Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

SelectedWorks

Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 516

Full-Text Articles in Physical Sciences and Mathematics

An Expert System For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub Apr 2015

An Expert System For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub

Jeremy Straub

Wireless power transfer (WPT) can be used to deliver space-generated power to ground stations through the use of microwave beams. WPT satellite power delivery systems have two major failure states: misdi-recting a beam and failing to send power to a station. This project has implemented an expert system to perform pattern recognition in an effort to prevent failures by analyzing the system state and predicting potential failures before they happen in support of space-based testing [1] and deployment [2].


Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin Apr 2015

Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.


Are Cyber Weapons Effective Military Tools?, Emilio Iasiello Apr 2015

Are Cyber Weapons Effective Military Tools?, Emilio Iasiello

Emilio Iasiello

Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. More substantive examples demonstrate that cyber-attacks have been more successful in non-military activities, as they may serve as a clandestine weapon of subterfuge better positioned to incapacitate systems without alerting the victims, veiling the orchestrator’s true identity via proxy groups and plausible deniability. Consequently, this paper provides a counter argument to the idea that cyber tools are instrumental military weapons in modern day warfare; cyber weapons are more effective options during …


A Web-Based Job Management System For Three-Dimensional Printing And Scanning At The University Of North Dakota, Dalyn Limesand, Stephanie Hollman, Jeremy Straub, Scott Kerlin Mar 2015

A Web-Based Job Management System For Three-Dimensional Printing And Scanning At The University Of North Dakota, Dalyn Limesand, Stephanie Hollman, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This paper discusses a system that will allow individuals from across campus to submit object files for printing by a 3D printer, without having to schedule appointment and manually operate it.

Logistical requirements dictate some level of human involvement, despite a goal of creating a fully automated system. Involvement areas include converting /preparing submitted files, sending the job to the printer, print tray preparation, and completed object removal. From a user’s perspective, however a seamless experience is anticipated. …


The Creation Of A Communication Systems For A Small Satellite At The University Of North Dakota, Michael Hlas, Jeremy Straub, Ronald Marsh Mar 2015

The Creation Of A Communication Systems For A Small Satellite At The University Of North Dakota, Michael Hlas, Jeremy Straub, Ronald Marsh

Jeremy Straub

Software defined radios (SDRs) are poised to significantly enhance the future of small spacecraft communications. They allow signal processing to be performed on a computer by software rather than requiring dedicated hardware. The SDR takes data from the flight computer and converts it into an analog signal that is transmitted via the spacecraft antenna. Because the signal processing is done in software, the radio can be easily reconfigured.

Data is prepared for transmission by TCP stack software onboard the OpenOrbiter Spacecraft and placed in a queue while the spacecraft is listening for a signal from a ground station. When a …


Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh Mar 2015

Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh

Jeremy Straub

An overview of the progress on the development of the OpenOrbiter CubeSat is presented. This covers, at a high level, the work that has been performed during the past year and foundational work that occurred prior to this. This poster also discusses future plans for the Open Prototype for Educational NanoSats (OPEN) framework and the OpenOrbiter Small Spacecraft Development Initiative. Particular focus is given to the ongoing work to prepare for an orbital launch, which the program has been down-selected for through the NASA ELaNa CubeSat Launch Initiative program.

In addition to this discussion of the program’s origins, goals and …


Scheduling Algorithm Development For An Open Source Software Spacecraft, Calvin Bina, Jeremy Straub, Ronald Marsh Mar 2015

Scheduling Algorithm Development For An Open Source Software Spacecraft, Calvin Bina, Jeremy Straub, Ronald Marsh

Jeremy Straub

The OpenOrbiter project at the University of North Dakota is working to develop a set of designs for a CubeSat class spacecraft as well as a working, modular collection of open source code that can be used by other CubeSat projects as a starting point for development. The availability of these designs and this codebase should foster accelerated development for other CubeSat projects, allowing those projects to focus their effort on their own application area, instead of reinventing the proverbial wheel. One aspect of this is to implement a task scheduler which will run on a Raspberry Pi flight computer …


Wikipedia And Medicine: Quantifying Readership, Editors, And The Significance Of Natural Language, James M. Heilman, Andrew G. West Mar 2015

Wikipedia And Medicine: Quantifying Readership, Editors, And The Significance Of Natural Language, James M. Heilman, Andrew G. West

Andrew G. West

BACKGROUND: Wikipedia is a collaboratively edited encyclopedia. One of the most popular websites on the Internet, it is known to be a frequently used source of healthcare information by both professionals and the lay public.

