Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (65)
- Computer security (5)
- Management Information Systems (5)
- Anti-virus (4)
- Anti-virus software (4)
-
- Computer Anti-Virus (4)
- Computer virus (4)
- Open Orbiter Project (4)
- Small Spacecraft (4)
- Virus detection (4)
- Virus scanning (4)
- Anti-virus design (3)
- Computer vulnerability (3)
- CubeSat (3)
- DSS (3)
- Heuristic scanning (3)
- Information systems (3)
- Innovation (3)
- Inventive Problem Solving (3)
- Management information system (3)
- Software Engineering (3)
- TRIZ (3)
- AI Decision Making (2)
- Anti-virus development (2)
- Artificial Intelligence & Robotic Control (2)
- Computer and Software (2)
- ES (2)
- Emulation (2)
- GUI (2)
- Graphical User Interface (2)
- Publication Year
- Publication
Articles 1 - 30 of 104
Full-Text Articles in Computer Sciences
Is Anti-Virus A Necessary Evil?, Umakant Mishra
Is Anti-Virus A Necessary Evil?, Umakant Mishra
Umakant Mishra
While everybody is becoming more and more dependent on computers there are some unscrupulous people who continuously try to misuse the technology and get illegal and illegitimate benefit out of this sophisticated environment. Today the Internet is like a busy street or open market place where you find almost everything you want. As there are some obvious risks when you stand or move in a busy street such as you are likely to be pick pocketed or cheated or even knocked out by a rash driving vehicle. Similar threats loom over the head of a user when he is exposed …
Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra
Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra
Umakant Mishra
Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.
There are many input/output devices like mouse, keyboard, pointers, and touch screens …
Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg
Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg
Muhammad Imran
We present AIDR (Artificial Intelligence for Disaster Response), a platform designed to perform automatic classification of crisis-related microblog communications. AIDR enables humans and machines to work together to apply human intelligence to large-scale data at high speed. The objective of AIDR is to classify messages that people post during disasters into a set of user-defined categories of information (e.g., "needs", "damage", etc.) For this purpose, the system continuously ingests data from Twitter, processes it (i.e., using machine learning classification techniques) and leverages human-participation (through crowdsourcing) in real-time. AIDR has been successfully tested to classify informative vs. non-informative tweets posted during …
Phone And Web Based Clicker Project, Nick Renford, Jeremy Straub, Scott Kerlin
Phone And Web Based Clicker Project, Nick Renford, Jeremy Straub, Scott Kerlin
Jeremy Straub
The goal of this project is to create an interface for Android,
iOS, and Windows Phone smartphones, as well as a web
interface that will act as a “clicker”. The
instructors will be able to send out questions, and the
students will be able to answer the questions, and get
feedback if the instructor wants them to have it. The teacher
can decide whether the feedback is instant or manually
initiated, and what format the response will be, whether it
includes the correct answer, and what type of chart, if any,
indicating the most commonly selected answer(s). There
will be …
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Umakant Mishra
Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.
Marick Test Matrix, Alan Ridlehoover
Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin
Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin
Jeremy Straub
The Testing and Integration Team plays an integral role in the development of the open source CubeSat known as Open Orbiter. Like any project, the Testing Team’s project can benefit from structure and management to effectively utilize it’s time and resources. CSCI 297 teaches the skills needed to turn a good idea into successful endeavor. By applying skills such as effective planning, setting milestones, dealing with changes and supervising to an actual project, Open Orbiter has transformed from a pipe dream to a real, obtainable goal. Doing this has turned learning about project management into more that just power points …
Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh
Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh
Jeremy Straub
The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
Introduction To Management Information System, Umakant Mishra
Introduction To Management Information System, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.
MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
Umakant Mishra
As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.
Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Umakant Mishra
During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …
Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub
Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub
Jeremy Straub
Small spacecraft operating outside of Earth orbit are significantly constrained by the communica- tions link available to them. This is particularly true for stand-alone craft that must rely on their own antenna and transmission systems (for which gain and available power generation are limited by form factor); it is also applicable to ‘hitchhiker’-style missions which may be able to utilize (quite likely very limited amounts of) time on the primary spacecraft’s communications equip- ment for long-haul transmission.
This poster presents the adaptation of the Model-Based Transmission Reduction (MBTR) frame- work’s Model-Based Data Analysis (MBDA) component for use on an interplanetary …
Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra
Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra
Umakant Mishra
False positives are equally dangerous as false negatives. Ideally the false positive rate should remain 0 or very close to 0. Even a slightest increase in false positive rate is considered as undesirable.
Although the specific methods provide very accurate scanning by comparing viruses with their exact signatures, they fail to detect the new and unknown viruses. On the other hand the generic methods can detect even new viruses without using virus signatures. But these methods are more likely to generate false positives. There is a positive correlation between the capability to detect new and unknown viruses and false positive …
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
Jeremy Straub
A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …
Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant
Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant
Jeremy Straub
Small satellites with their limited computational capabilities require that software engineering techniques promote efficient use of spacecraft resources. A model-driven approach to software engineering is an excellent solution to this resource maximization challenge as it facilitates visualization of the key solution processes and data elements.
The software engineering process utilized for the OpenOrbiter spacecraft, which is a remote sensing technology demonstrator, is presented. Key challenges presented by the Open Orbiter project included concurrent operation and tasking of five computer-on-module (COM) units and a flight computer and the associated data marshaling between local and general storage. The payload processing system (consisting …
An Effective End-User Development Approach Through Domain-Specific Mashups For Research Impact Evaluation. (Executive Summary), Muhammad Imran
An Effective End-User Development Approach Through Domain-Specific Mashups For Research Impact Evaluation. (Executive Summary), Muhammad Imran
Muhammad Imran
Over the last decade, there has been growing interest in the assessment of the performance of researchers, research groups, universities and even countries. The assessment of productivity is an instrument to select and promote personnel, assign research grants and measure the results of research projects. One particular assessment approach is bibliometrics i.e., the quantitative analysis of scientific publications through citation and content analysis. However, there is little consensus today on how research evaluation should be performed, and it is commonly acknowledged that the quantitative metrics available today are largely unsatisfactory. The process is very often highly subjective, and there are …
Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David Allison, Miriam A M Capretz, Hany Elyamany, Shuying Wang
Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David Allison, Miriam A M Capretz, Hany Elyamany, Shuying Wang
Miriam A M Capretz
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and inte-gration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that out-line what can …
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Jeremy Straub
No abstract provided.
Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk
Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk
Jeremy Straub
No abstract provided.
5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University
5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
The Short Story In Jordan Its Origin And Development, Philadelphia University
The Short Story In Jordan Its Origin And Development, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
An Approach For Crosscutting Concern Identification At Requirements Level Using Nlp, Zarinah Mohd. Kasirun Assoc. Prof.
An Approach For Crosscutting Concern Identification At Requirements Level Using Nlp, Zarinah Mohd. Kasirun Assoc. Prof.
Zarinah Mohd. Kasirun Assoc. Prof.
Poor requirements analysis process results in incomplete software applications. Some requirements appear as scattered and tangled concerns within requirements document. Hence it is difficult to identify such requirements. A number of research approaches such as Theme/Doc, early aspects identification, information retrieval and aspects identification using UML have been developed to identify crosscutting concern at the requirements level. Nevertheless, these approaches are only supported by semiautomated tools whereby human intervention is required to achieve the desired results. This research focuses on developing a tool to automatically identify crosscutting concern at the requirements level. A model based on Theme/Doc and early aspects …
Measuring Intellectual Capital In Corporations, Philadelphia University
Measuring Intellectual Capital In Corporations, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
Philadelphia University, Jordan
No abstract provided.