Computer Science Masters Theses: Recent submissions
Now showing items 1-20 of 93
-
Predictions using hidden Markov models and stochastic context-free grammars
(North Dakota State University, 2024-07)In systems where certain qualities are not directly observable, hidden Markov models provide a way to represent both the observable and hidden data. For systems behaving as Markov chains, the observable data can be analyzed ... -
Which tests to modify? A history-based test recommender
(North Dakota State University, 2024-07)Regression testing is critical for maintaining software quality. Therefore, developers must maintain efficient and effective regression test suites. However, the task can be tedious and challenging, especially in Continuous ... -
Understanding the impact of COVID-19 on online eating disorder communities on Reddit
(North Dakota State University, 2024)Like precedent disease outbreaks, COVID-19 has immense implications for health challenges. The social restrictions and disruption in daily activities pose a psychological burden for humans worldwide and may be particularly ... -
Augmented Reality and Cross-Device Interaction for Seamless Integration of Physical and Digital Scientific Papers
(North Dakota State University, 2024)Researchers face the challenge of efficiently navigating vast scientific literature while valuing printed papers in the digital age. Printed materials facilitate deeper engagement and comprehension, leading to superior ... -
Recruiting Through Identification: Identification Strategies and Tactics Used in External Higher Education Strategic Communication
(North Dakota State University, 2010)This exploratory study examines higher education strategic communication for identification inducement strategies and tactics using Cheney's (1983) typology as a guiding framework. The study also explores the differences ... -
Optimization of Mobile Sensor Movement in Self-Healing Sensor Networks
(North Dakota State University, 2010)This paper moves forward the key idea as proposed in past research works - a self-healing deployment approach for sensor networks, where a small percentage of mobile sensors are deployed along with the static sensors into ... -
Resource and Bandwidth Allocation in Hybrid Wireless Mobile Networks
(North Dakota State University, 2010)In the lead up to the implementation of 802.16 and 4G wireless networks, there have been many proposals for addition of multi-hop MANET zones or relay stations in order to cut the cost of building a new backbone ... -
Athletic Fundraising and University Development Offices: A Structurational Relationship
(North Dakota State University, 2010)This case study examines the working relationship between an athletic department and a central development office within a university. This study focuses primarily on the coordination of fundraising efforts between the ... -
An Architecture for the Implementation and Distribution of Multiuser Virtual Environments.
(North Dakota State University, 2010)JavaMOO is an architecture for creating multiuser virtual environments focusing on domain-specific design and rapid development. JavaMOO components use best practices and extensible design for system configuration, ... -
Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks
(North Dakota State University, 2010)Many wireless sensor network applications require secure communication between nodes in the network. However, establishing pair-wise keys between nodes to provide security is challenging due to the limited resources in ... -
Dynamic Algorithms for Sensor Scheduling and Adversary Path Prediction
(North Dakota State University, 2010)In this thesis we describe three new dynamic, real time and robust sensor scheduling algorithms for intruder tracking and sensor scheduling. We call them Tactic Association Based Algorithm (TABA), Tactic Case Based ... -
Anonymity and Hostile Node Identification in Wireless Sensor Networks
(North Dakota State University, 2010)In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ... -
Implementation of Parallel Programming to Improve Transaction Speed and Scalability in Blockchain Systems
(North Dakota State University, 2021)This thesis presents a parallel mining architecture model intended to be used in blockchain systems to improve transaction speed and network scalability while maintaining decentralization. Typical blockchain validation ... -
A Closed Form Optimization Model for The Conflict Neutralization Problem
(North Dakota State University, 2010)In this study, we proposed a novel closed form optimization model for the Conflict Neutralization Problem (CKP) and implemented an efficient algorithm for solving the problem. A novel tableau representation of the CNP ... -
Distance-Aware Relay Placement and Scheduling in Wireless Networks.
(North Dakota State University, 2011)The WiMAX technology and cognitive radio have been active topics in wireless networks. A WiMAX mesh network is able to provide larger wireless coverage, higher network capacity and Non-Line-Of-Sight (NLOS) communications. ... -
Uses and Gratifications of Amputees' Online Social Networks
(2011)The following thesis examined amputee support groups on Facebook. Having an 111 amputation can be a life-changing experience. and social support may be necessary to understand one's amputation. Hundreds of amputee groups ... -
Frequent Substring-Based Sequence Classification Using Reduced Alphabets
(North Dakota State University, 2011)In recent years, various disciplines have generated large quantities of sequence data which has necessitated automated techniques for classifying these sequences into different categories of interest. Especially with the ... -
POMDP Planning in Service Composition
(North Dakota State University, 2011)Automated vVeb service composition is becoming an increasingly important research topic. It describes the automatic process of composing atomic services into a chain of services that provide a specific functionality that ... -
An Evaluation Framework for Business Intelligence Visualization
(North Dakota State University, 2022)Nowadays, data visualization is becoming an essential part of data analysis. Business Intelligence Visualization (BIV) is a powerful tool that helps modern business flows faster and smoother than ever before. However, ... -
Analysis of SDR to Detect Long Range RFID Badge Cloners
(North Dakota State University, 2022)This thesis proposes a way of detecting when radio frequency identification (RFID) badge credentials are being captured through the use of software defined radio (SDR). A method for using SDR to detect when badge cloning ...