Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Effects Of Stereo And Screen Size On The Legibility Of Three-Dimensional Streamtube Visualization, Jian Chen, Haipeng Cai, Alexander P. Auchus, David H. Laidlaw Dec 2012

Effects Of Stereo And Screen Size On The Legibility Of Three-Dimensional Streamtube Visualization, Jian Chen, Haipeng Cai, Alexander P. Auchus, David H. Laidlaw

Faculty Publications

We report the impact of display characteristics (stereo and size) on task performance in diffusion magnetic resonance imaging (DMRI) in a user study with 12 participants. The hypotheses were that (1) adding stereo and increasing display size would improve task accuracy and reduce completion time, and (2) the greater the complexity of a spatial task, the greater the benefits of an improved display. Thus we expected to see greater performance gains when detailed visual reasoning was required. Participants used dense streamtube visualizations to perform five representative tasks: (1) determine the higher average fractional anisotropy (FA) values between two regions, (2) …


Eliciting A Sensemaking Process From Verbal Protocols Of Reverse Engineers, Adam R. Bryant, Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila Aug 2012

Eliciting A Sensemaking Process From Verbal Protocols Of Reverse Engineers, Adam R. Bryant, Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila

Faculty Publications

A process of sensemaking in reverse engineering was elicited from verbal protocols of reverse engineers as they investigated the assembly code of executable programs. Four participants were observed during task performance and verbal protocols were collected and analyzed from two of the participants to determine their problem-solving states and characterize likely transitions between those states. From this analysis, a high-level process of sensemaking is described which represents hypothesis generation and information-seeking behaviors in reverse engineering within a framework of goal-directed planning. Future work in validation and application of the process is discussed.


The Complexity Of Pebbling In Diameter Two Graphs*, Charles A. Cusack, Timothy Lewis, Daniel Simpson, Samuel Taggart Jul 2012

The Complexity Of Pebbling In Diameter Two Graphs*, Charles A. Cusack, Timothy Lewis, Daniel Simpson, Samuel Taggart

Faculty Publications

Given a simple, connected graph, a pebbling configuration is a function from its vertex set to the nonnegative integers. A pebbling move between adjacent vertices removes two pebbles from one vertex and adds one pebble to the other. A vertex r is said to be reachable from a configuration if there exists a sequence of pebbling moves that places one pebble on r. A configuration is solvable if every vertex is reachable. We prove tight bounds on the number of vertices with two and three pebbles that an unsolvable configuration on a diameter two graph can have in terms of …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Quest Hierarchy For Hyperspectral Face Recognition, David M. Ryer, Trevor J. Bihl, Kenneth W. Bauer Jr., Steven K. Rogers May 2012

Quest Hierarchy For Hyperspectral Face Recognition, David M. Ryer, Trevor J. Bihl, Kenneth W. Bauer Jr., Steven K. Rogers

Faculty Publications

A qualia exploitation of sensor technology (QUEST) motivated architecture using algorithm fusion and adaptive feedback loops for face recognition for hyperspectral imagery (HSI) is presented. QUEST seeks to develop a general purpose computational intelligence system that captures the beneficial engineering aspects of qualia-based solutions. Qualia-based approaches are constructed from subjective representations and have the ability to detect, distinguish, and characterize entities in the environment Adaptive feedback loops are implemented that enhance performance by reducing candidate subjects in the gallery and by injecting additional probe images during the matching process. The architecture presented provides a framework for exploring more advanced integration …


Malware Target Recognition Via Static Heuristics, Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers Feb 2012

Malware Target Recognition Via Static Heuristics, Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers

Faculty Publications

Organizations increasingly rely on the confidentiality, integrity and availability of their information and communications technologies to conduct effective business operations while maintaining their competitive edge. Exploitation of these networks via the introduction of undetected malware ultimately degrades their competitive edge, while taking advantage of limited network visibility and the high cost of analyzing massive numbers of programs. This article introduces the novel Malware Target Recognition (MaTR) system which combines the decision tree machine learning algorithm with static heuristic features for malware detection. By focusing on contextually important static heuristic features, this research demonstrates superior detection results. Experimental results on large …


