Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman Apr 2017

Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman

Tony Wasserman

This paper describes the OSSpal project, which is aimed at helping companies, government agencies, and other organizations find high quality free and open source software (FOSS) that meets their needs. OSSpal is a successor to the Business Readiness Rating (BRR), combining quantitative and qualitative evaluation measures for software in various categories. Instead of a purely numeric calculated score OSSpal adds curation of high-quality FOSS projects and individual user reviews of these criteria. Unlike the BRR project, for which there was no automated support, OSSpal has an operational, publicly available website where users may search by project name or category, and …


A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks Sep 2014

A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks

David J Brooks Dr.

A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of security equipment can reduce the costs and time associated with evaluations, as well as limiting the subjectivity of the tests. Vulnerability attacks will produce more realistic evaluation results of the whole security system; nevertheless, the data obtained is dependent on the physical attributes and skill of the attackers. This study …


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks Sep 2014

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

David J Brooks Dr.

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


Computational Thinking In A Game Design Course, Amber Settle Oct 2011

Computational Thinking In A Game Design Course, Amber Settle

Amber Settle

As a part of an NSF-funded project to enhance computational thinking in undergraduate general education courses, activities and assessments were developed for a game design course taught at DePaul University. The focus of the course is on game analysis and design, but the course textbook uses an approach that is heavily grounded in computational thinking principles. We describe the course activities and assignments and discuss an initial assessment of those materials. Our results show that there is a gap in difficulty between several of the activities and indicate that the materials developed help students to better learn the computational thinking …


Strategy-Based Interactive Cluster Visualization For Information Retrieval, Anton Leuski, James Allan Dec 2010

Strategy-Based Interactive Cluster Visualization For Information Retrieval, Anton Leuski, James Allan

James Allan

In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3- dimensional space based on their similarity and a springembedding algorithm. We begin by developing a method for estimating the quality of the organization when it is applied to a set of documents returned in response to a query. We show how the relevant documents tend to clump together in space. We proceed by presenting amethod for measuring the amount of structure in the organization and explain how this knowledge can be used to refine the system. …


Incremental Test Collections, Ben Carterette, James Allan Dec 2010

Incremental Test Collections, Ben Carterette, James Allan

James Allan

Corpora and topics are readily available for information retrieval research. Relevance judgments, which are necessary for system evaluation, are expensive; the cost of obtaining them prohibits in-house evaluation of retrieval systems on new corpora or new topics. We present an algorithm for cheaply constructing sets of relevance judgments. Our method intelligently selects documents to be judged and decides when to stop in such a way that with very little work there can be a high degree of con#12;dence in the result of the evaluation. We demonstrate the algorithm's e#11;ectiveness by showing that it produces small sets of relevance judgments that …


Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah Dec 2009

Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah

Rukaini Abdullah

In science education, it is believed that students should understand the qualitative principles that govern the subject including the cause-effect relationships in processes before they are immersed in complex problem solving. Traditional educational programs for teaching organic chemistry do not usually explain or justify an observed chemical phenomenon. These programs do not “explain” simply because the results are obtained through chaining the rules or by searching the reaction routes that have been pre-coded in software. This paper discusses the development techniques, simulation results, and student evaluation of a software tool that aimed to help chemistry students learn organic processes through …


Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl Apr 2008

Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl

Jens G. Pohl

The purpose of this paper is to present concepts and implementation principles related to the design and development of reusable software services that are capable of assisting users at the operational level. Knowledge Management Enterprise Services (KMES) are an implementation of the service-oriented architecture paradigm, with a focus on the exchange of data within the meaningful context of a particular application (i.e., knowledge) domain. This requires a KMES service to incorporate a high level representation of this knowledge domain in the form of an ontology that is shared among all collaborating services within the application environment and at the same …