Current Search: Computer software--Development (x)
View All Items
Pages
- Title
- A Decision Support System for Sprint Planning in Scrum Practice.
- Creator
- Alhazmi, Alhejab Shawqi, Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Scrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration...
Show moreScrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration developer competency, developer seniority and task dependency. The results are that the assignments of the tasks of each Sprint to developers guarantee that each team member contributes to their fullest potential, and project planning is optimized for the shortest possible time. Keywords—Scrum, Sprint planning, planning poker, competence, task dependence, Hungarian algorithm, Essence.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00005970
- Subject Headings
- Scrum (Computer software development), Project management, Agile software development
- Format
- Document (PDF)
- Title
- Software development behavior in small organizations.
- Creator
- Chaudhry, Muhammed Zubair., Florida Atlantic University, Levow, Roy B., Coulter, Neal S.
- Abstract/Description
-
As the software industry continues to mature, best practices have been defined to improve the quality and productivity of software development. Adoption rates of these practices are better understood for large organizations as compared to small standalone organizations. Based on surveys and interviews, this study analyzes the utilization of software development best practices by small software organizations, and the factors that influence different levels of adoption. The results demonstrate...
Show moreAs the software industry continues to mature, best practices have been defined to improve the quality and productivity of software development. Adoption rates of these practices are better understood for large organizations as compared to small standalone organizations. Based on surveys and interviews, this study analyzes the utilization of software development best practices by small software organizations, and the factors that influence different levels of adoption. The results demonstrate that context is the main determinant of adoption, driven by competitive pressures, organizational incentives, and prior exposure to best practices. Consulting firms were influenced by their contractual relationship with the client, which led to more focus on deliverables. Traditional product companies emphasized code management practices, though their focus on domain expertise detracted from software development best practices. Finally, startups were characterized by experienced senior managers who balanced quality assurance against pressures for a quick time to market release.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12787
- Subject Headings
- Computer software--Development, Associations, institutions, etc
- Format
- Document (PDF)
- Title
- INTEGRATING DESIGN THINKING MODEL AND ITEMS PRIORITIZATION DECISION SUPPORT SYSTEMS INTO REQUIREMENTS MANAGEMENT IN SCRUM.
- Creator
- Alhazmi, Alhejab Shawqi, Huang, Shihong, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The Agile methodologies have attracted the software development industry's attention due to their capability to overcome the limitations of the traditional software development approaches and to cope with increasing complexity in system development. Scrum is one of the Agile software development processes broadly adopted by industry. Scrum promotes frequent customer involvement and incremental short releases. Despite its popular use, Scrum’s requirements engineering stage is inadequately...
Show moreThe Agile methodologies have attracted the software development industry's attention due to their capability to overcome the limitations of the traditional software development approaches and to cope with increasing complexity in system development. Scrum is one of the Agile software development processes broadly adopted by industry. Scrum promotes frequent customer involvement and incremental short releases. Despite its popular use, Scrum’s requirements engineering stage is inadequately defined which can lead to increase development time and cost, along with low quality or failure for the end products. This research shows the importance of activity planning of requirements engineering in improving the product quality, cost, and scheduling as well as it points out some drawbacks of Agile practices and available solutions. To improve the Scrum requirements engineering by overcoming its challenges in cases, such as providing a comprehensive understanding of the customer’s needs and addressing the effects of the challenges in other cases, such as frequent changes of requirements, the Design Thinking model is integrated into the Scrum framework in the context of requirements engineering management. The use of the Design Thinking model, in the context of requirements engineering management, is validated through an in-depth scientific study of the IBM Design Thinking framework. In addition, this research presents an Items Prioritization dEcision Support System (IPESS) which is a tool to assist the Product Owners for requirements prioritization. IPESS is built on information collected in the Design Thinking model. The IPESS tool adopts Analytic Hierarchy Process (AHP) technique and PageRank algorithm to deal with the specified factors and to achieve the optimal order for requirements items based on the prioritization score. IPESS is a flexible and comprehensive tool that focuses on different important aspects including customer satisfaction and product quality. The IPESS tool is validated through an experiment that was conducted in a real-world project
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013699
- Subject Headings
- Scrum (Computer software development), Computer software--Development--Management, Software engineering
- Format
- Document (PDF)
- Title
- An empirical study of source code complexity and source code modifications during testing and maintenance.
