Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Physical Sciences and Mathematics

The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub Nov 2014

The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub

Jeremy Straub

A multi-tier architecture is under development (with similar craft heterogeneity to Fink's work on ‘tier scalable’ missions) which will facilitate autonomous local control of multiple heterogeneous craft. This mission architecture has been developed with a Mars mission in mind and has included CubeSats in a variety of critical mission roles.

Two concepts will be presented: the addition of CubeSats to a larger-scale multi-tier mission, where the CubeSats serve a supporting role and a mission driven by CubeSat orbital capabilities. In the first, CubeSats are utilized to augment the area of spatial coverage that can be obtained and the temporal coverage …


Hacking Back: Not The Right Solution, Emilio Iasiello Nov 2014

Hacking Back: Not The Right Solution, Emilio Iasiello

Emilio Iasiello

In cyberspace attackers enjoy an advantage over defenders, which has popularized the concept of “active cyber defense”— offensive actions intended to punish or deter the adversary. This article argues active cyber defense is not a practical course of action to obtain tactical and strategic objectives. Instead, “aggressive cyber defense,” a proactive security solution, is a more appropriate option.


Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv Nov 2014

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

Publicly posted URLs may contain a wealth of information about the identities and activities of the users who share them. URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. While often benign and necessary to render the web page, query strings sometimes contain tracking mechanisms, user names, email addresses, and other information that users may not wish to publicly reveal. In isolation this is not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted from web …


Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi Oct 2014

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi

Andrew G. West

Using runtime execution artifacts to identify malware and its associated "family" is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics this analysis produces are often circumvented by subsequent malware authors.

To this end we propose CHATTER, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse …


Ocena Wpływu Rozdzielczości Siatki Obliczeniowej Na Wyniki Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu, Mateusz Rzeszutek, Robert Oleniacz, Marian Mazur Oct 2014

Ocena Wpływu Rozdzielczości Siatki Obliczeniowej Na Wyniki Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu, Mateusz Rzeszutek, Robert Oleniacz, Marian Mazur

Robert Oleniacz

In this study are presented the results of the assessment of the impact of grid resolution on the results of computational modeling of the dispersion of air pollutants. Calculations were performed using Gaussian, non-stationary puff model CALPUFF. Four different grids resolution were analyzed. Networks were established on the basis of SRTM3 terrain and land cover classes of CLC, 2006. Analysis of results of spatial distribution of concentrations of air pollutants obtained in a regular computing grid was performed using statistical indicators recommended by the U.S. EPA. The study shows the applicability of particular computational grids in the system modeling transport …


Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh Oct 2014

Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh

R. W. Hndoosh

This work provides mathematical formulas and algorithm in order to calculate the derivatives that being necessary to perform Steepest Descent models to make T1 and T2 FLSs much more accessible to FLS modelers. It provides derivative computations that are applied on different kind of MFs, and some computations which are then clarified for specific MFs. We have learned how to model T1 FLSs when a set of training data is available and provided an application to derive the Steepest Descent models that depend on trigonometric function (SDTFM). This work, also focused on an interval type-2 non-singleton type-2 FLS (IT2 NS-T2 …


Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh Oct 2014

Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh

R. W. Hndoosh

The main objective of this model is to focus on how to use the model of fuzzy system to solve fuzzy mathematics problems. Some mathematical models based on fuzzy set theory, fuzzy systems and neural network techniques seem very well suited for typical technical problems. We have proposed an extension model of a fuzzy system to N-dimension, using Mamdani's minimum implication, the minimum inference system, and the singleton fuzzifier with the center average defuzzifier. Here construct two different models namely a fuzzy inference system and an adaptive fuzzy system using neural network. We have extended the theorem for accuracy of …


Fuzzy Mathematical Model For Detection Of Lung Cancer Using A Multi-Nfclass With Confusion Fuzzy Matrix For Accuracy, R.W. W. Hndoosh Sep 2014

Fuzzy Mathematical Model For Detection Of Lung Cancer Using A Multi-Nfclass With Confusion Fuzzy Matrix For Accuracy, R.W. W. Hndoosh

