Now showing items 41-60 of 69

  • Modeling and Prediction of Cryptocurrency Prices Using Machine Learning Techniques 

    Ashayer, Alireza (East Carolina University, 2019-05-01)
    With the introduction of Bitcoin in the year 2008 as the first practical decentralized cryptocurrency, the interest in cryptocurrencies and their underlying technology, Blockchain, has skyrocketed. Their promise of security, ...
  • Modeling and Testing of Aspect-Oriented Systems 

    Jiang, Wenhuan (East Carolina University, 2011)
    Aspect-Oriented programming modularizes crosscutting concerns into Aspects, which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the ...
  • Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images 

    Adeli, Hossein (East Carolina University, 2012)
    In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ...
  • Motion-Based Segmentation of Medical MRI Images: A Review and Analysis 

    Adhikari, Anil (East Carolina University, 2018-07-20)
    Image data produced in medical field assists doctors, surgeons and researchers to study muscle and tissue structure to identify and diagnose patient specific diseases and deficiency. Due to the complexity of muscle ...
  • MRSL: AUTONOMOUS NEURAL NETWORK-BASED SELF-STABILIZING SYSTEM 

    Hedayati, Hooman (East Carolina University, 2015-12-15)
    Stabilizing and localizing the positioning systems autonomously in the areas without GPS accessibility is a difficult task. In this thesis we describe a methodology called Most Reliable Straight Line (MRSL) for stabilizing ...
  • Optimization of Web Services for Cloud Deployment and Mobile Consumption 

    Bleicher, David (East Carolina University, 2013)
    Research performed for this thesis indicates an impedance mismatch between prevailing approaches to development of service-oriented enterprise applications and the consumption capabilities of mobile devices. The rich ...
  • Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model 

    Knight, Daniel P. (East Carolina University, 2013)
    Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
  • Performance Analysis of Extractive Text Summarization 

    Patel, Vishwa (East Carolina University, 2019-07-22)
    In this era, data is increasing exponentially, and it is crucial for people to keep up with all of this information. The information is available in several different forms such as news articles, online blogs, etc., many ...
  • Personality assessment from social media data: An ensemble model 

    Taghikhani, Shahin (East Carolina University, 2019-05-01)
    The global prevalence of social media encourages people to upload and share a vast and recurrent amount of information about themselves through various mediums of communication such as text, pictures, audio, and video. ...
  • POSTGRESQL AS A MULTI-MODEL DATABASE 

    Khanal, Rabindra (East Carolina University, 2019-07-26)
    Data is being generated at unprecedented volume and speed, which is popularly known as Big Data. Most of this data is unstructured and requires natural language processing and information retrieval techniques to extract ...
  • Recurrence and Plasticity in Evolved Neural Controllers 

    Ahlstrom, Mark (East Carolina University, 2009)
    Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ...
  • Runtime Monitoring On Hard Real-Time Operating Systems 

    Darafsheh, Kaveh (East Carolina University, 2015)
    This thesis will compare and evaluate different approaches in integrating runtime monitors into processes running on a hard real-time operating system. The host system is a single board computer (SBC) with a VxWorks 653 ...
  • Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System 

    Asghary Karahroudy, Ali (East Carolina University, 2011)
    Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ...
  • Self-Checked Metamorphic Testing of Monte Carlo Simulation 

    Wu, Tong (East Carolina University, 2011)
    Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ...
  • Sentiment analysis study with an emphasis on the integration of different statement polarities and the evaluation of the resulting sentiments 

    Braddy, Shawn (5/16/2016)
    Social media has become an integral part of today's society and has continued to grow tremendously throughout the world. People communicate through social media constantly and social media has become a pivotal place for ...
  • SOFTWARE ENGINEERING AS A SOCIAL PROCESS: A STUDY OF RESEARCH TRIANGLE PARK 

    Lanier, Lindsey (East Carolina University, 2016-05-03)
    Powered by increased capabilities of online collaboration tools, open source software development has become a critical component of the development landscape for both individual developers and for organizations. However, ...
  • Software Engineering for Real-Time NoSQL Systems-centric Big Data Analytics 

    Clark, William F (East Carolina University, 2020-12-02)
    Recent advances in Big Data Analytics (BDA) have stimulated widespread interest to integrate BDA capabilities into all aspects of a business. Before these advances, companies have spent time optimizing the software ...
  • Software Technology Maturation and Software Security 

    Locklear, Trina Kay (East Carolina University, 2019-08-05)
    Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ...
  • Studies on Gopala-Hemachandra Codes and their Applications 

    Childers, Logan (East Carolina University, 2020-11-16)
    Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several ...
  • Synchronizing Automata and the Černý Conjecture 

    Masters, Miciah Dashiel Butler (East Carolina University, 2012)
    We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ...