Now showing items 1-20 of 402

    • Adapting Web Page Tables on Mobile Web Browsers: Results from Two Controlled Empirical Studies 

      Annadi, Ramakanth Reddy (North Dakota State University, 2014)
      Displaying web page content in mobile screens is a challenging task and users often face difficulty retrieving the relevant data. It can force them to adopt a time-consuming hunt-and-peck strategy. Application of design ...
    • Adaptive Differential Evolution and its Application to Machine Vision 

      Dawar, Deepak (North Dakota State University, 2016)
      Over recent years, Evolutionary Algorithms (EA) have emerged as a practical approach for solving hard optimization problems ubiquitously presented in real life. The inherent advantage of EA over other types of numerical ...
    • Adaptive Mesh Refinment Applications for Adviction-Diffusion Problems Using Amrex 

      Kanumuru, Venkata (North Dakota State University, 2020)
      In this paper we implemented an adaptive mesh refinement in high performance computing environment to study a wide range of problems in engineering. They are nonlinear Fisher-Kolmogorov equation, heat equation, advection ...
    • Adaptive Regression Testing Strategies for Cost-Effective Regression Testing 

      Schwartz, Amanda Jo (North Dakota State University, 2013)
      Regression testing is an important but expensive part of the software development life-cycle. Many different techniques have been proposed for reducing the cost of regression testing. To date, much research has been performed ...
    • Adaptive Regression Testing Strategy: An Empirical Study 

      Arafeen, Md. Junaid (North Dakota State University, 2012)
      When software systems evolve, different amounts of code modifications can be involved in different versions. These factors can affect the costs and benefits of regression testing techniques, and thus, there may be no single ...
    • Addressing Challenges in Data Privacy and Security: Various Approaches to Secure Data 

      Pattanayak, Sayantica (North Dakota State University, 2021)
      Emerging neural networks based machine learning techniques such as deep learning and its variants have shown tremendous potential in many application domains. However, the neural network models raise serious privacy concerns ...
    • Addressing Off-Nominal Behaviors in Requirements for Embedded Systems 

      Aceituna, Daniel (North Dakota State University, 2015)
      System requirements are typically specified on the assumption that the system's operating environment will behave in what is considered to be an expected and nominal manner. When gathering requirements, one concern is ...
    • Advanced Computational Ratings for College Football Teams 

      Hensley, Joel Michael (North Dakota State University, 2010)
      This paper explores the subject of rating systems applied to the world of college football. Current rating system methodologies are examined, and four rating systems are developed and evaluated in a program. The Hensley ...
    • Agent Based Modeling for Simulation of Microbial Community 

      Tekeste, Noah Daniel (North Dakota State University, 2018)
      Agent based modeling uses interacting agents and a governing rule to understand a complex phenomenon. It is an important mode of inquiry in the field of life sciences. For this paper a Haploid Evolutionary Constructor (HEC) ...
    • Agent Communication and Negotiation in a Supply Chain 

      Upadhyay, Rajat (North Dakota State University, 2013)
      Supply Chain Management is an essential management paradigm for almost every organization. Effective implementation of Supply Chain Management (SCM) can significantly increase an organization’s profit. In this paper, a ...
    • Agent-Based Modeling to Simulate the Movement of a Flock of Birds 

      Byrisetty, Naga Chaitanya (North Dakota State University, 2013)
      The most beautiful, mysterious movements of bird flocks have always amused the human and led his thinking towards what makes these complex movements possible. This paper discusses the simulation of such bird behavior based ...
    • Alexa for Health Practitioners 

      Bhatt, Vidisha Nareshkumar (North Dakota State University, 2020)
      Many industries, including healthcare, are trying to take advantage of voice assistant systems by incorporating their technology into the industries’ environment. However, not many companies or researchers have successfully ...
    • Alexa, What Should I Eat? A Personalized Virtual Nutrition Coach for Native American Diabetes Patients Using Amazon's Smart Speaker Technology 

      Maharjan, Bikesh (North Dakota State University, 2020)
      Among all other ethnic groups in the USA, native American’s have higher chances of developing diabetes. A lot of tools have been developed to address this issue and help them in managing diabetes. However, these tools fail ...
    • Algorithms for Coverage Improvement in a Sensor Network 

      Maddi, Sunil Reddy (North Dakota State University, 2011)
      Sensors are devices which have the ability to receive and respond to a signal. These sensors, when used as a group, form a sensor network. Sensors in a sensor network can communicate and transmit data. In the early stages ...
    • Alternative Clustering Algorithms in Sensor Networks 

      Gupta, Divya (North Dakota State University, 2010)
      A wireless sensor network is composed of a large number of tiny sensor nodes that can be deployed in a variety of environments like battle fields, water, large fields, and the like, and can transmit data to a Base station ...
    • Analyses of People’s Perceptions Toward Risks in Genetically Modified Organisms 

      Dass, Pranav (North Dakota State University, 2016)
      This research aims to analyze people’s perceptions about the potential risks associated with the presence of genetically modified organisms (GMOs) in food products. We formulated research questions and hypotheses based on ...
    • Analysis of Image Classification Deep Learning Algorithm 

      Kanungo, Shivam (North Dakota State University, 2023)
      This study explores the use of TensorFlow 2 and Python for image classification problems. Image categorization is an important area in computer vision, with several real-world applications such as object identification/r ...
    • Analysis of Java's Common Vulnerabilities and Exposures in GitHub's Open-Source Projects 

      Akanmu, Semiu (North Dakota State University, 2022)
      Java developers rely on code reusability because of its time and effort reduction advantage. However, they are exposed to vulnerabilities in publicly available open-source software (OSS) projects. This study employed a ...
    • Analysis of SDR to Detect Long Range RFID Badge Cloners 

      Knecht, Brett (North Dakota State University, 2022)
      This thesis proposes a way of detecting when radio frequency identification (RFID) badge credentials are being captured through the use of software defined radio (SDR). A method for using SDR to detect when badge cloning ...
    • Analysis of Security Vulnerabilities in Web Applications using Threat Modeling 

      Kondamarri, Samuel Sudhakar (North Dakota State University, 2011)
      Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...