Current Search: Computer software -- Development (x)
View All Items
Pages
- Title
- Software metrics collection: Two new research tools.
- Creator
- Jordan, Sylviane G., Florida Atlantic University, Khoshgoftaar, Taghi M.
- Abstract/Description
-
Collecting software metrics manually could be a tedious, inaccurate, and subjective task. Two new tools were developed to automate this process in a rapid, accurate, and objective way. The first tool, the Metrics Analyzer, evaluates 19 metrics at the function level, from complete or partial systems written in C. The second tool, the Call Graph Generator, does not assess a metric directly, but generates a call graph based on a complete or partial system written in C. The call graph is used as...
Show moreCollecting software metrics manually could be a tedious, inaccurate, and subjective task. Two new tools were developed to automate this process in a rapid, accurate, and objective way. The first tool, the Metrics Analyzer, evaluates 19 metrics at the function level, from complete or partial systems written in C. The second tool, the Call Graph Generator, does not assess a metric directly, but generates a call graph based on a complete or partial system written in C. The call graph is used as an input to another tool (not considered here) that measures the coupling of a module, such as a function or a file. A case study analyzed the relationships among the metrics, including the coupling metric, using principal component analysis, which transformed the 19 metrics into eight principal components.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15483
- Subject Headings
- Software measurement, Computer software--Development, Computer software--Evaluation
- Format
- Document (PDF)
- Title
- A Decision Support System for Sprint Planning in Scrum Practice.
- Creator
- Alhazmi, Alhejab Shawqi, Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Scrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration...
Show moreScrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration developer competency, developer seniority and task dependency. The results are that the assignments of the tasks of each Sprint to developers guarantee that each team member contributes to their fullest potential, and project planning is optimized for the shortest possible time. Keywords—Scrum, Sprint planning, planning poker, competence, task dependence, Hungarian algorithm, Essence.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00005970
- Subject Headings
- Scrum (Computer software development), Project management, Agile software development
- Format
- Document (PDF)
- Title
- An empirical study of source code complexity and source code modifications during testing and maintenance.
- Creator
- De Gramont, Anne H., Florida Atlantic University, Khoshgoftaar, Taghi M.
- Abstract/Description
-
Since maintenance is the most expensive phase of the software life cycle, detecting most of the errors as early as possible in the software development effort can provide substantial savings. This study investigates the behavior of complexity metrics during testing and maintenance, and their relationship to modifications made to the software. Interface complexity causes most of the change activities during integration testing and maintenance, while size causes most of the changes during unit...
Show moreSince maintenance is the most expensive phase of the software life cycle, detecting most of the errors as early as possible in the software development effort can provide substantial savings. This study investigates the behavior of complexity metrics during testing and maintenance, and their relationship to modifications made to the software. Interface complexity causes most of the change activities during integration testing and maintenance, while size causes most of the changes during unit testing. Principal component analysis groups 16 complexity metrics into four domains. Changes in domain pattern are observed throughout the software life cycle. Using those domains as input, regression analysis shows that software complexity measures collected as early as the unit testing phase can identify and predict change prone modules. With a low rate of misclassification, discriminant analysis further confirms that complexity metrics provide a strong indication of the changes made to a module during testing and maintenance.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15089
- Subject Headings
- Computer software--Development, Software maintenance, Source code (Computer science)
- Format
- Document (PDF)
- Title
- INTEGRATING DESIGN THINKING MODEL AND ITEMS PRIORITIZATION DECISION SUPPORT SYSTEMS INTO REQUIREMENTS MANAGEMENT IN SCRUM.
- Creator
- Alhazmi, Alhejab Shawqi, Huang, Shihong, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The Agile methodologies have attracted the software development industry's attention due to their capability to overcome the limitations of the traditional software development approaches and to cope with increasing complexity in system development. Scrum is one of the Agile software development processes broadly adopted by industry. Scrum promotes frequent customer involvement and incremental short releases. Despite its popular use, Scrum’s requirements engineering stage is inadequately...
