3220 Slices
Medium 9781683922018

Late Papers- Software Engineering Research

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

SESSION

LATE PAPERS - SOFTWARE ENGINEERING

RESEARCH

Chair(s)

TBA

ISBN: 1-60132-468-5, CSREA Press ©

171

172

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

ISBN: 1-60132-468-5, CSREA Press ©

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

173

Object Orientation: A Mathematical Perspective

Nelson Rushton

Texas Tech University, Lubbock, Texas, USA

Abstract This paper examines language features usually associated with object orientation (OO) from the standpoint of mathematical practice and mathematical logic. Section 1 points out the occurrence of polymorphism and inheritance in mathematical theories commonly discussed as early as elementary school. Section 2 explains and illustrates the dichotomy between OO languages and common sense mathematics on one hand, and non-OO languages (such as C) and research-level mathematics on the other. This is related to the parallel dichotomy of nonmonotonic and monotonic logic used to reason about the respective kinds of systems.

See All Chapters
Medium 9781683922018

Web-Based Technologies & Applications + Cloud & Mobile Computing

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

SESSION

WEB-BASED TECHNOLOGIES AND

APPLICATIONS + CLOUD AND MOBILE

COMPUTING

Chair(s)

TBA

ISBN: 1-60132-468-5, CSREA Press ©

67

68

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

ISBN: 1-60132-468-5, CSREA Press ©

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

69

A Comparison of Server Side Scripting Technologies

Tyler Crawford, Tauqeer Hussain* tcraw850@live.kutztown.edu, hussain@kutztown.edu

Computer Science & Information Technology Department

Kutztown University of Pennsylvania

Kutztown, PA, U.S.A.

Abstract — In the presence of so many scripting languages or technologies available for server-side processing, it is usually a difficult decision for a beginner which technology to learn or use for development. In this paper, we have presented four leading server-side scripting technologies –PHP, Django, Ruby on Rails, and Node.js. We have identified five comparison attributes namely ease of getting started, availability of help and support, popularity, availability of development tools and packages, and perofrmance for the purpose of comparison. We have rated each technology based on these comparison attributes and provided our recommendations for the learners and developers. It is expected that the developers, software engineers, as well as the instructors teaching web development courses would benefit from this research.

See All Chapters
Medium 9781683922018

Programming Issues and Algorithms + Software Architectures and Softweare Engineering and Education

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

SESSION

PROGRAMMING ISSUES AND ALGORITHMS +

SOFTWARE ARCHITECTURES AND SOFTWARE

ENGINEERING + EDUCATION

Chair(s)

TBA

ISBN: 1-60132-468-5, CSREA Press ©

111

112

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

ISBN: 1-60132-468-5, CSREA Press ©

Int'l Conf. Software Eng. Research and Practice | SERP'17 |

113

Aesthetics Versus Entropy in Source Code

Ron Coleman and Brendon Boldt

Computer Science Department, Marist College, Poughkeepsie, NY, USA

Abstract – Although the separate literatures on programming style and information theories of software are large, little attention has been given to information theories of style. What is new in this paper we study the measure of programming style or “beauty” and its empirical relationship to disorder or information entropy in source. In a series of experiments, we use a beauty model based on fractal geometry and a corpus of programs from the GNU/Linux repository. The data show with statistical significance that beauty and entropy in code are inversely related. The data also indicate beauty and entropy are weakly to moderately correlated, which is to say, the beauty and entropy in source are not proxies. Finally, the data contains as a result of this study statistical evidence of ways in which the beauty model might serve as a new kind style checker. The main research contribution of this effort is a better understanding through empiricism of roles aesthetic expression and entropy play in crafting and maintaining codes.

See All Chapters
Medium 9781683921967

Knowledge Extraction, Knowledge Management, and Novel Applications

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi CSREA Press PDF

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

SESSION

KNOWLEDGE EXTRACTION, KNOWLEDGE

MANAGEMENT, AND NOVEL APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-463-4, CSREA Press ©

1

2

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

ISBN: 1-60132-463-4, CSREA Press ©

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

3

Building a Learning Machine Classifier with Inadequate

Data for Crime Prediction

Trung T. Nguyen, Amartya Hatua, and Andrew H. Sung

School of Computing, The University of Southern Mississippi, Hattiesburg, MS 39406, U.S.A.

Abstract—In this paper, we describe a crime predicting method which forecasts the types of crimes that will occur based on location and time. In the proposed method, the crime forecasting is done for the jurisdiction of Portland

Police Bureau (PPB). The method comprises the following steps: data acquisition and pre-processing, linking data with demographic data from various public sources, and prediction using machine learning algorithms. In the first step, data pre-processing is done mainly by cleaning the dataset, formatting, inferring and categorizing. The dataset is then supplemented with additional publicly available census data, which mainly provides the demographic information of the area, educational background, economical and ethnic background of the people involved; thereby some of the very important features are imported to the dataset provided by PPB in statistically meaningful ways, which contribute to achieving better performance. Under sampling techniques are used to deal with the imbalanced dataset problem.

See All Chapters
Medium 9781683921967

Information Extraction and Engineering, Prediction Methods and Data Mining, and Novel Applications

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi CSREA Press PDF

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

SESSION

INFORMATION EXTRACTION AND

ENGINEERING, PREDICTION METHODS AND

DATA MINING, AND NOVEL APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-463-4, CSREA Press ©

37

38

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

ISBN: 1-60132-463-4, CSREA Press ©

Int'l Conf. Information and Knowledge Engineering | IKE'17 |

39

Optical Polling for Behavioural Threshold Analysis in

Information Security

Dirk Snyman, Hennie Kruger

School of Computer-, Statistical- and Mathematical Sciences

North West University,

Potchefstroom, South Africa. e-mail: {dirk.snyman, hennie.kruger}@nwu.ac.za

Abstract—In terms of information security research, human attitude and behaviour are commonly sought to be assessed and addressed. These aspects remain complex and difficult to understand and control in order to efficiently manage them. Many psychological and sociological models exist to describe and test human behaviour but they are all reliant on data. This research presents a novel approach for data collection for the specific application of behavioural threshold analysis. Optical polling is found to be a viable alternative to traditional data collection methods which provides good quality data. It addresses some of the issues associated with behavioural threshold analysis and information security research in general.

See All Chapters

See All Slices