- Creator
- De Gramont, Anne H., Florida Atlantic University, Khoshgoftaar, Taghi M.
- Abstract/Description
-
Since maintenance is the most expensive phase of the software life cycle, detecting most of the errors as early as possible in the software development effort can provide substantial savings. This study investigates the behavior of complexity metrics during testing and maintenance, and their relationship to modifications made to the software. Interface complexity causes most of the change activities during integration testing and maintenance, while size causes most of the changes during unit...
Show moreSince maintenance is the most expensive phase of the software life cycle, detecting most of the errors as early as possible in the software development effort can provide substantial savings. This study investigates the behavior of complexity metrics during testing and maintenance, and their relationship to modifications made to the software. Interface complexity causes most of the change activities during integration testing and maintenance, while size causes most of the changes during unit testing. Principal component analysis groups 16 complexity metrics into four domains. Changes in domain pattern are observed throughout the software life cycle. Using those domains as input, regression analysis shows that software complexity measures collected as early as the unit testing phase can identify and predict change prone modules. With a low rate of misclassification, discriminant analysis further confirms that complexity metrics provide a strong indication of the changes made to a module during testing and maintenance.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15089
- Subject Headings
- Computer software--Development, Software maintenance, Source code (Computer science)
- Format
- Document (PDF)
- Title
- Information hiding: Digital watermarking techniques.
- Creator
- Sadicoff, Mauricio Levy., Florida Atlantic University, Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Digital Watermarking is a multimedia technique recently developed with the purpose of enhancing copyright protection on multimedia files. This thesis presents a survey of digital watermark features and classifications. It also proposes a classification method that includes most of previous classifications. The thesis then proceeds to detail two digital watermarking methods, Lower Significant Bit Encoding and Spread Spectrum Encoding. Software is designed and implemented to show the...
Show moreDigital Watermarking is a multimedia technique recently developed with the purpose of enhancing copyright protection on multimedia files. This thesis presents a survey of digital watermark features and classifications. It also proposes a classification method that includes most of previous classifications. The thesis then proceeds to detail two digital watermarking methods, Lower Significant Bit Encoding and Spread Spectrum Encoding. Software is designed and implemented to show the capabilities and behavior of each method. The software also shows how each method reacts to four typical transformations (attacks). The results of applying the two methods and their survival rates against the typical transformations are discussed in detail. Finally, the source code for the software is made available.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12897
- Subject Headings
- Computer software--Development, Digital watermarking, Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- Software metrics collection: Two new research tools.
- Creator
- Jordan, Sylviane G., Florida Atlantic University, Khoshgoftaar, Taghi M.
- Abstract/Description
-
Collecting software metrics manually could be a tedious, inaccurate, and subjective task. Two new tools were developed to automate this process in a rapid, accurate, and objective way. The first tool, the Metrics Analyzer, evaluates 19 metrics at the function level, from complete or partial systems written in C. The second tool, the Call Graph Generator, does not assess a metric directly, but generates a call graph based on a complete or partial system written in C. The call graph is used as...
Show moreCollecting software metrics manually could be a tedious, inaccurate, and subjective task. Two new tools were developed to automate this process in a rapid, accurate, and objective way. The first tool, the Metrics Analyzer, evaluates 19 metrics at the function level, from complete or partial systems written in C. The second tool, the Call Graph Generator, does not assess a metric directly, but generates a call graph based on a complete or partial system written in C. The call graph is used as an input to another tool (not considered here) that measures the coupling of a module, such as a function or a file. A case study analyzed the relationships among the metrics, including the coupling metric, using principal component analysis, which transformed the 19 metrics into eight principal components.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15483
- Subject Headings
- Software measurement, Computer software--Development, Computer software--Evaluation
- Format
- Document (PDF)
- Title
- Formal specification of authorization and user group models for object-oriented databases.
- Creator
- Wei, Dong., Florida Atlantic University, Fernandez, Eduardo B., France, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can...
Show moreThe use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can be used as a basis for implementation and possible verification in those cases where a high level of security is required.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15175
- Subject Headings
- Object-oriented databases, Computer software--Development, Database security
- Format
- Document (PDF)
- Title
- Misuse Patterns for the SSL/TLS Protocol.
