This Is AuburnElectronic Theses and Dissertations

Browsing by Author "Hendrix, Dean"

Now showing items 21-33 of 33

Investigation of EtherYatri’s Compatibility with IPV6 

Nemani, Srinivasa (2006-08-15)
Internet Protocol version six (IPv6) enjoys only a scant existence today. Many universities, companies and other organizations are building protocol stacks, hardware and applications to support IPv6, awaiting its full-fledged ...

A novel CPU P-State driver for better thermal control with improved power/performance trade-off 

Uppu, Pavan Ravi Teja (2015-12-14)
Power consumption and thermal emergencies in multi-core processors are now a major bottleneck due to increased heat dissipation caused by running intensive programs on densely integrated systems. High temperatures lead to ...

Object-Oriented Design Quality Adaptation: A System Dynamics Simulation 

Mesbahi El Aouame, Asmae (2013-04-19)
Despite the increasing interest of the software engineering research community in assessing and improving quality at the early phases of the software development lifecycle such as the design phase, less attention is devoted ...

Physical Layer Approach to Secure Visible Light Communication and Sensing 

Chen, Jian (2022-04-15)
Visible Light (VL) is a wireless technology that uses visible light (400 ~ 790 THz) as the medium to transmit information (i.e., visible light communication or VLC) or sense user's activities (i.e., visible light sensing ...

Risk/Reward Analysis of Test-Driven Development 

Hammond, Susan (2019-07-25)
Test Driven Development (TDD) is a software development practice advocated by practitioners of the Agile development approach. Many developers believe that TDD increases productivity and product quality, while others have ...

Role of the Best Practices from Extant Literature in Current Algorithm and Data Structure Visualizations 

Gondi, Ravali (2011-06-08)
Although there are many algorithm visualizations today, there is a question as to why algorithm and data structure visualization technology has not proved its effectiveness and gained widespread acceptance in mainstream ...

Scalable Collective Communication and Data Transfer for High-Performance Computation and Data Analytics 

Xu, Cong (2015-04-27)
Large-scale computer clusters are leveraged to solve various crucial problems in both High Performance Computing and Cloud Computing fields. Message Passing Interface (MPI) and MapReduce are two prevalent tools to tap the ...

Securing Web Applications: Web Application Flow Whitelisting to Improve Security 

Alabdulrazzaq, Haneen (2017-04-25)
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dictate ...

Smartphone Detection of Abnormal Equine Behavior 

Burton, Megan (2018-11-20)
This research was motivated by two key facts: There are over 9.2 million horses in the United States and over 64% of adults own a smartphone. Blending these two ideas led to the genesis of this research by asking the ...

Temperature Aware Scheduling in Multicore Systems 

Mishra, Vibudh (2018-06-26)
Power density in microprocessors is increasing rapidly, which results in higher operating temperature, and systems are prone to overheating. Dynamic thermal management has been used to dissipate heat, reduce the operating ...

User Experience Design and Experimental Evaluation of Extensible and Dynamic Viewers for Data Structures 

Jain, Jhilmil (2007-05-15)
Many techniques for the visualization of data structures and algorithms have been proposed and shown to be pedagogically effective. Yet, they are not widely adopted because they lack suitable methods for automatically ...

Using Tweets Sentiment Analysis to Predict Stock Market Movement 

Almohaimeed, Abdulaziz (2017-05-17)
Research shows that news affects stock market movement and indicates the possibility of predicting the market by using the news as a signal to a coming movement with an acceptable accuracy percentage. In this research, we ...

Vulnerability Assessment of Java Bytecode 

Shah, Rahul (2005-12-15)
Security of the software applications has become a critical issue as software is now used in almost all sectors parts of our day to day life. There is always an underlying threat that a malicious user may be able to access ...