Browsing Computer Science by Title
Now showing items 86-105 of 405
-
A Data Mining Approach for Identifying Pavement Distress Signatures
(North Dakota State University, 2015)This work introduces signature-based data mining of pavement distress data. The goal is to understand the factors that influence pavement distress. The presented approach maintains multiple types of flexible pavement ... -
A Data Mining Approach to Radiation Hybrid Mapping
(North Dakota State University, 2014)The task of mapping markers from Radiation Hybrid (RH) mapping experiments is typically viewed as equivalent to the traveling-salesman problem, which has combinatorial complexity. As an additional problem, experiments ... -
Data Replication Strategies in Cloud Computing
(North Dakota State University, 2011)Data replication is a widely used technique in various systems. For example, it can be employed in large-scale distributed file systems to increase data availability and system reliability, or it can be used in many network ... -
A Data Visualization Tool to Identify Patterns Formed by Subsets of Data
(North Dakota State University, 2010)An object may be identified by its properties which may comprise both continuous data values and categorical data values. Sometimes a particular property (categorical) value may select a group of objects which have ... -
Deception in Cyberspace: Con-Man Attack in Cloud Services
(North Dakota State University, 2018)A con-man deception appears in services from cyberspace, e.g., in cloud services. A cloud-service provider deceives by repeatedly providing less service than promised and deliberately avoids service monitoring. Such a ... -
A Decision Model for Emergency Response
(North Dakota State University, 2013)In the real world, emergencies occur at different places. The emergencies fall into three categories: a fire emergency, a medical emergency, and a police emergency. Different emergencies occur at different places at different ... -
Decision-Making for Self-Replicating 3D Printed Robot Systems
(North Dakota State University, 2021)This work addresses decision-making for robot systems that can self-replicate. With the advent of 3D printing technology, the development of self-replicating robot systems is more feasible to implement than it was previously. ... -
Deep Learning Applied to Public Company Valuation for Value Investing
(North Dakota State University, 2021)Value investing is an investing approach that seeks to discover and take advantage of price discrepancies between the market price and the actual value of a company (intrinsic value). The purpose of this work is to measure ... -
Demonstrating Bid Rigging with a Shopping Agent Application Using JADE
(North Dakota State University, 2011)This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ... -
Design and Development of Naive Bayes Classifier
(North Dakota State University, 2013)The naïve Bayes classifier is a simple form of Bayesian classifiers which assumes all the features are independent of each other. Despite this assumption, the naïve Bayes classifier’s accuracy is comparable to other ... -
Design and Evaluation of Two Hybrid Genome Assembly Approaches Using Illumina, Roche 454, and PacBio Datasets
(North Dakota State University, 2016)The assembly of next-generation sequencing reads is one of the most challenging and important tasks in bioinformatics. There are many different types of assembly algorithms and programs that have been developed to assemble ... -
Design and Implementation of Social Networking Website Features
(North Dakota State University, 2010)People want to communicate and interact with each other over the internet. There are various websites which are helpful for this kind of socializing. The popularity and adaptability of each website depends on the features ... -
Design of a Game for Cybersecurity Awareness
(North Dakota State University, 2019)The primary objective of this paper is to use the Bloom’s Revised Taxonomy educational objectives in creating a game called Cyber Air-Strike for learning basic concepts of cybersecurity. Bloom’s Revised Taxonomy is used ... -
Design of the Photo Album Ontology
(North Dakota State University, 2010)At present, growing demand of the management of huge volume of web contents, especially photos, require the software tools, which can store, index and retrieve the photos from the repository more efficiently. In this ... -
The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application
(North Dakota State University, 2019)Virtual Reality is currently an affordable and consumer ready technology used by many in the games and interactive media industry, however unlike the user interface standards in mobile, PCs, and Macs, VR UI design can vary ... -
Desktop Interactive Activity Diagram Tutorial
(North Dakota State University, 2015)Activity diagram plays a vital role in Business Process Modeling as well as System modeling. In this paper, I have proposed a desktop interactive activity diagram tutorial that has been designed for educational purposes ... -
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices
(North Dakota State University, 2019)There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ... -
Deterministic Greedy Algorithms for Optimal Sensor Placement
(North Dakota State University, 2012)A sensor is a device which can be sensitive to any physical stimulus, such as light, heat, or a particular motion, and responds with a respective impulse. A graph is an abstract representation for a set of objects of any ... -
Developing a Software Tool to Enhance the Creativity during Software Development Using the Results from the Literature Review
(North Dakota State University, 2013)Success during software development depends on the creativity of software engineers. Knowledge plays a very important role in enhancing the creativity of software developers. Knowledge is available in different forms like ... -
Developing and Validating Active Learning Engagement Strategies to Improve Students' Understanding of Programming and Software Engineering Concepts
(North Dakota State University, 2020)Introductory computer programming course is one of the fundamental courses in computer science. Students enrolled in computer science courses at the college or university have been reported to lack motivation, and engagement ...