- Creator
- Alkazimi, Ali, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering...
Show moreThe SSL/TLS is the main protocol used to provide secure data connection between a client and a server. The main concern of using this protocol is to avoid the secure connection from being breached. Computer systems and their applications are becoming more complex and keeping these secure connections between all the connected components is a challenge. To avoid any new security flaws and protocol connections weaknesses, the SSL/TLS protocol is always releasing newer versions after discovering security bugs and vulnerabilities in any of its previous version. We have described some of the common security flaws in the SSL/TLS protocol by identifying them in the literature and then by analyzing the activities from each of their use cases to find any possible threats. These threats are realized in the form of misuse cases to understand how an attack happens from the point of the attacker. This approach implies the development of some security patterns which will be added as a reference for designing secure systems using the SSL/TLS protocol. We finally evaluate its security level by using misuse patterns and considering the threat coverage of the models.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004873, http://purl.flvc.org/fau/fd/FA00004873
- Subject Headings
- Computer networks--Security measures., Computer network protocols., Computer software--Development., Computer architecture.
- Format
- Document (PDF)
- Title
- Assessing Data Interoperability ofUML Modeling Tools.
- Creator
- Gohel, Vaishali P., Huang, Shihong, Florida Atlantic University
- Abstract/Description
-
In the globalization software development environments, where the development activities are distributed geographically and temporally, it is increasingly important for the Computer Aided Software Engineering (CASE) tools to maintain the information (both syntactic and semantic) captured in the design models. The Unified Modeling Language (UML) is the de facto standard for modeling software applications and UML diagrams serve as graphical documentations of the software system. The...
Show moreIn the globalization software development environments, where the development activities are distributed geographically and temporally, it is increasingly important for the Computer Aided Software Engineering (CASE) tools to maintain the information (both syntactic and semantic) captured in the design models. The Unified Modeling Language (UML) is the de facto standard for modeling software applications and UML diagrams serve as graphical documentations of the software system. The interoperability of UML modeling tools is important in supporting the models exchange, and further support design reuse. Tool interoperability is often implemented using XML Metadata Interchange (XMI). Unfortunately, there is a loss of fidelity of the design documentation when transforming between UML and XMI due to the compatibility of different versions of UML, XMI and add-on proprietary information, which hinder reuse. This thesis evaluates the interoperability of UML modeling tools by assessing the quality of XMI documents representing the design. Case studies in this thesis demonstrate a framework of preserving the fidelity of UML model 's data when importing and exporting different UML models in a distributed heterogeneous environment.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012519
- Subject Headings
- UML (Computer science), Computer software--Development, Software engineering, Computer-aided design
- Format
- Document (PDF)
- Title
- An improved neural net-based approach for predicting software quality.
- Creator
- Guasti, Peter John., Florida Atlantic University, Khoshgoftaar, Taghi M., Pandya, Abhijit S.
- Abstract/Description
-
Accurately predicting the quality of software is a major problem in any software development project. Software engineers develop models that provide early estimates of quality metrics which allow them to take action against emerging quality problems. Most often the predictive models are based upon multiple regression analysis which become unstable when certain data assumptions are not met. Since neural networks require no data assumptions, they are more appropriate for predicting software...
Show moreAccurately predicting the quality of software is a major problem in any software development project. Software engineers develop models that provide early estimates of quality metrics which allow them to take action against emerging quality problems. Most often the predictive models are based upon multiple regression analysis which become unstable when certain data assumptions are not met. Since neural networks require no data assumptions, they are more appropriate for predicting software quality. This study proposes an improved neural network architecture that significantly outperforms multiple regression and other neural network attempts at modeling software quality. This is demonstrated by applying this approach to several large commercial software systems. After developing neural network models, we develop regression models on the same data. We find that the neural network models surpass the regression models in terms of predictive quality on the data sets considered.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15134
- Subject Headings
- Neural networks (Computer science), Computer software--Development, Computer software--Quality control, Software engineering
- Format
- Document (PDF)
- Title
- Analytical study of capability maturity model using content analysis.
