Search
Now showing items 25731-25740 of 28629
A Data Mining Approach for Identifying Pavement Distress Signatures
(North Dakota State University, 2015)
This work introduces signature-based data mining of pavement distress data. The goal is to understand the factors that influence pavement distress. The presented approach maintains multiple types of flexible pavement ...
Basic Cybersecurity Awareness Through Gaming
(North Dakota State University, 2019)
The goal of this paper is to bring the basic awareness of cybersecurity among students so that they do not become a victim of cybercrime. Studies show that cybersecurity serious games support multiple well-established ...
Implementation of a Clonal Selection Algorithm
(North Dakota State University, 2014)
Some of the best optimization solutions were inspired by nature. Clonal selection algorithm is a technique that was inspired from genetic behavior of the immune system, and is widely implemented in the scientific and ...
Immune Network Optimization of Composite SaaS for Cloud Computing
(North Dakota State University, 2015)
Serving the needs efficiently for a wide gamut of cloud users is a challenge. One way to address this challenge is to decompose SaaS (Software as a Service) into application components and then consider them as loosely ...
Optimization of Deployments for Service Oriented Clouds
(North Dakota State University, 2015)
In cloud-computing environments, every service in an application is deployed as a different service instance. All service instances are deployed at a different level of end-to-end Quality of Service (QoS), which are described ...
Implementation of Weighted Centroid Neural Network for Edge Preserving Image Compression
(North Dakota State University, 2017)
Image compression is a type of data compression applied to images. The objective of image compression is to reduce the cost for storage or transmission. Image compression is associated with removing redundant information ...
Critical Information Retrieval from Emails
(North Dakota State University, 2014)
With efficiency being a driving force in today’s ecommerce, emails have become a major form of communication. However, deciphering information from these emails has been a be-labored task. With every email containing ...
Classification Algorithms Applied to a Brain Computer Interface System Based On P300
(North Dakota State University, 2017)
A BCI or Brain Computer Interface is defined as a method of communication that converts neural activities generated by brain of living being (without the use of peripheral muscles and nerves) into computer commands or other ...
Investigation of the Effect of the Number of Inspectors on the Software Defect Estimates
(North Dakota State University, 2012)
Capture-recapture models help software managers by providing post-inspection defect estimate remaining in a software artifact to determine if a re-inspection in necessary. These estimates are calculated using the number ...
An Automated Approach for Discovering Functional Risk-Inducing Flaws in Software Designs
(North Dakota State University, 2015)
For safety critical applications, it is necessary to ensure that risk-inducing flaws do not
exist in the final product. To date, many risk-based testing techniques were proposed. The
majority of these techniques address ...