Now showing items 359-378 of 408

    • Stock Prediction Analyzing Investor Sentiments 

      Chatterjee, Arijit (North Dakota State University, 2018)
      We are going through a phase of data evolution where a major portion of the data from our daily lives is now been stored on social media platforms. In recent years, social media has become ubiquitous and important for ...
    • Stock Price Prediction Using Recurrent Neural Networks 

      Jahan, Israt (North Dakota State University, 2018)
      The stock market is generally very unpredictable in nature. There are many factors that might be responsible to determine the price of a particular stock such as the market trend, supply and demand ratio, global economy, ...
    • A Structural Metric Model to Predict the Complexity of Web Interfaces 

      Attaallah, Abdulaziz Ahmad (North Dakota State University, 2017)
      The complexity of web pages has been widely investigated. Many experimental studies used several metrics to measure certain aspects of the users, tasks or GUIs. In this research, we focusing on the visual structure of web ...
    • Study of Similarity Coefficients Using MapReduce Programming Model 

      Nayakam, GhanaShyam Nath (North Dakota State University, 2013)
      MapReduce is a programming model for processing and generating large data sets. Users specify a map function that processes a key/value pair to generate a set of intermediate key/value pairs, and a reduce function that ...
    • A Survey on Trust Management in Cloud Computing 

      Roodaki, Maryam (North Dakota State University, 2016)
      Nowadays the number of people that outsource their data to the cloud increases dramatically. Cloud computing offer cost-effective dynamic, scalable and shared services for enterprises from remote data centre. However, the ...
    • Systematic Approaches to Improve Test Case Prioritization Using Requirements and Risks 

      Hettiarachchi, Charitha Sasika (North Dakota State University, 2016)
      The use of system requirements and their risks enables software testers to identify more important test cases that can reveal faults associated with risky components. Having identified important test cases, software testers ...
    • Taxonomy of Gestures in Human Computer Interaction 

      Vafaei, Fereydoon (North Dakota State University, 2013)
      Classification of gestures is important in the area of gestural interaction given the diversity, the complexity and the spontaneity of the gestures in different HCI application domains. Gesture designers for interactive ...
    • Teaching Encryption: A Learning Theory Approach 

      Bhogadi, Manu Kishore (North Dakota State University, 2010)
      Bloom's taxonomy for cognitive domain is an effective taxonomy for structured learning. The six levels in Bloom's taxonomy for cognitive domain are based on the levels of difficulty. This paper focuses on teaching ...
    • Teaching Software Testing Concepts Using Learning Objects 

      Simley, Judi Lynn (North Dakota State University, 2017)
      The ubiquitous nature of software, it is very important to prepare students for jobs in the software industry. There is a profound deficiency in testing skills in graduating students when beginning jobs in Information ...
    • A Technique to Detect a Black Hole in Ad Hoc Networks 

      Suravarapu, Vijay Anand (North Dakota State University, 2010)
      Mobile Ad Hoc Networks (MANETs) are important because they are widely used in war zones, rescue missions and other civilian applications where it is almost impossible to use any other networks. MANETs are temporary ...
    • Text Mail - On Demand Email to SMS Service 

      Wijeyaratne, Pubudu (North Dakota State University, 2012)
      Short Messaging Service (SMS)-based mobile information services have become increasingly common around the world, especially among users with low-end mobile devices. This paper presents the design and implementation of ...
    • Threat Identification from Access Logs Using Elastic Stack 

      Vethanayagam, Suhanthan (North Dakota State University, 2020)
      Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...
    • Towards Better Engineering of Enterprise Resource Planning Systems 

      Asgar, Talukdar Sabbir (North Dakota State University, 2016)
      In spite of their high implementation failure rate, Enterprise Resource Planning (ERP) software remains a popular choice for most businesses. When it succeeds, ERP software provides effective integration of formerly isolated ...
    • Towards Change Propagating Test Models In Autonomic and Adaptive Systems 

      Akour, Mohammed Abd Alwahab (North Dakota State University, 2012)
      The major motivation for self-adaptive computing systems is the self-adjustment of the software according to a changing environment. Adaptive computing systems can add, remove, and replace their own components in response ...
    • Towards Improving P300-based Brain-Computer Interfaces: From Desktop to Mobile 

      Obeidat, Qasem Turki (North Dakota State University, 2014)
      A brain-computer interface (BCI) enables a paralyzed user to interact with an external device through brain signals. A BCI measures identi es patterns within these measured signals, translating such patterns into commands. ...
    • Towards Providing Test Case Meta-Data to Assist Dynamic Regression Test Scheduling 

      Katiyar, Arti (North Dakota State University, 2013)
      Autonomic software is typically characterized by dynamic adaptation, a self-management process in which the system adds, removes, and replaces its own components at runtime. At the end of maintenance, the modified software ...
    • Towards Test Focus Selection for Integration Testing Using Software Metrics 

      Bani Ta’an, Shadi Elaiyan (North Dakota State University, 2013)
      Object-oriented software systems contain a large number of modules which make the unit testing, integration testing, and system testing very difficult and challenging. While the aim of the unit testing is to show that ...
    • Tracking Vehicles from Mobile Phone Received Signal Strength Sequences 

      Chitraranjan, Charith Devinda (North Dakota State University, 2015)
      We address the problem of tracking vehicles from received signal strength (RSS) sequences generated by mobile phones carried in them. Our main objectives are to provide travel-time estimates for selected roads and provide ...
    • Training Set Selection to Improve Crop Classification 

      Christeson, Eric John (North Dakota State University, 2015)
      In some classification problems, acquiring class label information is much more expensive than collecting attribute data. One such problem is crop classification from satellite imagery. While random sampling is one option, ...
    • Trust and Anti-Autonomy Modelling of Autonomous Systems 

      Rastogi, Aakanksha (North Dakota State University, 2020)
      Human trust in autonomous vehicles is built upon their safe and secure operability in the most ethical, law abiding manner possible. Despite the technological advancements that autonomous vehicles are equipped with, their ...