OBJECTIVE: This document quantifies: (1) The amount of medical content on Wikipedia, (2) the citations supporting Wikipedia’s medical content, (3) the readership of medical content, and (4) the quantity/characteristics of Wikipedia’s medical contributors

METHODS: Using a well-defined categorization infrastructure we identify medically pertinent English Wikipedia articles and links to their foreign language equivalents (Objective 1). With these, Wikipedia’s API can be queried to produce metadata …


An Overview Of The Openorbiter Autonomous Operating Software, Dayln Limesand, Timothy Whitney, Jeremy Straub, Ronald Marsh Mar 2015

An Overview Of The Openorbiter Autonomous Operating Software, Dayln Limesand, Timothy Whitney, Jeremy Straub, Ronald Marsh

Jeremy Straub

The OpenOrbiter spacecraft aims to demonstrate the efficacy of the Open Prototype for Educational Nanosats (OPEN) framework. Software is an important part of this framework. This paper discusses the operating software for the spacecraft (which runs on top of the Linux operating system to command spacecraft operations). It presents an overview of this software and then pays particular attention to the aspects of software design that enable onboard autonomy. It also discusses the messaging scheme that is used onboard and the testing and validation plan. Finally, it discusses system extensibility, before concluding.


Nanosatellite Scheduling Using A Dictionary Module And A ‘Useful Trick’ With Coded Unsigned Integers, Monilito Castro, Jeremy Straub Mar 2015

Nanosatellite Scheduling Using A Dictionary Module And A ‘Useful Trick’ With Coded Unsigned Integers, Monilito Castro, Jeremy Straub

Jeremy Straub

Schedulers for small spacecraft must satisfy the dual requirement of generating very efficient schedules while concurrently minimizing the resources required to create the schedule. This paper proposes a technique for searching for tasks that can be utilized to fill particular schedule locations. This approach is based on a modular system for storing important variables. This modular system has three important variables: t0, x0 and y0. The variable y is latitude and x is longitude. Time variable t is an integer and each unit represents a time quantum. They are related to each other by three functions Ft, Fx, and Fy. …


Swarm Intelligence, A Blackboard Architecture And Local Decision Making For Spacecraft Command, Jeremy Straub Mar 2015

Swarm Intelligence, A Blackboard Architecture And Local Decision Making For Spacecraft Command, Jeremy Straub

Jeremy Straub

Control of a multi-spacecraft constellation is a topic of significant inquiry, at present. This paper presents and evaluates a command architecture for a multi-spacecraft mission. It combines swarm techniques with a decentralized / local decision making architecture (which uses a set of shared blackboards for coordination) and demonstrates the efficacy of this approach. Under this approach, the Blackboard software architecture is used to facilitate data sharing between craft as part of a resilient hierarchy and the swarm techniques are used to coordinate activity. The paper begins with an overview of prior work on the precursor command technologies and then presents …


Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis Mar 2015

Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis

Jeremy Straub

Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.

This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science Department senior design …


Using A Constellation Of Cubesats For In-Space Optical 3d Scanning, Jeremy Straub Mar 2015

Using A Constellation Of Cubesats For In-Space Optical 3d Scanning, Jeremy Straub

Jeremy Straub

The assessment of in-space objects is an area of ongoing research. Characterization of resident space objects (RSOs) can be useful for assessing the operating status of operator-affiliated or non-affiliated space assets, identifying unknown objects or gathering additional details for known objects. Under the proposed approach, a ring-like constellation of CubeSats passes around the target (at a distance) collecting imagery. This imagery is then utilized to create a 3D model of the target. This paper considers several key elements of a constellation to perform this type of imaging, including the constellation design and imaging capabilities required and the astrodynamics relevant to …


The Symbiotic Relationship Between Information Retrieval And Informetrics, Dietmar Wolfram Jan 2015

The Symbiotic Relationship Between Information Retrieval And Informetrics, Dietmar Wolfram

Dietmar Wolfram

Informetrics and information retrieval (IR) represent fundamental areas of study within information science. Historically, researchers have not fully capitalized on the potential research synergies that exist between these two areas. Data sources used in traditional informetrics studies have their analogues in IR, with similar types of empirical regularities found in IR system content and use. Methods for data collection and analysis used in informetrics can help to inform IR system development and evaluation. Areas of application have included automatic indexing, index term weighting and understanding user query and session patterns through the quantitative analysis of user transaction logs. Similarly, developments …


Intelligent Water Drops Algorithm For Coordinating Between Cluster Spacecraft In A Communications-Denied Environment, Jeremy Straub Jan 2015

Intelligent Water Drops Algorithm For Coordinating Between Cluster Spacecraft In A Communications-Denied Environment, Jeremy Straub

Jeremy Straub

This paper presents a modification of Shah-Hosseini’s Intelligent Water Drops (IWD) technique that can be utilized for collaborative control of multiple spacecraft in environments where communications are limited, intermittent or denied. It presents Shah- Hosseini’s base IWD algorithm as well as refinements thereof, which simplify it, making it more suitable for more computationally constrained environments (such as small spacecraft and UAVs). A framework for testing the proposed approach as well as several implementation impediments are discussed.


