Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (11)
- Singapore Management University (7)
- The University of Akron (4)
- Air Force Institute of Technology (3)
- Louisiana State University (3)
-
- Western University (3)
- Boise State University (2)
- Dakota State University (2)
- Marshall University (2)
- University of Kentucky (2)
- University of North Florida (2)
- West Virginia University (2)
- Bard College (1)
- Bridgewater State University (1)
- Bucknell University (1)
- Claremont Colleges (1)
- Embry-Riddle Aeronautical University (1)
- Florida Institute of Technology (1)
- Kennesaw State University (1)
- Missouri State University (1)
- Rollins College (1)
- San Jose State University (1)
- South Dakota State University (1)
- Southern Methodist University (1)
- The University of Southern Mississippi (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- University of Louisville (1)
- University of Montana (1)
- University of Nebraska at Omaha (1)
- Keyword
-
- Machine Learning (4)
- Computer Science (3)
- Computer science (3)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (2)
- Android (2)
-
- Blockchain (2)
- Digital Democracy (2)
- GPU (2)
- Machine learning (2)
- Mobile (2)
- Programming (2)
- Python (2)
- Software Engineering (2)
- Software development (2)
- Software testing (2)
- Thesis; University of North Florida; UNF; Dissertations (2)
- Web Development (2)
- Web application (2)
- <p>Application software -- Development.</p> <p>Mobile computing.</p> <p>Drone aircraft -- Control systems.</p> (1)
- <p>Machine learning -- Development.</p> <p>Machine learning -- Technological innovations.</p> <p>Artificial intelligence -- Computer programs.</p> (1)
- ACT-R (1)
- Academic -- UNF -- Computing; Web Analytics; Active Analytics; Google Analytics (1)
- Academic -- UNF -- Computing; code clone; clone detection; topic modeling; machine learning; software refactoring; software engineering; Latent Dirichlet Allocation -- Testing; Topic models -- Testing; Generative statistical models -- Testing; Code clone detection -- Statistical models; Code clone detection -- Software; CloneTM -- Testing (1)
- Academic papers (1)
- Accessible Web Design (1)
- Activism (1)
- Adaptive Gain Theory (1)
- Affect version (1)
- Analytics (1)
- Android appstore (1)
- Publication
-
- Dissertations and Theses Collection (Open Access) (7)
- Master's Theses (6)
- Theses and Dissertations (5)
- Computer Engineering (4)
- Williams Honors College, Honors Research Projects (4)
-
- Electronic Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Honors Theses (3)
- LSU Doctoral Dissertations (3)
- Boise State University Theses and Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Masters Theses & Doctoral Dissertations (2)
- Theses and Dissertations--Computer Science (2)
- Theses, Dissertations and Capstones (2)
- UNF Graduate Theses and Dissertations (2)
- CMC Senior Theses (1)
- Computer Science (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Computer Science and Software Engineering (1)
- Doctoral Dissertations and Master's Theses (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- Graduate Theses and Dissertations (1)
- MSU Graduate Theses (1)
- Master of Science in Computer Science Theses (1)
- Master's Projects (1)
- Master’s Theses and Projects (1)
- Senior Projects Spring 2019 (1)
- Senior Theses (1)
- Theses/Capstones/Creative Projects (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 30 of 65
Full-Text Articles in Physical Sciences and Mathematics
Automating Software Changes Via Recommendation Systems, Xiaoyu Liu
Automating Software Changes Via Recommendation Systems, Xiaoyu Liu
Computer Science and Engineering Theses and Dissertations
As the complexity of software systems is growing tremendously, it came with increasingly sophisticated data provided during development. The systematic and large-scale accumulation of software engineering data opened up new opportunities that infer information appropriately can be helpful to software development in a given context. This type of intelligent software development tools came to be known as recommendation systems.
