Now showing items 21-40 of 251

    • A Network Optimization Solver for Routing in Wireless Sensor Networks 

      Samaraweera, Shaminda Asela (North Dakota State University, 2010)
      Many wireless sensor network applications require energy efficient communication between nodes in the network. Sensor networks are of limited resources. Due to this limitation, the routing between the nodes is one of the ...
    • Automatic Evaluation of Mobile Web Pages 

      Sehgal, Ankita (North Dakota State University, 2010)
      The use of mobile devices to access the information on the World Wide Web is growing rapidly. The growth has created a surge in the number of webpages being designed for mobile devices. In order to support efficient ...
    • The Web Based Meeting Scheduler 

      Sharma, Mayukh (North Dakota State University, 2010)
      In this paper I present a Web based Meeting Scheduler which is a web-based easy to use group calendar application for scheduling events, reserving meeting rooms and scheduling meetings. Meetings and events may be scheduled ...
    • Kakuro Solver Application 

      Takahashi, Naomi (North Dakota State University, 2010)
      In this paper, the application called KakuroSolver is presented that solves Kakuro, the popular logical puzzle that combines Sudoku and crossword. The application accepts a Kakuro puzzle with any size; it then either ...
    • Complex Relation Discovery from the Semantic Web 

      Tanha, Mousumi (North Dakota State University, 2010)
      The vision or the Semantic Web undertakes an extension or the current Web, in which machines can understand all the data. The nature of Semantic Web data is relationship-centric and is very complex. In this study we aimed ...
    • Graduate Student Progress Tracking System 

      Thalloji, Pramodh Kumar (North Dakota State University, 2010)
      In this paper, I propose and implement an application to track the graduate student progress in various Computer Science and Software Engineering graduate programs. This application will provide lists of students who in ...
    • REND: Reliable and Energy-Efficient Node-Disjoint Paths in Wireless Sensor Networks 

      Yanteru, Siva (North Dakota State University, 2010)
      In wireless sensor networks, finding most reliable and most efficient paths between source node and destination node is considered NP hard problem. We can increase reliability by ability to find node-disjoint alternate ...
    • Outlier Identification in Sensor Network Clock Synchronization 

      Voorhees, William Davis (North Dakota State University, 2010)
      We first present a survey of clock synchronization research that describes the problem and various challenges to implementing an efficient protocol for clock synchronization in sensor networks. We then present several ...
    • A Technique to Detect a Black Hole in Ad Hoc Networks 

      Suravarapu, Vijay Anand (North Dakota State University, 2010)
      Mobile Ad Hoc Networks (MANETs) are important because they are widely used in war zones, rescue missions and other civilian applications where it is almost impossible to use any other networks. MANETs are temporary ...
    • Maximizing Sensor Coverage using Displacement to Remove Overlaps 

      Fazal, Kareemullah Khan (North Dakota State University, 2011)
      Sensor networks are wireless networks with small, low-cost sensors which collect and disseminate environmental data. They are used for monitoring and controlling physical environments from remote locations with better ...
    • Genetic Search for Multi School Routing 

      Ganesan, Arjun Sivaram Kumar (North Dakota State University, 2011)
      In genetic search for multi school routing, a set of commonly shared school buses and vans with capacity, travel speed and travel time limitations are used to service students from their pick up locations to their ...
    • Automated Tool for Software Requirements Inspection 

      Amaran, Pradeep (North Dakota State University, 2011)
      The software inspection process is a very cost effective method of identifying defects in documents produced during the software life cycle, leading to higher quality software with lower field failures. Manual inspections ...
    • Bayesian Approach for Detection Classification 

      Annapureddy, Anupama Reddy (North Dakota State University, 2011)
      The objective of this paper is to develop and test a software system that uses incomplete information from a collection of sensors to classify different objects present in a particular area with a pre-specified probability. ...
    • Graduate School Application Archive System (GSAAS) 

      Fazal, Nazeer Ahmed Khan (North Dakota State University, 2011)
      The advent of using web applications has dramatically changed the way people access data and understand these concepts. Users have expressed problems involved with accessing the data in an easy and effective way with ...
    • Modeling of Dynamic Pricing of Energy for a Smart Grid Using a Multi-agent Framework 

      Kaur, Harvinder (North Dakota State University, 2011)
      The use of smart grids is being promoted to address issues such as energy independence, global warming and emergency resilience. A smart grid is a digitized form of the power grid and is comprised of an intelligent monitoring ...
    • Positioning of Relay Stations in Wireless Sensor Networks 

      Koganti, Nikhil (North Dakota State University, 2011)
      A sensor is a device which can detect or measure a physical property and which records, indicates, or otherwise responds to the signal received. A wireless sensor in a network can communicate with the sensors located within ...
    • Analysis of Security Vulnerabilities in Web Applications using Threat Modeling 

      Kondamarri, Samuel Sudhakar (North Dakota State University, 2011)
      Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...
    • Novel Techniques Using Graph Neural Networks (GNNS) for Anomaly Detection 

      Joseph, Priya (North Dakota State University, 2023)
      This paper explores 2 new mechanisms that leverage graphs for anomaly detection. The novelty in approach one is to leverage the global attention capability of transformer architecture using a Graph Attention Network (GAT) ...
    • Chatting with Confidence: A Review on the Impact of User Interface, Trust, and User Experience in Chatbots, and a Proposal of a Redesigned Prototype 

      Tamimi, Arin (North Dakota State University, 2023)
      As artificial intelligence (AI) becomes more prevalent in our daily lives, trust has become a critical issue in ensuring that AI systems are reliable, ethical, and beneficial to society. This paper explores the role of ...
    • A Mobile Game for Learning Cyber-Attacks and Their Prevention 

      Solanki, Piyush (North Dakota State University, 2023)
      This paper's primary goal is to use Bloom's Revised Taxonomy educational objectives in creating Cyber Air-Attack. It's a game that teaches fundamental concepts about cybersecurity. Because it simplifies and makes learning ...