Recent Submissions

  • Analyzing Access Logs Data using Stream Based Architecture 

    Gautam, Nitendra; Gautam, Nitendra (North Dakota State University, 2018)
    Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ...
  • Using Message Queuing to Drive Polyglot Identity and Access Management Development 

    Frovarp, Richard Ernest Orvin; Frovarp, Richard Ernest Orvin (North Dakota State University, 2017)
    This paper describes a method of using an Advanced Message Queuing Protocol (AMQP) broker, RabbitMQ in particular, to facilitate the management of accounts across a variety of systems. Higher education poses a unique ...
  • Implementation of Weighted Centroid Neural Network for Edge Preserving Image Compression 

    Depa, Amarender Reddy; Depa, Amarender Reddy (North Dakota State University, 2017)
    Image compression is a type of data compression applied to images. The objective of image compression is to reduce the cost for storage or transmission. Image compression is associated with removing redundant information ...
  • A Java Class Analysis Program Development By ASM Library 

    Qiu, Chengxiang; Qiu, Chengxiang (North Dakota State University, 2017)
    Class analysis is useful technique that can be used in many situations, from the syntaxes parsing, potential bugs finding, and unused code detecting to reverse engineer coding. In this paper, I write a small program classasm ...
  • Classification Algorithms Applied to a Brain Computer Interface System Based On P300 

    Gaur, Himanshu; Gaur, Himanshu (North Dakota State University, 2017)
    A BCI or Brain Computer Interface is defined as a method of communication that converts neural activities generated by brain of living being (without the use of peripheral muscles and nerves) into computer commands or other ...
  • The Insurance Manager - Mobile Application 

    Sharma, Aditi; Sharma, Aditi (North Dakota State University, 2017)
    People buy several expensive products with the insurance whether it is a Camera, Phone, Television etc. Insurance usually comes with an end date and other important information like: Product Name, Vendor Name, Price of the ...
  • Perception about GMOs between the USA and Europe through Twitter 

    Chang, Feng; Chang, Feng (North Dakota State University, 2017)
    Twitter is one of the most popular social networking and microblogging services in the internet world. By the end of Jan 24, 2017, there were at least 100 million active users daily around the world. Due to such a huge ...
  • Finding Hidden Relationships between Medical Concepts by Leveraging Metamap and Text Mining Techniques 

    Yang, Weikang; Yang, Weikang (North Dakota State University, 2017)
    A lot of efforts have been made in order to make new discoveries in the biomedical filed. However, those valuable information may be hidden in text without applying appropriate text mining techniques. In this paper, I ...
  • Market Basket Analysis Algorithm with MapReduce Using HDFS 

    Nuthalapati, Aditya; Nuthalapati, Aditya (North Dakota State University, 2017)
    Market basket analysis techniques are substantially important to every day’s business decision. The traditional single processor and main memory based computing approach is not capable of handling ever increasing large ...
  • Implementation of Multilevel Thresholding Based Ant Colony Optimization Algorithm for Edge Detection of Images 

    Kanajal Chandrakanth, Spoorthy; Kanajal Chandrakanth, Spoorthy (North Dakota State University, 2017)
    Edges in an image characterize object boundaries in an image, which is helpful in image processing and feature extraction in a particular scene. One of the methods used to detect edges in an image is image thresholding, ...
  • Mining Connected Frequent Boolean Expressions 

    Kolte, Deepak; Kolte, Deepak (North Dakota State University, 2017)
    In this paper, we are finding Connected Frequent Boolean Expressions from cancer dataset [14] and protein protein interaction network [14] to discover group of dysregulated genes. Frequent Itemset Mining is a process of ...
  • Big Body: A Collaborative Platform for Bodybuilding and Nutrition 

    Arora, Amit; Arora, Amit (North Dakota State University, 2017)
    Health and a supple body has been seen as a prized possession by almost every culture. Witnessing our body grow and come alive with health after months of hard work is an unparalleled feeling. Bodybuilding tends to improve ...
  • Cognitive Heuristics in Software Engineering: Evaluating Confirmation Bias during Software Testing 

    Hegde, Shishir; Hegde, Shishir (North Dakota State University, 2017)
    Software engineering is a human centric activity and the thought processes of software engineers have influence on the quality of software products. Cognitive scientists have identified human errors known as cognitive ...
  • Teaching Software Testing Concepts Using Learning Objects 

    Simley, Judi Lynn; Simley, Judi Lynn (North Dakota State University, 2017)
    The ubiquitous nature of software, it is very important to prepare students for jobs in the software industry. There is a profound deficiency in testing skills in graduating students when beginning jobs in Information ...
  • Online Defect Tracking System 

    Soni, Gaurav; Soni, Gaurav (North Dakota State University, 2017)
    For Improving Software Reliability, Defect Tracking System (DTS) gives the facility to define the tasks and allow the managers to track the Defects and time spent by each employee for that particular task. This tool can ...
  • Automatic Conceptual Feedback on Software Tests 

    Kumar, Pranay; Kumar, Pranay (North Dakota State University, 2017)
    Students in introductory programming courses face many challenges. While the educators try their best to assist students with these challenges by adopting different approaches, majority of them end up overlooking the ...
  • Mining Quasi-Frequent Subnetworks in Graph Networks Using Edge-Edge Summary Graph 

    Dawar, Priyanka; Dawar, Priyanka (North Dakota State University, 2017)
    In today’s computing world, graphs have become increasingly important in modeling sophisticated structures, entities and their interactions, with broad applications including Bioinformatics, Computer Vision, Web analysis ...
  • Consumer Sentiment Analysis Using Twitter 

    Rashid, Rumana; Rashid, Rumana (North Dakota State University, 2017)
    Sentiment analysis is the task of finding people’s opinions about specific objects/matters. Ordinary people’s opinions affect the decision-making process. Today, there is a massive explosion of “sentiments” available on ...
  • Efficient Mobile Information Sharing Through Finger Swipe 

    Hu, Ping; Hu, Ping (North Dakota State University, 2017)
    Smartphones have been pervasive in our daily life, and are now the dominant driver of social media. People post and access information on the social media through smartphones. In addition, users are likely to share information ...
  • Semantics-Based Calorie Calculator 

    Narra, Sravan Raghu Kumar; Narra, Sravan Raghu Kumar (North Dakota State University, 2017)
    In recent years, people are considering healthy diet habits and many of them are trying to track and maintain their daily diet and consumption. To assist them, there are many applications available online and those ...

View more