Now showing items 1-20 of 24

  • AlienG2 - An Automated Analysis Tool for Genome-scale Prediction of Horizontal Gene Transfer 

    Ahmadvand, Ali (East Carolina University, 2013)
    This thesis will present a method for predicting Horizontal Gene Transfer (HGT) events through the creation of a web-based application called AlienG2. HGT is the process of genetic exchange between distantly related ...
  • Cloud Platform for Research Crowdsourcing in Mobile Testing 

    Starov, Oleksii (East Carolina University, 2013)
    Mobile application testing and testing over a cloud are two highly topical fields nowadays. Mobile testing presents specific test activities, including verification of an application against a variety of heterogeneous ...
  • ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK 

    Anderson, James Carold (East Carolina University, 2012)
    Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute ...
  • Formal Model To Reduce the Risk Of Cloud Outages 

    Hotwani, Komal (East Carolina University, 2014)
    Cloud outages have become very common in recent years as many companies adopt hosted services. One of the major reasons for cloud outages is the service level for availability, reliability, security not being met as mentioned ...
  • GestDefLS : A Gesture Definition Language in Swift 

    Writtenberry, Robert William (East Carolina University, 2015)
    The application programming interfaces supplied by Apple for developing applications in the Swift programming language on iOS devices provide limited support when it comes to declaring gesture recognizers outside of those ...
  • Group Mutual Exclusion in Linear Time and Space 

    He, Yuan (East Carolina University, 2014)
    The Group Mutual Exclusion (GME) problem, introduced by Joung, is a natural extension of the classical Mutual Exclusion problem. In the classical Mutual Exclusion problem, two or more processes are not simultaneously allowed ...
  • Improving Access to Information through Conceptual Classification 

    Bazargani, Sahar (East Carolina University, 2011)
    Overwhelming the users with large amount of information on the Web has resulted in users' inability to find the information and their dissatisfaction with available information searching and filtering systems. On the other ...
  • Migrating Legacy Software Applications to Cloud Computing Environments : A Software Architect's Approach 

    Rowe, Fred (East Carolina University, 2011)
    Cloud computing has garnered a great deal of interest in the past few years. The availability of on-demand computational power is presumed to provide substantial IT infrastructure cost-savings, partially through the ...
  • Migration of Legacy Web Application Using NoSQL Databases 

    Ghasemi, Pouyan (East Carolina University, 2013)
    The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ...
  • miRCancer : a microRNA-Cancer Association Database and Toolkit Based on Text Mining 

    Xie, Boya (East Carolina University, 2010)
    MicroRNAs (miRNAs) are a class of single-stranded small non-coding RNAs. Study of miRNAs has been a fast growing field since the first miRNA was discovered in 1993. Many findings indicate that miRNA plays an important role ...
  • Modeling and Testing of Aspect-Oriented Systems 

    Jiang, Wenhuan (East Carolina University, 2011)
    Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ...
  • Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images 

    Adeli, Hossein (East Carolina University, 2012)
    In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ...
  • Optimization of Web Services for Cloud Deployment and Mobile Consumption 

    Bleicher, David (East Carolina University, 2013)
    Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ...
  • Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model 

    Knight, Daniel P. (East Carolina University, 2013)
    Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
  • A Protocol and Tool for Developing a Descriptive Behavioral Model 

    Jeck, Steven (East Carolina University, 2012)
    Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ...
  • Recurrence and Plasticity in Evolved Neural Controllers 

    Ahlstrom, Mark (East Carolina University, 2009)
    Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ...
  • Risk Considerations in the Use of Unmanned Aerial Vehicles in the Construction Industry 

    Wang, George; Hollar, Donna; Sayger, Susan; Zhu, Zhen; Buckeridge, John S.; Li, Jie; Chong, Jimmy; Duffield, Colin; Ryu, Dongryeol; Hu, Wei (2016-12)
    The use of unmanned aerial vehicles (UAVs) in the construction industry is swiftly growing worldwide. UAVs are changing the way construction companies do business. Contractors are increasingly using camera-mounted UAVs ...
  • Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System 

    Asghary Karahroudy, Ali (East Carolina University, 2011)
    Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...
  • Self-Checked Metamorphic Testing of Monte Carlo Simulation 

    Wu, Tong (East Carolina University, 2011)
    Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ...
  • Synchronizing Automata and the Černý Conjecture 

    Masters, Miciah Dashiel Butler (East Carolina University, 2012)
    We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ...