Browsing College of Engineering and Technology by Title
Now showing items 10-25 of 25
-
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ... -
Migrating Legacy Software Applications to Cloud Computing Environments : A Software Architect's Approach
(East Carolina University, 2011)Cloud computing has garnered a great deal of interest in the past few years. The availability of on-demand computational power is presumed to provide substantial IT infrastructure cost-savings, partially through the ... -
Migration of Legacy Web Application Using NoSQL Databases
(East Carolina University, 2013)The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ... -
miRCancer : a microRNA-Cancer Association Database and Toolkit Based on Text Mining
(East Carolina University, 2010)MicroRNAs (miRNAs) are a class of single-stranded small non-coding RNAs. Study of miRNAs has been a fast growing field since the first miRNA was discovered in 1993. Many findings indicate that miRNA plays an important role ... -
Modeling and Testing of Aspect-Oriented Systems
(East Carolina University, 2011)Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
A New Approach to Communications Management Planning Through 3D Web and Semantic Web Technologies
(2011-09)Communication management plans are used to determine not only who needs what information but also how that information will be collected and transmitted. Now two evolving technologies are looking to drive project planners ... -
Optimization of Web Services for Cloud Deployment and Mobile Consumption
(East Carolina University, 2013)Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ... -
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ... -
A Protocol and Tool for Developing a Descriptive Behavioral Model
(East Carolina University, 2012)Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ... -
Recurrence and Plasticity in Evolved Neural Controllers
(East Carolina University, 2009)Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ... -
Self-Checked Metamorphic Testing of Monte Carlo Simulation
(East Carolina University, 2011)Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ... -
Small Business Information Security
(East Carolina University, 2012)Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ... -
USING HYBRID SCRUM TO MEET WATERFALL PROCESS DELIVERABLES
(East Carolina University, 2013)System Development Life Cycles (SDLCs) for organizations are often based upon traditional software development models such as the waterfall model. These processes are complex, heavy in documentation deliverables, and are ... -
Using n-grams to identify time periods of cultural influence
(East Carolina University, 2012)An author's literary style is influenced by the cultural time period in which the author lives. The author's ideas, and the words chosen to express them, can help identify the cultural time period that most influenced the ... -
Virtual world technologies provide platform for interaction between on-campus and online students: A case study
(Vancouver, BC., 2011)There has been a great deal of attention paid to efforts by educators to integrate teaching methodologies and strategies between face to face and online classrooms in an effort to maximize learning by combining delivery ...