Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Engineering

A Survey On Software Cost Estimation Techniques, Sai Mohan Reddy Chirra, Hassan Reza Jun 2019

A Survey On Software Cost Estimation Techniques, Sai Mohan Reddy Chirra, Hassan Reza

Computer Science Faculty Publications

The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a very much essential task. This paper presents a systematic review of different models used for software cost estimation which includes algorithmic methods, non-algorithmic methods and learning-oriented methods. The models considered in this review include both the traditional and the recent approaches for software cost estimation. The main objective of this paper is to provide an overview of software cost estimation models and summarize their …


Toward The Design And Implementation Of Traceability Engineering Tool Support, Subik Pokharel, Hassan Reza Jan 2019

Toward The Design And Implementation Of Traceability Engineering Tool Support, Subik Pokharel, Hassan Reza

Computer Science Faculty Publications

Requirements of a system keep on changing based on the need of stakeholders or the system developers, making requirement engineering an important aspect in software development. This develops a need for appropriate requirement change management. The importance of requirements traceability is defining relationships between the requirements and artefacts extracted by the stakeholder during the software development life-cycle and gives vital information to encourage software understanding. In this paper, we have concentrated on developing a tool for requirement traceability that can be used to extend the requirement elicitation and identification of system-wide qualities using the notion of quality attribute scenarios to …


Containers And Reproducibility In Scientific Research, Sara Faraji Jalal Apostal, David Apostal, Ronald Marsh Oct 2018

Containers And Reproducibility In Scientific Research, Sara Faraji Jalal Apostal, David Apostal, Ronald Marsh

Computer Science Faculty Publications

Numerical reproducibility has received increased emphasis in the scientific community. One reason that makes scientific research difficult to repeat is that different computing platforms calculate mathematical operations differently. Software containers have been shown to improve reproducibility in some instances and provide a convenient way to deploy applications in a variety of computing environments. However, there are software patterns or idioms that produce inconsistent results because mathematical operations are performed in different orders in different environments resulting in reproducibility errors. The performance of software in containers and the performance of software that improves numeric reproducibility may be of concern for some …


Image Zooming Using Corner Matching, Ronald Marsh, Md Nurul Amin, Charles Crandall, Raymond Davis Oct 2018

Image Zooming Using Corner Matching, Ronald Marsh, Md Nurul Amin, Charles Crandall, Raymond Davis

Computer Science Faculty Publications

This work was intended to direct the choice of an image interpolation/zoom algorithm for use in UND’s Open Prototype for Educational Nanosats (OPEN) satellite program. Whether intended for a space-borne platform or a balloon-borne platform, we expect to use a low cost camera (Raspberry Pi) and expect to have very limited bandwidth for image transmission. However, the technique developed could be used for any imaging application. The approach developed analyzes overlapping 3x3 blocks of pixels looking for “L” patterns that suggest the center pixel should be changed such that a triangle pattern results. We compare this approach against different types …


Developing A New Storage Format And A Warp-Based Spmv Kernel For Configuration Interaction Sparse Matrices On The Gpu†, Mohammed Mahmoud, Mark Hoffmann, Hassan Reza Aug 2018

Developing A New Storage Format And A Warp-Based Spmv Kernel For Configuration Interaction Sparse Matrices On The Gpu†, Mohammed Mahmoud, Mark Hoffmann, Hassan Reza

Computer Science Faculty Publications

Sparse matrix-vector multiplication (SpMV) can be used to solve diverse-scaled linear systems and eigenvalue problems that exist in numerous, and varying scientific applications. One of the scientific applications that SpMV is involved in is known as Configuration Interaction (CI). CI is a linear method for solving the nonrelativistic Schrödinger equation for quantum chemical multi-electron systems, and it can deal with the ground state as well as multiple excited states. In this paper, we have developed a hybrid approach in order to deal with CI sparse matrices. The proposed model includes a newly-developed hybrid format for storing CI sparse matrices on …


Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant Jul 2018

Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant

Computer Science Faculty Publications

The use of domain-specific modeling languages and associated methodologies, provide support in application domain where the safe and reliable operations of the systems are of paramount importance to the users and organizations, and wherein the domains are well understood and documented. One such area of domain-specific modeling application is in the field of avionic systems. For software systems to be used onboard aircrafts they must be certified, and as such certification protocols have been established for developing these safety-critical systems. These established protocols are usually represented as textual documents and inherently are difficult to apply directly in software development environments. …


Detecting Wildlife In Unmanned Aerial Systems Imagery Using Convolutional Neural Networks Trained With An Automated Feedback Loop, Connor Bowley, Marshall Bowley, Andrew Barnas, Susan Ellis-Felege, Travis Desell Jun 2018

Detecting Wildlife In Unmanned Aerial Systems Imagery Using Convolutional Neural Networks Trained With An Automated Feedback Loop, Connor Bowley, Marshall Bowley, Andrew Barnas, Susan Ellis-Felege, Travis Desell

Computer Science Faculty Publications

Using automated processes to detect wildlife in uncontrolled outdoor imagery in the field of wildlife ecology is a challenging task. This is especially true in imagery provided by an Unmanned Aerial System (UAS), where the relative size of wildlife is small and visually similar to its background. This work presents an automated feedback loop which can be used to train convolutional neural networks with extremely unbalanced class sizes, which alleviates some of these challenges. This work utilizes UAS imagery collected by the Wildlife@Home project, which has employed citizen scientists and trained experts to go through collected UAS imagery and classify …


G-Code Modeling For 3d Printer Quality Assessment, Tyler Welander, Ronald Marsh, Md Nurul Amin Jan 2018