- Creator
- Sheth, Dhaval Ranjitlal., Florida Atlantic University, Coulter, Neal S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Content analysis is used to investigate the essence of the Software Engineering Institute's Capability Maturity Model (CMM) through associated software process evaluation instruments. This study yields lexical maps of key terms from each questionnaire. The content analysis is studied in three possible ways for each of the questionnaires: By question, by key process area, and by maturity level. These maps are named suitably. Super network and distribution maps are used for finding relations...
Show moreContent analysis is used to investigate the essence of the Software Engineering Institute's Capability Maturity Model (CMM) through associated software process evaluation instruments. This study yields lexical maps of key terms from each questionnaire. The content analysis is studied in three possible ways for each of the questionnaires: By question, by key process area, and by maturity level. These maps are named suitably. Super network and distribution maps are used for finding relations among the maps. Analysis of the key terms from the maps are compared to extract the essence of CMM and the ability of the questionnaires to adequately assess an organization's process maturity.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15554
- Subject Headings
- Software engineering--Management, Computer software--Development, Computer software--Evaluation
- Format
- Document (PDF)
- Title
- Developing accurate software quality models using a faster, easier, and cheaper method.
- Creator
- Lim, Linda., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Managers of software development need to know which components of a system are fault-prone. If this can be determined early in the development cycle then resources can be more effectively allocated and significant costs can be reduced. Case-Based Reasoning (CBR) is a simple and efficient methodology for building software quality models that can provide early information to managers. Our research focuses on two case studies. The first study analyzes source files and classifies them as fault...
Show moreManagers of software development need to know which components of a system are fault-prone. If this can be determined early in the development cycle then resources can be more effectively allocated and significant costs can be reduced. Case-Based Reasoning (CBR) is a simple and efficient methodology for building software quality models that can provide early information to managers. Our research focuses on two case studies. The first study analyzes source files and classifies them as fault-prone or not fault-prone. It also predicts the number of faults in each file. The second study analyzes the fault removal process, and creates models that predict the outcome of software inspections.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12746
- Subject Headings
- Computer software--Development, Computer software--Quality control, Software engineering
- Format
- Document (PDF)
- Title
- Neural network approach to Bayesian background modeling for video object segmentation.
- Creator
- Culibrk, Dubravko., Florida Atlantic University, Furht, Borko, Marques, Oge, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Object segmentation in a video sequence is an essential task in video processing and forms the foundation of content analysis, scene understanding, object-based video encoding (e.g. MPEG-4), various surveillance and 2D-to-pseudo-3D conversion applications. Popularization and availability of video sequences with increased spatial resolution requires development of new, more efficient algorithms for object detection and segmentation. This dissertation discusses a novel neural-network-based...
Show moreObject segmentation in a video sequence is an essential task in video processing and forms the foundation of content analysis, scene understanding, object-based video encoding (e.g. MPEG-4), various surveillance and 2D-to-pseudo-3D conversion applications. Popularization and availability of video sequences with increased spatial resolution requires development of new, more efficient algorithms for object detection and segmentation. This dissertation discusses a novel neural-network-based approach to background modeling for motion-based object segmentation in video sequences. In particular, we show how Probabilistic Neural Network (PNN) architecture can be extended to form an unsupervised Bayesian classifier for the domain of video object segmentation. The constructed Background Modeling Neural Network (BNN) is capable of efficiently handling segmentation in natural-scene sequences with complex background motion and changes in illumination. The weights of the proposed neural network serve as an exclusive model of the background and are temporally updated to reflect the observed background statistics. The proposed approach is designed to enable an efficient, highly-parallelized hardware implementation. Such a system would be able to achieve real-time segmentation of high-resolution image sequences.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12214
- Subject Headings
- Neural networks (Computer science), Application software--Development, Data structures (Computer science), Bayesian field theory
- Format
- Document (PDF)
- Title
- A graphical Windows(c)-based cable and underwater system simulation software.
- Creator
- de Baudreuil, Jean., Florida Atlantic University, Driscoll, Frederick R.
- Abstract/Description
-
Underwater systems behavior prediction has become an important success factor in the design and implementation of marine systems. Most marine systems involve cables for mooring, deployment, recovery, or towing; however, estimating the response of these systems is difficult because of their non-linear behavior. Thus, numerical models are used to simulate submerged cabled systems. At FAU, many mission specific cable simulations have been developed, but no single, all encompassing software...
