Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Analysis Of Github Pull Requests, Canon Ellis
Analysis Of Github Pull Requests, Canon Ellis
Computer Science and Engineering Theses and Dissertations
The popularity of the software repository site GitHub has created a rise in the Pull Based Development Models' use. An essential portion of pull-based development is the creation of Pull Requests. Pull Requests often have to be reviewed by an individual to be approved and accepted into the Master branch of a software repository. The reviewing process can often be time-consuming and introduce a relatively high level of lost development time. This paper examines thousands of pull requests to understand the most valuable metadata of pull requests. We then introduce metrics in comparing the metadata of pull requests to understand …
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Analyzing Performance, Energy Consumption, And Reliability Of Mobile Applications, Osama Barack
Computer Science and Engineering Theses and Dissertations
Mobile applications have become a high priority for software developers. Researchers and practitioners are working toward improving and optimizing the energy efficiency and performance of mobile applications due to the capacity limitation of mobile device processors and batteries. In addition, mobile applications have become popular among end-users, developers have introduced a wide range of features that increase the complexity of application code.
To improve and enhance the maintainability, extensibility, and understandability of application code, refactoring techniques were introduced. However, implementing such techniques to mobile applications affects energy efficiency and performance. To evaluate and categorize software implementation and optimization efficiency, several …
The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne
The Prom Problem: Fair And Privacy-Enhanced Matchmaking With Identity Linked Wishes, Dwight Horne
Computer Science and Engineering Theses and Dissertations
In the Prom Problem (TPP), Alice wishes to attend a school dance with Bob and needs a risk-free, privacy preserving way to find out whether Bob shares that same wish. If not, no one should know that she inquired about it, not even Bob. TPP represents a special class of matchmaking challenges, augmenting the properties of privacy-enhanced matchmaking, further requiring fairness and support for identity linked wishes (ILW) – wishes involving specific identities that are only valid if all involved parties have those same wishes.
The Horne-Nair (HN) protocol was proposed as a solution to TPP along with a …
Incorporating Digital Ethics Throughout The Software Development Process, Michael Collins, Damian Gordon, Anna Becevel, William O'Mahony
Incorporating Digital Ethics Throughout The Software Development Process, Michael Collins, Damian Gordon, Anna Becevel, William O'Mahony
Conference papers
The media is reporting scandals associated with computer companies with increasing regularity; whether it is the misuse of user data, breach of privacy concerns, the use of biased artificial intelligence, or the problems of automated vehicles. Because of these complex issues, there is a growing need to equip computer science students with a deep appreciation of ethics, and to ensure that in the future they will develop computer systems that are ethically-based. One particularly useful strand of their education to incorporate ethics into is when teaching them about the formal approaches to developing computer systems.
There are a number of …
Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter
Computer Vision Gesture Recognition For Rock Paper Scissors, Nicholas Hunter
Senior Independent Study Theses
This project implements a human versus computer game of rock-paper-scissors using machine learning and computer vision. Player’s hand gestures are detected using single images with the YOLOv3 object detection system. This provides a generalized detection method which can recognize player moves without the need for a special background or lighting setup. Additionally, past moves are examined in context to predict the most probable next move of the system’s opponent. In this way, the system achieves higher win rates against human opponents than by using a purely random strategy.
Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal
Managing Inventory: A Study Of Databases And Database Management Systems, Jemal M. Jemal
Senior Independent Study Theses
Databases play an important role in the storage and manipulation of data. Databases and database management systems allow for fast and efficient data querying that has recently become increasingly important in most companies and organizations. This paper introduces a few of the different types of database management systems that are in widespread use today. It introduces some important terminology related to databases and database management systems. This paper also briefly discusses web user interfaces, highlighting important user interface design principles. Finally, an inventory management system is implemented for a local stationery store and is integrated with a web application to …
Certification-Driven Testing Of Safety-Critical Systems, Aiman S. Gannous
Certification-Driven Testing Of Safety-Critical Systems, Aiman S. Gannous
Electronic Theses and Dissertations
Safety-critical systems are those systems that when they fail they could cause loss of life or significant physical damages. Since software now is an essential component of these types of systems, failures caused by software faults could come from flaws in the software development life-cycle. As a result, challenges unfold in two directions. First, in verifying that the software will not put the system in an unsafe state, and identifying external failures and mitigate them properly. Second, in providing sufficient evidence for an efficient safety certification process. In this study, we propose an approach for testing safety-critical systems called Model-Combinatorial …
Renewable Energy Integration In Distribution System With Artificial Intelligence, Yi Gu
Renewable Energy Integration In Distribution System With Artificial Intelligence, Yi Gu
Electronic Theses and Dissertations
With the increasing attention of renewable energy development in distribution power system, artificial intelligence (AI) can play an indispensiable role. In this thesis, a series of artificial intelligence based methods are studied and implemented to further enhance the performance of power system operation and control.
Due to the large volume of heterogeneous data provided by both the customer and the grid side, a big data visualization platform is built to feature out the hidden useful knowledge for smart grid (SG) operation, control and situation awareness. An open source cluster calculation framework with Apache Spark is used to discover big data …