Now showing items 1-20 of 143

    • Discovering Complex Relationships between Drugs and Diseases 

      Sharma, Ranjana (North Dakota State University, 2011)
      Finding the complex semantic relations between existing drugs and new diseases will help in the drug development in a new way. Most of the drugs which have found new uses have been discovered due to serendipity. Hence, the ...
    • Demonstrating Bid Rigging with a Shopping Agent Application Using JADE 

      Sivanandam, Dinesh (North Dakota State University, 2011)
      This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
    • Graph Data Conversion and Tree Visualization 

      Guduru, Srinivas (North Dakota State University, 2011)
      The first part of the paper is converting graph data format from GXL to GraphML. GXL and GraphML are both XML-based languages for representing graph data. The HP page segmentation tool produces output graph data in GXL ...
    • Social and Ethical Dimensions of Electronic Medical Records 

      Tirupathi, Phani (North Dakota State University, 2012)
      Electronic Medical Records are a digital or computerized medical record created in an organization which delivers care as part of a health information system that allows the storage, retrieval, and modification of records. ...
    • Software Inspection Team Formation Based on the Learning Style of Individual Inspectors 

      Bavanari, Haribabu (North Dakota State University, 2012)
      To improve the software quality, researchers have focused their effort on developing and validating effective methods of finding and fixing defects early in the development process. Software inspections are most widely ...
    • A User Interface Prototype of Test Support As-A-Service 

      Kale, Neha (North Dakota State University, 2012)
      Cloud computing provides software as a service over the internet. With the increasing popularity of cloud applications, the development of error-free cloud-based applications that function reliably is necessary. Software ...
    • Application of the Kusumoto Cost-Metric to Evaluate the Cost-Effectiveness of Software Inspections 

      Mandala, Narendar Reddy (North Dakota State University, 2012)
      Inspection and testing are two widely recommended techniques for software quality improvement with a common goal of defect detection and removal in software products. While testing cannot be conducted until software is ...
    • Capacitated Transshipment Models for Predicting Signaling Pathways 

      Sahni, Ritika (North Dakota State University, 2012)
      Signal transduction is a process of transmitting signals for controlling biological responses. The protein-protein interaction (PPI) data, containing signal transduction proteins, can be considered as a bi-directional, ...
    • Energy Data Analyzer System 

      Pradhan, Basudha (North Dakota State University, 2012)
      Analyzing the electrical energy load and pricing data is important to make informed decisions about energy needs and regulations. Data from over a decade are publicly available online for many Independent System Operators ...
    • Fuzzy Decision Model for a Smart Grid 

      Baqui, Muhammad Niamul (North Dakota State University, 2012)
      Electricity is vital for U.S. economy. Over the years, the demand and the usage of electricity have skyrocketed, but the electric transmission and distribution processes have been manual. The current work formulates an ...
    • Course Proposal and Approval System 

      Murugaiyan, Elangovan (North Dakota State University, 2012)
      North Dakota State University (NDSU) Distance and Continuing Education (DCE) department makes learning resources of the institution available in a variety of traditional and non-traditional ways. It offers courses in various ...
    • A Tutorial Approach for Teaching Database Concepts 

      Sharma, Susbi (North Dakota State University, 2012)
      Experts in the education and psychology fields have undertaken immense research in order to find better learning approaches. Educators, teachers, cognitive psychologists, and researchers eventually accepted and developed ...
    • Modeling of Consumer Responses to Dynamic Pricing in a Smart Grid 

      Khan, Md Mahbubur Rahman (North Dakota State University, 2012)
      This paper models the responses of three different types of consumers based on their sensitivity to dynamic price. Simulated household demand data is used to model the dynamic price of electricity. These prices are then ...
    • Application for Capturing Potential Tardiness in Operating Room Suites 

      Gronneberg, Bethlehem Abera (North Dakota State University, 2012)
      This paper describes the design, architecture and implementation of a Dashboard Application, a tool developed to capture the potential tardiness in Operating Room (OR) Suites. The paper is focused on developing an automated ...
    • Deterministic Greedy Algorithms for Optimal Sensor Placement 

      Chintamaneni, Venkata Santosh (North Dakota State University, 2012)
      A sensor is a device which can be sensitive to any physical stimulus, such as light, heat, or a particular motion, and responds with a respective impulse. A graph is an abstract representation for a set of objects of any ...
    • Assessment and Recommendation of Requirement Management Tool Based on User Needs 

      Mohpal, Aditi (North Dakota State University, 2012)
      Over recent years, requirement management has played a very vital role in materializing IT projects. Whether it is the healthcare sector, finance sector, banking sector, or any other industrial sector, requirement management ...
    • Semantics-Enhanced Privacy Recommendation for Social Networking Sites 

      Li, Qingrui (North Dakota State University, 2012)
      Privacy protection is a vital issue for safe social interactions within social networking sites (SNS). Although SNSs such as MySpace and Facebook allow users to configure their privacy settings, the task is difficult ...
    • Comparison of Particle Swarm Optimization Variants 

      Daggubati, Satyanarayana (North Dakota State University, 2012)
      Particle swarm optimization (PSO) is a heuristic global optimization method, which is based on swarm intelligence. It is inspired by the research on the bird and fish flock movement behavior. The algorithm is widely used ...
    • Mining Association Rules in Cloud 

      Roy, Pallavi (North Dakota State University, 2012)
      The association rule mining was implemented in Hadoop. An association rule mining helps in finding relation between the items or item sets in the given data. The performance of the algorithm was evaluated by testing it in ...
    • A Package Tracking Application Based On Software Agents 

      Jonnalagadda, Vindhya (North Dakota State University, 2012)
      JADE (Java Agent Development Framework) is a software environment, which is fully developed in the Java language. It supports multi-agent systems using an extensible agent model and predefined program classes. This software ...