Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 59

Full-Text Articles in Physical Sciences and Mathematics

The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem Dec 2013

The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem

Sameem Abdul Kareem

Background: Recently, determination of skeletal age, defined as the assessment of bone age, has rapidly become an important task between forensic experts and radiologists. The GreulichePyle (GP) atlas is one of the most frequently used methods for the assessment of skeletal age around the world. After presentation of the GP approach for the estimation of the bone age, much research has been conducted to examine the usability of this method in various geographic or ethnic categories. This study investigates on a small-scale and compares the reliability of the GP atlas for assessment of the bone age for four ethnic groups …


Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh Dec 2013

Scheduling For A Small Satellite For Remote Sensed Data Collection, Donovan Torgerson, Christoffer Korvalnd, Jeremy Straub, Ronald Marsh

Jeremy Straub

Small satellites, such as CubeSats, serve as excellent platforms for the collection of data that can be supplied to a geographic information system. To serve this need, they require a robust and lightweight task scheduler due to their limited onboard power production capabilities as well as internal space restrictions. Because of these constraints, schedules must be optimized; however, the scheduling optimization process must be performed using limited processing (CPU) power.

Several considerations must be taken into account in order to make a scheduler for these systems. This poster highlights requirements such as inter-dependency of onboard systems, and limited windows of …


Roofsat: Teaching Students Skills For Software Development For Gis Data Collection And Other Activities, Jeremy Straub, Ronald Marsh, Donovan Torgerson, Christoffer Korvald Dec 2013

Roofsat: Teaching Students Skills For Software Development For Gis Data Collection And Other Activities, Jeremy Straub, Ronald Marsh, Donovan Torgerson, Christoffer Korvald

Jeremy Straub

Small Spacecraft provide an excellent platform for the collection of geospatial data. In order to enable the low-cost creation of small remote sensing space-craft in a university environment, a training pathway for students is required. The Realistic Operational Ob-ject for Facilitating Software Assessment and Testing (RoofSat) serves to provide students with experience developing software for a small satellite platform typi-cal of those used for remote sensing missions. It al-lows software to be tested with hardware that re-sponds in a similar manner to that found on the satel-lite for a fraction of the cost of development. This poster details the goals …


Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin Dec 2013

Openorbiter Ground Station Software, Alexander Lewis, Jacob Huhn, Jeremy Straub, Travis Desell, Scott Kerlin

Jeremy Straub

OpenOrbiter is a student project at the University of North Dakota to design and build a low cost1 and open-hardware / open-source software CubeSat2. The Ground Station is the user interface for operators of the satellite. The ground station software must manage spacecraft communications, track its orbital location , manage task assignment, provide security and retrieve the data from the spacecraft. This will be presented via a graphical user interface that allows a user to easily perform these tasks.


Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin Dec 2013

Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin

Jeremy Straub

The Testing and Integration Team plays an integral role in the development of the open source CubeSat known as Open Orbiter. Like any project, the Testing Team’s project can benefit from structure and management to effectively utilize it’s time and resources. CSCI 297 teaches the skills needed to turn a good idea into successful endeavor. By applying skills such as effective planning, setting milestones, dealing with changes and supervising to an actual project, Open Orbiter has transformed from a pipe dream to a real, obtainable goal. Doing this has turned learning about project management into more that just power points …


Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin Dec 2013

Openorbiter Payload Software, Tim Whitney, Kyle Goehner, Jeremy Straub, Scott Kerlin

Jeremy Straub

The Payload Software team is responsible for developing the image processing and task decomposition systems on the Open Orbiter satellite1. The image processing software performs operations to enhance the quality of the images collected by the onboard camera, specifically, mosaicking, which takes multiple images and stitches them together to make a larger image and super resolution, which takes multiple low resolution images of the same area to produce a higher resolution image2,3,4. The task decomposition part of the system decomposes tasks defined by the user into jobs that then get sent to the operating system to be performed. This system …


Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin Dec 2013

Project Management For The Openorbiter Operating Software Team, Kelton Karboviak, Dayln Limesand, Michael Hlas, Eric Berg, Christoffer Korvald, Jeremy Straub, Ronald Marsh, Scott Kerlin

Jeremy Straub

OpenOrbiter is producing a 1-U CubeSat spacecraft1 to facilitate the construction of low-cost2 spacecraft by others in the future. The Operating Software team is in charge of designing and creating the software that controls most of the CubeSat’s operations such as image capturing, storage management, and temperature sensing. The project management deliverables that we have worked on as a team are the Project Definition, Work Breakdown Structure, and the Project Schedule. The Project Definition defines exactly what our project team will be developing including, but not limited to, what the team is in charge of developing, what its not in …


Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin Dec 2013

Ground Station Software Team Project Management, Zach Maguire, Marshall Mattingly, Christoffer Korvald, Jeremy Straub, Scott Kerlin

Jeremy Straub

In CSCI 297 class we partake in learning the roles of software team leads and developers. With hands on activities that get us involved in what a real manager of a software team may do such as: defining a project, planning a project, developing a work breakdown structure, estimating the work, developing a project schedule, etc. This work is performed in the context of the OpenOrbiter project which seeks to build a low-cost spacecraft1 that can be produced with a parts budget of approxi-mately $5,0002 by schools worldwide. The ground station software team’s purpose within Open Orbiter project is to …


Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh Dec 2013

Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh

Jeremy Straub

The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …


Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh Dec 2013

Payload Software Design And Development For A Remote Sensing Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

Scheduling for a Small Satellite for Remote Sensed Data Collection


On Local Fractional Continuous Wavelet Transform, Yang Xiaojun Nov 2013

On Local Fractional Continuous Wavelet Transform, Yang Xiaojun

Xiao-Jun Yang

We introduce a new wavelet transform within the framework of the local fractional calculus. An illustrative example of local fractional wavelet transform is also presented.


Characterization Of Extended And Simplified Intelligent Water Drop (Siwd) Approaches And Their Comparison To The Intelligent Water Drop (Iwd) Approach, Jeremy Straub, Eunjin Kim Nov 2013

Characterization Of Extended And Simplified Intelligent Water Drop (Siwd) Approaches And Their Comparison To The Intelligent Water Drop (Iwd) Approach, Jeremy Straub, Eunjin Kim

Jeremy Straub

This paper presents a simplified approach to performing the Intelligent Water Drops (IWD) process. This approach is designed to be comparatively lightweight while approximating the results of the full IWD process. The Simplified Intelligent Water Drops (SIWD) approach is specifically designed for applications where IWD must be run in a computationally limited environment (such as on a robot, UAV or small spacecraft) or where performance speed must be maximized for time sensitive applications. The SWID approach is described and compared and contracted to the base IWD approach.


Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling Oct 2013

Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling

M Ryan Hess

Providing technical know-how to non-technical researchers to promote and preserve their collections online is an emerging niche librarians are filling. Digital humanities partners are sometimes external to the library’s institution. DePaul University Library assisted researchers at the National University of Ireland, Galway in preserving their catalogue of Vincentian documents by migrating metadata from an unstable server to Omeka.net, a hosted web publishing platform designed for cultural institutions. The library proposed Omeka.net after considering the collection’s requirements, the technical abilities of the researchers and their budget. The library contributed their expertise of metadata by analyzing, re-encoding, and cross-walking metadata to Dublin …


Local Fractional Discrete Wavelet Transform For Solving Signals On Cantor Sets, Yang Xiaojun Oct 2013

Local Fractional Discrete Wavelet Transform For Solving Signals On Cantor Sets, Yang Xiaojun

Xiao-Jun Yang

The discrete wavelet transform via local fractional operators is structured and applied to process the signals on Cantor sets. An illustrative example of the local fractional discretewavelet transformis given.


In Defense Of Technology, Mike Kelly Oct 2013

In Defense Of Technology, Mike Kelly

The Intellectual Standard

No abstract provided.


Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn Oct 2013

Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn

Andrew G. West

Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static and dynamic techniques for their accurate and efficient detection. Building on this existing literature, this work introduces ADAM, a system that uses machine-learning over network metadata derived from the sandboxed execution of webpage content. Machine-trained models are not novel in this problem space. Instead, it is the dynamic network artifacts (and their subsequent feature representations) collected during rendering that are the greatest contribution of this work.

There were two primary motivations in exploring this line of research. First, iDetermine, VeriSign’s status …


Babble: Identifying Malware By Its Dialects, Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin Oct 2013

Babble: Identifying Malware By Its Dialects, Aziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin

Andrew G. West

Using runtime execution to identify whether code is malware, and to which malware family it belongs, is an established technique in the security domain. Traditionally, literature has relied on explicit features derived from network, file system, or registry interaction. While effective, the collection and analysis of these fine-granularity data points makes the technique quite computationally expensive. Moreover, the signatures/heuristics this analysis produces are often easily circumvented by subsequent malware authors.

