Now showing items 3-22 of 89

    • Alexa for Health Practitioners 

      Bhatt, Vidisha Nareshkumar (North Dakota State University, 2020)
      Many industries, including healthcare, are trying to take advantage of voice assistant systems by incorporating their technology into the industries’ environment. However, not many companies or researchers have successfully ...
    • Alexa, What Should I Eat? A Personalized Virtual Nutrition Coach for Native American Diabetes Patients Using Amazon's Smart Speaker Technology 

      Maharjan, Bikesh (North Dakota State University, 2020)
      Among all other ethnic groups in the USA, native American’s have higher chances of developing diabetes. A lot of tools have been developed to address this issue and help them in managing diabetes. However, these tools fail ...
    • Analysis of Java's Common Vulnerabilities and Exposures in GitHub's Open-Source Projects 

      Akanmu, Semiu (North Dakota State University, 2022)
      Java developers rely on code reusability because of its time and effort reduction advantage. However, they are exposed to vulnerabilities in publicly available open-source software (OSS) projects. This study employed a ...
    • Analysis of SDR to Detect Long Range RFID Badge Cloners 

      Knecht, Brett (North Dakota State University, 2022)
      This thesis proposes a way of detecting when radio frequency identification (RFID) badge credentials are being captured through the use of software defined radio (SDR). A method for using SDR to detect when badge cloning ...
    • Anonymity and Hostile Node Identification in Wireless Sensor Networks 

      Reindl, Phillip Steven (North Dakota State University, 2010)
      In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ...
    • Application of Memory-Based Collaborative Filtering to Predict Fantasy Points of NFL Quarterbacks 

      Paramarta, Dienul Haq Ambeg (North Dakota State University, 2019)
      Subjective expert projections have been traditionally used to predict points in fantasy football, while machine prediction applications are limited. Memory-based collaborative filtering has been widely used in recommender ...
    • An Architecture for the Implementation and Distribution of Multiuser Virtual Environments. 

      Dischinger, Benjamin James (North Dakota State University, 2010)
      JavaMOO is an architecture for creating multiuser virtual environments focusing on domain-specific design and rapid development. JavaMOO components use best practices and extensible design for system configuration, ...
    • An Artificial Immune System Heuristic in a Smart Electrical Grid 

      Chowdhury, Md. Minhaz (North Dakota State University, 2014)
      The immune system of the human body follows a process that is adaptive and learns via experience. Some algorithms are designed to take advantage of this process to determine solutions for complex problem domains. The ...
    • Association Rule Mining of Biological Field Data Sets 

      Shrestha, Anuj (North Dakota State University, 2017)
      Association rule mining is an important data mining technique, yet, its use in association analysis of biological data sets has been limited. This mining technique was applied on two biological data sets, a genome and a ...
    • Athletic Fundraising and University Development Offices: A Structurational Relationship 

      Dickhudt, Keith Michael (North Dakota State University, 2010)
      This case study examines the working relationship between an athletic department and a central development office within a university. This study focuses primarily on the coordination of fundraising efforts between the ...
    • Attacking the Messenger: Exploring the Security of Big Data Messenger Apache Kafka 

      Losinski, Tyler (North Dakota State University, 2021)
      As technology becomes faster, cheaper, and more compact, a higher volume of data must be processed. This demand drives the need to process high volumes of data in near real time. As a result, technologies such as Kafka ...
    • An Automated Approach for Discovering Functional Risk-Inducing Flaws in Software Designs 

      Hassan, Amro Salem Salem (North Dakota State University, 2015)
      For safety critical applications, it is necessary to ensure that risk-inducing flaws do not exist in the final product. To date, many risk-based testing techniques were proposed. The majority of these techniques address ...
    • Blood Glucose Prediction Models for Personalized Diabetes Management 

      Fernando, Warnakulasuriya Chandima (North Dakota State University, 2018)
      Effective blood glucose (BG) control is essential for patients with diabetes. This calls for an immediate need to closely keep track of patients' BG level all the time. However, sometimes individual patients may not be ...
    • Building Plant 3D Genome Computing Resources 

      Bulathsinghalage, Chanaka Sampath Cooray (North Dakota State University, 2021)
      Chromatin interactions play increasingly important roles in three-dimensional genome organization and long-range gene regulation. Analyzing the three-dimensional structure of the plants is currently a growing field and we ...
    • Chemical Compound Classification Ensemble 

      Zhu, Ya (North Dakota State University, 2013)
      In the research of health science, scientists often need to screen numerous chemical compounds to find drugs that can treat a disease. The process of testing the functionality of these compounds in the laboratory is very ...
    • Classification of LiDar Data Using Window-Based Techniques 

      Li, Shuhang (North Dakota State University, 2016)
      Given LiDAR maps, we focus on identifying anthropologically relevant ditches automatically on the map. Archeologists can identify these features visually at the site, but approaches based on remotely sensed data would be ...
    • Classifying Gene Coexpression Networks Using Discrimination Pattern Mining 

      Qormosh, Bassam M M (North Dakota State University, 2016)
      Several algorithms for graph classi cation have been proposed. Algorithms that map graphs into feature vectors encoding the presence/absence of speci c subgraphs, have shown excellent performance. Most of the existing ...
    • A Closed Form Optimization Model for The Conflict Neutralization Problem 

      Wang, Yan (North Dakota State University, 2010)
      In this study, we proposed a novel closed form optimization model for the Conflict Neutralization Problem (CKP) and implemented an efficient algorithm for solving the problem. A novel tableau representation of the CNP ...
    • Comparative Analysis of Interface Usability for Cybersecurity Applications 

      Andrews, Wyly West (North Dakota State University, 2021)
      In cybersecurity, understanding the technologies and the best ways to interface with them is paramount for staying ahead of growing cyberthreats. Developers of cybersecurity software will benefit greatly from a greater ...
    • Context Specific Module Mining from Multiple Co-Expression Graph 

      Hossain, Md Shakhawat (North Dakota State University, 2017)
      Gene co-expression networks can be used to associate genes of unknown function with biological processes or to find genes in a specific context, environment responsible for a disease. We provide an overview of methods and ...