- AUETD Home
- Browsing by Author
Browsing by Author "Umphress, David"
Now showing items 41-60 of 75
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Human Performance in Cyber-Vulnerable Highly Automated Unmanned Aerial Systems
Stutts, Isaac (2020-02-05) ETD File Embargoed
Automation is ever present in today’s complex systems of systems. Originally created to ease workload and burden on the human operator and to increase safety by automating dangerous tasks, automation has become practically ...
Hybrid Learning of Feedforward Neural Networks for Regression Problems
Wu, Xing (2014-12-12)
Inspired by the structure and functional aspects of the biological neural networks, the Artificial Neural Network (ANN) is a very popular model in the machine learning fields to
learn complex relationships in the data. ...
Imprinting Community College Computer Science Education with Software Engineering Principles
Hundley, Jacqueline (2012-05-01)
Although the two-year curriculum guide includes coverage of all eight software engineering core topics, the computer science courses taught in Alabama community colleges limit student exposure to the programming, or coding, ...
Interface Design Guidelines to Improve Usability of Websites for Teenagers
Bailey, Cathy (2017-04-20)
Although most teenagers (aged 13-17) use the Internet daily, very little human-computer interaction (HCI) research exists on design of websites for teens. Several authors have published web usability guidelines and “cool” ...
IOT SECURITY: MODELING DEVELOPMENT AND VALIDATION OF IOT TECHNOLOGY
Osho, John Ajetunmobi (2022-07-28)
Modern design and development practices advocates including security as early as possible in the overall IoT engineering strategy. Tuning products late in the product cycle is costly due to changes rippling across components, ...
#IslamicState: An Analysis of Tweets in Support of ISIS After the November 2015 Attacks In Paris
Guthrie, Amanda (2018-07-31)
With the popularity and ease of using social media platforms, users are able to, in varying capacities, connect with others in varying capacities. During 2015, there were approximately 305 million worldwide active monthly ...
A Knowledge Base and Question Answering System Based on Loglan and English
Linker, Sheldon (2011-03-31)
One of the "holy grails" of computational linguistics has been to have a machine carry out a conversation, and to have some idea of what it is talking about. Loglan's machine grammar was a first attempt to carry out such ...
Link Quality Characterization in IEEE 802.11s Wireless Mesh Networks
Abid, Mohamed Riduan (2010-12-09)
HWMP (Hybrid Wireless Mesh Protocol) has been set as the default routing protocol for the
ongoing IEEE 802.11s WMN (Wireless Mesh Network) standard. Unlike most multi-hop routing protocols, which operate at the network ...
Maintaining the Security and Availability of a Stream of Time-Dependent Secret Information in an Ad-Hoc Network.
Sprunger, John David (2018-11-15)
In this thesis we present a system called Ad Hoc Security for maintaining the security and availability of a stream of time-dependent secret data in an ad-hoc network. Time-dependence refers to how each piece of data is ...
A Methodology for Increasing the Dependability of Open Source Software Components
Pape, Patrick (2013-04-16)
With the increasing use of open source software components in real world systems, there has arisen a need for increasing the dependability of these components. The dependability of these components can be increased like ...
Mobility and Energy Management in 5G Ultra-Dense Networks
Sun, Li (2022-12-05)
Triggered by the development of 5G technologies, the demand for mobile data has grown tremendously in recent years. It leads to an urgent need to upgrade the current macro-cell-based architecture of network infrastructure ...
A Model-Driven Engineering Framework for Computational Replicability and Reproducibility
Ledet, Joseph (2016-02-11)
The scientific community currently suffers from a lack of verification of results obtained from many well-intentioned researchers. Part of the reason for this lack is the difficulty in reproducing experiments performed by ...
NEED A NERD – Adapting PCSE (Practitioner Centered Software Engineering) to develop a Web Application
Selvaraj, Prabhu (2012-08-14)
Practitioner Centered Software Engineering (PCSE) is the most recent incarnation of Auburn University’s personal self-improvement process for helping software engineers control, manage, and improve the way they work. It ...
Object-Oriented Design Quality Adaptation: A System Dynamics Simulation
Mesbahi El Aouame, Asmae (2013-04-19)
Despite the increasing interest of the software engineering research community in assessing and improving quality at the early phases of the software development lifecycle such as the design phase, less attention is devoted ...
A PCSE (Practice Centered Software Engineering) tool for Eclipse Environment
Subramanian, Prathap (2010-12-03)
Practice Centered Software Engineering (PCSE) is the most recent incarnation of Auburn University’s personal self-improvement process for helping software engineers control, manage, and improve the way they work. It helps ...
Physical Layer Approach to Secure Visible Light Communication and Sensing
Chen, Jian (2022-04-15)
Visible Light (VL) is a wireless technology that uses visible light (400 ~ 790 THz) as the medium to transmit information (i.e., visible light communication or VLC) or sense user's activities (i.e., visible light sensing ...
Practical Consideration of Routing Protocols in Ad Hoc Networks
Yang, Junmo (2006-12-15)
In this dissertation, we investigate different routing approaches in an attempt to improve
the network performance by considering how wireless networks operate in the realistic
environment. Our work is centered around ...
Quantitative Risk Assessment Model for Software Security in the Design Phase of Software Development
Mkpong-Ruffin, Idongesit (2009-05-15)
Risk analysis is a process for considering possible risks and determining,which are the most significant for any particular effort. Determining which risks to address and the optimum strategy for mitigating said risks is ...
Regressing Object-Oriented Principles to Achieve Performance Gains on the Java Platform, Micro Edition
Cook, Sean (2006-12-15)
Object-Oriented Programming is a software design method that models the
characteristics of abstract or real objects using classes and objects [Sun Microsystems
2006b]. The Java language is intrinsically object-oriented; ...
Risk/Reward Analysis of Test-Driven Development
Hammond, Susan (2019-07-25)
Test Driven Development (TDD) is a software development practice advocated by practitioners of the Agile development approach. Many developers believe that TDD increases productivity and product quality, while others have ...