ACMSE 2021 continues the ACM Southeast Conference tradition of participation in all areas of computing disciplines.
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges
Recently, strategies of National Basketball Association (NBA) teams have evolved with the skillsets of players and the emergence of advanced analytics. This has led to a more free-flowing game in which traditional positions and play calls have been ...
Fast streaming translation using machine learning with transformer
Machine Translation is the usage of machine learning techniques in translation from one language to another. It has recently been applied to streaming translation, also known as automatic subtitling. The most common challenge in this area is the trade-...
Epileptic seizures classification in EEG using PCA based genetic algorithm through machine learning
In this research, a Principal Component Analysis (PCA) with Genetic Algorithm based Machine Learning (ML) approach is developed for the binary classification of epileptic seizures from the EEG dataset. The proposed approach utilizes PCA to reduce the ...
A bottom-up approach to creating a cyberattack model with fine grain components
In today's world every system developer and administrator should be familiar with cyberattacks and possible threats to their organizations systems. Petri Nets have been used to model and simulate cyberattacks allowing for additional knowledge on the ...
Teaching a computer forensics course
Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although ...
Meta-analysis to study the impact of learning engagement strategies in introductory computer programming courses: a multi-institutional study
- Vijayalakshmi Ramasamy,
- Mourya Reddy Narasareddygari,
- Gursimran Walia,
- Andrew Allen,
- Debra Duke,
- James Kiper,
- Debra Davis
Various Learning Engagement Strategies (LESs) have been used in CS education to motivate students and facilitate learning. More recently, LESs are being used to support programming pedagogy. Therefore, investigating the influence that the multiple ...
Comparison of algorithm learning tools to assist the education of alabama students
With the introduction of the Digital Literacy and Computer Science (DLCS) education standards, there is a need for Alabama teachers at all grade levels to be equipped with software tools that can be used to bolster students' learning of content ...
Evaluation of student collaboration on canvas LMS using educational data mining techniques
Online discussion forums provide valuable information about students' learning and engagement in course activities. The hidden knowledge in the contents of these discussion posts can be examined by analyzing the social interactions between the ...
A survey of wireless network simulation and/or emulation software for use in higher education
In this paper, we survey network simulators and/or emulators with support for wireless networks. We selected six tools, OMNeT++/INET, ns-3, Packet Tracer, Mininet-WiFi, CORE and Komondor, and further investigate them in regards to their potential use in ...
Item based recommendation using matrix-factorization-like embeddings from deep networks
- Vaidyanath Areyur Shanthakumar,
- Clark Barnett,
- Keith Warnick,
- Putu Ayu Sudyanti,
- Vitalii Gerbuz,
- Tathagata Mukherjee
In this paper we describe a method for computing item based recommendations using matrix-factorization-like embeddings of the items computed using a neural network. Matrix factorizations (MF) compute near optimal item embeddings by minimizing a loss ...
Testbed development for a novel approach towards high accuracy indoor localization with smartphones
Due to its deep penetration in people's daily life, smartphone has been proposed as a practical platform for indoor localization. Yet one major challenge is how to handle the non-negligible sensor errors that can become problematic when accumulated over ...
Game development workshops designed and delivered by peer mentors to increase student curiosity and interest in an introductory programming course
Student motivation in the Programming Fundamentals (CS1) course in our college has long been a problem. Our project utilized both peer modeling and game development to increase students' curiosity for programming and help them enjoy the learning ...
Characterizing networking performance and interrupt overhead of container overlay networks
Containers, an emerging service to manage and deploy applications into isolated boxes, are quickly increasing in popularity in the cloud and edge computing. In order to provide connectivity among multiple hosts, cloud providers adopt overlay networks, ...
A computer vision pipeline for automatic large-scale inventory tracking
Monitoring and tracking inventory is one of the most important aspects of administrating any large-scale enterprise operation that involves physical goods. One of the most evident examples of such operations is automotive manufacturing, especially for ...
Detecting fabric density and weft distortion in woven fabrics using the discrete fourier transform
Fabric density and distortion offer important information on fabric attributes and quality during the manufacturing process. However, most current procedures require human effort, which is often inefficient, time-consuming, and imprecise. In this paper, ...
