Now showing items 15-34 of 89

    • Blood Glucose Prediction Models for Personalized Diabetes Management 

      Fernando, Warnakulasuriya Chandima (North Dakota State University, 2018)
      Effective blood glucose (BG) control is essential for patients with diabetes. This calls for an immediate need to closely keep track of patients' BG level all the time. However, sometimes individual patients may not be ...
    • Building Plant 3D Genome Computing Resources 

      Bulathsinghalage, Chanaka Sampath Cooray (North Dakota State University, 2021)
      Chromatin interactions play increasingly important roles in three-dimensional genome organization and long-range gene regulation. Analyzing the three-dimensional structure of the plants is currently a growing field and we ...
    • Chemical Compound Classification Ensemble 

      Zhu, Ya (North Dakota State University, 2013)
      In the research of health science, scientists often need to screen numerous chemical compounds to find drugs that can treat a disease. The process of testing the functionality of these compounds in the laboratory is very ...
    • Classification of LiDar Data Using Window-Based Techniques 

      Li, Shuhang (North Dakota State University, 2016)
      Given LiDAR maps, we focus on identifying anthropologically relevant ditches automatically on the map. Archeologists can identify these features visually at the site, but approaches based on remotely sensed data would be ...
    • Classifying Gene Coexpression Networks Using Discrimination Pattern Mining 

      Qormosh, Bassam M M (North Dakota State University, 2016)
      Several algorithms for graph classi cation have been proposed. Algorithms that map graphs into feature vectors encoding the presence/absence of speci c subgraphs, have shown excellent performance. Most of the existing ...
    • A Closed Form Optimization Model for The Conflict Neutralization Problem 

      Wang, Yan (North Dakota State University, 2010)
      In this study, we proposed a novel closed form optimization model for the Conflict Neutralization Problem (CKP) and implemented an efficient algorithm for solving the problem. A novel tableau representation of the CNP ...
    • Comparative Analysis of Interface Usability for Cybersecurity Applications 

      Andrews, Wyly West (North Dakota State University, 2021)
      In cybersecurity, understanding the technologies and the best ways to interface with them is paramount for staying ahead of growing cyberthreats. Developers of cybersecurity software will benefit greatly from a greater ...
    • Context Specific Module Mining from Multiple Co-Expression Graph 

      Hossain, Md Shakhawat (North Dakota State University, 2017)
      Gene co-expression networks can be used to associate genes of unknown function with biological processes or to find genes in a specific context, environment responsible for a disease. We provide an overview of methods and ...
    • A Data Mining Approach for Identifying Pavement Distress Signatures 

      Bouret, Megan Sue (North Dakota State University, 2015)
      This work introduces signature-based data mining of pavement distress data. The goal is to understand the factors that influence pavement distress. The presented approach maintains multiple types of flexible pavement ...
    • Data Replication Strategies in Cloud Computing 

      Liu, Yang (North Dakota State University, 2011)
      Data replication is a widely used technique in various systems. For example, it can be employed in large-scale distributed file systems to increase data availability and system reliability, or it can be used in many network ...
    • Deep Learning Applied to Public Company Valuation for Value Investing 

      Haich, Abram Paul (North Dakota State University, 2021)
      Value investing is an investing approach that seeks to discover and take advantage of price discrepancies between the market price and the actual value of a company (intrinsic value). The purpose of this work is to measure ...
    • The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application 

      Tipparach, Santipab (North Dakota State University, 2019)
      Virtual Reality is currently an affordable and consumer ready technology used by many in the games and interactive media industry, however unlike the user interface standards in mobile, PCs, and Macs, VR UI design can vary ...
    • Development and Validation of a Library for Iterative Window-Based Processing of Geospatial Data 

      Schwartz, David Michael (North Dakota State University, 2021)
      High-resolution spectral images and digital elevation models are widely available. With this quantity of data, it is imperative to develop fast algorithms to extract information. We present a Python library that implements ...
    • Development of an Algorithm for Detection and Recovery of Corruption in Convolutional Neural Networks Data Storage 

      Ramzanpour, Mohammadreza (North Dakota State University, 2021)
      Computer vision based applications are commonly utilized in embedded systems. The demand for higher accuracy leads to increased complexity of convolutional neural networks (CNN) and hence, larger storage requirement for ...
    • Distance-Aware Relay Placement and Scheduling in Wireless Networks. 

      Bai, Shi (North Dakota State University, 2011)
      The WiMAX technology and cognitive radio have been active topics in wireless networks. A WiMAX mesh network is able to provide larger wireless coverage, higher network capacity and Non-Line-Of-Sight (NLOS) communications. ...
    • A Distributed Power Market for the Smart Grid 

      McCulloch, Ryan James (North Dakota State University, 2012)
      To address the challenges of resource allocation in the Smart Electrical Grid a new power market is proposed. A distributed and autonomous contract net based market system in which participants, represented by the agents, ...
    • Dynamic Algorithms for Sensor Scheduling and Adversary Path Prediction 

      Pandey, Shivendushital Pyarelal (North Dakota State University, 2010)
      In this thesis we describe three new dynamic, real time and robust sensor scheduling algorithms for intruder tracking and sensor scheduling. We call them Tactic Association Based Algorithm (TABA), Tactic Case Based ...
    • Effect of Prompting Techniques and Learning Styles on Requirements Elicitation 

      Jan, Bonnie Lynn (North Dakota State University, 2016)
      Research efforts on improving requirements elicitation are focused on developing and validating better techniques for eliciting a comprehensive set of requirements. However, there isn't enough empirical evidence available ...
    • Efficient Publish/Subscribe System over Mobile Ad-Hoc Network 

      Liu, Chao (North Dakota State University, 2012)
      Information dissemination is an important issue for mobile ad-hoc communities. This issue is very challenging due to the dynamic and fragile nature of the mobile ad-hoc networks, in which participants have limited computing ...
    • Efficient Regression Testing for Web Applications Using Reusable Constraint Values 

      Hossain, Md Imamul (North Dakota State University, 2013)
      Current web applications offer people easy ways to deploy web sites, and the use of web applications has grown rapidly over the past decades. Companies that provide web applications need frequent regression testing because ...