Search
Now showing items 111-120 of 220
Teaching Software Testing Concepts Using Learning Objects
(North Dakota State University, 2017)
The ubiquitous nature of software, it is very important to prepare students for jobs in the software industry. There is a profound deficiency in testing skills in graduating students when beginning jobs in Information ...
An Improved Modular Framework for Developing Multi-Surface Interaction
(North Dakota State University, 2016)
Advances in multi-touch capabilities have led to their use in a vast array of devices, but usable interactions that span across devices are less frequently encountered. To address this concern, a framework was created for ...
Signature Extraction from E-Mails
(North Dakota State University, 2016)
Detecting user identity information from the email is one of the predominant exploring topics in data mining. One approach is to extract signature from the body of emails. Those names are usually suitable for representing ...
Efficient Mobile Information Sharing Through Finger Swipe
(North Dakota State University, 2017)
Smartphones have been pervasive in our daily life, and are now the dominant driver of social media. People post and access information on the social media through smartphones. In addition, users are likely to share information ...
Emergency Search Using Android App
(North Dakota State University, 2015)
Emergency can occur anywhere anytime. The nature of emergency is unpredictable and it can unveil itself in any form. Whenever disasters occur, people in the location need to have adequate information to minimize the human ...
Application for Capturing Potential Tardiness in Operating Room Suites
(North Dakota State University, 2012)
This paper describes the design, architecture and implementation of a Dashboard Application, a tool developed to capture the potential tardiness in Operating Room (OR) Suites. The paper is focused on developing an automated ...
Basic Cybersecurity Awareness Through Gaming
(North Dakota State University, 2019)
The goal of this paper is to bring the basic awareness of cybersecurity among students so that they do not become a victim of cybercrime. Studies show that cybersecurity serious games support multiple well-established ...
Implementation of a Clonal Selection Algorithm
(North Dakota State University, 2014)
Some of the best optimization solutions were inspired by nature. Clonal selection algorithm is a technique that was inspired from genetic behavior of the immune system, and is widely implemented in the scientific and ...
Optimization of Deployments for Service Oriented Clouds
(North Dakota State University, 2015)
In cloud-computing environments, every service in an application is deployed as a different service instance. All service instances are deployed at a different level of end-to-end Quality of Service (QoS), which are described ...
Implementation of Weighted Centroid Neural Network for Edge Preserving Image Compression
(North Dakota State University, 2017)
Image compression is a type of data compression applied to images. The objective of image compression is to reduce the cost for storage or transmission. Image compression is associated with removing redundant information ...