Now showing items 211-230 of 251

    • Shortest Path in a Wireless Sensor Network with Multiple Sensor Failures 

      Poreddy, Sandeep Reddy (North Dakota State University, 2011)
      This paper shows how a shortest path can be obtained in a wireless sensor network, between a source sensor and a destination sensor, in a hop-by-hop fashion, considering multiple sensor failures along the path of data ...
    • Signature Extraction from E-Mails 

      Muttineni, Divya (North Dakota State University, 2016)
      Detecting user identity information from the email is one of the predominant exploring topics in data mining. One approach is to extract signature from the body of emails. Those names are usually suitable for representing ...
    • Simian Plus: A Mission Simulation Enhancement Toolkit 

      Dayala, Divya (North Dakota State University, 2014)
      Unmanned Air Vehicles (UAVs) have the ability to execute missions that include detecting and destroying the targets. The Simian simulator developed at NDSU performs complex motion calculations for moment - moment flight ...
    • Simple Identity Manager 

      Kolluru, Sunil (North Dakota State University, 2014)
      Identity management is a key area for any enterprise. Maintaining user profiles, including e-mail, passwords, and other personal information, and providing a way to manage them is ubiquitous for any company. Specifically, ...
    • Simulation of Forward Air Controller Missions with Pop-Up Targets 

      Sikharam, Sandeep (North Dakota State University, 2013)
      Orion is a Java-based framework that is used to develop different battlefield scenarios that involve unmanned air vehicles. There are currently four missions in the Orion framework. They are the track, sweep, patrol, and ...
    • Smart Robotic Arm Control through Autonomous Object Detection and Retrieval 

      Mahodaya, Vicky Ramnath (North Dakota State University, 2010)
      This paper outlines the design and development of a robotic arm that can automatically detect and locate an object within its working envelope, reach to the object, grab the object with the aid of force feedback, bring ...
    • Smart Task Scheduling for a Truck Company 

      Gautam, Pooja (North Dakota State University, 2014)
      The truck scheduling system is a web-based application which will facilitate online truck activities. The objective of the application is to provide the truck system with an automated computerized tool, which will be helpful ...
    • A Smartphone-Based Pointing Technique in Cross-Device Interaction 

      Yang, Juechen (North Dakota State University, 2019)
      In this paper, the author develops a novel cross-device cursor position estimation system for transferring a mobile device’s four-direction 2D movement to a cursor’s four-direction movement on a large display device; this ...
    • Social and Ethical Dimensions of Electronic Medical Records 

      Tirupathi, Phani (North Dakota State University, 2012)
      Electronic Medical Records are a digital or computerized medical record created in an organization which delivers care as part of a health information system that allows the storage, retrieval, and modification of records. ...
    • Social Network Based Recommendation System 

      Singh, Manish (North Dakota State University, 2013)
      Every day we are overwhelmed with choices and options. Recommendation systems have gained popularity in providing suggestions. But every web application today has its own recommendation system. The recommendations provided ...
    • A Software Agent System for Private Email 

      Mukka, Hari K. (North Dakota State University, 2010)
      The primary concerns in existing Email and instant messaging systems are authentication processes, privacy and security issues. These messaging systems transfer the message content through servers using protocols like ...
    • Software Inspection Team Formation Based on the Learning Style of Individual Inspectors 

      Bavanari, Haribabu (North Dakota State University, 2012)
      To improve the software quality, researchers have focused their effort on developing and validating effective methods of finding and fixing defects early in the development process. Software inspections are most widely ...
    • Software Inspection Tool for Defects Classification on Requirement Documents Using Collaborative Approach 

      Subedi, Ishan Mani (North Dakota State University, 2019)
      Software inspection is a process to minimize or eradicate defects throughout the entire software lifecycle which in turn helps to create and maintain quality products. While inspections are effective, it is often done ...
    • Software Metrics Tool 

      Reddy, Vijay Reddy (North Dakota State University, 2016)
      A software metric is the measurement of a particular characteristic of a software program. These metrics are very useful for optimizing the performance of the software, managing resources, debugging, schedule planning, ...
    • A Software Tool to Facilitate Automate Creation of Virtual Inspection Teams and Inspection Performance Evaluation 

      Lu, Zhou (North Dakota State University, 2016)
      Software inspection in the early phase of software development is proven to be an effective method to help developer to detect and fix defects in software requirement. It can improve the quality of software requirement, ...
    • Speed Optimized Implementation of Ant Colony Optimization Algorithm for Image Edge Detection 

      Moparthi, Rashmi (North Dakota State University, 2016)
      Ant Colony algorithm (ACO) is an approach used to provide a solution to an optimization problem. ACO follows the mechanism adapted by Ants to search for optimal paths by performing combined activity of all ants in the ...
    • SPIN Model Checker for MACT 

      Somavarapu, Murali Krishna (North Dakota State University, 2013)
      The SPIN (Simple PROMELA Interpreter) model checker is a verification system used to check high-level models of concurrent systems and improve the overall system’s performance. The SPIN model checker takes the PROMELA model ...
    • Stock Price Prediction Using Recurrent Neural Networks 

      Jahan, Israt (North Dakota State University, 2018)
      The stock market is generally very unpredictable in nature. There are many factors that might be responsible to determine the price of a particular stock such as the market trend, supply and demand ratio, global economy, ...
    • Study of Similarity Coefficients Using MapReduce Programming Model 

      Nayakam, GhanaShyam Nath (North Dakota State University, 2013)
      MapReduce is a programming model for processing and generating large data sets. Users specify a map function that processes a key/value pair to generate a set of intermediate key/value pairs, and a reduce function that ...
    • A Survey on Trust Management in Cloud Computing 

      Roodaki, Maryam (North Dakota State University, 2016)
      Nowadays the number of people that outsource their data to the cloud increases dramatically. Cloud computing offer cost-effective dynamic, scalable and shared services for enterprises from remote data centre. However, the ...