G-Code Modeling For 3d Printer Quality Assessment, Tyler Welander, Ronald Marsh, Md Nurul Amin

Computer Science Faculty Publications

The Department of Computer Science at the University of North Dakota (UND) has been evaluating optical/imaging methods for measuring the quality of 3D printed parts. In particular, we are interested in optical/imaging methods that can detect and measure such quality issues as layer shifting, layer separation and splitting, overheating, dimensional accuracy, and infill errors. This paper describes our work towards the analysis of infill errors as the quality of the infill does impact the structural integrity of the part being made. Externally, a part may look acceptable, but if the infill is faulty the part may be structurally unsound. Furthermore, …


Pedagogical Benefits From An Exercise In Reverse Engineering For An Aviation Software Systems, Emanuel S. Grant, Pann Ajjimaporn Jan 2018

Pedagogical Benefits From An Exercise In Reverse Engineering For An Aviation Software Systems, Emanuel S. Grant, Pann Ajjimaporn

Computer Science Faculty Publications

Since the Y2K crisis, reverse engineering has become a major area of work in industrial software application development, but lacks emphasis in US academia. This issue is exemplified by the high demand for software systems in new and expanding software application areas, which has resulted in systems being implemented before the requirements and design phases have been completed. Towards the maintenance of such systems, it is necessary to conducted reverse engineering for the derivation of software documentation for requirements and high-level and low-level design. When this scenario exists in the domain of safety-critical system, particularly in the aviation industry, reverse …


Toward Quality Attribute Driven Approach To Software Architectural Design, Payel Bajpayee, Hassan Reza Jun 2017

Toward Quality Attribute Driven Approach To Software Architectural Design, Payel Bajpayee, Hassan Reza

Computer Science Faculty Publications

It has been well-documented that the software architecture of any system plays a critical role in success or failure of software intensive systems. In this paper, a method has been proposed to evaluate the software architecture’s fitness with respect to key quality attributes for a web-based system. To the end, a comparative analysis based on quality attributes scenarios and tactics is carried out to select an optimal software architecture that meets the system level requirements of a web-based system, namely, Student and Course Evaluation System (SCES). The comparative study was driven by study of quality attributes and tactics with the …


A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza Oct 2016

A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza

Computer Science Faculty Publications

This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible security issues and how they can be addressed. Finally, a comparison of the major security issues in each architecture is presented to help determine which is most adaptable to meet the security needs of cyber-physical systems in healthcare.


Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane Jul 2016

Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane

Computer Science Faculty Publications

Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized …


A Blackboard-Style Decision-Making System For Multi-Tier Craft Control And Its Evaluation, Jeremy Straub, Hassan Reza Apr 2015

A Blackboard-Style Decision-Making System For Multi-Tier Craft Control And Its Evaluation, Jeremy Straub, Hassan Reza

Computer Science Faculty Publications

This article presents an approach for decision-making in support of the control of an autonomous system of multiple tiers of robots (e.g., satellite, aerial and ground) based on the Blackboard architectural style. Under the proposed approach, the system evaluates prospective approaches for goal satisfaction (identified by user selected final rules), identifies the lowest-cost solution and determines the best path to achieving the goal, via the analysis of the Blackboard rule and action set. Two different approaches to this rule and action path generation are discussed. This article presents the proposed Blackboard-style architecture for autonomous multi-tier control and describes its implementation. …


Mapping Aadl To Petri Net Tool-Sets Using Pnml Framework, Hassan Reza, Amrita Chatterjee Oct 2014

Mapping Aadl To Petri Net Tool-Sets Using Pnml Framework, Hassan Reza, Amrita Chatterjee

Computer Science Faculty Publications

Architecture Analysis and Design Language (AADL) has been utilized to specify and verify non- functional properties of Real-Time Embedded Systems (RTES) used in critical application systems. Examples of such critical application systems include medical devices, nuclear power plants, aer- ospace, financial, etc. Using AADL, an engineer is enable to analyze the quality of a system. For example, a developer can perform performance analysis such as end-to-end flow analysis to guarantee that system components have the required resources to meet the timing requirements relevant to their communications. The critical issue related to developing and deploying safety critical systems is how to …


The Use Of The Blackboard Architecture For A Decision Making System For The Control Of Craft With Various Actuator And Movement Capabilities, Jeremy Straub, Hassan Reza Jun 2014

The Use Of The Blackboard Architecture For A Decision Making System For The Control Of Craft With Various Actuator And Movement Capabilities, Jeremy Straub, Hassan Reza

Computer Science Faculty Publications

This paper provides an overview of an approach to the control of multiple craft with heterogeneous movement and actuation characteristics that is based on the Blackboard software architecture. An overview of the Blackboard architecture is provided. Then, the operational and mission requirements that dictate the need for autonomous control are characterized and the utility of the Blackboard architecture is for meeting these requirements is discussed. The performance of a best-path solver and naïve solver are compared. The results demonstrate that the best-path solver outperforms the naïve solver in the amount of time taken to generate a solution, however, the number …


Information Technology Systems And Services, Doris Bornhoeft Jan 2008

Information Technology Systems And Services, Doris Bornhoeft

UND Departmental Histories

This departmental history was written on the occasion of the UND Quasquicentennial in 2008.


Information Systems And Business Education, University Of North Dakota Jan 2008

Information Systems And Business Education, University Of North Dakota

UND Departmental Histories

This departmental history was written on the occasion of the UND Quasquicentennial in 2008.


Computer Science, Don Varvel Jan 1983

Computer Science, Don Varvel

UND Departmental Histories

This departmental history was written on the occasion of the UND Centennial in 1983.