This Is AuburnElectronic Theses and Dissertations

Browsing Auburn Theses and Dissertations by Author "Umphress, David"

Now showing items 21-40 of 75

Developing Single page application with best practices 

Wilkhu, Sumeet (2017-04-26)
Browsers have been around since early 1990 and have been used for disseminating information using HTML, CSS and Javascript. Initially, Javascript was used as client side scripting language and its use was limited to data ...

DevSecOps of Containerization 

Cui, Pinchen (2020-08-03)
Containerization is a new concept of virtualization, one that has attracted attention and occupied considerable amount of market size due to its inherent lightweight characteristics. However, the lightweight advantage is ...

Discrete Event Role Playing Simulation of Small Team Software Engineering Projects 

Rogers, Neal (2006-08-15)
A dissertation presented on the simulation of small team software engineering projects. Each individual acts as a team leader for a software project that is scheduled to last from 5 to 52 weeks. A team of four or five ...

Dynamic Clustering Protocol based on Relative Speed in Mobile Ad Hoc Networks For Intelligent Vehicles 

Gopalaswamy, Sundeep (2007-12-15)
A knowledge of real time traffic density on different roads has many applications such as real time navigation for driver, designing efficient vehicular routing protocol and building fully autonomous vehicles. Forming ...

Dynamic Task Scheduling onto Heterogeneous Machines Using Support Vector Machine 

Park, Yong (2008-05-15)
Distributed computing has been used to overcome the limitations of single computer use. However, the benefit of parallelizing computations may substantially reduce, if there is no well constructed mechanism to coordinate ...

Dynamically Adjustable Software Process 

Rawajfih, Yasmeen (2016-12-09)
Industry experience shows that the quality of a software product is directly related to the quality of the software process used to produce it. Software process can rarely be used out of the box. Project types, scopes and ...

Effects of Delay Variation of IEEE 802.11 on Synchronization in Ad Hoc Networks 

Sitton, Philip (2007-05-15)
The 802.11 MAC protocol, extensively used in wireless networks, handles the problem of collisions over a shared medium in part by avoiding them through the use of a random backoff counter drawn from an exponentially ...

The Effects of Genetic-based and Swarm Intelligence-based Feature Selection on Adversarial Author Identification 

Halladay, Steve (2022-04-25)
Within the realm of author identification, where researchers work to classify writing samples by author, researchers are using more and diverse feature sets to try to improve classification accuracy. From a computational ...

Efficient Reliability Verification Testing in Open Source Software Using Priority Prediction 

Pape, Patrick (2015-05-08)
Open source software is becoming a strong alternative to private development for a wide market of applications. There is a stigma against using open source software in the private sector because of licensing restrictions ...

Empirical Evidence of the Consequences of Bad Smells in Software 

Topuz, Fatma Neda (2022-03-08)
A “smell” is a property of software source code that indicates a deeper problem. Smells do not necessarily affect the code at the immediate point in time but are thought to cause problems during a later phase of the ...

Employing Machine Learning Techniques in Conjunction with Linguistic Scoring Mechanism to Formalize the Uncertainty Carried by Scoring Numeric Processes Driven by Probabilistic Methods 

Livio Zavarce, Javier (2020-08-18)
The aim of this research is to integrate the naturalistic mechanisms inherent to domain experts’ heuristics with machine learning capabilities as a useful framework with the capacity to support several domains of the human ...

Energy Efficient Pre-Fetching - Models to Implementation 

Manzanares, Adam (2010-04-29)
With the rapid growth of the production and storage of large scale data sets it is important to investigate methods to drive the cost of storage systems down. We are currently in the midst of an information explosion and ...

Energy Profiles of Java Collections Classes 

Hasan, Samir (2016-04-22)
We created detailed profiles of the energy consumed by common operations done on Java List, Map, and Set abstractions. The results show that the alternative data types for these abstractions differ significantly in terms ...

Energy-Efficient Traffic-Aware Routing in Underwater 

Zhang, Lei (2008-08-15)
Underwater acoustic networks are a special type of wireless sensor networks deployed in a harsh oceanic environment for mission critical tasks. In this unique sensor network, energy efficiency is the most critical problem. ...

Evaluation of Realistic Mobility Model for Comparative Study of Routing Protocols in IEEE 802.11p (DSRC) Vehicular Ad-hoc Network (VANET) 

Song, Dongsuk (2012-07-16)
As a countermeasure for rapidly changing topology and high mobility of vehicles, Vehicular Ad-hoc Network (VANET) is emerging as a standard routing protocol. When used efficiently, an ad-hoc routing protocol could play a ...

The Evolution of the C# Language: The Impact of Syntactic Sugar and Language Integrated Query on Performance 

Mageed, Ahmad (2010-04-09)
The C# language has seen a healthy adoption rate for a fairly young language. Each released version has introduced features that have addressed pain points in the version preceding it, as well as providing greater flexibility ...

A Flexible Model for Multi-agent Based Simulation of Software Development Process 

Agarwal, Ravikant (2007-12-15)
Inadequate use of project management techniques in software development can be traced to the lack of efficient education strategies for managers. Software development processes are complex and therefore it is hard to predict ...

From Bare Metal to Private Cloud: Introducing DevSecOps and Cloud Technologies to Naval Systems 

Anderson, Robert (2018-07-20)
Virtualizing computing resources provides a myriad of benefits ranging from increased hardware utilization, better disaster recovery, and isolation between the applications and the underlying hardware. Isolation of ...

Generic Reverse Engineering Architecture with Compiler and Compression Classification Components 

Torri, Stephen (2009-05-15)
As more and more applications, libraries, and other types of programs are being executed in untrusted environments they will be targets of attackers. These applications are exposed to malicious programs attempting to exploit ...

GENERTIA: A System for Vulnerability Analysis, Design and Redesign of Immunity-Based Anomaly Detection System 

Hou, Haiyu (2006-12-15)
The principles of immunology have been applied to the design and implementation of artificial systems and algorithms for solving a broad range of mathematical and engineering problems, which results in a new computation ...