Browsing Computer Science by Title
Now showing items 14-33 of 408
-
Algorithms for Coverage Improvement in a Sensor Network
(North Dakota State University, 2011)Sensors are devices which have the ability to receive and respond to a signal. These sensors, when used as a group, form a sensor network. Sensors in a sensor network can communicate and transmit data. In the early stages ... -
Alternative Clustering Algorithms in Sensor Networks
(North Dakota State University, 2010)A wireless sensor network is composed of a large number of tiny sensor nodes that can be deployed in a variety of environments like battle fields, water, large fields, and the like, and can transmit data to a Base station ... -
Analyses of People’s Perceptions Toward Risks in Genetically Modified Organisms
(North Dakota State University, 2016)This research aims to analyze people’s perceptions about the potential risks associated with the presence of genetically modified organisms (GMOs) in food products. We formulated research questions and hypotheses based on ... -
Analysis of Image Classification Deep Learning Algorithm
(North Dakota State University, 2023)This study explores the use of TensorFlow 2 and Python for image classification problems. Image categorization is an important area in computer vision, with several real-world applications such as object identification/r ... -
Analysis of Java's Common Vulnerabilities and Exposures in GitHub's Open-Source Projects
(North Dakota State University, 2022)Java developers rely on code reusability because of its time and effort reduction advantage. However, they are exposed to vulnerabilities in publicly available open-source software (OSS) projects. This study employed a ... -
Analysis of SDR to Detect Long Range RFID Badge Cloners
(North Dakota State University, 2022)This thesis proposes a way of detecting when radio frequency identification (RFID) badge credentials are being captured through the use of software defined radio (SDR). A method for using SDR to detect when badge cloning ... -
Analysis of Security Vulnerabilities in Web Applications using Threat Modeling
(North Dakota State University, 2011)Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ... -
Analyzing Access Logs Data using Stream Based Architecture
(North Dakota State University, 2018)Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ... -
Analyzing Student Learning Outcomes in Programming Course Using Individual Study Vs. Pair Programming
(North Dakota State University, 2014)Pair programming has been common practice in the programming industry during last three decades, but only recently did it start to draw the attention as a teaching strategy. This paper investigates whether we should introduce ... -
Analyzing Three Different Tuning Strategies for Random Forest Hyperparameters for Fraud Detection
(North Dakota State University, 2021)Technology is advancing rapidly, and more tasks are becoming online than ever. Along with the benefits comes the disadvantages of this great advancement. While online services relieve from the struggle of in person activities, ... -
Anonymity and Hostile Node Identification in Wireless Sensor Networks
(North Dakota State University, 2010)In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ... -
Application for Capturing Potential Tardiness in Operating Room Suites
(North Dakota State University, 2012)This paper describes the design, architecture and implementation of a Dashboard Application, a tool developed to capture the potential tardiness in Operating Room (OR) Suites. The paper is focused on developing an automated ... -
An Application of Association Rule Mining to Unit Test Selection
(North Dakota State University, 2013)Appropriate selection of unit tests during the software development process is vital when many unit tests exist. The developer may be unfamiliar with some tests and non-obvious relationships between application code and ... -
Application of Memory-Based Collaborative Filtering to Predict Fantasy Points of NFL Quarterbacks
(North Dakota State University, 2019)Subjective expert projections have been traditionally used to predict points in fantasy football, while machine prediction applications are limited. Memory-based collaborative filtering has been widely used in recommender ... -
Application of the Kusumoto Cost-Metric to Evaluate the Cost-Effectiveness of Software Inspections
(North Dakota State University, 2012)Inspection and testing are two widely recommended techniques for software quality improvement with a common goal of defect detection and removal in software products. While testing cannot be conducted until software is ... -
Applied Nonparametric Statistical Tests to Compare Evolutionary and Swarm Intelligence Approaches
(North Dakota State University, 2014)Recently, in many experimental studies, the statistical analysis of nonparametric comparisons has grown in the area of computational intelligence. The research refers to application of different techniques that are used ... -
An Architecture for the Implementation and Distribution of Multiuser Virtual Environments.
(North Dakota State University, 2010)JavaMOO is an architecture for creating multiuser virtual environments focusing on domain-specific design and rapid development. JavaMOO components use best practices and extensible design for system configuration, ... -
An Artificial Immune System Heuristic in a Smart Electrical Grid
(North Dakota State University, 2014)The immune system of the human body follows a process that is adaptive and learns via experience. Some algorithms are designed to take advantage of this process to determine solutions for complex problem domains. The ... -
Assessment and Recommendation of Requirement Management Tool Based on User Needs
(North Dakota State University, 2012)Over recent years, requirement management has played a very vital role in materializing IT projects. Whether it is the healthcare sector, finance sector, banking sector, or any other industrial sector, requirement management ... -
Assessment of Engineering Methodologies for Increasing CubeSat Mission Success Rates
(North Dakota State University, 2021)In the last twenty years, CubeSat Systems have gained popularity in educational institutions and commercial industries. CubeSats have attracted educators and manufacturers due to their ability to be quickly produced and ...