Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Theses/Dissertations

2019

Institution
Keyword
Publication

Articles 1 - 30 of 65

Full-Text Articles in Physical Sciences and Mathematics

Automating Software Changes Via Recommendation Systems, Xiaoyu Liu Dec 2019

Automating Software Changes Via Recommendation Systems, Xiaoyu Liu

Computer Science and Engineering Theses and Dissertations

As the complexity of software systems is growing tremendously, it came with increasingly sophisticated data provided during development. The systematic and large-scale accumulation of software engineering data opened up new opportunities that infer information appropriately can be helpful to software development in a given context. This type of intelligent software development tools came to be known as recommendation systems.

Recommendation Systems in Software Change (RSSCs) share commonalities with conventional recommendation systems: mainly in their usage model, the usual reliance on data mining, and in the predictive nature of their functionality. So a major challenge for designing RSSCs is to automatically …


The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar Dec 2019

The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar

University of New Orleans Theses and Dissertations

This is a study of the impacts of the incorporation, into certain points of the Computer Science degree program at the University of New Orleans, of Course Management software with an Autograding component. The software in question, developed at Carnegie Mellon University, is called “Autolab.” We begin by dissecting Autolab in order to gain an understanding of its inner workings. We can then take out understanding of its functionality and apply that to an examination of fundamental changes to courses in the time since they incorporated the software. With that, we then compare Drop, Failure, Withdrawal rate data from before …


Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh Dec 2019

Multimodal Mobile Sensing Systems For Physiological And Psychological Assessment, Nguyen Phan Sinh Huynh

Dissertations and Theses Collection (Open Access)

Sensing systems for monitoring physiological and psychological states have been studied extensively in both academic and industry research for different applications across various domains. However, most of the studies have been done in the lab environment with controlled and complicated sensor setup, which is only suitable for serious healthcare applications in which the obtrusiveness and immobility can be compromised in a trade-off for accurate clinical screening or diagnosing. The recent substantial development of mobile devices with embedded miniaturized sensors are now allowing new opportunities to adapt and develop such sensing systems in the mobile context. The ability to sense physiological …


Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang Dec 2019

Countering Cybersecurity Vulnerabilities In The Power System, Fengli Zhang

Graduate Theses and Dissertations

Security vulnerabilities in software pose an important threat to power grid security, which can be exploited by attackers if not properly addressed. Every month, many vulnerabilities are discovered and all the vulnerabilities must be remediated in a timely manner to reduce the chance of being exploited by attackers. In current practice, security operators have to manually analyze each vulnerability present in their assets and determine the remediation actions in a short time period, which involves a tremendous amount of human resources for electric utilities. To solve this problem, we propose a machine learning-based automation framework to automate vulnerability analysis and …


Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan Dec 2019

Gesture-Based Profiling Of Commonplace Lifestyle And Physical Activity Behaviors, Meeralakshmi Radhakrishnan

Dissertations and Theses Collection (Open Access)

The widespread availability of sensors on personal devices (e.g., smartphones, smartwatches) and other cheap, commoditized IoT devices in the environment has opened up the opportunity for developing applications that capture and enhance various lifestyle-driven daily activities of individuals. Moreover, there is a growing trend of leveraging ubiquitous computing technologies to improve physical health and wellbeing. Several of the lifestyle monitoring applications rely primarily on the capability of recognizing contextually relevant human movements, actions and gestures. As such, gesture recognition techniques, and gesture-based analytics have emerged as a fundamental component for realizing personalized lifestyle applications.

This thesis explores how such wealth …


Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran Dec 2019

Enhanced Gesture Sensing Using Battery-Less Wearable Motion Trackers, Huy Vu Tran

Dissertations and Theses Collection (Open Access)

Wearable devices are gaining in popularity, but are presently used primarily for productivity-related functions (such as calling people or discreetly receiving notifications) or for physiological sensing. However, wearable devices are still not widely used for a wider set of sensing-based applications, even though their potential is enormous. Wearable devices can enable a variety of novel applications. For example, wrist-worn and/or finger-worn devices could be viable controllers for real-time AR/VR games and applications, and can be used for real-time gestural tracking to support rehabilitative patient therapy or training of sports personnel. There are, however, a key set of impediments towards realizing …


Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei Dec 2019

Leveraging Defects Life-Cycle For Labeling Defective Classes, Bailey R. Vandehei

Master's Theses

Data from software repositories are a very useful asset to building dierent kinds of

models and recommender systems aimed to support software developers. Specically,

the identication of likely defect-prone les (i.e., classes in Object-Oriented systems)

helps in prioritizing, testing, and analysis activities. This work focuses on automated

methods for labeling a class in a version as defective or not. The most used methods

for automated class labeling belong to the SZZ family and fail in various circum-

stances. Thus, recent studies suggest the use of aect version (AV) as provided by

developers and available in the issue tracker such as …


A Programming Model For Internetworked Things, Hao Jiang Sep 2019

A Programming Model For Internetworked Things, Hao Jiang

Electronic Thesis and Dissertation Repository

The Internet of Things (IoT) emerges as a system paradigm that encompasses a wide spectrum of technologies and protocols related to Internetworking, services computing, and device connectivity. The main objective is to achieve an environment whereby physical devices and everyday objects can communicate and interact with each other over the Internet. The Internet of Things is heralded as the next generation Internet, and introduces significant opportunities for novel applications in many different domains. What is missing right now is a programming model whereby developers as well as end-users can specify any addressable resource at a higher level of abstraction, and …


Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh Sep 2019

Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh

Dissertations and Theses Collection (Open Access)

Over the past few years, deep learning has emerged as state-of-the-art solutions for many challenging computer vision tasks such as face recognition, object detection, etc. Despite of its outstanding performance, deep neural networks (DNNs) are computational intensive, which prevent them to be widely adopted on billions of mobile and embedded devices with scarce resources. To address that limitation, we
focus on building systems and optimization algorithms to accelerate those models, making them more computational-efficient.
First, this thesis explores the computational capabilities of different existing processors (or co-processors) on modern mobile devices. It recognizes that by leveraging the mobile Graphics Processing …


Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku Aug 2019

Texture-Based Deep Neural Network For Histopathology Cancer Whole Slide Image (Wsi) Classification, Nelson Zange Tsaku

Master of Science in Computer Science Theses

Automatic histopathological Whole Slide Image (WSI) analysis for cancer classification has been highlighted along with the advancements in microscopic imaging techniques. However, manual examination and diagnosis with WSIs is time-consuming and tiresome. Recently, deep convolutional neural networks have succeeded in histopathological image analysis. In this paper, we propose a novel cancer texture-based deep neural network (CAT-Net) that learns scalable texture features from histopathological WSIs. The innovation of CAT-Net is twofold: (1) capturing invariant spatial patterns by dilated convolutional layers and (2) Reducing model complexity while improving performance. Moreover, CAT-Net can provide discriminative texture patterns formed on cancerous regions of histopathological …


Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento De Aguiar Aug 2019

Spatiotemporal Forecasting At Scale, Rafael Felipe Nascimento De Aguiar

Electronic Thesis and Dissertation Repository

Spatiotemporal forecasting can be described as predicting the future value of a variable given when and where it will happen. This type of forecasting task has the potential to aid many institutions and businesses in asking questions, such as how many people will visit a given hospital in the next hour. Answers to these questions have the potential to spur significant socioeconomic impact, providing privacy-friendly short-term forecasts about geolocated events, which in turn can help entities to plan and operate more efficiently. These seemingly simple questions, however, present complex challenges to forecasting systems. With more GPS-enabled devices connected every year, …


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif Aug 2019

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Doctoral Dissertations and Master's Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately …


A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das Aug 2019

A Multimodal Approach To Sarcasm Detection On Social Media, Dipto Das

MSU Graduate Theses

In recent times, a major share of human communication takes place online. The main reason being the ease of communication on social networking sites (SNSs). Due to the variety and large number of users, SNSs have drawn the attention of the computer science (CS) community, particularly the affective computing (also known as emotional AI), information retrieval, natural language processing, and data mining groups. Researchers are trying to make computers understand the nuances of human communication including sentiment and sarcasm. Emotion or sentiment detection requires more insights about the communication than it does for factual information retrieval. Sarcasm detection is particularly …


Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman Aug 2019

Deviant: A Mutation Testing Tool For Solidity Smart Contracts, Patrick Chapman

Boise State University Theses and Dissertations

Blockchain in recent years has exploded in popularity with Ethereum being one of the leading blockchain platforms. Solidity is a widely used scripting language for creating smart contracts in Ethereum applications. Quality assurance in Solidity contracts is of critical importance because bugs or vulnerabilities can lead to a considerable loss of financial assets. However, it is unclear what level of quality assurance is provided in many of these applications.

