Search
Now showing items 21-30 of 33
An Automated Approach for Discovering Functional Risk-Inducing Flaws in Software Designs
(North Dakota State University, 2015)
For safety critical applications, it is necessary to ensure that risk-inducing flaws do not
exist in the final product. To date, many risk-based testing techniques were proposed. The
majority of these techniques address ...
Increasing Usability and Accessibility of GIS Technology Through Extension of Existing Software Tools
(North Dakota State University, 2015)
As the popularity of Geographic Information System (GIS) technology increases and its use extends from specialized users to the general public, tools available to users must adapt to take these changes into account. Virtual ...
Implementation of a GIS with Analytics for Pollution Data
(North Dakota State University, 2015)
Particulate matter called pm2.5 refers to harmful microscopic liquid or solid matter of diameter 2.5 microns suspended in the air. To effectively analyze and visualize data for pollution category pm2.5, a Geographic ...
Wireless Sensor Network Scheduling and Coverage Using an ABC Algorithm
(North Dakota State University, 2015)
Limited sensor battery capacity is a major issue in wireless sensor networks. If all of the sensors in a network need not be in an awake state to provide adequate coverage at any given time, it is possible to strategically ...
Fuzzy Reasoning Based Evolutionary Algorithms Applied to Data Mining
(North Dakota State University, 2015)
Data mining and information retrieval are two difficult tasks for various reasons. First, as the volume of data increases tremendously, most of the data are complex, large, imprecise, uncertain or incomplete. Furthermore, ...
Mining Significant Patterns by Integrating Biological Interaction Networks with Gene Profiles
(North Dakota State University, 2015)
Nowadays, large amounts of high-throughput data are available. Automatic with classical cell biology techniques which are employed in the analysis of cell functions, interactions, and how pathogens can exploit them in ...
Usability Construct for Mobile Applications: A Clustering based Approach
(North Dakota State University, 2015)
The growth of mobile applications that run on cell phones and other handheld devices has introduced a broad range of usability challenges that were not faced by the web and standalone PC environments. The current usability ...
Enterprise Resource Planning Metamodel Test Pattern
(North Dakota State University, 2015)
Enterprise Resource Planning (ERP) system is a complex distributed software solution
that costs millions of dollars to implement. Upgrading an ERP metamodel subsystem introduces
critical risks in the functionality of all ...
Domain Ontology Based Detection Approach to Identify Effect Types of Security Requirements upon Functional Requirements
(North Dakota State University, 2015)
Requirements engineering is a subfield of software engineering that is concerned with analyzing software requirements specifications. An important process of requirement engineering is tracing requirements to investigate ...
NDSU Scholar: Application to Search Articles Relevant to a Research Problem
(North Dakota State University, 2015)
Because of recent development in the field of computers, there has been substantial growth in the field of online education that varies from online tutors to electronic research papers. Now days, a student can find almost ...