Now showing items 41-60 of 254

    • Comparison Analysis of Classification Algorithms for Intrusion Detection 

      Saha, Binita (North Dakota State University, 2021)
      As the Internet of Things becomes more prevalent in our lives, we are confronted with more security concerns. Network attacks have become more common in the cyber world these days. Denial of service, Prove, Remote to Local ...
    • Comparison between Symfony, ASP.NET MVC, And Node.js Express for Web Development 

      Mao, Xiaoli (North Dakota State University, 2018)
      Web development technologies have been developing tremendously in recent years. While new technologies such as Node.js come with various frameworks, traditional technologies such as ASP.NET and PHP are also being used with ...
    • Comparison of Global and Local Particle Swarm Optimization 

      Ferdousi, Nazrin (North Dakota State University, 2021)
      Particle swarm optimization is a computational algorithm used to optimize a solution through sequential processing of particles using a specified estimation of quality. The algorithm is inspired by biological systems such ...
    • Comparison of Non-Learned and Learned Molecule Representations for Catalyst Discovery 

      Yao, Qianqian (North Dakota State University, 2022)
      Catalyst discovery is one very important task in storing renewable energy to address climate change and energy scarcity globally. Catalyst candidates can be represented by molecular descriptors and also can be modeled by ...
    • Comparison of Particle Swarm Optimization Variants 

      Daggubati, Satyanarayana (North Dakota State University, 2012)
      Particle swarm optimization (PSO) is a heuristic global optimization method, which is based on swarm intelligence. It is inspired by the research on the bird and fish flock movement behavior. The algorithm is widely used ...
    • Comparison of RNN, LSTM and GRU on Speech Recognition Data 

      Shewalkar, Apeksha Nagesh (North Dakota State University, 2018)
      Deep Learning [DL] provides an efficient way to train Deep Neural Networks [DNN]. DDNs when used for end-to-end Automatic Speech Recognition [ASR] tasks, could produce more accurate results compared to traditional ASR. ...
    • Complex Relation Discovery from the Semantic Web 

      Tanha, Mousumi (North Dakota State University, 2010)
      The vision or the Semantic Web undertakes an extension or the current Web, in which machines can understand all the data. The nature of Semantic Web data is relationship-centric and is very complex. In this study we aimed ...
    • Computing the Yield per Acre for a Given Field Using GIS Capabilities 

      Badu, Sadhana (North Dakota State University, 2016)
      Software tools and technologies, such as geographic information systems (GIS), are playing an important role in the field of agriculture. The capabilities of the open source GIS system GRASS are used to process LandSat ...
    • Consumer Sentiment Analysis Using Twitter 

      Rashid, Rumana (North Dakota State University, 2017)
      Sentiment analysis is the task of finding people’s opinions about specific objects/matters. Ordinary people’s opinions affect the decision-making process. Today, there is a massive explosion of “sentiments” available on ...
    • Course Proposal and Approval System 

      Murugaiyan, Elangovan (North Dakota State University, 2012)
      North Dakota State University (NDSU) Distance and Continuing Education (DCE) department makes learning resources of the institution available in a variety of traditional and non-traditional ways. It offers courses in various ...
    • Covid-19 Face Cover Tracker Using Amazon Web Services 

      Hoque, Rahmanul (North Dakota State University, 2021)
      Numerous studies have shown that wearing face covers and following other social distancing guidelines reduce community transmission of air borne diseases like COVID-19 during a pandemic. While public health administrators ...
    • Credit Card Fraud Detection Predictive Modeling 

      Sharma, Nishant (North Dakota State University, 2020)
      Finance fraud is a growing problem with consequences in the financial industry and data mining has been successfully applied to huge volume of complex financial datasets to automate and analyze credit card frauds in online ...
    • Critical Information Retrieval from Emails 

      Sen, Souvik (North Dakota State University, 2014)
      With efficiency being a driving force in today’s ecommerce, emails have become a major form of communication. However, deciphering information from these emails has been a be-labored task. With every email containing ...
    • A Data Visualization Tool to Identify Patterns Formed by Subsets of Data 

      Osmani, Md Golam Morshed (North Dakota State University, 2010)
      An object may be identified by its properties which may comprise both continuous data values and categorical data values. Sometimes a particular property (categorical) value may select a group of objects which have ...
    • A Decision Model for Emergency Response 

      Chelaiah Rothimaswa, Ashok Kumar Vellaswamy (North Dakota State University, 2013)
      In the real world, emergencies occur at different places. The emergencies fall into three categories: a fire emergency, a medical emergency, and a police emergency. Different emergencies occur at different places at different ...
    • Demonstrating Bid Rigging with a Shopping Agent Application Using JADE 

      Sivanandam, Dinesh (North Dakota State University, 2011)
      This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
    • Design and Development of Naive Bayes Classifier 

      Garg, Bandana (North Dakota State University, 2013)
      The naïve Bayes classifier is a simple form of Bayesian classifiers which assumes all the features are independent of each other. Despite this assumption, the naïve Bayes classifier’s accuracy is comparable to other ...
    • Design and Evaluation of Two Hybrid Genome Assembly Approaches Using Illumina, Roche 454, and PacBio Datasets 

      Sun, Liren (North Dakota State University, 2016)
      The assembly of next-generation sequencing reads is one of the most challenging and important tasks in bioinformatics. There are many different types of assembly algorithms and programs that have been developed to assemble ...
    • Design and Implementation of Social Networking Website Features 

      Aakula, Srikanth Goud (North Dakota State University, 2010)
      People want to communicate and interact with each other over the internet. There are various websites which are helpful for this kind of socializing. The popularity and adaptability of each website depends on the features ...
    • Design of a Game for Cybersecurity Awareness 

      Bhardwaj, Jagjot (North Dakota State University, 2019)
      The primary objective of this paper is to use the Bloom’s Revised Taxonomy educational objectives in creating a game called Cyber Air-Strike for learning basic concepts of cybersecurity. Bloom’s Revised Taxonomy is used ...