Detection of local structures in images using local entropy information
Recently one deep learning technique, Convolutional Neural Networks (CNN), has gained immense popularity. Their success is particularly noticeable on image data, but falls short on non-image data. New methods have been developed to transform non-image ...
A three layer spatial-spectral hyperspectral image classification model using guided median filters
Hyperspectral images (HSI) contain rich spectral information from a large portion of the electromagnetic spectrum. Using these images, it is possible to make pixel-level classification as each pixel holds hundreds of features. In this paper, we propose ...
Application of back-translation: a transfer learning approach to identify ambiguous software requirements
Ambiguous requirements are problematic in requirement engineering as various stakeholders can debate on the interpretation of the requirements leading to a variety of issues in the development stages. Since requirement specifications are usually written ...
Automated mapping of fault logs to SRS requirements using key-phrase extraction
Software requirement specification (SRS) document contains faults due to the inherent ambiguous nature of natural language (NL). These faults are identified and reported (using fault logs) through inspections and are handed back to the requirements ...
Encoding feature models using mainstream JSON technologies
Feature modeling is a process for identifying the common and variable parts of a software product line and recording them in a tree-structured feature model. However, feature models can be difficult for mainstream developers to specify and maintain ...
Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attack
The Internet of Things (IoT) is the term coined to encompass the myriad of devices that have some data processing and transmitting capabilities. Due to the increasing number of IoT devices connected to the Internet, network protocols intended for IoT ...
Wavelet transform-based feature extraction approach for epileptic seizure classification
In this research, a wavelet transform-based feature extraction approach is proposed for the detection of epileptic seizures from the EEG raw dataset. The proposed approach uses the Wavelet Transform (WT) method to divide the seizure and non-seizure ...
Modification and complexity analysis of an incremental learning algorithm under the VPRS model
This article introduced the modification of an incremental learning algorithm and summarized its performance via the complexity analysis. The algorithm was originally proposed in the context of classic rough set theory, utilizing the hierarchy of ...
An empirical study of thermal attacks on edge platforms
Cloud-edge systems are vulnerable to thermal attacks as the increased energy consumption may remain undetected, while occurring alongside normal, CPU-intensive applications. The purpose of our research is to study thermal effects on modern edge systems. ...
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest
Network security is an important aspect for any organization to keep their information systems secure. A Network Intrusion Detection System (NIDS) is an aid to secure the network by detecting abnormal or malicious traffic. In this paper, we applied a ...
Verifying phishmon: a framework for dynamic webpage classification
- John Tomaselli,
- Austin Willoughby,
- Jorge Vargas Amezcua,
- Emma Delehanty,
- Katherine Floyd,
- Damien Wright,
- Mark Lammers,
- Ron Vetter
Phishing attacks are the scourge of the network security manager's job. Looking for a solution to counter this trend, this paper examines and verifies the efficacy of Phishmon, a machine learning framework for scrutinizing webpages that relies on ...
A study on students' views toward K-12 computer science teaching career
The national STEM teacher shortage in public schools is no secret. A recent expansion and adoption Computer Science (CS) Education in the K-12 curriculum exacerbates the shortage. Many states have formed CS Education committees in charge of creating ...
Web-based 3D visualization system for anatomy online instruction
Problem-based instruction is an active learning instructional practice that requires students to use rational and critical thinking skills to generate reasonable solutions to problem-based scenarios. For complex medical conditions such as stroke, ...
Analysis of students' database design skills in capstone projects
In this paper, we use Association rule learning to analyze the relationship between students' performance in database courses and their performance of database design in the capstone projects. Students need to design and implement databases to store ...
An evaluation of continuous integration and delivery frameworks for classroom use
Continuous integration and delivery (CI/CD) frameworks are a core element of DevOps-based software development. A PHP-based case study assessed the suitability of five such frameworks---JFrog Arti-factory, Bitbucket Pipelines, Jenkins, Azure DevOps, and ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ACM SE '24 | 137 | 44 | 32% |
ACM SE '23 | 71 | 31 | 44% |
ACMSE '18 | 41 | 34 | 83% |
ACM SE '17 | 34 | 21 | 62% |
ACM SE '10 | 94 | 48 | 51% |
Overall | 377 | 178 | 47% |