Recommendation Systems in Software Change (RSSCs) share commonalities with conventional recommendation systems: mainly in their usage model, the usual reliance on data mining, and in the predictive nature of their functionality. So a major challenge for designing RSSCs is to automatically …
The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar
The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar
University of New Orleans Theses and Dissertations
This is a study of the impacts of the incorporation, into certain points of the Computer Science degree program at the University of New Orleans, of Course Management software with an Autograding component. The software in question, developed at Carnegie Mellon University, is called “Autolab.” We begin by dissecting Autolab in order to gain an understanding of its inner workings. We can then take out understanding of its functionality and apply that to an examination of fundamental changes to courses in the time since they incorporated the software. With that, we then compare Drop, Failure, Withdrawal rate data from before …
Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh
Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh
Dissertations and Theses Collection (Open Access)
Sensing systems for monitoring physiological and psychological states have been studied extensively in both academic and industry research for different applications across various domains. However, most of the studies have been done in the lab environment with controlled and complicated sensor setup, which is only suitable for serious healthcare applications in which the obtrusiveness and immobility can be compromised in a trade-off for accurate clinical screening or diagnosing. The recent substantial development of mobile devices with embedded miniaturized sensors are now allowing new opportunities to adapt and develop such sensing systems in the mobile context. The ability to sense physiological …
Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang
Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang
Graduate Theses and Dissertations
Security vulnerabilities in software pose an important threat to power grid security, which can be exploited by attackers if not properly addressed. Every month, many vulnerabilities are discovered and all the vulnerabilities must be remediated in a timely manner to reduce the chance of being exploited by attackers. In current practice, security operators have to manually analyze each vulnerability present in their assets and determine the remediation actions in a short time period, which involves a tremendous amount of human resources for electric utilities. To solve this problem, we propose a machine learning-based automation framework to automate vulnerability analysis and …
Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan
Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan
Dissertations and Theses Collection (Open Access)
The widespread availability of sensors on personal devices (e.g., smartphones, smartwatches) and other cheap, commoditized IoT devices in the environment has opened up the opportunity for developing applications that capture and enhance various lifestyle-driven daily activities of individuals. Moreover, there is a growing trend of leveraging ubiquitous computing technologies to improve physical health and wellbeing. Several of the lifestyle monitoring applications rely primarily on the capability of recognizing contextually relevant human movements, actions and gestures. As such, gesture recognition techniques, and gesture-based analytics have emerged as a fundamental component for realizing personalized lifestyle applications.
This thesis explores how such wealth …
Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran
Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran
Dissertations and Theses Collection (Open Access)
Wearable devices are gaining in popularity, but are presently used primarily for productivity-related functions (such as calling people or discreetly receiving notifications) or for physiological sensing. However, wearable devices are still not widely used for a wider set of sensing-based applications, even though their potential is enormous. Wearable devices can enable a variety of novel applications. For example, wrist-worn and/or finger-worn devices could be viable controllers for real-time AR/VR games and applications, and can be used for real-time gestural tracking to support rehabilitative patient therapy or training of sports personnel. There are, however, a key set of impediments towards realizing …
Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei
Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei
Master's Theses
Data from software repositories are a very useful asset to building dierent kinds of
models and recommender systems aimed to support software developers. Specically,
the identication of likely defect-prone les (i.e., classes in Object-Oriented systems)
helps in prioritizing, testing, and analysis activities. This work focuses on automated
methods for labeling a class in a version as defective or not. The most used methods
for automated class labeling belong to the SZZ family and fail in various circum-
stances. Thus, recent studies suggest the use of aect version (AV) as provided by
developers and available in the issue tracker such as …
A Programming Model For Internetworked Things, Hao Jiang
A Programming Model For Internetworked Things, Hao Jiang
Electronic Thesis and Dissertation Repository
The Internet of Things (IoT) emerges as a system paradigm that encompasses a wide spectrum of technologies and protocols related to Internetworking, services computing, and device connectivity. The main objective is to achieve an environment whereby physical devices and everyday objects can communicate and interact with each other over the Internet. The Internet of Things is heralded as the next generation Internet, and introduces significant opportunities for novel applications in many different domains. What is missing right now is a programming model whereby developers as well as end-users can specify any addressable resource at a higher level of abstraction, and …
Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh
Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh
Dissertations and Theses Collection (Open Access)
Over the past few years, deep learning has emerged as state-of-the-art solutions for many challenging computer vision tasks such as face recognition, object detection, etc. Despite of its outstanding performance, deep neural networks (DNNs) are computational intensive, which prevent them to be widely adopted on billions of mobile and embedded devices with scarce resources. To address that limitation, we
focus on building systems and optimization algorithms to accelerate those models, making them more computational-efficient.
