Now showing items 21-40 of 43

  • Migrating Legacy Software Applications to Cloud Computing Environments : A Software Architect's Approach 

    Rowe, Fred (East Carolina University, 2011)
    Cloud computing has garnered a great deal of interest in the past few years. The availability of on-demand computational power is presumed to provide substantial IT infrastructure cost-savings, partially through the ...
  • Migration of Legacy Web Application Using NoSQL Databases 

    Ghasemi, Pouyan (East Carolina University, 2013)
    The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ...
  • miRCancer : a microRNA-Cancer Association Database and Toolkit Based on Text Mining 

    Xie, Boya (East Carolina University, 2010)
    MicroRNAs (miRNAs) are a class of single-stranded small non-coding RNAs. Study of miRNAs has been a fast growing field since the first miRNA was discovered in 1993. Many findings indicate that miRNA plays an important role ...
  • Modeling and Testing of Aspect-Oriented Systems 

    Jiang, Wenhuan (East Carolina University, 2011)
    Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ...
  • Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images 

    Adeli, Hossein (East Carolina University, 2012)
    In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ...
  • MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN 

    Fu, Tian (East Carolina University, 2012)
    Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
  • A New Approach to Communications Management Planning Through 3D Web and Semantic Web Technologies 

    Lesko, Charles J. Jr. (2011-09)
    Communication management plans are used to determine not only who needs what information but also how that information will be collected and transmitted. Now two evolving technologies are looking to drive project planners ...
  • Optimization of Web Services for Cloud Deployment and Mobile Consumption 

    Bleicher, David (East Carolina University, 2013)
    Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ...
  • Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model 

    Knight, Daniel P. (East Carolina University, 2013)
    Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
  • A Protocol and Tool for Developing a Descriptive Behavioral Model 

    Jeck, Steven (East Carolina University, 2012)
    Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ...
  • Recurrence and Plasticity in Evolved Neural Controllers 

    Ahlstrom, Mark (East Carolina University, 2009)
    Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ...
  • Risk Considerations in the Use of Unmanned Aerial Vehicles in the Construction Industry 

    Wang, George; Hollar, Donna; Sayger, Susan; Zhu, Zhen; Buckeridge, John S.; Li, Jie; Chong, Jimmy; Duffield, Colin; Ryu, Dongryeol; Hu, Wei (2016-12)
    The use of unmanned aerial vehicles (UAVs) in the construction industry is swiftly growing worldwide. UAVs are changing the way construction companies do business. Contractors are increasingly using camera-mounted UAVs ...
  • Safe Design Suggestions for Vegetated Roofs 

    Behm, Michael (2012-08)
    Rooftop vegetation is becoming increasingly popular because of its environmental benefits and its ability to earn green-building certification credits. With the exception of one international guideline, there is little ...
  • Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System 

    Asghary Karahroudy, Ali (East Carolina University, 2011)
    Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...
  • Self-Checked Metamorphic Testing of Monte Carlo Simulation 

    Wu, Tong (East Carolina University, 2011)
    Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ...
  • Small Business Information Security 

    Vail, John Edwards (East Carolina University, 2012)
    Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
  • A Survey of Retailer's Satisfaction 

    Nakhostin Maher, Zahra (East Carolina University, 2013)
    The purpose of this exploratory study is to examine the overall satisfaction of retailers' from manufacturers in a supply-chain system, based on selected "Lean" related factors, such as quality, delivery, cost, and pricing. ...
  • Synchronizing Automata and the Černý Conjecture 

    Masters, Miciah Dashiel Butler (East Carolina University, 2012)
    We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ...
  • UInterestManager : A Generic Framework to Model User Interests 

    Darabi, Majid (East Carolina University, 2013)
    With the proliferation of documents on the Internet, it has become increasingly difficult for users to search and retrieve the information they want: information that is relevant and interesting. To address this problem, ...
  • USING HYBRID SCRUM TO MEET WATERFALL PROCESS DELIVERABLES 

    Moster, Emil (East Carolina University, 2013)
    System Development Life Cycles (SDLCs) for organizations are often based upon traditional software development models such as the waterfall model. These processes are complex, heavy in documentation deliverables, and are ...