R. W. Hndoosh

and detection of lung cancer data. This model depends on a generic model of a fuzzy perceptron, which can be used to derive a neural fuzzy system for specific domains. The multi neuron-fuzzy classification (Multi-NFClass) model proposed that uses input, hidden layers, output, and subclasses that have a multitude in each class. This model derives fuzzy rules to classify patterns into a number of crisp classes. Firstly, an attempt is made to describe fuzzy if–then rules, and construction of the fuzzy if–then rule, that are determined by the simple steps when its antecedent fuzzy sets are specified by genetic operations, …


Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess Aug 2014

Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess

M Ryan Hess

DePaul University Library will share its lessons learned and recommendations for hosted CONTENTdm 6 administrators wishing to customize CONTENTdm in a way that strikes the right balance between default CONTENTdm sites and sites that stand out and better serve our unique audiences. The DePaul University Library has learned many lessons from customizing its hosted instance of CONTENTdm 6, including the use of jQuery to add interface enhancements and remove some native CONTENTdm features. Unfortunately, this did not prove a long-term solution due to some limitations of CONTENTdm’s built-in customization tools, leading to content management issues and bugs that were hard …


Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim Aug 2014

Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim

Andrew G. West

Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static and dynamic techniques to alleviate such threats. Building on this existing literature, this work introduces the design and evaluation of ADAM, a system that uses machine-learning over network metadata derived from the sandboxed execution of webpage content. ADAM aims to detect malicious webpages and identify the nature of those vulnerabilities using a simple set of features. Machine-trained models are not novel in this problem space. Instead, it is the dynamic network artifacts (and their subsequent feature representations) collected during rendering that …


Mathematical Structure Of Fuzzy Modeling Of Medical Diagnoses By Using Clustering Models, R.W. W. Hndoosh Aug 2014

Mathematical Structure Of Fuzzy Modeling Of Medical Diagnoses By Using Clustering Models, R.W. W. Hndoosh

R. W. Hndoosh

An Adaptive-Network-based Fuzzy Inference System ANFIS with different techniques of clustering is successfully developed to solve one of the problems of medical diagnoses, because it has the advantage of powerful modeling ability. In this paper, we propose the generation of an adaptive neuro-Fuzzy Inference System model using different clustering models such as a subtractive fuzzy clustering (SFC) model and a fuzzy c-mean clustering (FCM) model in the Takagi-Sugeno (TS) fuzzy model for selecting the hidden node centers. An experimental result on datasets of medical diagnoses shows the proposed model with two models of clustering (ANFIS-SFC & ANFIS-FCM) while comparing the …


A General Framework For Uncertainty Propagation Based On Point Estimate Methods, René Schenkendorf Jul 2014

A General Framework For Uncertainty Propagation Based On Point Estimate Methods, René Schenkendorf

René Schenkendorf

A general framework to approach the challenge of uncertainty propagation in model based prognostics is presented in this work. It is shown how the so-called Point Estimate Meth- ods (PEMs) are ideally suited for this purpose because of the following reasons: 1) A credible propagation and represen- tation of Gaussian (normally distributed) uncertainty can be done with a minimum of computational effort for non-linear applications. 2) Also non-Gaussian uncertainties can be prop- agated by evaluating suitable transfer functions inherently. 3) Confidence intervals of simulation results can be derived which do not have to be symmetrically distributed around the mean value …


Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen Jul 2014

Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen

Andrew G. West

Networked machines serving as binary distribution points, C&C channels, or drop sites are a ubiquitous aspect of malware infrastructure. By sandboxing malcode one can extract the network endpoints (i.e., domains and URL paths) contacted during execution. Some endpoints are benign, e.g., connectivity tests. Exclusively malicious destinations, however, can serve as signatures enabling network alarms. Often these behavioral distinctions are drawn by expert analysts, resulting in considerable cost and labeling latency.

