Now showing items 60-79 of 94

  • Optimization of Web Services for Cloud Deployment and Mobile Consumption 

    Bleicher, David (East Carolina University, 2013)
    Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ...
  • Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model 

    Knight, Daniel P. (East Carolina University, 2013)
    Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
  • Performance Analysis of Extractive Text Summarization 

    Patel, Vishwa (East Carolina University, 2019-07-22)
    In this era, data is increasing exponentially, and it is crucial for people to keep up with all of this information. The information is available in several different forms such as news articles, online blogs, etc., many ...
  • Performance analysis of machine learning algorithms to predict mobile applications' star ratings via its user interface features 

    Navaei, Maryam (East Carolina University, 2022-05-05)
    The first part of this thesis concludes with an overall summary of the publications so far on the applied Machine Learning techniques in different phases of the Software Development Life Cycle that including Requirements ...
  • Personality assessment from social media data: An ensemble model 

    Taghikhani, Shahin (East Carolina University, 2019-05-01)
    The global prevalence of social media encourages people to upload and share a vast and recurrent amount of information about themselves through various mediums of communication such as text, pictures, audio, and video. ...
  • POSTGRESQL AS A MULTI-MODEL DATABASE 

    Khanal, Rabindra (East Carolina University, 2019-07-26)
    Data is being generated at unprecedented volume and speed, which is popularly known as Big Data. Most of this data is unstructured and requires natural language processing and information retrieval techniques to extract ...
  • A Protocol and Tool for Developing a Descriptive Behavioral Model 

    Jeck, Steven (East Carolina University, 2012)
    Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ...
  • QPE: A System For Deconstructing SQL Queries 

    Bullard, Connor D (East Carolina University, 2023-04-26)
    Research on the topic of converting natural language to machine-readable code has experienced great interest over the last decade, however studies into converting machine-readable code into natural language are sparse. The ...
  • Recurrence and Plasticity in Evolved Neural Controllers 

    Ahlstrom, Mark (East Carolina University, 2009)
    Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ...
  • Risk Considerations in the Use of Unmanned Aerial Vehicles in the Construction Industry 

    Wang, George; Hollar, Donna; Sayger, Susan; Zhu, Zhen; Buckeridge, John S.; Li, Jie; Chong, Jimmy; Duffield, Colin; Ryu, Dongryeol; Hu, Wei (2016-12)
    The use of unmanned aerial vehicles (UAVs) in the construction industry is swiftly growing worldwide. UAVs are changing the way construction companies do business. Contractors are increasingly using camera-mounted UAVs ...
  • Runtime Monitoring On Hard Real-Time Operating Systems 

    Darafsheh, Kaveh (East Carolina University, 2015)
    This thesis will compare and evaluate different approaches in integrating runtime monitors into processes running on a hard real-time operating system. The host system is a single board computer (SBC) with a VxWorks 653 ...
  • Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System 

    Asghary Karahroudy, Ali (East Carolina University, 2011)
    Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...
  • Self-Checked Metamorphic Testing of Monte Carlo Simulation 

    Wu, Tong (East Carolina University, 2011)
    Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ...
  • Sentiment analysis study with an emphasis on the integration of different statement polarities and the evaluation of the resulting sentiments 

    Braddy, Shawn (5/16/2016)
    Social media has become an integral part of today's society and has continued to grow tremendously throughout the world. People communicate through social media constantly and social media has become a pivotal place for ...
  • SOFTWARE ENGINEERING AS A SOCIAL PROCESS: A STUDY OF RESEARCH TRIANGLE PARK 

    Lanier, Lindsey (East Carolina University, 2016-05-03)
    Powered by increased capabilities of online collaboration tools, open source software development has become a critical component of the development landscape for both individual developers and for organizations. However, ...
  • Software Engineering for Real-Time NoSQL Systems-centric Big Data Analytics 

    Clark, William F (East Carolina University, 2020-12-02)
    Recent advances in Big Data Analytics (BDA) have stimulated widespread interest to integrate BDA capabilities into all aspects of a business. Before these advances, companies have spent time optimizing the software ...
  • Software Technology Maturation and Software Security 

    Locklear, Trina Kay (East Carolina University, 2019-08-05)
    Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ...
  • Studies on Gopala-Hemachandra Codes and their Applications 

    Childers, Logan (East Carolina University, 2020-11-16)
    Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several ...
  • Synchronizing Automata and the Černý Conjecture 

    Masters, Miciah Dashiel Butler (East Carolina University, 2012)
    We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ...
  • SYSTEMATIC REVIEW OF LITERATURE USING TWITTER AS A TOOL 

    Pradyumn, Mudit (East Carolina University, 2018-07-17)
    Twitter has over 330 million active monthly users producing roughly 500 million Tweets per day, or 200 billion Tweets a year. Making this one of the largest human-generated opinion data collections. In addition to this ...