To this end, we propose "Babble", a system that is concerned only with the *order* in which high-level system events take place. Individual events are mapped onto an alphabet and …


A Proposition For Using Mathematical Models Based On A Fuzzy System With Application, R. W. Hndoosh Oct 2013

A Proposition For Using Mathematical Models Based On A Fuzzy System With Application, R. W. Hndoosh

R. W. Hndoosh

Some mathematical models based on fuzzy set theory, fuzzy systems and neural network techniques seem very well suited for typical technical problems. This study aims to build two different models, the Fuzzy Inference System (FIS) and the Adaptive Fuzzy System using neural network. We have proposed a new model of a fuzzy system that is extended from 2-dimensions to 3-dimensions, using Mamdani's minimum implication, the minimum inference system, the Singleton fuzzifier and the Center Average Defuzzifier. Also, we have extended the theorem accuracy of the fuzzy system to 3- dimensions along with changing the type of fuzzy inference system. We …


Slaves To Big Data. Or Are We?, Mireille Hildebrandt Oct 2013

Slaves To Big Data. Or Are We?, Mireille Hildebrandt

Mireille Hildebrandt

In this contribution the notion of Big Data is discussed in relation to the monetisation of personal data. The claim of some proponents as well as adversaries, that Big Data implies that ‘n = all’, meaning that we no longer need to rely on samples because we have all the data, is scrutinized and found both overly optimistic and unnecessarily pessimistic. A set of epistemological and ethical issues is presented, focusing on the implications of Big Data for our perception, cognition, fairness, privacy and due process. The article then looks into the idea of user centric personal data management, to …


Designing An Mis Database For Selection And Recruitment, Umakant Mishra Sep 2013

Designing An Mis Database For Selection And Recruitment, Umakant Mishra

Umakant Mishra

Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.

This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …


Introduction To Management Information System, Umakant Mishra Aug 2013

Introduction To Management Information System, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.


Management Information Systems Vs. Other Information Systems, Umakant Mishra Aug 2013

Management Information Systems Vs. Other Information Systems, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.

MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …


How To Implement Access Rights In An Mis Project, Umakant Mishra Aug 2013

How To Implement Access Rights In An Mis Project, Umakant Mishra

Umakant Mishra

The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …


Caimans - Semantic Platform For Advance Content Mining (Sketch Wp), Salvo Reina Jul 2013

Caimans - Semantic Platform For Advance Content Mining (Sketch Wp), Salvo Reina

Salvo Reina

A middleware SW platform was created for automatic classification of textual contents. The worksheet of requirements and the original flow-sketchs are published.


How Do Viruses Attack Anti-Virus Programs, Umakant Mishra Jul 2013

How Do Viruses Attack Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.

Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …


Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra Jul 2013

Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra

Umakant Mishra

During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …


Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello Jul 2013

Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello

Emilio Iasiello

No abstract provided.


Eprints Below Upwards (The Manual That Was Missed), Balasubramanian Thiagarajan Jun 2013

Eprints Below Upwards (The Manual That Was Missed), Balasubramanian Thiagarajan

Balasubramanian Thiagarajan

As a person who is passionate in academic transmission of knowledge I found it really important to have a repository where scholarly publications could be archived and easily retrieved. My Institution / University does not have any such archiving facilities. I sought the advice of my teacher (who else other than google) which gave me some options of softwares which could be installed in a website. After a thorough research I found Eprint software fitted the billing to the core. On top of it it came free as it was open source. As with all open source software this software …


Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello Jun 2013

Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello

Emilio Iasiello

This paper examines how cyber attacks, if indeed conducted by nation states, have been unsuccessful in supporting states' foreign policy objectives. By analyzing three prominent case studies, I show that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets. The three case studies, hypothetical scenarios because attribution has not been confirmed, include: (1) the October 2012 distributed denial of service attacks targeting the U.S. banking sector; (2) the 2012 Stuxnet attack against Iran; and …


The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub Jun 2013

The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub

Jeremy Straub

Planetary missions are generally very well planned out. Where the spacecraft will be deployed, what it will do there and in what order are generally determined before launch. While some allowance is made for greater depth exploration of scientifically interesting items identified during the investigation, a successful mission is (generally) one that doesn’t deviate significantly from its planning. When sending an initial mission to an unsurveyed planet or moon, however, this approach is not suitable. Current space technology provides the capability to send a combined survey and lander mission (instead of conducting an initial survey mission and following it up …