Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Small Spacecraft (17)
- Open Orbiter Project (13)
- CubeSat (11)
- Artificial Intelligence & Robotic Control (6)
- Computer security (6)
-
- OpenOrbiter (6)
- Anti-virus (5)
- Anti-virus software (5)
- Computer Anti-Virus (5)
- Computer virus (5)
- Mosaicking (5)
- Virus detection (5)
- Virus scanning (5)
- AI Decision Making (4)
- Heuristic scanning (4)
- Image Processing (4)
- Legal Implications of Emerging Technologies (4)
- Legal Protection by Design (4)
- Management Information Systems (4)
- Small spacecraft (4)
- Anti-virus design (3)
- Computer vulnerability (3)
- Information systems (3)
- Integrity checking (3)
- Management (3)
- Management information system (3)
- Project management (3)
- Software Engineering (3)
- Software Innovation (3)
- Space Mission Design (3)
- Publication
-
- Jeremy Straub (21)
- Umakant Mishra (9)
- Mireille Hildebrandt (5)
- Andrew G. West (3)
- Xiao-Jun Yang (3)
-
- Emilio Iasiello (2)
- Wojciech Budzianowski (2)
- Amanda Hartman McLellan (1)
- Balasubramanian Thiagarajan (1)
- Charis P. Kaite (1)
- Dr Deogratias Harorimana (1)
- Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN, (1)
- Jason V Ma (1)
- M Ryan Hess (1)
- Madeleine R. H. Roberts (1)
- Muhammad Imran (1)
- R. W. Hndoosh (1)
- Richard J. Urban (1)
- Salvo Reina (1)
- Sameem Abdul Kareem (1)
- The Intellectual Standard (1)
- File Type
Articles 1 - 30 of 59
Full-Text Articles in Physical Sciences and Mathematics
The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem
The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem
Sameem Abdul Kareem
Background: Recently, determination of skeletal age, defined as the assessment of bone age, has rapidly become an important task between forensic experts and radiologists. The GreulichePyle (GP) atlas is one of the most frequently used methods for the assessment of skeletal age around the world. After presentation of the GP approach for the estimation of the bone age, much research has been conducted to examine the usability of this method in various geographic or ethnic categories. This study investigates on a small-scale and compares the reliability of the GP atlas for assessment of the bone age for four ethnic groups …
Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh
Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh
Jeremy Straub
Small satellites, such as CubeSats, serve as excellent platforms for the collection of data that can be supplied to a geographic information system. To serve this need, they require a robust and lightweight task scheduler due to their limited onboard power production capabilities as well as internal space restrictions. Because of these constraints, schedules must be optimized; however, the scheduling optimization process must be performed using limited processing (CPU) power.
Several considerations must be taken into account in order to make a scheduler for these systems. This poster highlights requirements such as inter-dependency of onboard systems, and limited windows of …
Roofsat: Teaching Students Skills For Software Development For Gis Data Collection And Other Activities, Jeremy Straub, Ronald Marsh, Donovan Torgerson, Christoffer Korvald
Roofsat: Teaching Students Skills For Software Development For Gis Data Collection And Other Activities, Jeremy Straub, Ronald Marsh, Donovan Torgerson, Christoffer Korvald
Jeremy Straub
Small Spacecraft provide an excellent platform for the collection of geospatial data. In order to enable the low-cost creation of small remote sensing space-craft in a university environment, a training pathway for students is required. The Realistic Operational Ob-ject for Facilitating Software Assessment and Testing (RoofSat) serves to provide students with experience developing software for a small satellite platform typi-cal of those used for remote sensing missions. It al-lows software to be tested with hardware that re-sponds in a similar manner to that found on the satel-lite for a fraction of the cost of development. This poster details the goals …
Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin
Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin
Jeremy Straub
OpenOrbiter is a student project at the University of North Dakota to design and build a low cost1 and open-hardware / open-source software CubeSat2. The Ground Station is the user interface for operators of the satellite. The ground station software must manage spacecraft communications, track its orbital location , manage task assignment, provide security and retrieve the data from the spacecraft. This will be presented via a graphical user interface that allows a user to easily perform these tasks.
Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin
Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin
Jeremy Straub
The Testing and Integration Team plays an integral role in the development of the open source CubeSat known as Open Orbiter. Like any project, the Testing Team’s project can benefit from structure and management to effectively utilize it’s time and resources. CSCI 297 teaches the skills needed to turn a good idea into successful endeavor. By applying skills such as effective planning, setting milestones, dealing with changes and supervising to an actual project, Open Orbiter has transformed from a pipe dream to a real, obtainable goal. Doing this has turned learning about project management into more that just power points …
Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin
Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin
Jeremy Straub
The Payload Software team is responsible for developing the image processing and task decomposition systems on the Open Orbiter satellite1. The image processing software performs operations to enhance the quality of the images collected by the onboard camera, specifically, mosaicking, which takes multiple images and stitches them together to make a larger image and super resolution, which takes multiple low resolution images of the same area to produce a higher resolution image2,3,4. The task decomposition part of the system decomposes tasks defined by the user into jobs that then get sent to the operating system to be performed. This system …
Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin
Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin
Jeremy Straub
OpenOrbiter is producing a 1-U CubeSat spacecraft1 to facilitate the construction of low-cost2 spacecraft by others in the future. The Operating Software team is in charge of designing and creating the software that controls most of the CubeSat’s operations such as image capturing, storage management, and temperature sensing. The project management deliverables that we have worked on as a team are the Project Definition, Work Breakdown Structure, and the Project Schedule. The Project Definition defines exactly what our project team will be developing including, but not limited to, what the team is in charge of developing, what its not in …
Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin
Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin
Jeremy Straub
In CSCI 297 class we partake in learning the roles of software team leads and developers. With hands on activities that get us involved in what a real manager of a software team may do such as: defining a project, planning a project, developing a work breakdown structure, estimating the work, developing a project schedule, etc. This work is performed in the context of the OpenOrbiter project which seeks to build a low-cost spacecraft1 that can be produced with a parts budget of approxi-mately $5,0002 by schools worldwide. The ground station software team’s purpose within Open Orbiter project is to …
Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh
Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh
Jeremy Straub
The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …
Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh
Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh
Jeremy Straub
Scheduling for a Small Satellite for Remote Sensed Data Collection
On Local Fractional Continuous Wavelet Transform, Yang Xiaojun
On Local Fractional Continuous Wavelet Transform, Yang Xiaojun
Xiao-Jun Yang
We introduce a new wavelet transform within the framework of the local fractional calculus. An illustrative example of local fractional wavelet transform is also presented.
Characterization Of Extended And Simplified Intelligent Water Drop (Siwd) Approaches And Their Comparison To The Intelligent Water Drop (Iwd) Approach, Jeremy Straub, Eunjin Kim
Characterization Of Extended And Simplified Intelligent Water Drop (Siwd) Approaches And Their Comparison To The Intelligent Water Drop (Iwd) Approach, Jeremy Straub, Eunjin Kim
Jeremy Straub
This paper presents a simplified approach to performing the Intelligent Water Drops (IWD) process. This approach is designed to be comparatively lightweight while approximating the results of the full IWD process. The Simplified Intelligent Water Drops (SIWD) approach is specifically designed for applications where IWD must be run in a computationally limited environment (such as on a robot, UAV or small spacecraft) or where performance speed must be maximized for time sensitive applications. The SWID approach is described and compared and contracted to the base IWD approach.
Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling
Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling
M Ryan Hess
Providing technical know-how to non-technical researchers to promote and preserve their collections online is an emerging niche librarians are filling. Digital humanities partners are sometimes external to the library’s institution. DePaul University Library assisted researchers at the National University of Ireland, Galway in preserving their catalogue of Vincentian documents by migrating metadata from an unstable server to Omeka.net, a hosted web publishing platform designed for cultural institutions. The library proposed Omeka.net after considering the collection’s requirements, the technical abilities of the researchers and their budget. The library contributed their expertise of metadata by analyzing, re-encoding, and cross-walking metadata to Dublin …
Local Fractional Discrete Wavelet Transform For Solving Signals On Cantor Sets, Yang Xiaojun
Local Fractional Discrete Wavelet Transform For Solving Signals On Cantor Sets, Yang Xiaojun
Xiao-Jun Yang
The discrete wavelet transform via local fractional operators is structured and applied to process the signals on Cantor sets. An illustrative example of the local fractional discretewavelet transformis given.
In Defense Of Technology, Mike Kelly
Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn
Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn
Andrew G. West
Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static and dynamic techniques for their accurate and efficient detection. Building on this existing literature, this work introduces ADAM, a system that uses machine-learning over network metadata derived from the sandboxed execution of webpage content. Machine-trained models are not novel in this problem space. Instead, it is the dynamic network artifacts (and their subsequent feature representations) collected during rendering that are the greatest contribution of this work.