Show moreThe Agile methodologies have attracted the software development industry's attention due to their capability to overcome the limitations of the traditional software development approaches and to cope with increasing complexity in system development. Scrum is one of the Agile software development processes broadly adopted by industry. Scrum promotes frequent customer involvement and incremental short releases. Despite its popular use, Scrum’s requirements engineering stage is inadequately defined which can lead to increase development time and cost, along with low quality or failure for the end products. This research shows the importance of activity planning of requirements engineering in improving the product quality, cost, and scheduling as well as it points out some drawbacks of Agile practices and available solutions. To improve the Scrum requirements engineering by overcoming its challenges in cases, such as providing a comprehensive understanding of the customer’s needs and addressing the effects of the challenges in other cases, such as frequent changes of requirements, the Design Thinking model is integrated into the Scrum framework in the context of requirements engineering management. The use of the Design Thinking model, in the context of requirements engineering management, is validated through an in-depth scientific study of the IBM Design Thinking framework. In addition, this research presents an Items Prioritization dEcision Support System (IPESS) which is a tool to assist the Product Owners for requirements prioritization. IPESS is built on information collected in the Design Thinking model. The IPESS tool adopts Analytic Hierarchy Process (AHP) technique and PageRank algorithm to deal with the specified factors and to achieve the optimal order for requirements items based on the prioritization score. IPESS is a flexible and comprehensive tool that focuses on different important aspects including customer satisfaction and product quality. The IPESS tool is validated through an experiment that was conducted in a real-world project
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013699
- Subject Headings
- Scrum (Computer software development), Computer software--Development--Management, Software engineering
- Format
- Document (PDF)
- Title
- Software development behavior in small organizations.
- Creator
- Chaudhry, Muhammed Zubair., Florida Atlantic University, Levow, Roy B., Coulter, Neal S.
- Abstract/Description
-
As the software industry continues to mature, best practices have been defined to improve the quality and productivity of software development. Adoption rates of these practices are better understood for large organizations as compared to small standalone organizations. Based on surveys and interviews, this study analyzes the utilization of software development best practices by small software organizations, and the factors that influence different levels of adoption. The results demonstrate...
Show moreAs the software industry continues to mature, best practices have been defined to improve the quality and productivity of software development. Adoption rates of these practices are better understood for large organizations as compared to small standalone organizations. Based on surveys and interviews, this study analyzes the utilization of software development best practices by small software organizations, and the factors that influence different levels of adoption. The results demonstrate that context is the main determinant of adoption, driven by competitive pressures, organizational incentives, and prior exposure to best practices. Consulting firms were influenced by their contractual relationship with the client, which led to more focus on deliverables. Traditional product companies emphasized code management practices, though their focus on domain expertise detracted from software development best practices. Finally, startups were characterized by experienced senior managers who balanced quality assurance against pressures for a quick time to market release.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12787
- Subject Headings
- Computer software--Development, Associations, institutions, etc
- Format
- Document (PDF)
- Title
- An improved neural net-based approach for predicting software quality.
- Creator
- Guasti, Peter John., Florida Atlantic University, Khoshgoftaar, Taghi M., Pandya, Abhijit S.
- Abstract/Description
-
Accurately predicting the quality of software is a major problem in any software development project. Software engineers develop models that provide early estimates of quality metrics which allow them to take action against emerging quality problems. Most often the predictive models are based upon multiple regression analysis which become unstable when certain data assumptions are not met. Since neural networks require no data assumptions, they are more appropriate for predicting software...
Show moreAccurately predicting the quality of software is a major problem in any software development project. Software engineers develop models that provide early estimates of quality metrics which allow them to take action against emerging quality problems. Most often the predictive models are based upon multiple regression analysis which become unstable when certain data assumptions are not met. Since neural networks require no data assumptions, they are more appropriate for predicting software quality. This study proposes an improved neural network architecture that significantly outperforms multiple regression and other neural network attempts at modeling software quality. This is demonstrated by applying this approach to several large commercial software systems. After developing neural network models, we develop regression models on the same data. We find that the neural network models surpass the regression models in terms of predictive quality on the data sets considered.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15134
- Subject Headings
- Neural networks (Computer science), Computer software--Development, Computer software--Quality control, Software engineering
- Format
- Document (PDF)
- Title
- Analytical study of capability maturity model using content analysis.
- Creator
- Sheth, Dhaval Ranjitlal., Florida Atlantic University, Coulter, Neal S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Content analysis is used to investigate the essence of the Software Engineering Institute's Capability Maturity Model (CMM) through associated software process evaluation instruments. This study yields lexical maps of key terms from each questionnaire. The content analysis is studied in three possible ways for each of the questionnaires: By question, by key process area, and by maturity level. These maps are named suitably. Super network and distribution maps are used for finding relations...
