Search
Now showing items 371-380 of 408
Implementation of Parallel Programming to Improve Transaction Speed and Scalability in Blockchain Systems
(North Dakota State University, 2021)
This thesis presents a parallel mining architecture model intended to be used in blockchain systems to improve transaction speed and network scalability while maintaining decentralization. Typical blockchain validation ...
Blockchain-Based Trust Model: Alleviating the Threat of Malicious Cyber-Attacks
(North Dakota State University, 2020)
Online communities provide a unique environment where interactions performed among its subscribers who have shared interest. Members of these virtual communities are typically classified as trustworthy and untrustworthy. ...
Design of the Photo Album Ontology
(North Dakota State University, 2010)
At present, growing demand of the management of huge volume of web contents,
especially photos, require the software tools, which can store, index and retrieve the photos
from the repository more efficiently. In this ...
A Network Optimization Solver for Routing in Wireless Sensor Networks
(North Dakota State University, 2010)
Many wireless sensor network applications require energy efficient communication
between nodes in the network. Sensor networks are of limited resources. Due to this
limitation, the routing between the nodes is one of the ...
Anonymity and Hostile Node Identification in Wireless Sensor Networks
(North Dakota State University, 2010)
In many secure wireless network attack scenarios, the source of a data packet is as sensitive
as the data it contains. Existing work to provide source anonymity in wireless sensor
networks (WSN) are not frugal in terms ...
XGraphML-A Tool for Transforming UML to GraphML
(North Dakota State University, 2010)
This paper proposes and implements XGraphML, a tool which transforms a file from a
UML format to a GraphML using XSLT and JAXP technologies. The tool connects
ArgoUML with VEGGIE through this transformation. ArgoUML is ...
A Data Visualization Tool to Identify Patterns Formed by Subsets of Data
(North Dakota State University, 2010)
An object may be identified by its properties which may comprise both
continuous data values and categorical data values. Sometimes a particular property
(categorical) value may select a group of objects which have ...
Dynamic Algorithms for Sensor Scheduling and Adversary Path Prediction
(North Dakota State University, 2010)
In this thesis we describe three new dynamic, real time and robust sensor
scheduling algorithms for intruder tracking and sensor scheduling. We call them Tactic
Association Based Algorithm (TABA), Tactic Case Based ...
A Software Agent System for Private Email
(North Dakota State University, 2010)
The primary concerns in existing Email and instant messaging systems are
authentication processes, privacy and security issues. These messaging systems transfer the
message content through servers using protocols like ...
Virtual-Experiment-Driven Process Model (VEDPM)
(North Dakota State University, 2010)
Computer simulations are the last resort for many complex problems such as swarm
applications. However, to the best of the author's knowledge, there is no convincing work
in proving ''What You Simulate ls What You See'' ...