Search
Now showing items 2221-2230 of 4247
Threat Identification from Access Logs Using Elastic Stack
(North Dakota State University, 2020)
Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...
Semantics-Enhanced Privacy Recommendation for Social Networking Sites
(North Dakota State University, 2012)
Privacy protection is a vital issue for safe social interactions within social
networking sites (SNS). Although SNSs such as MySpace and Facebook allow
users to configure their privacy settings, the task is difficult ...
Mining Quasi-Frequent Subnetworks in Graph Networks Using Edge-Edge Summary Graph
(North Dakota State University, 2017)
In today’s computing world, graphs have become increasingly important in modeling sophisticated structures, entities and their interactions, with broad applications including Bioinformatics, Computer Vision, Web analysis ...
Improving Usability in ‘CIRCLE’
(North Dakota State University, 2016)
This paper describes how the System Usability Scale (SUS) has helped in improving and making a software tool called the Classification, Identification, and Retrieval-based Collaborative Learning Environment (CIRCLE) more ...
A Mobile Website Prototype
(North Dakota State University, 2013)
More people have started using smart phones, and in the near future, cell phones/smart phones will take the place of computers. I developed a mobile website prototype based on standards, such as keeping it task oriented, ...
Web-Based Smart Farm Visualization GIS Tool
(North Dakota State University, 2015)
Visualization of data is much more vibrant and informative than a written description could ever be. Continued research on information visualization has resulted in discovery of a number of designs and variety of techniques. ...
Development of Learning Objects For Teaching Software Testing Using a Cyber Learning Environment
(North Dakota State University, 2016)
This paper is an attempt to extend the database of learning objects on WReSTT (Web Repository of Software Testing Tools) that students enrolled in programming courses can use to improve their understanding of testing ...
A Smartphone-Based Pointing Technique in Cross-Device Interaction
(North Dakota State University, 2019)
In this paper, the author develops a novel cross-device cursor position estimation system for transferring a mobile device’s four-direction 2D movement to a cursor’s four-direction movement on a large display device; this ...
Glowworm Swarm Optimization Algorithm for Multi-Threshold Image Segmentation
(North Dakota State University, 2016)
Glowworm Smarm Optimization (GSO), one of the nature-inspired swarm intelligence algorithms is used for finding solutions to optimization problems. Glowworms emit light to attract its mates and mates choosing the brighter ...
Path Planning under Failures in Wireless Sensor Networks
(North Dakota State University, 2013)
This paper explores how an all pair shortest path can be obtained in a wireless sensor network when sensors fail. Sensors are randomly deployed in a predefined geographical area, simulating the deployment of sensors from ...