skip to main content
10.1145/3409334acmconferencesBook PagePublication Pagesacm-seConference Proceedingsconference-collections
ACM SE '21: Proceedings of the 2021 ACM Southeast Conference
ACM2021 Proceeding
  • Conference Chair:
  • Kazi Rahman,
  • Program Chair:
  • Eric Gamess
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACM SE '21: 2021 ACM Southeast Conference Virtual Event USA April 15 - 17, 2021
ISBN:
978-1-4503-8068-3
Published:
10 May 2021
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

ACMSE 2021 continues the ACM Southeast Conference tradition of participation in all areas of computing disciplines.

research-article
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges

Recently, strategies of National Basketball Association (NBA) teams have evolved with the skillsets of players and the emergence of advanced analytics. This has led to a more free-flowing game in which traditional positions and play calls have been ...

research-article
Fast streaming translation using machine learning with transformer

Machine Translation is the usage of machine learning techniques in translation from one language to another. It has recently been applied to streaming translation, also known as automatic subtitling. The most common challenge in this area is the trade-...

research-article
Epileptic seizures classification in EEG using PCA based genetic algorithm through machine learning

In this research, a Principal Component Analysis (PCA) with Genetic Algorithm based Machine Learning (ML) approach is developed for the binary classification of epileptic seizures from the EEG dataset. The proposed approach utilizes PCA to reduce the ...

research-article
A bottom-up approach to creating a cyberattack model with fine grain components

In today's world every system developer and administrator should be familiar with cyberattacks and possible threats to their organizations systems. Petri Nets have been used to model and simulate cyberattacks allowing for additional knowledge on the ...

research-article
Teaching a computer forensics course

Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although ...

research-article
Meta-analysis to study the impact of learning engagement strategies in introductory computer programming courses: a multi-institutional study

Various Learning Engagement Strategies (LESs) have been used in CS education to motivate students and facilitate learning. More recently, LESs are being used to support programming pedagogy. Therefore, investigating the influence that the multiple ...

research-article
Comparison of algorithm learning tools to assist the education of alabama students

With the introduction of the Digital Literacy and Computer Science (DLCS) education standards, there is a need for Alabama teachers at all grade levels to be equipped with software tools that can be used to bolster students' learning of content ...

research-article
Evaluation of student collaboration on canvas LMS using educational data mining techniques

Online discussion forums provide valuable information about students' learning and engagement in course activities. The hidden knowledge in the contents of these discussion posts can be examined by analyzing the social interactions between the ...

research-article
A survey of wireless network simulation and/or emulation software for use in higher education

In this paper, we survey network simulators and/or emulators with support for wireless networks. We selected six tools, OMNeT++/INET, ns-3, Packet Tracer, Mininet-WiFi, CORE and Komondor, and further investigate them in regards to their potential use in ...

research-article
Best Paper
Best Paper
Item based recommendation using matrix-factorization-like embeddings from deep networks

In this paper we describe a method for computing item based recommendations using matrix-factorization-like embeddings of the items computed using a neural network. Matrix factorizations (MF) compute near optimal item embeddings by minimizing a loss ...

research-article
Testbed development for a novel approach towards high accuracy indoor localization with smartphones

Due to its deep penetration in people's daily life, smartphone has been proposed as a practical platform for indoor localization. Yet one major challenge is how to handle the non-negligible sensor errors that can become problematic when accumulated over ...

research-article
Game development workshops designed and delivered by peer mentors to increase student curiosity and interest in an introductory programming course

Student motivation in the Programming Fundamentals (CS1) course in our college has long been a problem. Our project utilized both peer modeling and game development to increase students' curiosity for programming and help them enjoy the learning ...

research-article
Characterizing networking performance and interrupt overhead of container overlay networks

Containers, an emerging service to manage and deploy applications into isolated boxes, are quickly increasing in popularity in the cloud and edge computing. In order to provide connectivity among multiple hosts, cloud providers adopt overlay networks, ...

research-article
A computer vision pipeline for automatic large-scale inventory tracking

Monitoring and tracking inventory is one of the most important aspects of administrating any large-scale enterprise operation that involves physical goods. One of the most evident examples of such operations is automotive manufacturing, especially for ...

research-article
Detecting fabric density and weft distortion in woven fabrics using the discrete fourier transform