First, this thesis explores the computational capabilities of different existing processors (or co-processors) on modern mobile devices. It recognizes that by leveraging the mobile Graphics Processing …
Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku
Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku
Master of Science in Computer Science Theses
Automatic histopathological Whole Slide Image (WSI) analysis for cancer classification has been highlighted along with the advancements in microscopic imaging techniques. However, manual examination and diagnosis with WSIs is time-consuming and tiresome. Recently, deep convolutional neural networks have succeeded in histopathological image analysis. In this paper, we propose a novel cancer texture-based deep neural network (CAT-Net) that learns scalable texture features from histopathological WSIs. The innovation of CAT-Net is twofold: (1) capturing invariant spatial patterns by dilated convolutional layers and (2) Reducing model complexity while improving performance. Moreover, CAT-Net can provide discriminative texture patterns formed on cancerous regions of histopathological …
Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento De Aguiar
Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento De Aguiar
Electronic Thesis and Dissertation Repository
Spatiotemporal forecasting can be described as predicting the future value of a variable given when and where it will happen. This type of forecasting task has the potential to aid many institutions and businesses in asking questions, such as how many people will visit a given hospital in the next hour. Answers to these questions have the potential to spur significant socioeconomic impact, providing privacy-friendly short-term forecasts about geolocated events, which in turn can help entities to plan and operate more efficiently. These seemingly simple questions, however, present complex challenges to forecasting systems. With more GPS-enabled devices connected every year, …
Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif
Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif
Doctoral Dissertations and Master's Theses
The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately …
A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das
A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das
MSU Graduate Theses
In recent times, a major share of human communication takes place online. The main reason being the ease of communication on social networking sites (SNSs). Due to the variety and large number of users, SNSs have drawn the attention of the computer science (CS) community, particularly the affective computing (also known as emotional AI), information retrieval, natural language processing, and data mining groups. Researchers are trying to make computers understand the nuances of human communication including sentiment and sarcasm. Emotion or sentiment detection requires more insights about the communication than it does for factual information retrieval. Sarcasm detection is particularly …
Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman
Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman
Boise State University Theses and Dissertations
Blockchain in recent years has exploded in popularity with Ethereum being one of the leading blockchain platforms. Solidity is a widely used scripting language for creating smart contracts in Ethereum applications. Quality assurance in Solidity contracts is of critical importance because bugs or vulnerabilities can lead to a considerable loss of financial assets. However, it is unclear what level of quality assurance is provided in many of these applications.
Mutation testing is the process of intentionally injecting faults into a target program and then running the provided test suite against the various injected faults. Mutation testing is used to evaluate …
Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris
Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris
Boise State University Theses and Dissertations
Probabilistic Symbolic Execution (PSE) extends Symbolic Execution (SE), a path-sensitive static program analysis technique, by calculating the probabilities with which program paths are executed. PSE relies on the ability of the underlying symbolic models to accurately represent the execution paths of the program as the collection of input values following these paths. While researchers established PSE for numerical data types, PSE for complex data types such as strings is a novel area of research.