Show moreContent analysis is used to investigate the essence of the Software Engineering Institute's Capability Maturity Model (CMM) through associated software process evaluation instruments. This study yields lexical maps of key terms from each questionnaire. The content analysis is studied in three possible ways for each of the questionnaires: By question, by key process area, and by maturity level. These maps are named suitably. Super network and distribution maps are used for finding relations among the maps. Analysis of the key terms from the maps are compared to extract the essence of CMM and the ability of the questionnaires to adequately assess an organization's process maturity.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15554
- Subject Headings
- Software engineering--Management, Computer software--Development, Computer software--Evaluation
- Format
- Document (PDF)
- Title
- Developing accurate software quality models using a faster, easier, and cheaper method.
- Creator
- Lim, Linda., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Managers of software development need to know which components of a system are fault-prone. If this can be determined early in the development cycle then resources can be more effectively allocated and significant costs can be reduced. Case-Based Reasoning (CBR) is a simple and efficient methodology for building software quality models that can provide early information to managers. Our research focuses on two case studies. The first study analyzes source files and classifies them as fault...
Show moreManagers of software development need to know which components of a system are fault-prone. If this can be determined early in the development cycle then resources can be more effectively allocated and significant costs can be reduced. Case-Based Reasoning (CBR) is a simple and efficient methodology for building software quality models that can provide early information to managers. Our research focuses on two case studies. The first study analyzes source files and classifies them as fault-prone or not fault-prone. It also predicts the number of faults in each file. The second study analyzes the fault removal process, and creates models that predict the outcome of software inspections.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12746
- Subject Headings
- Computer software--Development, Computer software--Quality control, Software engineering
- Format
- Document (PDF)
- Title
- Information hiding: Digital watermarking techniques.
- Creator
- Sadicoff, Mauricio Levy., Florida Atlantic University, Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Digital Watermarking is a multimedia technique recently developed with the purpose of enhancing copyright protection on multimedia files. This thesis presents a survey of digital watermark features and classifications. It also proposes a classification method that includes most of previous classifications. The thesis then proceeds to detail two digital watermarking methods, Lower Significant Bit Encoding and Spread Spectrum Encoding. Software is designed and implemented to show the...
Show moreDigital Watermarking is a multimedia technique recently developed with the purpose of enhancing copyright protection on multimedia files. This thesis presents a survey of digital watermark features and classifications. It also proposes a classification method that includes most of previous classifications. The thesis then proceeds to detail two digital watermarking methods, Lower Significant Bit Encoding and Spread Spectrum Encoding. Software is designed and implemented to show the capabilities and behavior of each method. The software also shows how each method reacts to four typical transformations (attacks). The results of applying the two methods and their survival rates against the typical transformations are discussed in detail. Finally, the source code for the software is made available.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12897
- Subject Headings
- Computer software--Development, Digital watermarking, Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- CAD design patterns.
- Creator
- Hayes, Joey C., Florida Atlantic University, Pandya, Abhijit S.
- Abstract/Description
-
Software reuse has been looked upon in recent years as a promising mechanism for achieving increased levels of software quality and productivity within an organization. A form of software reuse which has been gaining in popularity is the use of design patterns. Design patterns are a higher level of abstraction than source code and are proving to be a valuable resource for both software developers and new hires within a company. This thesis develops the idea of applying design patterns to the...
Show moreSoftware reuse has been looked upon in recent years as a promising mechanism for achieving increased levels of software quality and productivity within an organization. A form of software reuse which has been gaining in popularity is the use of design patterns. Design patterns are a higher level of abstraction than source code and are proving to be a valuable resource for both software developers and new hires within a company. This thesis develops the idea of applying design patterns to the Computer Aided Design (CAD) software development environment. The benefits and costs associated with implementing a software reuse strategy are explained and the reasoning for developing design patterns is given. Design patterns are then described in detail and a potential method for applying design patterns within the CAD environment is demonstrated through the development of a CAD design pattern catalog.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15358
- Subject Headings
- Computer-aided design, Computer-aided software engineering, Computer software--Development, Computer software--Reusability
- Format
- Document (PDF)
- Title
- Assessing Data Interoperability ofUML Modeling Tools.