Fabric density and distortion offer important information on fabric attributes and quality during the manufacturing process. However, most current procedures require human effort, which is often inefficient, time-consuming, and imprecise. In this paper, ...

research-article
Detection of local structures in images using local entropy information

Recently one deep learning technique, Convolutional Neural Networks (CNN), has gained immense popularity. Their success is particularly noticeable on image data, but falls short on non-image data. New methods have been developed to transform non-image ...

research-article
Public Access
A three layer spatial-spectral hyperspectral image classification model using guided median filters

Hyperspectral images (HSI) contain rich spectral information from a large portion of the electromagnetic spectrum. Using these images, it is possible to make pixel-level classification as each pixel holds hundreds of features. In this paper, we propose ...

research-article
Application of back-translation: a transfer learning approach to identify ambiguous software requirements

Ambiguous requirements are problematic in requirement engineering as various stakeholders can debate on the interpretation of the requirements leading to a variety of issues in the development stages. Since requirement specifications are usually written ...

research-article
Automated mapping of fault logs to SRS requirements using key-phrase extraction

Software requirement specification (SRS) document contains faults due to the inherent ambiguous nature of natural language (NL). These faults are identified and reported (using fault logs) through inspections and are handed back to the requirements ...

research-article
Encoding feature models using mainstream JSON technologies

Feature modeling is a process for identifying the common and variable parts of a software product line and recording them in a tree-structured feature model. However, feature models can be difficult for mainstream developers to specify and maintain ...

research-article
Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attack

The Internet of Things (IoT) is the term coined to encompass the myriad of devices that have some data processing and transmitting capabilities. Due to the increasing number of IoT devices connected to the Internet, network protocols intended for IoT ...

short-paper
Wavelet transform-based feature extraction approach for epileptic seizure classification

In this research, a wavelet transform-based feature extraction approach is proposed for the detection of epileptic seizures from the EEG raw dataset. The proposed approach uses the Wavelet Transform (WT) method to divide the seizure and non-seizure ...

short-paper
Modification and complexity analysis of an incremental learning algorithm under the VPRS model

This article introduced the modification of an incremental learning algorithm and summarized its performance via the complexity analysis. The algorithm was originally proposed in the context of classic rough set theory, utilizing the hierarchy of ...

short-paper
Best Short Paper
Best Short Paper
An empirical study of thermal attacks on edge platforms

Cloud-edge systems are vulnerable to thermal attacks as the increased energy consumption may remain undetected, while occurring alongside normal, CPU-intensive applications. The purpose of our research is to study thermal effects on modern edge systems. ...

short-paper
Public Access
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest

Network security is an important aspect for any organization to keep their information systems secure. A Network Intrusion Detection System (NIDS) is an aid to secure the network by detecting abnormal or malicious traffic. In this paper, we applied a ...

short-paper
Verifying phishmon: a framework for dynamic webpage classification

Phishing attacks are the scourge of the network security manager's job. Looking for a solution to counter this trend, this paper examines and verifies the efficacy of Phishmon, a machine learning framework for scrutinizing webpages that relies on ...

short-paper
Public Access
A study on students' views toward K-12 computer science teaching career

The national STEM teacher shortage in public schools is no secret. A recent expansion and adoption Computer Science (CS) Education in the K-12 curriculum exacerbates the shortage. Many states have formed CS Education committees in charge of creating ...

short-paper
Web-based 3D visualization system for anatomy online instruction

Problem-based instruction is an active learning instructional practice that requires students to use rational and critical thinking skills to generate reasonable solutions to problem-based scenarios. For complex medical conditions such as stroke, ...

short-paper
Analysis of students' database design skills in capstone projects

In this paper, we use Association rule learning to analyze the relationship between students' performance in database courses and their performance of database design in the capstone projects. Students need to design and implement databases to store ...

short-paper
An evaluation of continuous integration and delivery frameworks for classroom use

Continuous integration and delivery (CI/CD) frameworks are a core element of DevOps-based software development. A PHP-based case study assessed the suitability of five such frameworks---JFrog Arti-factory, Bitbucket Pipelines, Jenkins, Azure DevOps, and ...

Contributors
  • Jacksonville State University

Recommendations

Acceptance Rates

Overall Acceptance Rate178of377submissions,47%
YearSubmittedAcceptedRate
ACM SE '241374432%
ACM SE '23713144%
ACMSE '18413483%
ACM SE '17342162%
ACM SE '10944851%
Overall37717847%