Search
Now showing items 141-150 of 202
MRSL: AUTONOMOUS NEURAL NETWORK-BASED SELF-STABILIZING SYSTEM
(East Carolina University, 2015-12-15)
Stabilizing and localizing the positioning systems autonomously in the areas without GPS accessibility is a difficult task. In this thesis we describe a methodology called Most Reliable Straight Line (MRSL) for stabilizing ...
Modeling Salient Object-Object Interactions to Generate Textual Descriptions for Natural Images
(East Carolina University, 2012)
In this thesis we consider the problem of automatically generating textual descriptions of images which is useful in many applications. For example, searching and retrieving visual data in overwhelming number of images and ...
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)
Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ...
Data in Depth: Web 3-D Technologies Provide New Approaches to the Presentation of Course Content
(2010)
For nearly two decades, the Web has provided the
classroom with vast, ever-expanding volumes of browseraccessible
information. As the web has evolved so too has
our desire to become more involved with the process ...
Small Business Information Security
(East Carolina University, 2012)
Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
Desired Versus Actual Training for Online Instructors in Community Colleges
(East Carolina University, 2009)
The growth of distance education and the demand for instructors has developed over the past ten to fifteen years. There is a perception that the type and amount of instructor preparation is highly variable between institutions. ...
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)
Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
Using n-grams to identify time periods of cultural influence
(East Carolina University, 2012)
An author's literary style is influenced by the cultural time period in which the author lives. The author's ideas, and the words chosen to express them, can help identify the cultural time period that most influenced the ...