- Creator
- Gohel, Vaishali P., Huang, Shihong, Florida Atlantic University
- Abstract/Description
-
In the globalization software development environments, where the development activities are distributed geographically and temporally, it is increasingly important for the Computer Aided Software Engineering (CASE) tools to maintain the information (both syntactic and semantic) captured in the design models. The Unified Modeling Language (UML) is the de facto standard for modeling software applications and UML diagrams serve as graphical documentations of the software system. The...
Show moreIn the globalization software development environments, where the development activities are distributed geographically and temporally, it is increasingly important for the Computer Aided Software Engineering (CASE) tools to maintain the information (both syntactic and semantic) captured in the design models. The Unified Modeling Language (UML) is the de facto standard for modeling software applications and UML diagrams serve as graphical documentations of the software system. The interoperability of UML modeling tools is important in supporting the models exchange, and further support design reuse. Tool interoperability is often implemented using XML Metadata Interchange (XMI). Unfortunately, there is a loss of fidelity of the design documentation when transforming between UML and XMI due to the compatibility of different versions of UML, XMI and add-on proprietary information, which hinder reuse. This thesis evaluates the interoperability of UML modeling tools by assessing the quality of XMI documents representing the design. Case studies in this thesis demonstrate a framework of preserving the fidelity of UML model 's data when importing and exporting different UML models in a distributed heterogeneous environment.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012519
- Subject Headings
- UML (Computer science), Computer software--Development, Software engineering, Computer-aided design
- Format
- Document (PDF)
- Title
- Improved models of software quality.
- Creator
- Szabo, Robert Michael., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Though software development has been evolving for over 50 years, the development of computer software systems has largely remained an art. Through the application of measurable and repeatable processes, efforts have been made to slowly transform the software development art into a rigorous engineering discipline. The potential gains are tremendous. Computer software pervades modern society in many forms. For example, the automobile, radio, television, telephone, refrigerator, and still-camera...
Show moreThough software development has been evolving for over 50 years, the development of computer software systems has largely remained an art. Through the application of measurable and repeatable processes, efforts have been made to slowly transform the software development art into a rigorous engineering discipline. The potential gains are tremendous. Computer software pervades modern society in many forms. For example, the automobile, radio, television, telephone, refrigerator, and still-camera have all been transformed by the introduction of computer based controls. The quality of these everyday products is in part determined by the quality of the computer software running inside them. Therefore, the timely delivery of low-cost and high-quality software to enable these mass market products becomes very important to the long term success of the companies building them. It is not surprising that managing the number of faults in computer software to competitive levels is a prime focus of the software engineering activity. In support of this activity, many models of software quality have been developed to help control the software development process and ensure that our goals of cost and quality are met on time. In this study, we focus on the software quality modeling activity. We improve existing static and dynamic methodologies and demonstrate new ones in a coordinated attempt to provide engineering methods applicable to the development of computer software. We will show how the power of separate predictive and classification models of software quality may be combined into one model; introduce a three group fault classification model in the object-oriented paradigm; demonstrate a dynamic modeling methodology of the testing process and show how software product measures and software process measures may be incorporated as input to such a model; demonstrate a relationship between software product measures and the testability of software. The following methodologies were considered: principal components analysis, multiple regression analysis, Poisson regression analysis, discriminant analysis, time series analysis, and neural networks. Commercial grade software systems are used throughout this dissertation to demonstrate concepts and validate new ideas. As a result, we hope to incrementally advance the state of the software engineering "art".
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/12409
- Subject Headings
- Software engineering--Standards, Software engineering--Management, Computer software--Development, Computer software--Quality control
- Format
- Document (PDF)
- Title
- Formal specification of authorization and user group models for object-oriented databases.
- Creator
- Wei, Dong., Florida Atlantic University, Fernandez, Eduardo B., France, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can...
Show moreThe use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can be used as a basis for implementation and possible verification in those cases where a high level of security is required.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15175
- Subject Headings
- Object-oriented databases, Computer software--Development, Database security
- Format
- Document (PDF)
- Title
- Misuse Patterns for the SSL/TLS Protocol.
- Creator
- Alkazimi, Ali, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering...
Show moreThe SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering security bugs and vulnerabilities in any of its previous version. We have described some of the common security flaws in the SSL/TLS protocol by identifying them in the literature and then by analyzing the activities from each of their use cases to find any possible threats. These threats are realized in the form of misuse cases to understand how an attack happens from the point of the attacker. This approach implies the development of some security patterns which will be added as a reference for designing secure systems using the SSL/TLS protocol. We finally evaluate its security level by using misuse patterns and considering the threat coverage of the models.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004873, http://purl.flvc.org/fau/fd/FA00004873
- Subject Headings
- Computer networks--Security measures., Computer network protocols., Computer software--Development., Computer architecture.
- Format
- Document (PDF)
- Title
- Object recognition on Android mobil platform using speeded up robust features.
- Creator
- Tyagi, Vivek K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we...
Show moreIn recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we propose a framework to overcome design challenges and provide an evaluation methodology to assess the system performance. We use the emerging Android mobile platform to implement and test the framework. We performed a case study using the proposal and reported the test result. This assessment will help developers make wise decisions about their application design. Furthermore, the Android API developers could use this information to provide better interfaces to the third party developers. The design and evaluation methodology could be extended to other mobile platforms for a wider consumer base.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2683531
- Subject Headings
- Mobile computing, Application software, Development, Object-oriented programming (Computer software), Pattern recognition systems, Development
- Format
- Document (PDF)
- Title
- Design patterns and object oriented model of a biometric service system.
- Creator
- Blandon, Jatni., Florida Atlantic University, Han, Chingping (Jim)
- Abstract/Description
-
Continuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to...
Show moreContinuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to illustrate of the use of design patterns and object oriented analysis. First, the conceptual model of an Electronic Fingerprint Service establishes the vocabulary for discussing how a system is constructed. Since good design decisions eventually result in a good design model, this model is used to leverage the object reused when requirements change. The Electronic Biometric Services model demonstrates how by applying design patterns, the system can gain the flexibility and agility required to grow and change according to new requirements.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13351
- Subject Headings
- Computer software--Development, Software architecture, Object-oriented programming (Computer science), Biometric identification, Pattern recognition systems--Development
- Format
- Document (PDF)
- Title
- Campus driver assistant on an Android platform.
- Creator
- Zankina, Iana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
College campuses can be large, confusing, and intimidating for new students and visitors. Finding the campus may be easy using a GPS unit or Google Maps directions, but this is not the case when you are actually on the campus. There is no service that provides directional assistance for the campus itself. This thesis proposes a driver assistant application running on an Android platform that can direct drivers to different buildings and parking lots in the campus. The application's user...
Show moreCollege campuses can be large, confusing, and intimidating for new students and visitors. Finding the campus may be easy using a GPS unit or Google Maps directions, but this is not the case when you are actually on the campus. There is no service that provides directional assistance for the campus itself. This thesis proposes a driver assistant application running on an Android platform that can direct drivers to different buildings and parking lots in the campus. The application's user interface lets the user select a user type, a campus, and a destination through use of drop down menus and buttons. Once the user submits the needed information, then the next portion of the application runs in the background. The app retrieves the Campus Map XML created by the mapping tool that was constructed for this project. The XML data containing all the map elements is then parsed and stored in a hierarchal data structure. The resulting objects are then used to construct a campus graph, on which an altered version of Dijkstra's Shortest Path algorithm is executed. When the path to the destination has been discovered, the campus map with the computed path overlaid is displayed on the user's device, showing the route to the desired destination.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3359159
- Subject Headings
- Mobile computing, Software engineering, Application software, Development
- Format
- Document (PDF)
- Title
- A procedure for evaluation and selection of computer-aided software engineering (CASE) tools for analysis and design.
- Creator
- Phillips, Steven David., Florida Atlantic University, Levow, Roy B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Due to the relative youth of the computer-aided software engineering (CASE) market and the lack of standards, evaluation of CASE tools is a difficult problem. This problem is made more difficult by the fact that no single CASE tool is able to satisfy the needs of all potential users. In addition, an incorrect choice is expensive in terms of money and time invested. In this thesis, the literature is surveyed and synthesized to produce procedures and criteria to be used in the evaluation and...