Inżynieria Chemiczna Ćw., Wojciech M. Budzianowski Jan 2015

Inżynieria Chemiczna Ćw., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Tematyka Prac Doktorskich, Wojciech M. Budzianowski Jan 2015

Tematyka Prac Doktorskich, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub Nov 2014

The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub

Jeremy Straub

A multi-tier architecture is under development (with similar craft heterogeneity to Fink's work on ‘tier scalable’ missions) which will facilitate autonomous local control of multiple heterogeneous craft. This mission architecture has been developed with a Mars mission in mind and has included CubeSats in a variety of critical mission roles.

Two concepts will be presented: the addition of CubeSats to a larger-scale multi-tier mission, where the CubeSats serve a supporting role and a mission driven by CubeSat orbital capabilities. In the first, CubeSats are utilized to augment the area of spatial coverage that can be obtained and the temporal coverage …


Hacking Back: Not The Right Solution, Emilio Iasiello Nov 2014

Hacking Back: Not The Right Solution, Emilio Iasiello

Emilio Iasiello

In cyberspace attackers enjoy an advantage over defenders, which has popularized the concept of “active cyber defense”— offensive actions intended to punish or deter the adversary. This article argues active cyber defense is not a practical course of action to obtain tactical and strategic objectives. Instead, “aggressive cyber defense,” a proactive security solution, is a more appropriate option.


Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv Nov 2014

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

Publicly posted URLs may contain a wealth of information about the identities and activities of the users who share them. URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. While often benign and necessary to render the web page, query strings sometimes contain tracking mechanisms, user names, email addresses, and other information that users may not wish to publicly reveal. In isolation this is not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted from web …


Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi Oct 2014

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi

Andrew G. West

Using runtime execution artifacts to identify malware and its associated "family" is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics this analysis produces are often circumvented by subsequent malware authors.

To this end we propose CHATTER, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse …


Ocena Wpływu Rozdzielczości Siatki Obliczeniowej Na Wyniki Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu, Mateusz Rzeszutek, Robert Oleniacz, Marian Mazur Oct 2014

Ocena Wpływu Rozdzielczości Siatki Obliczeniowej Na Wyniki Modelowania Rozprzestrzeniania Się Zanieczyszczeń W Powietrzu, Mateusz Rzeszutek, Robert Oleniacz, Marian Mazur

Robert Oleniacz

In this study are presented the results of the assessment of the impact of grid resolution on the results of computational modeling of the dispersion of air pollutants. Calculations were performed using Gaussian, non-stationary puff model CALPUFF. Four different grids resolution were analyzed. Networks were established on the basis of SRTM3 terrain and land cover classes of CLC, 2006. Analysis of results of spatial distribution of concentrations of air pollutants obtained in a regular computing grid was performed using statistical indicators recommended by the U.S. EPA. The study shows the applicability of particular computational grids in the system modeling transport …


Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh Oct 2014

Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh

R. W. Hndoosh

This work provides mathematical formulas and algorithm in order to calculate the derivatives that being necessary to perform Steepest Descent models to make T1 and T2 FLSs much more accessible to FLS modelers. It provides derivative computations that are applied on different kind of MFs, and some computations which are then clarified for specific MFs. We have learned how to model T1 FLSs when a set of training data is available and provided an application to derive the Steepest Descent models that depend on trigonometric function (SDTFM). This work, also focused on an interval type-2 non-singleton type-2 FLS (IT2 NS-T2 …


Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh Oct 2014

Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh

R. W. Hndoosh

The main objective of this model is to focus on how to use the model of fuzzy system to solve fuzzy mathematics problems. Some mathematical models based on fuzzy set theory, fuzzy systems and neural network techniques seem very well suited for typical technical problems. We have proposed an extension model of a fuzzy system to N-dimension, using Mamdani's minimum implication, the minimum inference system, and the singleton fuzzifier with the center average defuzzifier. Here construct two different models namely a fuzzy inference system and an adaptive fuzzy system using neural network. We have extended the theorem for accuracy of …


