Search
Now showing items 181-190 of 256
Zero-Trust Architecture and Its Cost-Effectiveness on Network Security
(North Dakota State University, 2022)
Zero-Trust Architecture (ZTA) is a ‘Never Trust, Always Verify’ concept to improve cybersecurity by eliminating trust and validating network requests continuously. ZTA replaces Virtual Private Networks (VPNs) and provides ...
Study of Similarity Coefficients Using MapReduce Programming Model
(North Dakota State University, 2013)
MapReduce is a programming model for processing and generating large data sets. Users specify a map function that processes a key/value pair to generate a set of intermediate key/value pairs, and a reduce function that ...
Analyzing Access Logs Data using Stream Based Architecture
(North Dakota State University, 2018)
Within the past decades, the enterprise-level IT infrastructure in many businesses have grown from a few to thousands of servers, increasing the digital footprints they produce. These digital footprints include access logs ...
Demonstrating Bid Rigging with a Shopping Agent Application Using JADE
(North Dakota State University, 2011)
This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
Graph Data Conversion and Tree Visualization
(North Dakota State University, 2011)
The first part of the paper is converting graph data format from GXL to GraphML. GXL and GraphML are both XML-based languages for representing graph data. The HP page segmentation tool produces output graph data in GXL ...
Optimization Modeling for Wireless Sensor Scheduling
(North Dakota State University, 2013)
Wireless sensor networks, consisting of sensing devices which sense the environment and communicate information among each other, is an emergent field in wireless networking with many potential applications. The efficiency ...
Replication with Incentives in Centralized Peer to Peer Networks
(North Dakota State University, 2013)
We are living in a digital age in which data production has become so ubiquitous that the demand for sharing will increase as more aspects of life become digital. There are several ways we share data: via websites and ...
Best Practices of ERP Implementation
(North Dakota State University, 2014)
Today Enterprise Resource Planning (ERP) has become a fundamental necessity for the organization. It serves many functional areas and many industries in an integrated fashion, trying to automate operations from inventory ...
Effectiveness of Human Error Abstraction Assist Tool at Improving the Quality of Software Requirements
(North Dakota State University, 2020)
The successful completion of any given software project is dependent on error-free Software Requirement Specification (SRS) documents. SRS documents are prone to human errors and faults because their creation involves a ...
Enterprise Resource Planning Metamodel Test Pattern
(North Dakota State University, 2015)
Enterprise Resource Planning (ERP) system is a complex distributed software solution
that costs millions of dollars to implement. Upgrading an ERP metamodel subsystem introduces
critical risks in the functionality of all ...