Show moreDue to the relative youth of the computer-aided software engineering (CASE) market and the lack of standards, evaluation of CASE tools is a difficult problem. This problem is made more difficult by the fact that no single CASE tool is able to satisfy the needs of all potential users. In addition, an incorrect choice is expensive in terms of money and time invested. In this thesis, the literature is surveyed and synthesized to produce procedures and criteria to be used in the evaluation and selection of CASE tools intended for the analysis and design phases of the software development life cycle.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14701
- Subject Headings
- Electronic data processing--Structured techniques, System analysis, Computer software--Development, Computer-aided software engineering
- Format
- Document (PDF)
- Title
- Framework for requirements-driven system design automation.
- Creator
- Fonoage, Mihai., Charles E. Schmidt College of Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, a framework for improving model-driven system design productivity with Requirements-Driven Design Automation (RDDA) is presented. The key to the proposed approach is to close the semantic gap between requirements, components and architecture by using compatible semantic models for describing product requirements and component capabilities, including constraints. An ontology-based representation language is designed that spans requirements for the application domain, the...
Show moreIn this thesis, a framework for improving model-driven system design productivity with Requirements-Driven Design Automation (RDDA) is presented. The key to the proposed approach is to close the semantic gap between requirements, components and architecture by using compatible semantic models for describing product requirements and component capabilities, including constraints. An ontology-based representation language is designed that spans requirements for the application domain, the software design domain and the component domain. Design automation is supported for architecture development by machine-based mapping of desired product/subsystem features and capabilities to library components and by synthesis and maintenance of Systems Modeling Language (SysML) design structure diagrams. The RDDA framework uses standards-based semantic web technologies and can be integrated with exiting modeling tools. Requirements specification is a major component of the system development cycle. Mistakes and omissions in requirements documents lead to ambiguous or wrong interpretation by engineers, causing errors that trickle down in design and implementation with consequences on the overall development cost. We describe a methodology for requirements specification that aims to alleviate the above issues and that produces models for functional requirements that can be automatically validated for completeness and consistency. The RDDA framework uses an ontology-based language for semantic description of functional product requirements, SysML structure diagrams, component constraints, and Quality of Service. The front-end method for requirements specification is the SysML editor in Rhapsody. A requirements model in Web Ontology Language (OWL) is converted from SysML to Extensible Markup Language Metadata Interchange (XMI) representation., The specification is validated for completeness and consistency with a ruled-based system implemented in Prolog. With our methodology, omission s and several types of consistency errors present in the requirements specification are detected early on, before the design stage. Component selection and design automation have the potential to play a major role in reducing the system development time and cost caused by the rapid change in technology advances and the large solution search space. In our work, we start from a structured representation of requirements and components using SysML, and based on specific set of rules written in Prolog, we partially automate the process of architecture design.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2975246
- Subject Headings
- Computer architecture, Computer software, Development, User-centered system design, Information technology, Management, Semantic Web
- Format
- Document (PDF)
- Title
- Neural network approach to Bayesian background modeling for video object segmentation.
- Creator
- Culibrk, Dubravko., Florida Atlantic University, Furht, Borko, Marques, Oge, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Object segmentation in a video sequence is an essential task in video processing and forms the foundation of content analysis, scene understanding, object-based video encoding (e.g. MPEG-4), various surveillance and 2D-to-pseudo-3D conversion applications. Popularization and availability of video sequences with increased spatial resolution requires development of new, more efficient algorithms for object detection and segmentation. This dissertation discusses a novel neural-network-based...
Show moreObject segmentation in a video sequence is an essential task in video processing and forms the foundation of content analysis, scene understanding, object-based video encoding (e.g. MPEG-4), various surveillance and 2D-to-pseudo-3D conversion applications. Popularization and availability of video sequences with increased spatial resolution requires development of new, more efficient algorithms for object detection and segmentation. This dissertation discusses a novel neural-network-based approach to background modeling for motion-based object segmentation in video sequences. In particular, we show how Probabilistic Neural Network (PNN) architecture can be extended to form an unsupervised Bayesian classifier for the domain of video object segmentation. The constructed Background Modeling Neural Network (BNN) is capable of efficiently handling segmentation in natural-scene sequences with complex background motion and changes in illumination. The weights of the proposed neural network serve as an exclusive model of the background and are temporally updated to reflect the observed background statistics. The proposed approach is designed to enable an efficient, highly-parallelized hardware implementation. Such a system would be able to achieve real-time segmentation of high-resolution image sequences.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12214
- Subject Headings
- Neural networks (Computer science), Application software--Development, Data structures (Computer science), Bayesian field theory
- Format
- Document (PDF)