For string data types SE tools commonly utilize finite state automata to represent a symbolic string model. Thus, PSE inherits from SE automata-based symbolic string models …
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Dissertations and Theses Collection (Open Access)
Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …
Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya
Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya
Dissertations and Theses Collection (Open Access)
The rapid advances of the Web have changed the ways information is distributed and exchanged among individuals and organizations. Various content from different domains are generated daily and contributed by users' daily activities, such as posting messages in a microblog platform, or collaborating in a question and answer site. To deal with such tremendous volume of user generated content, there is a need for approaches that are able to handle the mass amount of available data and to extract knowledge hidden in the user generated content. This dissertation attempts to make sense of the generated content to help in three …
Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria
Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria
Dissertations and Theses Collection (Open Access)
The rising mental health illnesses of severe stress and depression is of increasing concern worldwide. Often associated by similarities in symptoms, severe stress can take a toll on a person’s productivity and result in depression if the stress is left unmanaged. Unfortunately, depression can occur without any feelings of stress. With depression growing as a leading cause of disability in economic productivity, there has been a sharp rise in mental health initiatives to improve stress and depression management. To offer such services conveniently and discreetly, recent efforts have focused on using mobile technologies. However, these initiatives usually require users to …
High-Performance Computing Frameworks For Large-Scale Genome Assembly, Sayan Goswami
High-Performance Computing Frameworks For Large-Scale Genome Assembly, Sayan Goswami
LSU Doctoral Dissertations
Genome sequencing technology has witnessed tremendous progress in terms of throughput and cost per base pair, resulting in an explosion in the size of data. Typical de Bruijn graph-based assembly tools demand a lot of processing power and memory and cannot assemble big datasets unless running on a scaled-up server with terabytes of RAMs or scaled-out cluster with several dozens of nodes. In the first part of this work, we present a distributed next-generation sequence (NGS) assembler called Lazer, that achieves both scalability and memory efficiency by using partitioned de Bruijn graphs. By enhancing the memory-to-disk swapping and reducing the …
Reach - A Community Service Application, Samuel Noel Magana
Reach - A Community Service Application, Samuel Noel Magana
Computer Engineering
Communities are familiar threads that unite people through several shared attributes and interests. These commonalities are the core elements that link and bond us together. Many of us are part of multiple communities, moving in and out of them depending on our needs. These common threads allow us to support and advocate for each other when facing a common threat or difficult situation. Healthy and vibrant communities are fundamental to the operation of our society. These interactions within our communities define the way we as individuals interact with each other, and society at large. Being part of a community helps …
Robot Reporter Website Development, Samuel Verkruyse
Robot Reporter Website Development, Samuel Verkruyse
Computer Engineering
The Robot Reporter Website Development project created a front end interface for interacting with news stories generated by the Robot Reporter script that was originally developed for the Digital Democracy institute at Cal Poly. Various graphs, videos, and other interesting content is displayed to the user in order to create an automated news website focusing on activity in state legislatures.
Keylime, Eli William Partker
Keylime, Eli William Partker
Computer Engineering
Josh, Matt and I knew we wanted to develop a mobile app for our senior project because that is what we found ourselves to be most passionate about during our time here at Cal Poly. We started to think of problems we wanted to solve using an application and we came up with a couple ideas but chose to expand on one. Students come to Cal Poly every year new to the area and the food options San Luis Obispo provides. Many of the restaurants in SLO offer a variety of deals to the community and most of them to …
Accessible And Responsive Website Design For Cal Poly Dbs Marine Education Program, Charles W. Alexander
Accessible And Responsive Website Design For Cal Poly Dbs Marine Education Program, Charles W. Alexander
Computer Engineering
In this project, I demonstrate how accessible and responsive designs are followed in order to implement a modern, multi-page website which both adapts to the size of the screen as well as has the logical, semantic structure needed for accessible technologies to accurately use the site. This website is designed for a marine education program, Dive Beneath the Surface, which hosts live streams of scientific divers as they interact in real time with students many miles away. Although this site will not be the streaming platform, it needs to host a repository of videos and lessons for those students and …
Radish: A Cross Platform Meal Prepping App For Beginner Weightlifters, Spoorthy S. Vemula, Tanay Gottigundala, Cory Baxes
Radish: A Cross Platform Meal Prepping App For Beginner Weightlifters, Spoorthy S. Vemula, Tanay Gottigundala, Cory Baxes
Computer Science and Software Engineering
With the increasing ease of access and decreasing price of most food, obesity rates in the developing world have risen dramatically in recent years. As of March 23rd, 2019, obesity rates had reached 39.6%, a 6% increase in just 8 years. Research has shown that people with obesity have a significantly increased risk of heart disease, stroke, type 2 diabetes, and certain cancers, among other life-threatening diseases. In addition, 42% of people who begin weightlifting quit because it’s too difficult to follow a diet or workout regimen.