There were two primary motivations in exploring this line of research. First, iDetermine, VeriSign’s status …
Babble: Identifying Malware By Its Dialects, Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin
Babble: Identifying Malware By Its Dialects, Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin
Andrew G. West
Using runtime execution to identify whether code is malware, and to which malware family it belongs, is an established technique in the security domain. Traditionally, literature has relied on explicit features derived from network, file system, or registry interaction. While effective, the collection and analysis of these fine-granularity data points makes the technique quite computationally expensive. Moreover, the signatures/heuristics this analysis produces are often easily circumvented by subsequent malware authors.
To this end, we propose "Babble", a system that is concerned only with the *order* in which high-level system events take place. Individual events are mapped onto an alphabet and …
A Proposition For Using Mathematical Models Based On A Fuzzy System With Application, R. W. Hndoosh
A Proposition For Using Mathematical Models Based On A Fuzzy System With Application, R. W. Hndoosh
R. W. Hndoosh
Some mathematical models based on fuzzy set theory, fuzzy systems and neural network techniques seem very well suited for typical technical problems. This study aims to build two different models, the Fuzzy Inference System (FIS) and the Adaptive Fuzzy System using neural network. We have proposed a new model of a fuzzy system that is extended from 2-dimensions to 3-dimensions, using Mamdani's minimum implication, the minimum inference system, the Singleton fuzzifier and the Center Average Defuzzifier. Also, we have extended the theorem accuracy of the fuzzy system to 3- dimensions along with changing the type of fuzzy inference system. We …
Slaves To Big Data. Or Are We?, Mireille Hildebrandt
Slaves To Big Data. Or Are We?, Mireille Hildebrandt
Mireille Hildebrandt
In this contribution the notion of Big Data is discussed in relation to the monetisation of personal data. The claim of some proponents as well as adversaries, that Big Data implies that ‘n = all’, meaning that we no longer need to rely on samples because we have all the data, is scrutinized and found both overly optimistic and unnecessarily pessimistic. A set of epistemological and ethical issues is presented, focusing on the implications of Big Data for our perception, cognition, fairness, privacy and due process. The article then looks into the idea of user centric personal data management, to …
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
Introduction To Management Information System, Umakant Mishra
Introduction To Management Information System, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.
MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
Caimans - Semantic Platform For Advance Content Mining (Sketch Wp), Salvo Reina
Caimans - Semantic Platform For Advance Content Mining (Sketch Wp), Salvo Reina
Salvo Reina
A middleware SW platform was created for automatic classification of textual contents. The worksheet of requirements and the original flow-sketchs are published.
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
Umakant Mishra
As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.
Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Umakant Mishra
During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …
Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello
Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello
Emilio Iasiello
No abstract provided.
Eprints Below Upwards (The Manual That Was Missed), Balasubramanian Thiagarajan
Eprints Below Upwards (The Manual That Was Missed), Balasubramanian Thiagarajan
Balasubramanian Thiagarajan
As a person who is passionate in academic transmission of knowledge I found it really important to have a repository where scholarly publications could be archived and easily retrieved. My Institution / University does not have any such archiving facilities. I sought the advice of my teacher (who else other than google) which gave me some options of softwares which could be installed in a website. After a thorough research I found Eprint software fitted the billing to the core. On top of it it came free as it was open source. As with all open source software this software …
Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello
Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello
Emilio Iasiello
This paper examines how cyber attacks, if indeed conducted by nation states, have been unsuccessful in supporting states' foreign policy objectives. By analyzing three prominent case studies, I show that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets. The three case studies, hypothetical scenarios because attribution has not been confirmed, include: (1) the October 2012 distributed denial of service attacks targeting the U.S. banking sector; (2) the 2012 Stuxnet attack against Iran; and …
The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub
The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub
Jeremy Straub
Planetary missions are generally very well planned out. Where the spacecraft will be deployed, what it will do there and in what order are generally determined before launch. While some allowance is made for greater depth exploration of scientifically interesting items identified during the investigation, a successful mission is (generally) one that doesn’t deviate significantly from its planning. When sending an initial mission to an unsurveyed planet or moon, however, this approach is not suitable. Current space technology provides the capability to send a combined survey and lander mission (instead of conducting an initial survey mission and following it up …