Recent Submissions

  • Comparison between Symfony, ASP.NET MVC, And Node.js Express for Web Development 

    Mao, Xiaoli (North Dakota State University, 2018)
    Web development technologies have been developing tremendously in recent years. While new technologies such as Node.js come with various frameworks, traditional technologies such as ASP.NET and PHP are also being used with ...
  • Agent Based Modeling for Simulation of Microbial Community 

    Tekeste, Noah Daniel (North Dakota State University, 2018)
    Agent based modeling uses interacting agents and a governing rule to understand a complex phenomenon. It is an important mode of inquiry in the field of life sciences. For this paper a Haploid Evolutionary Constructor (HEC) ...
  • Sentiment Analysis of Global Warming Using Twitter Data 

    Mucha, Nithisha (North Dakota State University, 2018)
    Global warming or climate change is one of the most discussed topics of the decade. Some people think global warming is a severe threat to the planet whereas some people think, it is a hoax. The goal of this paper is to ...
  • Robust D-Optimal Design for Multiple Nominal Parameter Values under the 5PL-1P Model 

    Liang, Cuiping (North Dakota State University, 2018)
    A robust D-optimal design that works well for multiple nominal parameter values is presented in this paper. In general, D-optimal design works very well for estimating the model parameters, but it is very sensitive to ...
  • Exploring Associations between Lifestyles and Metabolic Syndrome in Middle-Age Chinese Population 

    Zhou, Xiaoyi (North Dakota State University, 2018)
    Nowadays the prevalence of Metabolic Syndrome (MetS) affects many middle-age people in China. MetS is associated with the risk of type 2 diabetes and cardiovascular disease. Identifying the potential risk factors contribute ...
  • Understanding Students’ Perceptions of Difficulty and the Effect Difficulty Has on Mathematical Anxiety 

    Larson, Caleb Bridger (North Dakota State University, 2018)
    There exists a growing atmosphere surrounding mathematics that allows individuals to exclaim their belief they are deficient in math without any societal judgement. Compared to a state like being illiterate, we have reached ...
  • Understanding Human Errors to Improve Requirements Quality 

    Manjunath, Kavitha (North Dakota State University, 2018)
    Requirements engineering is the first and perhaps the most important phase of software life cycle. Software faults committed during the requirements development, if left undetected can affect downstream activities. While ...
  • Analyzing Access Logs Data using Stream Based Architecture 

    Gautam, Nitendra; Gautam, Nitendra (North Dakota State University, 2018)
    Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ...
  • Using Message Queuing to Drive Polyglot Identity and Access Management Development 

    Frovarp, Richard Ernest Orvin; Frovarp, Richard Ernest Orvin (North Dakota State University, 2017)
    This paper describes a method of using an Advanced Message Queuing Protocol (AMQP) broker, RabbitMQ in particular, to facilitate the management of accounts across a variety of systems. Higher education poses a unique ...
  • Implementation of Weighted Centroid Neural Network for Edge Preserving Image Compression 

    Depa, Amarender Reddy; Depa, Amarender Reddy (North Dakota State University, 2017)
    Image compression is a type of data compression applied to images. The objective of image compression is to reduce the cost for storage or transmission. Image compression is associated with removing redundant information ...
  • A Java Class Analysis Program Development By ASM Library 

    Qiu, Chengxiang; Qiu, Chengxiang (North Dakota State University, 2017)
    Class analysis is useful technique that can be used in many situations, from the syntaxes parsing, potential bugs finding, and unused code detecting to reverse engineer coding. In this paper, I write a small program classasm ...
  • Classification Algorithms Applied to a Brain Computer Interface System Based On P300 

    Gaur, Himanshu; Gaur, Himanshu (North Dakota State University, 2017)
    A BCI or Brain Computer Interface is defined as a method of communication that converts neural activities generated by brain of living being (without the use of peripheral muscles and nerves) into computer commands or other ...
  • The Insurance Manager - Mobile Application 

    Sharma, Aditi; Sharma, Aditi (North Dakota State University, 2017)
    People buy several expensive products with the insurance whether it is a Camera, Phone, Television etc. Insurance usually comes with an end date and other important information like: Product Name, Vendor Name, Price of the ...
  • Perception about GMOs between the USA and Europe through Twitter 

    Chang, Feng; Chang, Feng (North Dakota State University, 2017)
    Twitter is one of the most popular social networking and microblogging services in the internet world. By the end of Jan 24, 2017, there were at least 100 million active users daily around the world. Due to such a huge ...
  • Finding Hidden Relationships between Medical Concepts by Leveraging Metamap and Text Mining Techniques 

    Yang, Weikang; Yang, Weikang (North Dakota State University, 2017)
    A lot of efforts have been made in order to make new discoveries in the biomedical filed. However, those valuable information may be hidden in text without applying appropriate text mining techniques. In this paper, I ...
  • Market Basket Analysis Algorithm with MapReduce Using HDFS 

    Nuthalapati, Aditya; Nuthalapati, Aditya (North Dakota State University, 2017)
    Market basket analysis techniques are substantially important to every day’s business decision. The traditional single processor and main memory based computing approach is not capable of handling ever increasing large ...
  • Implementation of Multilevel Thresholding Based Ant Colony Optimization Algorithm for Edge Detection of Images 

    Kanajal Chandrakanth, Spoorthy; Kanajal Chandrakanth, Spoorthy (North Dakota State University, 2017)
    Edges in an image characterize object boundaries in an image, which is helpful in image processing and feature extraction in a particular scene. One of the methods used to detect edges in an image is image thresholding, ...
  • Mining Connected Frequent Boolean Expressions 

    Kolte, Deepak; Kolte, Deepak (North Dakota State University, 2017)
    In this paper, we are finding Connected Frequent Boolean Expressions from cancer dataset [14] and protein protein interaction network [14] to discover group of dysregulated genes. Frequent Itemset Mining is a process of ...
  • Big Body: A Collaborative Platform for Bodybuilding and Nutrition 

    Arora, Amit; Arora, Amit (North Dakota State University, 2017)
    Health and a supple body has been seen as a prized possession by almost every culture. Witnessing our body grow and come alive with health after months of hard work is an unparalleled feeling. Bodybuilding tends to improve ...
  • Cognitive Heuristics in Software Engineering: Evaluating Confirmation Bias during Software Testing 

    Hegde, Shishir; Hegde, Shishir (North Dakota State University, 2017)
    Software engineering is a human centric activity and the thought processes of software engineers have influence on the quality of software products. Cognitive scientists have identified human errors known as cognitive ...

View more