Leveraging 28,000 expert-labeled endpoints derived from ~100k malware binaries this paper characterizes those domains/URLs towards prioritizing manual efforts and automatic signature generation. Our analysis focuses on endpoints' static metadata properties …


Determination Of Optimal Spatial Databases For The Area Of Poland To The Calculation Of Air Pollutant Dispersion Using The Calmet/Calpuff Model, Robert Oleniacz, Mateusz Rzeszutek Jun 2014

Determination Of Optimal Spatial Databases For The Area Of Poland To The Calculation Of Air Pollutant Dispersion Using The Calmet/Calpuff Model, Robert Oleniacz, Mateusz Rzeszutek

Robert Oleniacz

The paper presents a methodology for the preparation of three-dimensional spatial data and land use data for the purpose of modeling pollutant dispersion in the ambient air using a group of geophysical preprocessors of the CALMET/CALPUFF modeling system and the GIS software. Some space information data sources available to Poland were specified and their characteristics and availability were discussed. Particular attention was turned to the SRTM3 and GTOPO30 elevation data as well as the CLC2006 and GLCC land use data, for the preparation of computational grids of different resolutions. Groups of programs which can be used in order to form …


Ocena Wpływu Nowo Budowanej Spalarni Odpadów Komunalnych W Krakowie Na Jakość Powietrza Z Wykorzystaniem Modelu Calmet/Calpuff, Mateusz Rzeszutek, Robert Oleniacz Jun 2014

Ocena Wpływu Nowo Budowanej Spalarni Odpadów Komunalnych W Krakowie Na Jakość Powietrza Z Wykorzystaniem Modelu Calmet/Calpuff, Mateusz Rzeszutek, Robert Oleniacz

Robert Oleniacz

The chapter presents the results of the evaluation the impact on air quality for the newly built Municipal Solid Waste Thermal Treatment Plant in Krakow (Poland) whose construction started in autumn 2013. Air pollution impact assessment was performed for air emissions adopted at the levels of emission limit values applicable for waste incineration. Modeling of air pollutant dispersion was carried out using the system of CALMET/CALPUFF models. For this purpose, the terrain elevation data from Shuttle Radar Topography Mission (SRTM3) and data of land use from Corine Land Cover 2006 (CLC 2006) were adopted with a resolution of about 100 …


The Differences Are Not So Great: High Altitude Balloon And Small Spacecraft Software Development, Jeremy Straub, Ronald Marsh Jun 2014

The Differences Are Not So Great: High Altitude Balloon And Small Spacecraft Software Development, Jeremy Straub, Ronald Marsh

Jeremy Straub

Previous work discussed critical differences in planning, developing hardware for and executing a high altitude balloon (HAB) mission. One area where this difference is less pronounced is in software development, allowing HABs to be utilized as a ‘software testbed’ for many orbital missions. This paper provides an overview of the software development process for both orbital and HAB craft, highlighting differences between the two processes and the numerous similarities. It concludes by presenting a framework for analyzing the suitability of HAB testing for small satellite software.


Lexical Based Semantic Orientation Of Online Customer Reviews And Blogs-J-Am Sci 10(8) 143_147--07-June-2014.Pdf, Dr. Muhammad Zubair Asghar May 2014

Lexical Based Semantic Orientation Of Online Customer Reviews And Blogs-J-Am Sci 10(8) 143_147--07-June-2014.Pdf, Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

Rapid increase in internet users along with growing power of online review sites and social media hasgiven birth to sentiment analysis or opinion mining, which aims at determining what other people think andcomment. Sentiments or Opinions contain public generated content about products, services, policies and politics.People are usually interested to seek positive and negative opinions containing likes and dislikes, shared by users forfeatures of particular product or service. This paper proposed sentence-level lexical based domain independentsentiment classification method for different types of data such as reviews and blogs. The proposed method is basedon general lexicons i.e. WordNet, SentiWordNet and user …


On The Privacy Concerns Of Url Query Strings, Andrew G. West, Adam J. Aviv May 2014

On The Privacy Concerns Of Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. Often times these arguments are not privacy sensitive but are necessary to render the web page. However, query strings may also contain tracking mechanisms, user names, email addresses, and other information that users may not wish to reveal. In isolation such URLs are not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted from web browsers) are increasingly being publicly broadcast.

