Search
Now showing items 1441-1450 of 3438
Training Set Selection to Improve Crop Classification
(North Dakota State University, 2015)
In some classification problems, acquiring class label information is much more expensive than collecting attribute data. One such problem is crop classification from satellite imagery. While random sampling is one option, ...
Mining Connected Frequent Boolean Expressions
(North Dakota State University, 2017)
In this paper, we are finding Connected Frequent Boolean Expressions from cancer dataset [14] and protein protein interaction network [14] to discover group of dysregulated genes. Frequent Itemset Mining is a process of ...
A New Coupling Metric: Combining Structural and Semantic Relationships
(North Dakota State University, 2014)
Maintaining object-oriented software is problematic and expensive. Earlier research has revealed that complex relationships among object-oriented software entities are key reasons that make maintenance costly. Therefore, ...
Tracking Vehicles from Mobile Phone Received Signal Strength Sequences
(North Dakota State University, 2015)
We address the problem of tracking vehicles from received signal strength (RSS) sequences generated by mobile phones carried in them. Our main objectives are to provide travel-time estimates for selected roads and provide ...
Application of Memory-Based Collaborative Filtering to Predict Fantasy Points of NFL Quarterbacks
(North Dakota State University, 2019)
Subjective expert projections have been traditionally used to predict points in fantasy football, while machine prediction applications are limited. Memory-based collaborative filtering has been widely used in recommender ...
Deterministic Greedy Algorithms for Optimal Sensor Placement
(North Dakota State University, 2012)
A sensor is a device which can be sensitive to any physical stimulus, such as light, heat, or a particular motion, and responds with a respective impulse. A graph is an abstract representation for a set of objects of any ...
Evaluating the Usefulness of Requirement Error Taxonomy as a Defect Prevention Technique: An Empirical Investigation
(North Dakota State University, 2014)
Defect prevention techniques can be used during the creation of software artifacts to help developers create high-quality artifacts. The Requirement Error Taxonomy developed by Walia et al. [22, 23] helps focus developer’s ...
A Java Class Analysis Program Development By ASM Library
(North Dakota State University, 2017)
Class analysis is useful technique that can be used in many situations, from the syntaxes parsing, potential bugs finding, and unused code detecting to reverse engineer coding. In this paper, I write a small program classasm ...
Consumer Sentiment Analysis Using Twitter
(North Dakota State University, 2017)
Sentiment analysis is the task of finding people’s opinions about specific objects/matters. Ordinary people’s opinions affect the decision-making process. Today, there is a massive explosion of “sentiments” available on ...
An Artificial Immune System Heuristic in a Smart Electrical Grid
(North Dakota State University, 2014)
The immune system of the human body follows a process that is adaptive and learns via experience. Some algorithms are designed to take advantage of this process to determine solutions for complex problem domains. The ...