Now showing items 4-23 of 254

    • Agent Communication and Negotiation in a Supply Chain 

      Upadhyay, Rajat (North Dakota State University, 2013)
      Supply Chain Management is an essential management paradigm for almost every organization. Effective implementation of Supply Chain Management (SCM) can significantly increase an organization’s profit. In this paper, a ...
    • Agent-Based Modeling to Simulate the Movement of a Flock of Birds 

      Byrisetty, Naga Chaitanya (North Dakota State University, 2013)
      The most beautiful, mysterious movements of bird flocks have always amused the human and led his thinking towards what makes these complex movements possible. This paper discusses the simulation of such bird behavior based ...
    • Algorithms for Coverage Improvement in a Sensor Network 

      Maddi, Sunil Reddy (North Dakota State University, 2011)
      Sensors are devices which have the ability to receive and respond to a signal. These sensors, when used as a group, form a sensor network. Sensors in a sensor network can communicate and transmit data. In the early stages ...
    • Alternative Clustering Algorithms in Sensor Networks 

      Gupta, Divya (North Dakota State University, 2010)
      A wireless sensor network is composed of a large number of tiny sensor nodes that can be deployed in a variety of environments like battle fields, water, large fields, and the like, and can transmit data to a Base station ...
    • Analysis of Image Classification Deep Learning Algorithm 

      Kanungo, Shivam (North Dakota State University, 2023)
      This study explores the use of TensorFlow 2 and Python for image classification problems. Image categorization is an important area in computer vision, with several real-world applications such as object identification/r ...
    • Analysis of Security Vulnerabilities in Web Applications using Threat Modeling 

      Kondamarri, Samuel Sudhakar (North Dakota State University, 2011)
      Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...
    • Analyzing Access Logs Data using Stream Based Architecture 

      Gautam, Nitendra (North Dakota State University, 2018)
      Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ...
    • Analyzing Student Learning Outcomes in Programming Course Using Individual Study Vs. Pair Programming 

      Abeyratne, Keith (North Dakota State University, 2014)
      Pair programming has been common practice in the programming industry during last three decades, but only recently did it start to draw the attention as a teaching strategy. This paper investigates whether we should introduce ...
    • Analyzing Three Different Tuning Strategies for Random Forest Hyperparameters for Fraud Detection 

      Sarao, Kulwinder Kaur (North Dakota State University, 2021)
      Technology is advancing rapidly, and more tasks are becoming online than ever. Along with the benefits comes the disadvantages of this great advancement. While online services relieve from the struggle of in person activities, ...
    • Application for Capturing Potential Tardiness in Operating Room Suites 

      Gronneberg, Bethlehem Abera (North Dakota State University, 2012)
      This paper describes the design, architecture and implementation of a Dashboard Application, a tool developed to capture the potential tardiness in Operating Room (OR) Suites. The paper is focused on developing an automated ...
    • An Application of Association Rule Mining to Unit Test Selection 

      Gunderson, Karl Nils (North Dakota State University, 2013)
      Appropriate selection of unit tests during the software development process is vital when many unit tests exist. The developer may be unfamiliar with some tests and non-obvious relationships between application code and ...
    • Application of the Kusumoto Cost-Metric to Evaluate the Cost-Effectiveness of Software Inspections 

      Mandala, Narendar Reddy (North Dakota State University, 2012)
      Inspection and testing are two widely recommended techniques for software quality improvement with a common goal of defect detection and removal in software products. While testing cannot be conducted until software is ...
    • Applied Nonparametric Statistical Tests to Compare Evolutionary and Swarm Intelligence Approaches 

      Amanchi, Srinivas Adithya (North Dakota State University, 2014)
      Recently, in many experimental studies, the statistical analysis of nonparametric comparisons has grown in the area of computational intelligence. The research refers to application of different techniques that are used ...
    • Assessment and Recommendation of Requirement Management Tool Based on User Needs 

      Mohpal, Aditi (North Dakota State University, 2012)
      Over recent years, requirement management has played a very vital role in materializing IT projects. Whether it is the healthcare sector, finance sector, banking sector, or any other industrial sector, requirement management ...
    • Automated Detection of Acute Leukemia Using K-Means Clustering Algorithm 

      Arya, Minakshi (North Dakota State University, 2019)
      Detection of ALL can be done through the analysis of white blood cells (WBCs) called leukocytes. Usually, the analysis of blood cells is performed manually by skilled operators, have numerous drawbacks, such as slow analysis, ...
    • An Automated Testing Framework for the Virtual Cell Game 

      Dandey, Santosh Raj (North Dakota State University, 2013)
      The NDSU Virtual Cell game is a role-based, multi-user computer game developed to aid in learning cellular concepts in biology. It is developed using client/server architecture with Lambda-Moo as a server and web-based ...
    • Automated Tool for Software Requirements Inspection 

      Amaran, Pradeep (North Dakota State University, 2011)
      The software inspection process is a very cost effective method of identifying defects in documents produced during the software life cycle, leading to higher quality software with lower field failures. Manual inspections ...
    • Automatic Conceptual Feedback on Software Tests 

      Kumar, Pranay (North Dakota State University, 2017)
      Students in introductory programming courses face many challenges. While the educators try their best to assist students with these challenges by adopting different approaches, majority of them end up overlooking the ...
    • Automatic Evaluation of Mobile Web Pages 

      Sehgal, Ankita (North Dakota State University, 2010)
      The use of mobile devices to access the information on the World Wide Web is growing rapidly. The growth has created a surge in the number of webpages being designed for mobile devices. In order to support efficient ...
    • Automatic Method for Testing Struts-Based Application 

      Tiwari, Shweta (North Dakota State University, 2013)
      Model based testing is a very popular and widely used in industry and academia. There are many tools developed to support model based development and testing, however, the benefits of model based testing requires tools ...