Mutation testing is the process of intentionally injecting faults into a target program and then running the provided test suite against the various injected faults. Mutation testing is used to evaluate …


Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris Aug 2019

Suitability Of Finite State Automata To Model String Constraints In Probablistic Symbolic Execution, Andrew Harris

Boise State University Theses and Dissertations

Probabilistic Symbolic Execution (PSE) extends Symbolic Execution (SE), a path-sensitive static program analysis technique, by calculating the probabilities with which program paths are executed. PSE relies on the ability of the underlying symbolic models to accurately represent the execution paths of the program as the collection of input values following these paths. While researchers established PSE for numerical data types, PSE for complex data types such as strings is a novel area of research.

For string data types SE tools commonly utilize finite state automata to represent a symbolic string model. Thus, PSE inherits from SE automata-based symbolic string models …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang Jul 2019

Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang

Dissertations and Theses Collection (Open Access)

Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …


Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya Jul 2019

Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya

Dissertations and Theses Collection (Open Access)

The rapid advances of the Web have changed the ways information is distributed and exchanged among individuals and organizations. Various content from different domains are generated daily and contributed by users' daily activities, such as posting messages in a microblog platform, or collaborating in a question and answer site. To deal with such tremendous volume of user generated content, there is a need for approaches that are able to handle the mass amount of available data and to extract knowledge hidden in the user generated content. This dissertation attempts to make sense of the generated content to help in three …


Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria Jul 2019

Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria

Dissertations and Theses Collection (Open Access)

The rising mental health illnesses of severe stress and depression is of increasing concern worldwide. Often associated by similarities in symptoms, severe stress can take a toll on a person’s productivity and result in depression if the stress is left unmanaged. Unfortunately, depression can occur without any feelings of stress. With depression growing as a leading cause of disability in economic productivity, there has been a sharp rise in mental health initiatives to improve stress and depression management. To offer such services conveniently and discreetly, recent efforts have focused on using mobile technologies. However, these initiatives usually require users to …


High-Performance Computing Frameworks For Large-Scale Genome Assembly, Sayan Goswami Jun 2019

High-Performance Computing Frameworks For Large-Scale Genome Assembly, Sayan Goswami

LSU Doctoral Dissertations

Genome sequencing technology has witnessed tremendous progress in terms of throughput and cost per base pair, resulting in an explosion in the size of data. Typical de Bruijn graph-based assembly tools demand a lot of processing power and memory and cannot assemble big datasets unless running on a scaled-up server with terabytes of RAMs or scaled-out cluster with several dozens of nodes. In the first part of this work, we present a distributed next-generation sequence (NGS) assembler called Lazer, that achieves both scalability and memory efficiency by using partitioned de Bruijn graphs. By enhancing the memory-to-disk swapping and reducing the …


Reach - A Community Service Application, Samuel Noel Magana Jun 2019

Reach - A Community Service Application, Samuel Noel Magana

Computer Engineering

Communities are familiar threads that unite people through several shared attributes and interests. These commonalities are the core elements that link and bond us together. Many of us are part of multiple communities, moving in and out of them depending on our needs. These common threads allow us to support and advocate for each other when facing a common threat or difficult situation. Healthy and vibrant communities are fundamental to the operation of our society. These interactions within our communities define the way we as individuals interact with each other, and society at large. Being part of a community helps …


Robot Reporter Website Development, Samuel Verkruyse Jun 2019

Robot Reporter Website Development, Samuel Verkruyse

Computer Engineering

The Robot Reporter Website Development project created a front end interface for interacting with news stories generated by the Robot Reporter script that was originally developed for the Digital Democracy institute at Cal Poly. Various graphs, videos, and other interesting content is displayed to the user in order to create an automated news website focusing on activity in state legislatures.


Keylime, Eli William Partker Jun 2019

Keylime, Eli William Partker

Computer Engineering

Josh, Matt and I knew we wanted to develop a mobile app for our senior project because that is what we found ourselves to be most passionate about during our time here at Cal Poly. We started to think of problems we wanted to solve using an application and we came up with a couple ideas but chose to expand on one. Students come to Cal Poly every year new to the area and the food options San Luis Obispo provides. Many of the restaurants in SLO offer a variety of deals to the community and most of them to …


Accessible And Responsive Website Design For Cal Poly Dbs Marine Education Program, Charles W. Alexander Jun 2019

Accessible And Responsive Website Design For Cal Poly Dbs Marine Education Program, Charles W. Alexander