Computer Aided Geometric Design, Thomas W. Sederberg Jan 2012

Computer Aided Geometric Design, Thomas W. Sederberg

Faculty Publications

This semester is the twenty-fourth time I have taught a course at Brigham Young University titled, "Computer Aided Geometric Design." When I first taught such a course in 1983, the field was young enough that no textbook covered everything that I wanted to teach, and so these notes evolved. The field now has matured to the point that several semesters worth of valuable material could be compiled. These notes, admittedly biased towards my own interests, reflect my personal preferences as to which of that material is most beneficial to students in an introductory course. I welcome anyone who has an …


Testing The Effectiveness Of Lecture Capture Technology Using Prior Gpa As A Performance Indicator, Michael D. Stroup, Michael M. Pickard, Korey E. Kahler Jan 2012

Testing The Effectiveness Of Lecture Capture Technology Using Prior Gpa As A Performance Indicator, Michael D. Stroup, Michael M. Pickard, Korey E. Kahler

Faculty Publications

This empirical study examines whether making lecture capture technology available in a face-to-face lecture environment can improve students’ ability to learn the course material. We examine student performance in undergraduate principles courses in computer science and economics. However, rather than simply comparing average course grades between lecture capture and non-lecture capture classes, we use student grade point average (GPA) as a predictor of course grades earned in non-lecture capture classes and lecture capture classes taught by the same professors using the same course materials. Our results imply that making lecture capture technology available in face-to-face lectures does not appear to …


Using Self Organizing Maps To Analyze Demographics And Swing State Voting In The 2008 U.S. Presidential Election, Paul T. Pearson, Cameron I. Cooper Jan 2012

Using Self Organizing Maps To Analyze Demographics And Swing State Voting In The 2008 U.S. Presidential Election, Paul T. Pearson, Cameron I. Cooper

Faculty Publications

Emergent self-organizing maps (ESOMs) and k-means clustering are used to cluster counties in each of the states of Florida, Pennsylvania, and Ohio by demographic data from the 2010 United States census. The counties in these clusters are then analyzed for how they voted in the 2008 U.S. Presidential election, and political strategies are discussed that target demographically similar geographical regions based on ESOM results. The ESOM and k-means clusterings are compared and found to be dissimilar by the variation of information distance function.


A Synthetic Document Image Dataset For Developing And Evaluating Historical Document Processing Methods, Daniel Walker, William Lund, Eric Ringger Jan 2012

A Synthetic Document Image Dataset For Developing And Evaluating Historical Document Processing Methods, Daniel Walker, William Lund, Eric Ringger

Faculty Publications

Document images accompanied by OCR output text and ground truth transcriptions are useful for developing and evaluating document recognition and processing methods, especially for historical document images. Additionally, research into improving the performance of such methods often requires further annotation of training and test data (e.g., topical document labels). However, transcribing and labeling historical documents is expensive. As a result, existing real-world document image datasets with such accompanying resources are rare and often relatively small. We introduce synthetic document image datasets of varying levels of noise that have been created from standard (English) text corpora using an existing document degradation …


Acquiring Os X File Handles Through Forensic Memory Analysis, Andrew F. Hay, Gilbert L. Peterson Jan 2012

Acquiring Os X File Handles Through Forensic Memory Analysis, Andrew F. Hay, Gilbert L. Peterson

Faculty Publications

Memory analysis has become a critical capability in digital forensics because it provides insight into system state that cannot be fully represented through traditional media analysis. The volafox open source project has begun the work of structured memory analysis for OS X with support for a limited set of kernel structures. This paper addresses one memory analysis deficiency on OS X with the introduction of a new volafox module for parsing file handles associated with running processes. The developed module outputs information comparable to the UNIX lsof (list open files) command, which is used to validate the results.