Search
Now showing items 1-10 of 11
ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK
(East Carolina University, 2012)
Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute ...
Safe Design Suggestions for Vegetated Roofs
(2012-08)
Rooftop vegetation is becoming increasingly popular because of its environmental benefits and its ability to earn green-building certification credits. With the exception of one international guideline, there is little ...
Synchronizing Automata and the Černý Conjecture
(East Carolina University, 2012)
We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ...
A Protocol and Tool for Developing a Descriptive Behavioral Model
(East Carolina University, 2012)
Fuzzy rules have been used to model complex human behavior in order to develop sophisticated industrial control systems. The use of fuzzy rules to create a behavioral model provides a quantitative basis for discussing the ...
Contributing organizational factors to driver fatigue based on the Compliance, Safety, Accountability (CSA 2010) Measurement System
(2012)
Fatigue is considered as one of the main causes of motor carrier crashes. To control this hazard, Federal Motor Carrier Safety Administration (FMCSA) enforces prescriptive Hours-of-Service (HOS) regulation. Over the last ...
Safe design of skyrise greenery in Singapore
(2012)
Singapore is transforming from a “garden city” to a “City-in-a-Garden”. Designing for safety is recognized by researchers and some governments as a best practice in facilitating eventual worker safety within the built ...
Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images
(East Carolina University, 2012)
In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ...
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)
Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ...
Small Business Information Security
(East Carolina University, 2012)
Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...