This position paper argues that the …


Is Anti-Virus A Necessary Evil?, Umakant Mishra May 2014

Is Anti-Virus A Necessary Evil?, Umakant Mishra

Umakant Mishra

While everybody is becoming more and more dependent on computers there are some unscrupulous people who continuously try to misuse the technology and get illegal and illegitimate benefit out of this sophisticated environment. Today the Internet is like a busy street or open market place where you find almost everything you want. As there are some obvious risks when you stand or move in a busy street such as you are likely to be pick pocketed or cheated or even knocked out by a rash driving vehicle. Similar threats loom over the head of a user when he is exposed …


Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra May 2014

Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.

There are many input/output devices like mouse, keyboard, pointers, and touch screens …


Of Mills And Machines - Computing Thought Experiments On Consciousness, Aïda Raoult Apr 2014

Of Mills And Machines - Computing Thought Experiments On Consciousness, Aïda Raoult

Aïda Raoult

In this computing-oriented analysis, 5 of the most influential thought experiments on consciousness inspired by the development of A.I. in the 70s-80s are (1) presented as more refined versions of Leibniz’s mill (LM), (2) then reformulated in terms of LM which reveals a divergence in their approach of the mind-body problem; (3) combining this result with computational complexity theory shows the ontological question is less difficult to answer than the causal one. In the end, (4) these considerations participate in the debate over machine consciousness.


Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg Apr 2014

Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg

Muhammad Imran

We present AIDR (Artificial Intelligence for Disaster Response), a platform designed to perform automatic classification of crisis-related microblog communications. AIDR enables humans and machines to work together to apply human intelligence to large-scale data at high speed. The objective of AIDR is to classify messages that people post during disasters into a set of user-defined categories of information (e.g., "needs", "damage", etc.) For this purpose, the system continuously ingests data from Twitter, processes it (i.e., using machine learning classification techniques) and leverages human-participation (through crowdsourcing) in real-time. AIDR has been successfully tested to classify informative vs. non-informative tweets posted during …


Constraint Satisfaction Problem: A Generic Scheduler, Ben Carpenter, Brent Weichel, Jeremy Straub, Eunjin Kim Apr 2014

Constraint Satisfaction Problem: A Generic Scheduler, Ben Carpenter, Brent Weichel, Jeremy Straub, Eunjin Kim

Jeremy Straub

The task was to create a scheduler that would create a schedule that gets as many of the tasks done as possible while maximizing the total value of the tasks performed. Each task was assigned a value, a priority, and a duration. Each task also had certain times that they could be run, so they couldn’t just be run at any point where they fit. We decided that in order to get a more accurate ordering for the process, we would take the value divided by the duration that way we were less likely to skip over processes that ran …


Dynamic Task Scheduling Problem: Greedy Knapsack Solution, Christian Sandtveit, Darrin Winger, Jeremy Straub, Eunjin Kim Apr 2014

Dynamic Task Scheduling Problem: Greedy Knapsack Solution, Christian Sandtveit, Darrin Winger, Jeremy Straub, Eunjin Kim

Jeremy Straub

The problem that we worked with was a dynamic scheduling problem. For this problem, we are given a set of tasks to be scheduled in an allotted time slot, so that the total value of the tasks done is maximized. Each task has a duration, value. Each task also has one or more periods in which they can be scheduled. Some tasks can have conflicting time slots that can prevent other tasks from being scheduled. As tasks are assigned time slots it is possible to prevent other tasks from being as-signed a time slot. Looking for ways to minimize the …


Medical Rate Setting: Multi-Curve Approximation And Projection, Darrin Winger, Christian Sandtveit, Jeremy Straub, Eunjin Kim Apr 2014

Medical Rate Setting: Multi-Curve Approximation And Projection, Darrin Winger, Christian Sandtveit, Jeremy Straub, Eunjin Kim

