Browsing College of Engineering and Technology by Title
Now showing items 15-34 of 43
-
Formal Model To Reduce the Risk Of Cloud Outages
(East Carolina University, 2014)Cloud outages have become very common in recent years as many companies adopt hosted services. One of the major reasons for cloud outages is the service level for availability, reliability, security not being met as mentioned ... -
GestDefLS : A Gesture Definition Language in Swift
(East Carolina University, 2015)The application programming interfaces supplied by Apple for developing applications in the Swift programming language on iOS devices provide limited support when it comes to declaring gesture recognizers outside of those ... -
Group Mutual Exclusion in Linear Time and Space
(East Carolina University, 2014)The Group Mutual Exclusion (GME) problem, introduced by Joung, is a natural extension of the classical Mutual Exclusion problem. In the classical Mutual Exclusion problem, two or more processes are not simultaneously allowed ... -
Implementation of a System for Monitoring Overall Equipment Effectiveness (OEE) and Exploring Correlation Between OEE and Process Capability
(East Carolina University, 2011)An effective process equipment monitoring tool widely accepted in manufacturing units today is overall equipment effectiveness (OEE). OEE began its debut as a pillar of the total productive maintenance (TPM) system, where ... -
Improving Access to Information through Conceptual Classification
(East Carolina University, 2011)Overwhelming the users with large amount of information on the Web has resulted in users' inability to find the information and their dissatisfaction with available information searching and filtering systems. On the other ... -
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ... -
Migrating Legacy Software Applications to Cloud Computing Environments : A Software Architect's Approach
(East Carolina University, 2011)Cloud computing has garnered a great deal of interest in the past few years. The availability of on-demand computational power is presumed to provide substantial IT infrastructure cost-savings, partially through the ... -
Migration of Legacy Web Application Using NoSQL Databases
(East Carolina University, 2013)The Migration of the legacy web application to Content Management Systems (CMS) is inevitable because of the overload of managing the content. Traditionally, Content Management Systems are built with RDBMSes and the migration ... -
miRCancer : a microRNA-Cancer Association Database and Toolkit Based on Text Mining
(East Carolina University, 2010)MicroRNAs (miRNAs) are a class of single-stranded small non-coding RNAs. Study of miRNAs has been a fast growing field since the first miRNA was discovered in 1993. Many findings indicate that miRNA plays an important role ... -
Modeling and Testing of Aspect-Oriented Systems
(East Carolina University, 2011)Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ... -
Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images
(East Carolina University, 2012)In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
A New Approach to Communications Management Planning Through 3D Web and Semantic Web Technologies
(2011-09)Communication management plans are used to determine not only who needs what information but also how that information will be collected and transmitted. Now two evolving technologies are looking to drive project planners ... -
Optimization of Web Services for Cloud Deployment and Mobile Consumption
(East Carolina University, 2013)Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ... -
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ... -
A Protocol and Tool for Developing a Descriptive Behavioral Model
(East Carolina University, 2012)Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ... -
Recurrence and Plasticity in Evolved Neural Controllers
(East Carolina University, 2009)Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ... -
Risk Considerations in the Use of Unmanned Aerial Vehicles in the Construction Industry
(2016-12)The use of unmanned aerial vehicles (UAVs) in the construction industry is swiftly growing worldwide. UAVs are changing the way construction companies do business. Contractors are increasingly using camera-mounted UAVs ... -
Safe Design Suggestions for Vegetated Roofs
(2012-08)Rooftop vegetation is becoming increasingly popular because of its environmental benefits and its ability to earn green-building certification credits. With the exception of one international guideline, there is little ... -
Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System
(East Carolina University, 2011)Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...