This Is AuburnElectronic Theses and Dissertations

Browsing by Author "Chapman, Richard"

Now showing items 1-20 of 33

The Activity Metric for Low Resource, On-line Character Recognition 

Confer, William (2005-12-15)
This work presents an algorithm for on-line character recognition that is fast, portable, and consumes very little memory for code or data. The algorithm is alphabet-independent, and does not require training beyond ...

Analysis of Video Latency in UAV Wired and Wireless Networks 

Works, Gloice (2008-05-15)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...

COURSEBUILDER: Design and Development of an eLearning System 

Ramesh, Nandakrishnan (2017-11-28)
Web-based learning environments have the potential to support collaboration among teachers and students and encourage interaction in the classroom by providing quality Internet resources for learning. By incorporating these ...

Culturally Situated Design Tools: Animated Support Tools for Mathematics 

Bolton, Albanie (2010-04-12)
Culturally Situated Design Tools (CSDTs) are web-based software applications that allow students to create simulations of cultural arts: Native American beadwork, African American cornrow hairstyles, urban graffiti, and ...

Development of A Software Architecture Method for Software Product Families and its Application to the AubieSat Satellite Program 

O'Farrell, John Ryan (2009-11-13)
Software architecture methodologies are very useful in reusing software code from one product to another. In software product families, several similar products are developed by the same organization that share many features ...

Development of an Augmenting Navigational Cognition System 

Yang, Ying (2005-12-15)
Social isolation for persons with cognitive impairments due to aging and/or disease is common and widespread. Those people who have diseases such as early Alzheimer’s and dementia tend to forget what they have to do to ...

Discrete Event Role Playing Simulation of Small Team Software Engineering Projects 

Rogers, Neal (2006-08-15)
A dissertation presented on the simulation of small team software engineering projects. Each individual acts as a team leader for a software project that is scheduled to last from 5 to 52 weeks. A team of four or five ...

Employing Machine Learning Techniques in Conjunction with Linguistic Scoring Mechanism to Formalize the Uncertainty Carried by Scoring Numeric Processes Driven by Probabilistic Methods 

Livio Zavarce, Javier (2020-08-18)
The aim of this research is to integrate the naturalistic mechanisms inherent to domain experts’ heuristics with machine learning capabilities as a useful framework with the capacity to support several domains of the human ...

Energy Modeling and Management of Database System 

Zhou, Yi (2018-04-10)
In this dissertation, we propose a toolkit called EDOM facilitating the evaluation and optimization of energy-efficient multicore-based database systems. Two core components in EDOM are a benchmarking toolkit and a ...

Enhancing Host Based Intrusion Detection Systems with Danger Theory of Artificial Immune Systems 

Amer, Suhair (2008-05-15)
Rather than discriminating activity by belonging to self or non-self, danger theory extends its discrimination to be between non-self but harmless and self but harmful. The danger theory states that the system does not ...

Evaluation of Reactive Collision Avoidance Algorithms for Unmanned Aerial Vehicles 

Jones, David (2015-05-06)
In the field of unmanned aerial vehicles (UAVs), several control processes must be active to maintain safe, autonomous flight. When flying multiple UAVs simultaneously, these aircraft must be capable of performing mission ...

Generic Reverse Engineering Architecture with Compiler and Compression Classification Components 

Torri, Stephen (2009-05-15)
As more and more applications, libraries, and other types of programs are being executed in untrusted environments they will be targets of attackers. These applications are exposed to malicious programs attempting to exploit ...

GENERTIA: A System for Vulnerability Analysis, Design and Redesign of Immunity-Based Anomaly Detection System 

Hou, Haiyu (2006-12-15)
The principles of immunology have been applied to the design and implementation of artificial systems and algorithms for solving a broad range of mathematical and engineering problems, which results in a new computation ...

Improving Energy Efficiency and Security of DVFS-Enabled Clouds 

Mao, Jianzhou (2022-08-02)
Since modern data centers have been significantly scaling up in capacity in past decades, it is demanding to curtail energy consumption of virtual-machine-powered data centers. Cloud computing has radically changed the ...

Interface Design Guidelines to Improve Usability of Websites for Teenagers 

Bailey, Cathy (2017-04-20)
Although most teenagers (aged 13-17) use the Internet daily, very little human-computer interaction (HCI) research exists on design of websites for teens. Several authors have published web usability guidelines and “cool” ...

Mobility and Energy Management in 5G Ultra-Dense Networks 

Sun, Li (2022-12-05)
Triggered by the development of 5G technologies, the demand for mobile data has grown tremendously in recent years. It leads to an urgent need to upgrade the current macro-cell-based architecture of network infrastructure ...

A Model for Building Trustworthiness in Online Stores 

Lanford, Patricia (2007-08-15)
More and more research is being done everyday in the world of e-commerce as consumers and merchants alike realize how powerful a selling tool the internet has become. Research shows that trust is key to the success of ...

Multi-objective Optimization for Establishing Geographical Boundaries and Associations Using Evolutionary Algorithms and Collaborative and Adversarial Intelligent Agents 

Lartigue, Jonathan W. (2018-07-26)
Evolutionary Algorithms (EAs) are useful in solving prohibitively large search problems in a limited amount of time. Where even the most efficient standard search algorithms can become unwieldy as the solution space expands, ...

MyAccessible Math: Shining Light on Math Concepts for Visually Impaired Students 

Jariwala, Abhishek Virendrabhai (2022-07-19)
Human-Computer Interaction (HCI) research aims to make systems versatile, easy to use, and accessible for most people. While computer technologies have successfully remodeled and improved the learning process, students ...

Novel Machine Learning Algorithms for Analyzing Large-scale Genomic and Genetic Data 

Wang, Ye (2020-12-01)
With the advancement of next-generation sequencing technology, numerous disease/ phenotypic associations with the human microbiome and human genome are uncovered and revealed. In this dissertation, we take advantage of ...