Now showing items 362-381 of 405

    • Taxonomy of Gestures in Human Computer Interaction 

      Vafaei, Fereydoon (North Dakota State University, 2013)
      Classification of gestures is important in the area of gestural interaction given the diversity, the complexity and the spontaneity of the gestures in different HCI application domains. Gesture designers for interactive ...
    • Teaching Encryption: A Learning Theory Approach 

      Bhogadi, Manu Kishore (North Dakota State University, 2010)
      Bloom's taxonomy for cognitive domain is an effective taxonomy for structured learning. The six levels in Bloom's taxonomy for cognitive domain are based on the levels of difficulty. This paper focuses on teaching ...
    • Teaching Software Testing Concepts Using Learning Objects 

      Simley, Judi Lynn (North Dakota State University, 2017)
      The ubiquitous nature of software, it is very important to prepare students for jobs in the software industry. There is a profound deficiency in testing skills in graduating students when beginning jobs in Information ...
    • A Technique to Detect a Black Hole in Ad Hoc Networks 

      Suravarapu, Vijay Anand (North Dakota State University, 2010)
      Mobile Ad Hoc Networks (MANETs) are important because they are widely used in war zones, rescue missions and other civilian applications where it is almost impossible to use any other networks. MANETs are temporary ...
    • Text Mail - On Demand Email to SMS Service 

      Wijeyaratne, Pubudu (North Dakota State University, 2012)
      Short Messaging Service (SMS)-based mobile information services have become increasingly common around the world, especially among users with low-end mobile devices. This paper presents the design and implementation of ...
    • Threat Identification from Access Logs Using Elastic Stack 

      Vethanayagam, Suhanthan (North Dakota State University, 2020)
      Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...
    • Towards Better Engineering of Enterprise Resource Planning Systems 

      Asgar, Talukdar Sabbir (North Dakota State University, 2016)
      In spite of their high implementation failure rate, Enterprise Resource Planning (ERP) software remains a popular choice for most businesses. When it succeeds, ERP software provides effective integration of formerly isolated ...
    • Towards Change Propagating Test Models In Autonomic and Adaptive Systems 

      Akour, Mohammed Abd Alwahab (North Dakota State University, 2012)
      The major motivation for self-adaptive computing systems is the self-adjustment of the software according to a changing environment. Adaptive computing systems can add, remove, and replace their own components in response ...
    • Towards Improving P300-based Brain-Computer Interfaces: From Desktop to Mobile 

      Obeidat, Qasem Turki (North Dakota State University, 2014)
      A brain-computer interface (BCI) enables a paralyzed user to interact with an external device through brain signals. A BCI measures identi es patterns within these measured signals, translating such patterns into commands. ...
    • Towards Providing Test Case Meta-Data to Assist Dynamic Regression Test Scheduling 

      Katiyar, Arti (North Dakota State University, 2013)
      Autonomic software is typically characterized by dynamic adaptation, a self-management process in which the system adds, removes, and replaces its own components at runtime. At the end of maintenance, the modified software ...
    • Towards Test Focus Selection for Integration Testing Using Software Metrics 

      Bani Ta’an, Shadi Elaiyan (North Dakota State University, 2013)
      Object-oriented software systems contain a large number of modules which make the unit testing, integration testing, and system testing very difficult and challenging. While the aim of the unit testing is to show that ...
    • Tracking Vehicles from Mobile Phone Received Signal Strength Sequences 

      Chitraranjan, Charith Devinda (North Dakota State University, 2015)
      We address the problem of tracking vehicles from received signal strength (RSS) sequences generated by mobile phones carried in them. Our main objectives are to provide travel-time estimates for selected roads and provide ...
    • Training Set Selection to Improve Crop Classification 

      Christeson, Eric John (North Dakota State University, 2015)
      In some classification problems, acquiring class label information is much more expensive than collecting attribute data. One such problem is crop classification from satellite imagery. While random sampling is one option, ...
    • Trust and Anti-Autonomy Modelling of Autonomous Systems 

      Rastogi, Aakanksha (North Dakota State University, 2020)
      Human trust in autonomous vehicles is built upon their safe and secure operability in the most ethical, law abiding manner possible. Despite the technological advancements that autonomous vehicles are equipped with, their ...
    • A Tutorial Approach for Teaching Database Concepts 

      Sharma, Susbi (North Dakota State University, 2012)
      Experts in the education and psychology fields have undertaken immense research in order to find better learning approaches. Educators, teachers, cognitive psychologists, and researchers eventually accepted and developed ...
    • Tutorial on Negative Selection Algorithm 

      Singh, Sonal (North Dakota State University, 2013)
      The primary aim of this paper is to incorporate the educational objectives of the revised Bloom’s taxonomy in the creation of educational material and assessments for teaching the concepts of the Negative Selection Algorithm. ...
    • A Two-phase Security Mechanism for Anomaly Detection in Wireless Sensor Networks 

      Zhao, Jingjun (North Dakota State University, 2013)
      Wireless Sensor Networks (WSNs) have been applied to a wide range of application areas, including battle fields, transportation systems, and hospitals. The security issues in WSNs are still hot research topics. The constrained ...
    • Understanding Contextual Factors in Regression Testing Techniques 

      Anderson, Jeffrey Ryan (North Dakota State University, 2016)
      The software regression testing techniques of test case reduction, selection, and prioritization are widely used and well-researched in software development. They allow for more efficient utilization of scarce testing ...
    • Understanding Human Errors to Improve Requirements Quality 

      Manjunath, Kavitha (North Dakota State University, 2018)
      Requirements engineering is the first and perhaps the most important phase of software life cycle. Software faults committed during the requirements development, if left undetected can affect downstream activities. While ...
    • Understanding the Patterns of Microservice Intercommunication From A Developer Perspective 

      Nadeem, Anas (North Dakota State University, 2022)
      Microservices Architecture is the modern paradigm for designing software. Based on the divide-and-conquer strategy, microservices architecture organizes the application by furnishing it with a fine-level granularity. Each ...