Show moreUnderwater systems behavior prediction has become an important success factor in the design and implementation of marine systems. Most marine systems involve cables for mooring, deployment, recovery, or towing; however, estimating the response of these systems is difficult because of their non-linear behavior. Thus, numerical models are used to simulate submerged cabled systems. At FAU, many mission specific cable simulations have been developed, but no single, all encompassing software package exists. This thesis develops a Windows(c) based software package to quickly and easily create FEA models of underwater cabled systems and simulate their response. The model is based on a discrete finite element analysis using linear elements. The software provides fully integrated and interactive Graphical User Interfaces with a 3-dimensional graphical display of the model, and integrates adapted data analysis and visualization tools. The software provides an easy and efficient way to simulate an underwater system involving cables.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13232
- Subject Headings
- Oceanographic submersibles--Computer simulation, Computer software--Development, Simulation methods, Cables, Submarine
- Format
- Document (PDF)
- Title
- Extensions to real-time object-oriented software design methodologies.
- Creator
- Woodcock, Timothy G., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Real-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant...
Show moreReal-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant complexity. With object-oriented design, the system is modeled in the environment that it will be used in. Objects themselves, are partitions of the system, into logical, understandable units. In this dissertation, we start by surveying the current real-time object-oriented design methodologies. By comparing these methodologies and developing a set of criteria for evaluating them, we discover that certain aspects of these methodologies still need some work. The most important aspects of the methodologies are understanding the effects of deadlines on statechart behavioral models and understanding the effects of deadlines when object models are inherited or undergo aggregation. The effects of deadlines on statecharts are then explored in detail. There are two basic ways that deadlines are added to statecharts. The first, and most popular, is adding timing as a condition on a state transition. The second is adding a count down timer to a state and forcing a transition if the timer reaches zero. We show that these are equivalent and can be used interchangeably to simplify designs. Next, the effects of deadlines on behavior models when the corresponding object models undergo inheritance or aggregation are studied. We will first analyze the effects on the behavior model when object inheritance is encountered. We found eight ways that the behavior model can be modified and still maintain the properties of inheritance. Finally, deadlines are added and the analysis is repeated.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12493
- Subject Headings
- Real-time data processing, Computer software--Development, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Software development of a hardware-in-the-loop simulation and a three-dimensional viewer for autonomous underwater vehicles.
- Creator
- Mahieu, Frederi., Florida Atlantic University, An, Edgar, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
This thesis describes the development of the hardware-in-the-loop simulation for FAU Autonomous Underwater Vehicles. The development was based on the existing simulation platform. For more efficiency and flexibility, this simulation package was ported to Linux. The hardware-in-the-loop simulation enables developers to connect the vehicle directly to a remote simulator. This kind of simulation is used to test the actual software components embedded in the vehicle system. The simulation package...
Show moreThis thesis describes the development of the hardware-in-the-loop simulation for FAU Autonomous Underwater Vehicles. The development was based on the existing simulation platform. For more efficiency and flexibility, this simulation package was ported to Linux. The hardware-in-the-loop simulation enables developers to connect the vehicle directly to a remote simulator. This kind of simulation is used to test the actual software components embedded in the vehicle system. The simulation package was enhanced by the addition of a 3D viewer. This thesis describes the whole development process, from feasibility study and implementation to qualification phases. This viewer is platform independent and designed to be connected to the simulator. It renders the AUV moving in a virtual environment. This tool can be used during all development steps, from tuning phases to post-mission analysis.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/15778
- Subject Headings
- Oceanographic submersibles--Computer simulation, Computer software--Development, Simulation methods, Three-dimensional display systems
- Format
- Document (PDF)
- Title
- Development of Internet-based data management and retrieval schemes for AUV applications.
- Creator
- Bayard, Gildas Yann., Florida Atlantic University, An, Edgar
- Abstract/Description
-
The rapid increase in the amount of data gathered by Autonomous Underwater Vehicles (AUV) leads to a global data management issue. Indeed, this large data collection effort is only interesting if the data collected can be easily retrieved and analyzed by many researchers. The main contribution of this thesis is the design of data management and retrieval schemes useful to the whole AUV community that both simplify the access and treatment of the data collected. This is achieved by the use of...
