Computer Science: Recent submissions
Now showing items 61-80 of 416
-
POMDP Planning in Service Composition
(North Dakota State University, 2011)Automated vVeb service composition is becoming an increasingly important research topic. It describes the automatic process of composing atomic services into a chain of services that provide a specific functionality that ... -
Contributing Factors Promoting Success for Females in Computing: A Comparative Study
(North Dakota State University, 2022)Despite the growing global demand for Computer Science (CS) professionals, their high earning potential, and diversified career paths (U.S. BLS 2021, UNESCO 2017), a critical gap exists between enrollment and graduation ... -
Pattern Recognition and Quantifying Associations Within Entities of Data Driven Systems for Improving Model Interpretability
(North Dakota State University, 2022)Discovering associations among entities of a system plays an important role in data science. The majority of the data science related problems have become heavily dependent on Machine Learning (ML) since the rise of ... -
An Evaluation Framework for Business Intelligence Visualization
(North Dakota State University, 2022)Nowadays, data visualization is becoming an essential part of data analysis. Business Intelligence Visualization (BIV) is a powerful tool that helps modern business flows faster and smoother than ever before. However, ... -
Understanding the Patterns of Microservice Intercommunication From A Developer Perspective
(North Dakota State University, 2022)Microservices Architecture is the modern paradigm for designing software. Based on the divide-and-conquer strategy, microservices architecture organizes the application by furnishing it with a fine-level granularity. Each ... -
Analysis of SDR to Detect Long Range RFID Badge Cloners
(North Dakota State University, 2022)This thesis proposes a way of detecting when radio frequency identification (RFID) badge credentials are being captured through the use of software defined radio (SDR). A method for using SDR to detect when badge cloning ... -
Multi-Teacher Knowledge Distillation Using Teacher's Domain Expertise
(North Dakota State University, 2022)Large BERT models cannot be used with low computing power and storage capacity. Knowledge Distillation solves this problem by distilling knowledge into a smaller BERT model while retaining much of the teacher’s accuracy ... -
Software Engineering Methodologies in Developing a Railway Condition Monitoring System
(North Dakota State University, 2022)With the continuous growth of rail track geometry irregularities due to aging, environmental factors, and wheel loads, rail track requires frequent maintenance. Railroads often rely on the precise and correct localization ... -
Analysis of Java's Common Vulnerabilities and Exposures in GitHub's Open-Source Projects
(North Dakota State University, 2022)Java developers rely on code reusability because of its time and effort reduction advantage. However, they are exposed to vulnerabilities in publicly available open-source software (OSS) projects. This study employed a ... -
Sentiment Analysis of COVID-19 Vaccination Impact on Twitter Tweets Using NLP Supervised Learning and RNN Classification Comparison
(North Dakota State University, 2022)Twitter provides a platform for exchanging information and opinions on global concerns like the COVID-19 epidemic. During the COVID-19 pandemic, we used a collection of around 16,180 tweets to derive inferences regarding ... -
Modeling of Dynamic Pricing of Energy for a Smart Grid Using a Multi-agent Framework
(North Dakota State University, 2011)The use of smart grids is being promoted to address issues such as energy independence, global warming and emergency resilience. A smart grid is a digitized form of the power grid and is comprised of an intelligent monitoring ... -
Positioning of Relay Stations in Wireless Sensor Networks
(North Dakota State University, 2011)A sensor is a device which can detect or measure a physical property and which records, indicates, or otherwise responds to the signal received. A wireless sensor in a network can communicate with the sensors located within ... -
Analysis of Security Vulnerabilities in Web Applications using Threat Modeling
(North Dakota State University, 2011)Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ... -
Novel Techniques Using Graph Neural Networks (GNNS) for Anomaly Detection
(North Dakota State University, 2023)This paper explores 2 new mechanisms that leverage graphs for anomaly detection. The novelty in approach one is to leverage the global attention capability of transformer architecture using a Graph Attention Network (GAT) ... -
Chatting with Confidence: A Review on the Impact of User Interface, Trust, and User Experience in Chatbots, and a Proposal of a Redesigned Prototype
(North Dakota State University, 2023)As artificial intelligence (AI) becomes more prevalent in our daily lives, trust has become a critical issue in ensuring that AI systems are reliable, ethical, and beneficial to society. This paper explores the role of ... -
A Mobile Game for Learning Cyber-Attacks and Their Prevention
(North Dakota State University, 2023)This paper's primary goal is to use Bloom's Revised Taxonomy educational objectives in creating Cyber Air-Attack. It's a game that teaches fundamental concepts about cybersecurity. Because it simplifies and makes learning ... -
Enhancing Restaurant Dining Experience: Design and Evaluation of a Mobile App for Personalized Menu Item Selection in Restaurants
(North Dakota State University, 2023)Picking the right food item from a restaurant menu can be challenging for people, specially for those who are unfamiliar with local cuisine and those with specific dietary requirements. Existing menus often lack essential ... -
Analysis of Image Classification Deep Learning Algorithm
(North Dakota State University, 2023)This study explores the use of TensorFlow 2 and Python for image classification problems. Image categorization is an important area in computer vision, with several real-world applications such as object identification/r ... -
Data Replication Strategies in Cloud Computing
(North Dakota State University, 2011)Data replication is a widely used technique in various systems. For example, it can be employed in large-scale distributed file systems to increase data availability and system reliability, or it can be used in many network ... -
CHAPS Online
(North Dakota State University, 2022)This paper explores the application development phases of the online version of Cow Herd Appraisal Performance Software (CHAPS). Beef producers and Extension professionals have been using CHAPS since 1985 as a herd management ...