Now showing items 141-160 of 416

    • Mobile Diabetes Application 

      Myneedi, Anusha (North Dakota State University, 2019)
      In recent years, Diabetes is becoming a serious health challenge. The prevalence of diabetes has increased with accompanying increases in body weight and diminished physical activity and with increased automation. Effective ...
    • Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices 

      Kambhampaty, Krishna Kanth (North Dakota State University, 2019)
      There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ...
    • Incorporating Sliding Window-Based Aggregation for Evaluating Topographic Variables in Geographic Information Systems 

      Gomes, Rahul (North Dakota State University, 2019)
      The resolution of spatial data has increased over the past decade making them more accurate in depicting landform features. From using a 60m resolution Landsat imagery to resolution close to a meter provided by data from ...
    • Algorithms for Coverage Improvement in a Sensor Network 

      Maddi, Sunil Reddy (North Dakota State University, 2011)
      Sensors are devices which have the ability to receive and respond to a signal. These sensors, when used as a group, form a sensor network. Sensors in a sensor network can communicate and transmit data. In the early stages ...
    • Automated Detection of Acute Leukemia Using K-Means Clustering Algorithm 

      Arya, Minakshi (North Dakota State University, 2019)
      Detection of ALL can be done through the analysis of white blood cells (WBCs) called leukocytes. Usually, the analysis of blood cells is performed manually by skilled operators, have numerous drawbacks, such as slow analysis, ...
    • Enumeration of Dense Modules in Networks 

      Durgapathi, Yashwanth Goud (North Dakota State University, 2019)
      To analyze large networks in various research fields including biology, sociology, and web mining, detection of dense modules (a.k.a. clusters) is a crucial step. Though numerous methods have been proposed to this aim, ...
    • Using Cyberlearning Environment to Improve Student’s Learning and Engagement in Introductory Computer Programming Courses 

      Narasareddy Gari, Mourya Reddy (North Dakota State University, 2019)
      All Computer Science majors are required to take introductory programming (CS1) as a fundamental course which has a high dropout rate. Researchers report that CS1 students lack motivation and need constant resource support. ...
    • Using Machine Learning and Graph Mining Approaches to Improve Software Requirements Quality: An Empirical Investigation 

      Singh, Maninder (North Dakota State University, 2019)
      Software development is prone to software faults due to the involvement of multiple stakeholders especially during the fuzzy phases (requirements and design). Software inspections are commonly used in industry to detect ...
    • Multi-Agent Based Simulation of an Unmanned Aerial Vehicles System 

      Murugesan, Karthiksivaram (North Dakota State University, 2011)
      The rapid growth of using Unmanned Aerial Vehicles (UAV) for civilian and military applications has promoted the development of research in many areas. Most of the unmanned aerial vehicles in use are manually controlled. ...
    • Software Metrics Tool 

      Singh, Rajat (North Dakota State University, 2018)
      In the current world software applications are becoming more important with each passing day. They are present in all walks of life and it’s difficult to imagine a world without them. It’s a part of every known industry ...
    • Design of a Game for Cybersecurity Awareness 

      Bhardwaj, Jagjot (North Dakota State University, 2019)
      The primary objective of this paper is to use the Bloom’s Revised Taxonomy educational objectives in creating a game called Cyber Air-Strike for learning basic concepts of cybersecurity. Bloom’s Revised Taxonomy is used ...
    • Multi Feature CBIR Model for Trademark Image Distinctiveness 

      Soni, Pratima (North Dakota State University, 2019)
      A Content-Based Image Retrieval (CBIR) system can help in detecting trademark infringement. This paper describes an improvement and extension of previous work for the existing Universal Model for a CBIR system, which only ...
    • Predictive Performance Evaluation of Different Neural Networks Using Stock Prices 

      Nyavanandi, Deepika (North Dakota State University, 2019)
      Forecasting stock market prices has been a challenging task due to its volatile nature and nonlinearity. Recently, artificial neural networks (ANNs) have become popular in solving a variety of scientific and financial ...
    • Evaluating the Usability of Collaboration Tool for Software Inspection Process 

      Kasireddy, Mounisha (North Dakota State University, 2019)
      To develop a good software product, the first and foremost step to master is creating complete and accurate software requirements specification document. Requirements documents are created from through research and are ...
    • The Grid Scan Heuristic for Extending Lifetime in Wireless Sensor Networks 

      Pachva, Srikar (North Dakota State University, 2011)
      Wireless Sensor Networks, consisting of sensing devices which sense the environment and communicate information among each other, is an emergent field in wireless networking with many potential applications. Efficiency of ...
    • A Petri Net Based Simulation for Multiple Unmanned Aerial Vehicles 

      Mehta, Puneet (North Dakota State University, 2019)
      Nowadays more and more Unmanned Aerial Vehicles (UAVs) are being mass produced and are being used for a lot of activities like exploring never before explored areas of the world, recreational work, rescue missions etc. In ...
    • DOM Structure Based Web Pattern Mining 

      Pillarikuppam, Naresh (North Dakota State University, 2011)
      A rapid expansion in the Web has motivated several studies to understand and recognize the implementation structure underlying the interface. Though the presentation of the Web pages looks different, those Web pages may ...
    • Shortest Path in a Wireless Sensor Network with Multiple Sensor Failures 

      Poreddy, Sandeep Reddy (North Dakota State University, 2011)
      This paper shows how a shortest path can be obtained in a wireless sensor network, between a source sensor and a destination sensor, in a hop-by-hop fashion, considering multiple sensor failures along the path of data ...
    • K-Anonymization Implementation Using Apache Spark 

      Tortikar, Pratik (North Dakota State University, 2019)
      This experiment attempts on data which can reveal a person’s identity to anonymize with k-1 anonymity principle. "Given person-specific field-structured data, produce a release of the data with scientific guarantees that ...
    • Diabetes Social Networking App for American Indians 

      Gurram, Rachana (North Dakota State University, 2019)
      Chronic disease effects health and quality of living largely. Social networking can initiate the onset of pathology and serve as direct cause for several chronic and non-communicable diseases. Technology has the potential ...