Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 104

Full-Text Articles in Computer Sciences

Is Anti-Virus A Necessary Evil?, Umakant Mishra May 2014

Is Anti-Virus A Necessary Evil?, Umakant Mishra

Umakant Mishra

While everybody is becoming more and more dependent on computers there are some unscrupulous people who continuously try to misuse the technology and get illegal and illegitimate benefit out of this sophisticated environment. Today the Internet is like a busy street or open market place where you find almost everything you want. As there are some obvious risks when you stand or move in a busy street such as you are likely to be pick pocketed or cheated or even knocked out by a rash driving vehicle. Similar threats loom over the head of a user when he is exposed …


Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra May 2014

Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.

There are many input/output devices like mouse, keyboard, pointers, and touch screens …


Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg Apr 2014

Aidr: Artificial Intelligence For Disaster Response, Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, Sarah Vieweg

Muhammad Imran

We present AIDR (Artificial Intelligence for Disaster Response), a platform designed to perform automatic classification of crisis-related microblog communications. AIDR enables humans and machines to work together to apply human intelligence to large-scale data at high speed. The objective of AIDR is to classify messages that people post during disasters into a set of user-defined categories of information (e.g., "needs", "damage", etc.) For this purpose, the system continuously ingests data from Twitter, processes it (i.e., using machine learning classification techniques) and leverages human-participation (through crowdsourcing) in real-time. AIDR has been successfully tested to classify informative vs. non-informative tweets posted during …


Phone And Web Based Clicker Project, Nick Renford, Jeremy Straub, Scott Kerlin Mar 2014

Phone And Web Based Clicker Project, Nick Renford, Jeremy Straub, Scott Kerlin

Jeremy Straub

The goal of this project is to create an interface for Android,

iOS, and Windows Phone smartphones, as well as a web

interface that will act as a “clicker”. The

instructors will be able to send out questions, and the

students will be able to answer the questions, and get

feedback if the instructor wants them to have it. The teacher

can decide whether the feedback is instant or manually

initiated, and what format the response will be, whether it

includes the correct answer, and what type of chart, if any,

indicating the most commonly selected answer(s). There

will be …


Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash Mar 2014

Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash

Umakant Mishra

Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.


Marick Test Matrix, Alan Ridlehoover Jan 2014

Marick Test Matrix, Alan Ridlehoover

Alan Ridlehoover

No abstract provided.


Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin Dec 2013

Testing And Integration Team Project Management, Tyler Leben, Jeremy Straub, Scott Kerlin

Jeremy Straub

The Testing and Integration Team plays an integral role in the development of the open source CubeSat known as Open Orbiter. Like any project, the Testing Team’s project can benefit from structure and management to effectively utilize it’s time and resources. CSCI 297 teaches the skills needed to turn a good idea into successful endeavor. By applying skills such as effective planning, setting milestones, dealing with changes and supervising to an actual project, Open Orbiter has transformed from a pipe dream to a real, obtainable goal. Doing this has turned learning about project management into more that just power points …


Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh Dec 2013

Software For Openorbiter, Christoffer Korvald, Jeremy Straub, Scott Kerlin, Ronald Marsh

Jeremy Straub

The software development effort for the OpenOrbiter project consists of four teams: operating software development, payload software development, ground station software development and testing. These teams are designing and developing the software required to create a turn-key spacecraft design1 which can be produced at a price point of under USD $5,000 by faculty, students and researchers world-wide2. Through this process, students are gaining valuable real-world experience3,4 in areas of indicated interest5. Each team is headed by a team lead who is responsible for conducting weekly meetings and organizing the activities of the team. During the Fall, 2013 semester, team leads …


Designing An Mis Database For Selection And Recruitment, Umakant Mishra Sep 2013

Designing An Mis Database For Selection And Recruitment, Umakant Mishra

Umakant Mishra

Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.

This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …


Introduction To Management Information System, Umakant Mishra Aug 2013

Introduction To Management Information System, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.


Management Information Systems Vs. Other Information Systems, Umakant Mishra Aug 2013

Management Information Systems Vs. Other Information Systems, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.

MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …


How To Implement Access Rights In An Mis Project, Umakant Mishra Aug 2013

How To Implement Access Rights In An Mis Project, Umakant Mishra

Umakant Mishra

The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …


How Do Viruses Attack Anti-Virus Programs, Umakant Mishra Jul 2013

How Do Viruses Attack Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.

Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …


Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra Jul 2013

Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra

Umakant Mishra

During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …


Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub Jun 2013

Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub

Jeremy Straub

Small spacecraft operating outside of Earth orbit are significantly constrained by the communica- tions link available to them. This is particularly true for stand-alone craft that must rely on their own antenna and transmission systems (for which gain and available power generation are limited by form factor); it is also applicable to ‘hitchhiker’-style missions which may be able to utilize (quite likely very limited amounts of) time on the primary spacecraft’s communications equip- ment for long-haul transmission.

This poster presents the adaptation of the Model-Based Transmission Reduction (MBTR) frame- work’s Model-Based Data Analysis (MBDA) component for use on an interplanetary …


Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra May 2013

Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra

Umakant Mishra

False positives are equally dangerous as false negatives. Ideally the false positive rate should remain 0 or very close to 0. Even a slightest increase in false positive rate is considered as undesirable.

Although the specific methods provide very accurate scanning by comparing viruses with their exact signatures, they fail to detect the new and unknown viruses. On the other hand the generic methods can detect even new viruses without using virus signatures. But these methods are more likely to generate false positives. There is a positive correlation between the capability to detect new and unknown viruses and false positive …


A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub Mar 2013

A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub

Jeremy Straub

A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …


Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant Mar 2013

Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant

Jeremy Straub

Small satellites with their limited computational capabilities require that software engineering techniques promote efficient use of spacecraft resources. A model-driven approach to software engineering is an excellent solution to this resource maximization challenge as it facilitates visualization of the key solution processes and data elements.

The software engineering process utilized for the OpenOrbiter spacecraft, which is a remote sensing technology demonstrator, is presented. Key challenges presented by the Open Orbiter project included concurrent operation and tasking of five computer-on-module (COM) units and a flight computer and the associated data marshaling between local and general storage. The payload processing system (consisting …


An Effective End-User Development Approach Through Domain-Specific Mashups For Research Impact Evaluation. (Executive Summary), Muhammad Imran Jan 2013

An Effective End-User Development Approach Through Domain-Specific Mashups For Research Impact Evaluation. (Executive Summary), Muhammad Imran

Muhammad Imran

Over the last decade, there has been growing interest in the assessment of the performance of researchers, research groups, universities and even countries. The assessment of productivity is an instrument to select and promote personnel, assign research grants and measure the results of research projects. One particular assessment approach is bibliometrics i.e., the quantitative analysis of scientific publications through citation and content analysis. However, there is little consensus today on how research evaluation should be performed, and it is commonly acknowledged that the quantitative metrics available today are largely unsatisfactory. The process is very often highly subjective, and there are …


Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David Allison, Miriam A M Capretz, Hany Elyamany, Shuying Wang Jan 2012

Privacy Protection Framework With Defined Policies For Service-Oriented Architecture, David Allison, Miriam A M Capretz, Hany Elyamany, Shuying Wang

Miriam A M Capretz

Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and inte-gration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that out-line what can …


Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk Jan 2012

Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk

Jeremy Straub

No abstract provided.


Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk Jan 2012

Payload Software, Christoffer Korvald, Jeremy Straub, Atif Mohammad, Josh Berk

Jeremy Straub

No abstract provided.


5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University Jan 2012

5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


The Short Story In Jordan Its Origin And Development, Philadelphia University Jan 2012

The Short Story In Jordan Its Origin And Development, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


An Approach For Crosscutting Concern Identification At Requirements Level Using Nlp, Zarinah Mohd. Kasirun Assoc. Prof. Jan 2011

An Approach For Crosscutting Concern Identification At Requirements Level Using Nlp, Zarinah Mohd. Kasirun Assoc. Prof.

Zarinah Mohd. Kasirun Assoc. Prof.

Poor requirements analysis process results in incomplete software applications. Some requirements appear as scattered and tangled concerns within requirements document. Hence it is difficult to identify such requirements. A number of research approaches such as Theme/Doc, early aspects identification, information retrieval and aspects identification using UML have been developed to identify crosscutting concern at the requirements level. Nevertheless, these approaches are only supported by semiautomated tools whereby human intervention is required to achieve the desired results. This research focuses on developing a tool to automatically identify crosscutting concern at the requirements level. A model based on Theme/Doc and early aspects …


Measuring Intellectual Capital In Corporations, Philadelphia University Jan 2011

Measuring Intellectual Capital In Corporations, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University Jan 2011

Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University Jan 2011

Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University Jan 2011

Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University Jan 2011

تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University

Philadelphia University, Jordan

No abstract provided.