We created Radish in an attempt to tackle these problems. Radish makes it …
Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia
Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia
Master's Theses
Defect prediction aims at identifying software artifacts that are likely to exhibit a defect. The main purpose of defect prediction is to reduce the cost of testing and code review, by letting developers focus on specific artifacts. Several researchers have worked on improving the accuracy of defect estimation models using techniques such as tuning, re-balancing, or feature selection. Ultimately, the reliability of a prediction model depends on the quality of the dataset. Therefore effort has been spent in identifying sources of noise in the datasets, and how to deal with them, including defect misclassification and defect origin. A key component …
A Webrtc Video Chat Implementation Within The Yioop Search Engine, Yangcha Ho
A Webrtc Video Chat Implementation Within The Yioop Search Engine, Yangcha Ho
Master's Projects
Web real-time communication (abbreviated as WebRTC) is one of the latest Web application technologies that allows voice, video, and data to work collectively in a browser without a need for third-party plugins or proprietary software installation. When two browsers from different locations communicate with each other, they must know how to locate each other,
bypass security and firewall protections, and transmit all multimedia communications in real time. This project not only illustrates how WebRTC technology works but also walks through a real example of video chat-style application. The application communicates between two remote users using WebSocket and the data encryption …
Mobile Music Development Tools For Creative Coders, Daniel Stuart Holmes
Mobile Music Development Tools For Creative Coders, Daniel Stuart Holmes
LSU Doctoral Dissertations
This project is a body of work that facilitates the creation of musical mobile artworks. The project includes a code toolkit that enhances and simplifies the development of mobile music iOS applications, a flexible notation system designed for mobile musical interactions, and example apps and scored compositions to demonstrate the toolkit and notation system.
The code library is designed to simplify the technical aspect of user-centered design and development with a more direct connection between concept and deliverable. This sim- plification addresses learning problems (such as motivation, self-efficacy, and self-perceived understanding) by bridging the gap between idea and functional prototype …
Grant Anon Minigames Extension, Justin Robbins
Grant Anon Minigames Extension, Justin Robbins
Theses/Capstones/Creative Projects
The Grant Anon system was designed to be a casualized version of the real-time strategy genre, a genre usually known for its difficulty and competitiveness because of Starcraft II, the most popular game in the genre. Grant Anon was designed as part of a capstone project, and this report details the extension that was created to add an additional element designed to make it easier for any player to enjoy Grant Anon: minigames. These minigames serve to reduce the skill needed to participate effectively in Grant Anon. This is accomplished by providing an alternative means of gaining an advantage over …
Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh
Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh
Theses and Dissertations
Design of a network is a challenging problem as it involves the integration of several complex components such as routers, servers, computers, smart devices. This is further complicated by the need to have robust security policies implemented to prevent violation of confidentiality as the networked devices interact. The design of such complex networked systems demand a more rigorous approach to the modeling and analysis, which can be inherited from the field of Software engineering. Presently, network or security engineers do not use a system/software engineering approach to design and build cybersecurity systems. Thus, we propose a system/software engineering approach to …