Jeremy Straub

In order to maximize profit, our approach was to maximize the difference between total revenue and total cost, where total revenue would be larger than total cost. In the problem we are given a series of points, which relates price, cost, profit and quantity. We can calculate the total revenue by multi-plying the price with quantity, and the total cost by multiplying the cost with the quantity. Total profit is calculated by multiplying profit and quantity. We are given 4 initial points, and based on those 4 points we will calculate the point where the profit is currently maximized. Based …


Development Of A Ground Station For The Openorbiter Spacecraft, Jacob Huhn, Alexander Lewis, Christoffer Korvald, Jeremy Straub, Scott Kerlin Apr 2014

Development Of A Ground Station For The Openorbiter Spacecraft, Jacob Huhn, Alexander Lewis, Christoffer Korvald, Jeremy Straub, Scott Kerlin

Jeremy Straub

The OpenOrbiter Small Spacecraft Development Initiative[1] at the University of North Dakota is working to design and build a low cost[2] and open-hardware / opensource software CubeSat[3]. The Ground Station is the user interface for operators of the satellite. The ground station software must manage spacecraft communications, track its orbital location , manage task assignment, provide security and retrieve the data from the spacecraft. This will be presented via a graphical user interface that allows a user to easily perform these tasks.


Task Scheduling Problem: Using The Most Constrained Variable Algorithm To Maximize, Jaeden Lovin, Calvin Bina, Jeremy Straub, Eunjin Kim Apr 2014

Task Scheduling Problem: Using The Most Constrained Variable Algorithm To Maximize, Jaeden Lovin, Calvin Bina, Jeremy Straub, Eunjin Kim

Jeremy Straub

For this constraint satisfaction problem we needed to schedule a series of tasks to run in a certain order. Each task has a set duration that it must run for and a domain of times during which it can run during. Each task had a value and the goal of the problem was to pick times for the tasks to run in or-der to maximize the total value. We thought of multiple ways to potentially approach this problem, and decided to use some form of the least constraining variable. We would choose the task with the least constraints on other …


Medical Rate Setting Problem: Using The Hill-Climbing Search To Maximize Health Care Provider Profit, Calvin Bina, Jaeden Lovin, Jeremy Straub, Eunjin Kim Apr 2014

Medical Rate Setting Problem: Using The Hill-Climbing Search To Maximize Health Care Provider Profit, Calvin Bina, Jaeden Lovin, Jeremy Straub, Eunjin Kim

Jeremy Straub

Our program for calculating the optimal price for a service is relatively simple, but it gets great results. We make use of quadratic regres-sion. Quadratic regression has a very similar concept to linear regression. Given a set of data points, we find the equation that is the best fit to represent those data points. With linear re-gression, our resulting equation is linear. How-ever, with quadratic regression, our end result is a quadratic equation. We have two quadratic equations to come up with. One is our cost function and the other is our units sold func-tion. Both of these equations are …


Classroom Polling Software For Use With Mobile And Web-Based Devices, Nick Renford, Jeremy Straub, Scott Kerlin Apr 2014

Classroom Polling Software For Use With Mobile And Web-Based Devices, Nick Renford, Jeremy Straub, Scott Kerlin

Jeremy Straub

The goal of this project is to create an interface for Android, iOS, and Win-dows Phone smartphones, as well as a web interface that will act as a “clicker”. The instructors will be able to send out questions, and the students will be able to answer the questions, and get feedback if the instructor wants them to have it. The teacher can decide whether the feedback is instant or manually initiated, and what format the response will be, whether it includes the correct answer, and what type of chart, if any, indicating the most com-monly selected answer(s). There will be …


Update On The Operating Software For Openorbiter, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh Apr 2014

Update On The Operating Software For Openorbiter, Dayln Limesand, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

The operating software team of the OpenOrbiter project has been tasked with developing software for general spacecraft maintenance, performing mission tasks and the monitoring of system critical aspects of the spacecraft. To do so, the team is developing an autonomous system that will be able to continuously check sensors for data, and schedule tasks that pertain to the current mission and general maintenance of the onboard systems. Development in support of these objectives is ongoing with work focusing on the completion of the development of a stable system. This poster presents an overview of current work on the project and …