Show moreThe rapid increase in the amount of data gathered by Autonomous Underwater Vehicles (AUV) leads to a global data management issue. Indeed, this large data collection effort is only interesting if the data collected can be easily retrieved and analyzed by many researchers. The main contribution of this thesis is the design of data management and retrieval schemes useful to the whole AUV community that both simplify the access and treatment of the data collected. This is achieved by the use of a self-describing standard data format (Hierarchical Data Format) and the use of Internet browsers' file download ability. Recent developments in Sun's Java applet technology have been used to provide a user-friendly Graphical User Interface (GUI) so that the user can select data files according to a large number of parameters (what variables have been collected, when and where).
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15687
- Subject Headings
- Submersibles--Data processing, Java (Computer program language), Application software--Development
- Format
- Document (PDF)
- Title
- Software design using case based reasoning.
- Creator
- Smith, Nancy T., Florida Atlantic University, Ganesan, Krishnamurthy, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The project that was created for this thesis is a Case Based Reasoning application to be used in high level software design for Siemens' Telecommunications software. Currently, design engineers search for existing subtasks in the software that are similar to subtasks in their new designs by reading documentation and consulting with other engineers. The prototype for Software Design Using Case Based Reasoning (SDUCBR) stores these subtasks in a case library and enables the design engineer to...
Show moreThe project that was created for this thesis is a Case Based Reasoning application to be used in high level software design for Siemens' Telecommunications software. Currently, design engineers search for existing subtasks in the software that are similar to subtasks in their new designs by reading documentation and consulting with other engineers. The prototype for Software Design Using Case Based Reasoning (SDUCBR) stores these subtasks in a case library and enables the design engineer to locate relevant subtasks via three different indexing techniques. This thesis addresses knowledge representation and indexing mechanisms appropriate for this application. SDUCBR is domain-dependent. Cases are stored in a relational hierarchy to facilitate analyzing the existing implementation from various perspectives. The indexing mechanisms were designed to provide the software design engineer with the flexibility of describing a problem differently based on the objective, level of granularity, and special characteristics of the subtask.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15198
- Subject Headings
- Computer software--Development, Case-based reasoning, Artificial intelligence--Data processing, System design
- Format
- Document (PDF)
- Title
- CAD design patterns.
- Creator
- Hayes, Joey C., Florida Atlantic University, Pandya, Abhijit S.
- Abstract/Description
-
Software reuse has been looked upon in recent years as a promising mechanism for achieving increased levels of software quality and productivity within an organization. A form of software reuse which has been gaining in popularity is the use of design patterns. Design patterns are a higher level of abstraction than source code and are proving to be a valuable resource for both software developers and new hires within a company. This thesis develops the idea of applying design patterns to the...
Show moreSoftware reuse has been looked upon in recent years as a promising mechanism for achieving increased levels of software quality and productivity within an organization. A form of software reuse which has been gaining in popularity is the use of design patterns. Design patterns are a higher level of abstraction than source code and are proving to be a valuable resource for both software developers and new hires within a company. This thesis develops the idea of applying design patterns to the Computer Aided Design (CAD) software development environment. The benefits and costs associated with implementing a software reuse strategy are explained and the reasoning for developing design patterns is given. Design patterns are then described in detail and a potential method for applying design patterns within the CAD environment is demonstrated through the development of a CAD design pattern catalog.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15358
- Subject Headings
- Computer-aided design, Computer-aided software engineering, Computer software--Development, Computer software--Reusability
- Format
- Document (PDF)
- Title
- Design patterns and object oriented model of a biometric service system.
- Creator
- Blandon, Jatni., Florida Atlantic University, Han, Chingping (Jim)
- Abstract/Description
-
Continuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to...
Show moreContinuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to illustrate of the use of design patterns and object oriented analysis. First, the conceptual model of an Electronic Fingerprint Service establishes the vocabulary for discussing how a system is constructed. Since good design decisions eventually result in a good design model, this model is used to leverage the object reused when requirements change. The Electronic Biometric Services model demonstrates how by applying design patterns, the system can gain the flexibility and agility required to grow and change according to new requirements.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13351
- Subject Headings
- Computer software--Development, Software architecture, Object-oriented programming (Computer science), Biometric identification, Pattern recognition systems--Development
- Format
- Document (PDF)