Browsing Computer Science by Title
Now showing items 68-87 of 94
-
Recurrence and Plasticity in Evolved Neural Controllers
(East Carolina University, 2009)Among the more important applications of evolutionary neurocontrollers is the development of systems that are able to dynamically adapt to a changing environment. While traditional approaches to control system design demand ... -
Risk Considerations in the Use of Unmanned Aerial Vehicles in the Construction Industry
(2016-12)The use of unmanned aerial vehicles (UAVs) in the construction industry is swiftly growing worldwide. UAVs are changing the way construction companies do business. Contractors are increasingly using camera-mounted UAVs ... -
Runtime Monitoring On Hard Real-Time Operating Systems
(East Carolina University, 2015)This thesis will compare and evaluate different approaches in integrating runtime monitors into processes running on a hard real-time operating system. The host system is a single board computer (SBC) with a VxWorks 653 ... -
Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System
(East Carolina University, 2011)Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and vulnerabilities too. Despite the fact that different ... -
Self-Checked Metamorphic Testing of Monte Carlo Simulation
(East Carolina University, 2011)Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However, testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on ... -
Sentiment analysis study with an emphasis on the integration of different statement polarities and the evaluation of the resulting sentiments
(5/16/2016)Social media has become an integral part of today's society and has continued to grow tremendously throughout the world. People communicate through social media constantly and social media has become a pivotal place for ... -
SOFTWARE ENGINEERING AS A SOCIAL PROCESS: A STUDY OF RESEARCH TRIANGLE PARK
(East Carolina University, 2016-05-03)Powered by increased capabilities of online collaboration tools, open source software development has become a critical component of the development landscape for both individual developers and for organizations. However, ... -
Software Engineering for Real-Time NoSQL Systems-centric Big Data Analytics
(East Carolina University, 2020-12-02)Recent advances in Big Data Analytics (BDA) have stimulated widespread interest to integrate BDA capabilities into all aspects of a business. Before these advances, companies have spent time optimizing the software ... -
Software Technology Maturation and Software Security
(East Carolina University, 2019-08-05)Software technology maturation, also referred to as technology transfer, is as difficult as it is rare, mostly because of the time scale involved. Software maturation is defined as the process of taking a piece of technology ... -
Studies on Gopala-Hemachandra Codes and their Applications
(East Carolina University, 2020-11-16)Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in data compression and cryptography. We study a specific parameterization of Gopala-Hemachandra codes and present several ... -
Synchronizing Automata and the Černý Conjecture
(East Carolina University, 2012)We provide a survey of research surrounding the Černý conjecture. This conjecture concerns finite-state automata that have the property of being "synchronizing." A synchronizing automaton is one for which there exists ... -
SYSTEMATIC REVIEW OF LITERATURE USING TWITTER AS A TOOL
(East Carolina University, 2018-07-17)Twitter has over 330 million active monthly users producing roughly 500 million Tweets per day, or 200 billion Tweets a year. Making this one of the largest human-generated opinion data collections. In addition to this ... -
Tactile Demographics: Predicting Demographic Information Using Touch Data from Mobile Devices
(East Carolina University, 2021-04-20)The research conducted in this thesis was to serve as a baseline on which human demographics are most likely to be able to be predicted through touch screen interactions. In addition, it served as a way of finding which ... -
TEXT EXTRACTION FROM IMAGES USING NEURAL NETWORKS
(East Carolina University, 2019-09-16)Most western languages have witnessed the power of Artificial Intelligence (AI) in one other form. Primary fact for this achievement is due to the efforts of several researchers contributing to the field of computational ... -
The Relationship Between Categorical Expenditures and Graduation Rates at North Carolina Community Colleges
(East Carolina University, 2018-12-10)The public perception of higher education, the culture of that institution, and its value to American citizens is changing. Taxpayer demands to downsize costly government expenditures, including government subsidizing of ... -
Thesis - generating knowledgebase of common behavior and workflow patterns for secure systems
(East Carolina University, 2018-05-02)Knowledge discovery from large data for system security management and threat detection have been a complex task due to large number of users and the dynamic nature of distributed systems. Healthcare organizations as a ... -
Time Series Forecasting Using Generative Adversarial Networks
(East Carolina University, 2023-05-04)Time series data is prevalent in many fields, such as finance, weather forecasting, and economics. Predicting future values of a time series can provide valuable insights for decision-making, such as identifying trends, ... -
Towards Big Data Infrastructure for Historic Handwritten Document Transcription
(East Carolina University, 2017-05-03)Historical archival documents are vast and contain many thousands of pages of unstructured data, often not easily searchable. The current state of the art is searchable meta-tags of documents which help a reader to land ... -
Treasure Island Security framework : A Generic Security Framework for public clouds
(East Carolina University, 2014)In this thesis we introduce a generic security framework for public clouds called Treasure Island Security framework that is designed to address the issues related to cloud computing security and specifically key-management ... -
UInterestManager : A Generic Framework to Model User Interests
(East Carolina University, 2013)With the proliferation of documents on the Internet, it has become increasingly difficult for users to search and retrieve the information they want: information that is relevant and interesting. To address this problem, ...