Computer Engineering

In this project, I demonstrate how accessible and responsive designs are followed in order to implement a modern, multi-page website which both adapts to the size of the screen as well as has the logical, semantic structure needed for accessible technologies to accurately use the site. This website is designed for a marine education program, Dive Beneath the Surface, which hosts live streams of scientific divers as they interact in real time with students many miles away. Although this site will not be the streaming platform, it needs to host a repository of videos and lessons for those students and …


Radish: A Cross Platform Meal Prepping App For Beginner Weightlifters, Spoorthy S. Vemula, Tanay Gottigundala, Cory Baxes Jun 2019

Radish: A Cross Platform Meal Prepping App For Beginner Weightlifters, Spoorthy S. Vemula, Tanay Gottigundala, Cory Baxes

Computer Science and Software Engineering

With the increasing ease of access and decreasing price of most food, obesity rates in the developing world have risen dramatically in recent years. As of March 23rd, 2019, obesity rates had reached 39.6%, a 6% increase in just 8 years. Research has shown that people with obesity have a significantly increased risk of heart disease, stroke, type 2 diabetes, and certain cancers, among other life-threatening diseases. In addition, 42% of people who begin weightlifting quit because it’s too difficult to follow a diet or workout regimen.

We created Radish in an attempt to tackle these problems. Radish makes it …


Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia Jun 2019

Snoring: A Noise Defect Prediction Datasets, Aalok Ahluwalia

Master's Theses

Defect prediction aims at identifying software artifacts that are likely to exhibit a defect. The main purpose of defect prediction is to reduce the cost of testing and code review, by letting developers focus on specific artifacts. Several researchers have worked on improving the accuracy of defect estimation models using techniques such as tuning, re-balancing, or feature selection. Ultimately, the reliability of a prediction model depends on the quality of the dataset. Therefore effort has been spent in identifying sources of noise in the datasets, and how to deal with them, including defect misclassification and defect origin. A key component …


A Webrtc Video Chat Implementation Within The Yioop Search Engine, Yangcha Ho May 2019

A Webrtc Video Chat Implementation Within The Yioop Search Engine, Yangcha Ho

Master's Projects

Web real-time communication (abbreviated as WebRTC) is one of the latest Web application technologies that allows voice, video, and data to work collectively in a browser without a need for third-party plugins or proprietary software installation. When two browsers from different locations communicate with each other, they must know how to locate each other,

bypass security and firewall protections, and transmit all multimedia communications in real time. This project not only illustrates how WebRTC technology works but also walks through a real example of video chat-style application. The application communicates between two remote users using WebSocket and the data encryption …


Mobile Music Development Tools For Creative Coders, Daniel Stuart Holmes May 2019

Mobile Music Development Tools For Creative Coders, Daniel Stuart Holmes

LSU Doctoral Dissertations

This project is a body of work that facilitates the creation of musical mobile artworks. The project includes a code toolkit that enhances and simplifies the development of mobile music iOS applications, a flexible notation system designed for mobile musical interactions, and example apps and scored compositions to demonstrate the toolkit and notation system.

The code library is designed to simplify the technical aspect of user-centered design and development with a more direct connection between concept and deliverable. This sim- plification addresses learning problems (such as motivation, self-efficacy, and self-perceived understanding) by bridging the gap between idea and functional prototype …


Grant Anon Minigames Extension, Justin Robbins May 2019

Grant Anon Minigames Extension, Justin Robbins

Theses/Capstones/Creative Projects

The Grant Anon system was designed to be a casualized version of the real-time strategy genre, a genre usually known for its difficulty and competitiveness because of Starcraft II, the most popular game in the genre. Grant Anon was designed as part of a capstone project, and this report details the extension that was created to add an additional element designed to make it easier for any player to enjoy Grant Anon: minigames. These minigames serve to reduce the skill needed to participate effectively in Grant Anon. This is accomplished by providing an alternative means of gaining an advantage over …


Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh May 2019

Assume-Guarantee Reasoning Using A Cyber Security Ontology, Ali Abdurhman Alfageeh

Theses and Dissertations

Design of a network is a challenging problem as it involves the integration of several complex components such as routers, servers, computers, smart devices. This is further complicated by the need to have robust security policies implemented to prevent violation of confidentiality as the networked devices interact. The design of such complex networked systems demand a more rigorous approach to the modeling and analysis, which can be inherited from the field of Software engineering. Presently, network or security engineers do not use a system/software engineering approach to design and build cybersecurity systems. Thus, we propose a system/software engineering approach to …