Search
Now showing items 1561-1570 of 3438
Immune Network Optimization of Composite SaaS for Cloud Computing
(North Dakota State University, 2015)
Serving the needs efficiently for a wide gamut of cloud users is a challenge. One way to address this challenge is to decompose SaaS (Software as a Service) into application components and then consider them as loosely ...
Optimization of Deployments for Service Oriented Clouds
(North Dakota State University, 2015)
In cloud-computing environments, every service in an application is deployed as a different service instance. All service instances are deployed at a different level of end-to-end Quality of Service (QoS), which are described ...
Implementation of Weighted Centroid Neural Network for Edge Preserving Image Compression
(North Dakota State University, 2017)
Image compression is a type of data compression applied to images. The objective of image compression is to reduce the cost for storage or transmission. Image compression is associated with removing redundant information ...
Critical Information Retrieval from Emails
(North Dakota State University, 2014)
With efficiency being a driving force in today’s ecommerce, emails have become a major form of communication. However, deciphering information from these emails has been a be-labored task. With every email containing ...
Classification Algorithms Applied to a Brain Computer Interface System Based On P300
(North Dakota State University, 2017)
A BCI or Brain Computer Interface is defined as a method of communication that converts neural activities generated by brain of living being (without the use of peripheral muscles and nerves) into computer commands or other ...
Investigation of the Effect of the Number of Inspectors on the Software Defect Estimates
(North Dakota State University, 2012)
Capture-recapture models help software managers by providing post-inspection defect estimate remaining in a software artifact to determine if a re-inspection in necessary. These estimates are calculated using the number ...
An Automated Approach for Discovering Functional Risk-Inducing Flaws in Software Designs
(North Dakota State University, 2015)
For safety critical applications, it is necessary to ensure that risk-inducing flaws do not
exist in the final product. To date, many risk-based testing techniques were proposed. The
majority of these techniques address ...
Female Factor and Team Projects: A Social Sensitivity Perspective
(North Dakota State University, 2014)
Software Development is a complex, time-consuming task wherein a team must collaborate effectively over a long period of time. Achieving maximum productivity and quality requires commitment. A recent MIT study concluded ...
Big Body: A Collaborative Platform for Bodybuilding and Nutrition
(North Dakota State University, 2017)
Health and a supple body has been seen as a prized possession by almost every culture. Witnessing our body grow and come alive with health after months of hard work is an unparalleled feeling. Bodybuilding tends to improve ...
Parallelization of Particle Swarm Optimization Algorithm Using Hadoop Mapreduce
(North Dakota State University, 2016)
Particle Swarm Optimization (PSO) has received attention in many research fields and real-world applications for solving optimization problems in the areas of intelligent transportation systems, wireless sensor networks, ...