Search
Now showing items 301-310 of 408
Zero-Trust Architecture and Its Cost-Effectiveness on Network Security
(North Dakota State University, 2022)
Zero-Trust Architecture (ZTA) is a ‘Never Trust, Always Verify’ concept to improve cybersecurity by eliminating trust and validating network requests continuously. ZTA replaces Virtual Private Networks (VPNs) and provides ...
Study of Similarity Coefficients Using MapReduce Programming Model
(North Dakota State University, 2013)
MapReduce is a programming model for processing and generating large data sets. Users specify a map function that processes a key/value pair to generate a set of intermediate key/value pairs, and a reduce function that ...
Mobile Health Application for Diabetes Self-Management
(North Dakota State University, 2020)
As mobile healthcare applications are becoming more and more popular, it brings patients a more convenient way to self-management and communicating remotely compare to the traditional healthcare system. This paper introduces ...
Usability Construct for Mobile Applications: A Clustering based Approach
(North Dakota State University, 2015)
The growth of mobile applications that run on cell phones and other handheld devices has introduced a broad range of usability challenges that were not faced by the web and standalone PC environments. The current usability ...
Towards Improving P300-based Brain-Computer Interfaces: From Desktop to Mobile
(North Dakota State University, 2014)
A brain-computer interface (BCI) enables a paralyzed user to interact with an
external device through brain signals. A BCI measures identi es patterns within
these measured signals, translating such patterns into commands. ...
Analyzing Access Logs Data using Stream Based Architecture
(North Dakota State University, 2018)
Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ...
Demonstrating Bid Rigging with a Shopping Agent Application Using JADE
(North Dakota State University, 2011)
This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
Graph Data Conversion and Tree Visualization
(North Dakota State University, 2011)
The first part of the paper is converting graph data format from GXL to GraphML. GXL and GraphML are both XML-based languages for representing graph data. The HP page segmentation tool produces output graph data in GXL ...
Optimization Modeling for Wireless Sensor Scheduling
(North Dakota State University, 2013)
Wireless sensor networks, consisting of sensing devices which sense the environment and communicate information among each other, is an emergent field in wireless networking with many potential applications. The efficiency ...
Replication with Incentives in Centralized Peer to Peer Networks
(North Dakota State University, 2013)
We are living in a digital age in which data production has become so ubiquitous that the demand for sharing will increase as more aspects of life become digital. There are several ways we share data: via websites and ...