Now showing items 34-53 of 408

    • Association Rule Mining of Biological Field Data Sets 

      Shrestha, Anuj (North Dakota State University, 2017)
      Association rule mining is an important data mining technique, yet, its use in association analysis of biological data sets has been limited. This mining technique was applied on two biological data sets, a genome and a ...
    • Athletic Fundraising and University Development Offices: A Structurational Relationship 

      Dickhudt, Keith Michael (North Dakota State University, 2010)
      This case study examines the working relationship between an athletic department and a central development office within a university. This study focuses primarily on the coordination of fundraising efforts between the ...
    • Attacking the Messenger: Exploring the Security of Big Data Messenger Apache Kafka 

      Losinski, Tyler (North Dakota State University, 2021)
      As technology becomes faster, cheaper, and more compact, a higher volume of data must be processed. This demand drives the need to process high volumes of data in near real time. As a result, technologies such as Kafka ...
    • An Automated Approach for Discovering Functional Risk-Inducing Flaws in Software Designs 

      Hassan, Amro Salem Salem (North Dakota State University, 2015)
      For safety critical applications, it is necessary to ensure that risk-inducing flaws do not exist in the final product. To date, many risk-based testing techniques were proposed. The majority of these techniques address ...
    • Automated Detection of Acute Leukemia Using K-Means Clustering Algorithm 

      Arya, Minakshi (North Dakota State University, 2019)
      Detection of ALL can be done through the analysis of white blood cells (WBCs) called leukocytes. Usually, the analysis of blood cells is performed manually by skilled operators, have numerous drawbacks, such as slow analysis, ...
    • Automated Framework to Improve User’s Awareness and to Categorize Friends on Online Social Networks 

      Barakat, Rahaf (North Dakota State University, 2015)
      The popularity of online social networks has brought up new privacy threats. These threats often arise after users willingly, but unwittingly reveal their information to a wider group of people than they actually intended. ...
    • An Automated Testing Framework for the Virtual Cell Game 

      Dandey, Santosh Raj (North Dakota State University, 2013)
      The NDSU Virtual Cell game is a role-based, multi-user computer game developed to aid in learning cellular concepts in biology. It is developed using client/server architecture with Lambda-Moo as a server and web-based ...
    • Automated Tool for Software Requirements Inspection 

      Amaran, Pradeep (North Dakota State University, 2011)
      The software inspection process is a very cost effective method of identifying defects in documents produced during the software life cycle, leading to higher quality software with lower field failures. Manual inspections ...
    • Automatic Conceptual Feedback on Software Tests 

      Kumar, Pranay (North Dakota State University, 2017)
      Students in introductory programming courses face many challenges. While the educators try their best to assist students with these challenges by adopting different approaches, majority of them end up overlooking the ...
    • Automatic Evaluation of Mobile Web Pages 

      Sehgal, Ankita (North Dakota State University, 2010)
      The use of mobile devices to access the information on the World Wide Web is growing rapidly. The growth has created a surge in the number of webpages being designed for mobile devices. In order to support efficient ...
    • Automatic Method for Testing Struts-Based Application 

      Tiwari, Shweta (North Dakota State University, 2013)
      Model based testing is a very popular and widely used in industry and academia. There are many tools developed to support model based development and testing, however, the benefits of model based testing requires tools ...
    • Basic Cybersecurity Awareness Through Gaming 

      Kulkarni, Vikas Krishnarao (North Dakota State University, 2019)
      The goal of this paper is to bring the basic awareness of cybersecurity among students so that they do not become a victim of cybercrime. Studies show that cybersecurity serious games support multiple well-established ...
    • Bayesian Approach for Detection Classification 

      Annapureddy, Anupama Reddy (North Dakota State University, 2011)
      The objective of this paper is to develop and test a software system that uses incomplete information from a collection of sensors to classify different objects present in a particular area with a pre-specified probability. ...
    • Best Practices of ERP Implementation 

      Puri, Rahul (North Dakota State University, 2014)
      Today Enterprise Resource Planning (ERP) has become a fundamental necessity for the organization. It serves many functional areas and many industries in an integrated fashion, trying to automate operations from inventory ...
    • Big Body: A Collaborative Platform for Bodybuilding and Nutrition 

      Arora, Amit (North Dakota State University, 2017)
      Health and a supple body has been seen as a prized possession by almost every culture. Witnessing our body grow and come alive with health after months of hard work is an unparalleled feeling. Bodybuilding tends to improve ...
    • Blockchain-Based Trust Model: Alleviating the Threat of Malicious Cyber-Attacks 

      Bugalwi, Ahmed Youssef (North Dakota State University, 2020)
      Online communities provide a unique environment where interactions performed among its subscribers who have shared interest. Members of these virtual communities are typically classified as trustworthy and untrustworthy. ...
    • Blood Glucose Prediction Models for Personalized Diabetes Management 

      Fernando, Warnakulasuriya Chandima (North Dakota State University, 2018)
      Effective blood glucose (BG) control is essential for patients with diabetes. This calls for an immediate need to closely keep track of patients' BG level all the time. However, sometimes individual patients may not be ...
    • Brain Cancer Detection Using MRI Scans 

      Thotapally, Shanthanreddy (North Dakota State University, 2020)
      An estimate of about 700,000 Americans today live with a brain tumor. Of these, 70% are benign and 30% are malicious. The average survival rate of all the malicious brain tumor patients is 35%. Diagnosing these tumors early ...
    • Breast Cancer Diagnosis Using Different Machine Learning Techniques 

      Roy, Souradip (North Dakota State University, 2019)
      Cancer is one of the dangerous diseases which causes many deaths each year and breast cancer being one of them which is quite common among women. In today’s time 12 percent of the women can develop breast cancer over her ...
    • Building Plant 3D Genome Computing Resources 

      Bulathsinghalage, Chanaka Sampath Cooray (North Dakota State University, 2021)
      Chromatin interactions play increasingly important roles in three-dimensional genome organization and long-range gene regulation. Analyzing the three-dimensional structure of the plants is currently a growing field and we ...