Fuzzy Mathematical Model For Detection Of Lung Cancer Using A Multi-Nfclass With Confusion Fuzzy Matrix For Accuracy, R.W. W. Hndoosh Sep 2014

Fuzzy Mathematical Model For Detection Of Lung Cancer Using A Multi-Nfclass With Confusion Fuzzy Matrix For Accuracy, R.W. W. Hndoosh

R. W. Hndoosh

and detection of lung cancer data. This model depends on a generic model of a fuzzy perceptron, which can be used to derive a neural fuzzy system for specific domains. The multi neuron-fuzzy classification (Multi-NFClass) model proposed that uses input, hidden layers, output, and subclasses that have a multitude in each class. This model derives fuzzy rules to classify patterns into a number of crisp classes. Firstly, an attempt is made to describe fuzzy if–then rules, and construction of the fuzzy if–then rule, that are determined by the simple steps when its antecedent fuzzy sets are specified by genetic operations, …


Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess Aug 2014

Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess

M Ryan Hess

DePaul University Library will share its lessons learned and recommendations for hosted CONTENTdm 6 administrators wishing to customize CONTENTdm in a way that strikes the right balance between default CONTENTdm sites and sites that stand out and better serve our unique audiences. The DePaul University Library has learned many lessons from customizing its hosted instance of CONTENTdm 6, including the use of jQuery to add interface enhancements and remove some native CONTENTdm features. Unfortunately, this did not prove a long-term solution due to some limitations of CONTENTdm’s built-in customization tools, leading to content management issues and bugs that were hard …


Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim Aug 2014

Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim

Andrew G. West

Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static and dynamic techniques to alleviate such threats. Building on this existing literature, this work introduces the design and evaluation of ADAM, a system that uses machine-learning over network metadata derived from the sandboxed execution of webpage content. ADAM aims to detect malicious webpages and identify the nature of those vulnerabilities using a simple set of features. Machine-trained models are not novel in this problem space. Instead, it is the dynamic network artifacts (and their subsequent feature representations) collected during rendering that …


Mathematical Structure Of Fuzzy Modeling Of Medical Diagnoses By Using Clustering Models, R.W. W. Hndoosh Aug 2014

Mathematical Structure Of Fuzzy Modeling Of Medical Diagnoses By Using Clustering Models, R.W. W. Hndoosh

R. W. Hndoosh

An Adaptive-Network-based Fuzzy Inference System ANFIS with different techniques of clustering is successfully developed to solve one of the problems of medical diagnoses, because it has the advantage of powerful modeling ability. In this paper, we propose the generation of an adaptive neuro-Fuzzy Inference System model using different clustering models such as a subtractive fuzzy clustering (SFC) model and a fuzzy c-mean clustering (FCM) model in the Takagi-Sugeno (TS) fuzzy model for selecting the hidden node centers. An experimental result on datasets of medical diagnoses shows the proposed model with two models of clustering (ANFIS-SFC & ANFIS-FCM) while comparing the …


A General Framework For Uncertainty Propagation Based On Point Estimate Methods, René Schenkendorf Jul 2014

A General Framework For Uncertainty Propagation Based On Point Estimate Methods, René Schenkendorf

René Schenkendorf

A general framework to approach the challenge of uncertainty propagation in model based prognostics is presented in this work. It is shown how the so-called Point Estimate Meth- ods (PEMs) are ideally suited for this purpose because of the following reasons: 1) A credible propagation and represen- tation of Gaussian (normally distributed) uncertainty can be done with a minimum of computational effort for non-linear applications. 2) Also non-Gaussian uncertainties can be prop- agated by evaluating suitable transfer functions inherently. 3) Confidence intervals of simulation results can be derived which do not have to be symmetrically distributed around the mean value …


Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen Jul 2014

Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen

Andrew G. West

Networked machines serving as binary distribution points, C&C channels, or drop sites are a ubiquitous aspect of malware infrastructure. By sandboxing malcode one can extract the network endpoints (i.e., domains and URL paths) contacted during execution. Some endpoints are benign, e.g., connectivity tests. Exclusively malicious destinations, however, can serve as signatures enabling network alarms. Often these behavioral distinctions are drawn by expert analysts, resulting in considerable cost and labeling latency.

Leveraging 28,000 expert-labeled endpoints derived from ~100k malware binaries this paper characterizes those domains/URLs towards prioritizing manual efforts and automatic signature generation. Our analysis focuses on endpoints' static metadata properties …