Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- File Type
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman
Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman
Tony Wasserman
A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks
A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks
David J Brooks Dr.
A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of security equipment can reduce the costs and time associated with evaluations, as well as limiting the subjectivity of the tests. Vulnerability attacks will produce more realistic evaluation results of the whole security system; nevertheless, the data obtained is dependent on the physical attributes and skill of the attackers. This study …
Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks
Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks
David J Brooks Dr.
Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …
Computational Thinking In A Game Design Course, Amber Settle
Computational Thinking In A Game Design Course, Amber Settle
Amber Settle
Strategy-Based Interactive Cluster Visualization For Information Retrieval, Anton Leuski, James Allan
Strategy-Based Interactive Cluster Visualization For Information Retrieval, Anton Leuski, James Allan
James Allan
In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3- dimensional space based on their similarity and a springembedding algorithm. We begin by developing a method for estimating the quality of the organization when it is applied to a set of documents returned in response to a query. We show how the relevant documents tend to clump together in space. We proceed by presenting amethod for measuring the amount of structure in the organization and explain how this knowledge can be used to refine the system. …
Incremental Test Collections, Ben Carterette, James Allan
Incremental Test Collections, Ben Carterette, James Allan
James Allan
Corpora and topics are readily available for information retrieval research. Relevance judgments, which are necessary for system evaluation, are expensive; the cost of obtaining them prohibits in-house evaluation of retrieval systems on new corpora or new topics. We present an algorithm for cheaply constructing sets of relevance judgments. Our method intelligently selects documents to be judged and decides when to stop in such a way that with very little work there can be a high degree of con#12;dence in the result of the evaluation. We demonstrate the algorithm's e#11;ectiveness by showing that it produces small sets of relevance judgments that …
Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah
Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah
Rukaini Abdullah
In science education, it is believed that students should understand the qualitative principles that govern the subject including the cause-effect relationships in processes before they are immersed in complex problem solving. Traditional educational programs for teaching organic chemistry do not usually explain or justify an observed chemical phenomenon. These programs do not “explain” simply because the results are obtained through chaining the rules or by searching the reaction routes that have been pre-coded in software. This paper discusses the development techniques, simulation results, and student evaluation of a software tool that aimed to help chemistry students learn organic processes through …
Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl
Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl
Jens G. Pohl
The purpose of this paper is to present concepts and implementation principles related to the design and development of reusable software services that are capable of assisting users at the operational level. Knowledge Management Enterprise Services (KMES) are an implementation of the service-oriented architecture paradigm, with a focus on the exchange of data within the meaningful context of a particular application (i.e., knowledge) domain. This requires a KMES service to incorporate a high level representation of this knowledge domain in the form of an ontology that is shared among all collaborating services within the application environment and at the same …