was designed using an agile life cycle model over the course of …
The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson
The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson
Computer Engineering
Modern chess engines have the ability to augment their evaluation by using massive tables containing billions of positions and their memorized solutions. This report examines the importance of these tables to better understand the circumstances under which they should be used. The analysis conducted in this paper empirically examines differences in size and speed of memorized positions and their impacts on engine strength. Using this technique, situations where memorized tables improve play (and situations where they do not) are discovered.
Advanced Malware Detection For Android Platform, Ke Xu
Advanced Malware Detection For Android Platform, Ke Xu
Dissertations and Theses Collection (Open Access)
In the first quarter of 2018, 75.66% of smartphones sales were devices running An- droid. Due to its popularity, cyber-criminals have increasingly targeted this ecosys- tem. Malware running on Android severely violates end users security and privacy, allowing many attacks such as defeating two factor authentication of mobile bank- ing applications, capturing real-time voice calls and leaking sensitive information. In this dissertation, I describe the pieces of work that I have done to effectively de- tect malware on Android platform, i.e., ICC-based malware detection system (IC- CDetector), multi-layer malware detection system (DeepRefiner), and self-evolving and scalable malware detection system (DroidEvolver) …
Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson
Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson
Master's Theses
Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their own …
Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang
Jupyterlab_Voyager: A Data Visualization Enhancement In Jupyterlab, Ji Zhang
Master's Theses
With the emergence of big data, scientific data analysis and visualization (DAV) tools are critical components of the data science software ecosystem; the usability of these tools is becoming extremely important to facilitate next-generation scientific discoveries. JupyterLab has been considered as one of the best polyglot, web-based, open-source data science tools. As the next phase of extensible interface for the classic iPython Notebooks, this tool supports interactive data science and scientific computing across multiple programming languages with great performances. Despite these advantages, previous heuristics evaluation studies have shown that JupyterLab has some significant flaws in the data visualization side. The …
Detecting And Characterizing Self Hiding Behavior In Android Applications, Raina Samuel
Detecting And Characterizing Self Hiding Behavior In Android Applications, Raina Samuel
Theses
Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed up-front, which puts users at risk. This study focuses on characterization and detection of such techniques, e.g., hiding the app or removing traces, known as 'self hiding' (SH) behavior. SH behavior has not been studied per se - rather it has been reported on only as a byproduct of malware investigations. This gap is addressed via a study and suite of static analyses targeted at SH in Android apps. …
A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson
A Jython-Based Restful Web Service Api For Python Code Reflection, John A. Nielson
University of New Orleans Theses and Dissertations
Often times groups of domain experts, such as scientists and engineers, will develop their own software modules for specialized computational tasks. When these users determine there is a need to integrate the data and computations used in their specialized components with an enterprise data management system, interoperability between the enterprise system and the specialized components rather than re-implementation allows for faster implementation and more flexible change management by shifting the onus of changes to the scientific components to the subject matter experts rather than the enterprise information technology team. The Jython-based RESTful web service API was developed to leverage code …
A Home Security System Based On Smartphone Sensors, Michael Mahler
A Home Security System Based On Smartphone Sensors, Michael Mahler
Graduate Theses and Dissertations
Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured …
Ksugo, Chase Godwin
Ksugo, Chase Godwin
KSU Journey Honors College Capstones and Theses
KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.
Recommending Apis For Software Evolution, Ferdian Thung
Recommending Apis For Software Evolution, Ferdian Thung
Dissertations and Theses Collection (Open Access)
Softwares are constantly evolving. This evolution has been made easier through the use of Application Programming Interfaces (APIs). By leveraging APIs, developers reuse previously implemented functionalities and concentrate on writing new codes. These APIs may originate from either third parties or internally from other compo- nents of the software that are currently developed. In the first case, developers need to know how to find and use third party APIs. In the second case, developers need to be aware of internal APIs in their own software. In either case, there is often too much information to digest. For instance, finding the …
Cslc Tutoring Portal, Brian Hodges
Cslc Tutoring Portal, Brian Hodges
Theses/Capstones/Creative Projects
A web portal designed for the Computer Science Learning Center to track students requesting help
Budgeting In Student Life: An Educational Website, Heather Grunden
Budgeting In Student Life: An Educational Website, Heather Grunden
Honors Projects
An applied honors project in the form of a website prototype. The purpose of this website is to introduce college students to the concept of budgeting and to teach them the core steps of creating their own budget, since many existing budgeting applications are pay-to-use, and the free options tend to have little to no instruction.