Sunday, March 28, 2010
Prospectus Workshop Summary
Thursday, March 18, 2010
Research Design Workshop Summary
I really think the workshop process that we have been taking part in will help the clarity and perfection of my entire research prospectus, especially with the research design section. Instead of just seeing the solution through our eyes this allows us to get a second opinion onto the logic behind the steps in the process and how they lead up to the final solution which will hopefully solve the entire research problem.
Thursday, February 25, 2010
#5 State of Your Research Prospectus (freewrite, 10 minutes)
My thinking has come very far just from the start of the topic. In the beginning I knew I wanted to do something related to Biometrics, as that has always interested me since the day that Professor Heishman introduced it to the class. From this fairly vague topic I had to then research into some of the more narrow topics within this field. I had previous knowledge of security and privacy being problems with this system, and thought that that would be a very manageable topic considering these methods are closing in on the general population fast, and they will more than likely be implemented in most place within the nextseveral years. Knowing that security and privacy are problems, I started hypothesizing different questions regarding that subject, making sure to keep on that single narrow subject. With this I found that the question should involve some sort of new "method" for guarding the general public against the security and privacy concerns of biometrics, after all, almost all Computer Science journals that I have read propose some sort of alternative method that gets the job done in a much more efficient way. From this question it was fairly easy to devise the problem since the question was initially derived from a problem that the population was having. Using the question the problem was very straightforward and concerned how people felt towards the security and privacy problems and how those people can be put at risk by using biometrics.
Although I haven't really started the review of the literature, I feel this won't be a very hard part. Most of the general information concerning biometrics is widely available, and in fact I have already found many sources using the keywords "Biometrics & Privacy" which will help me in my methodological literature review. In developing my literature review, I have learned to make the subject as broad as possible so that the audience will be able to tell that I have "done my homework" concerning the topic at hand. With this in mind I plan to take a thematic approach of the methods used in biometrics, jumping around to the most prominent topics in biometrics by explaining how some of the more famous theories have been derived and are used in everyday biometrics.
#3 Reading the Literature Review (freewrite, 10 minutes)
It is different from papers that I have written in the past in that it is a very broad overview of a single topic. Most papers that I have written require that you focus on a single issue and then discuss ways to solve it. This literature review would be useful as support for a project proposal just based upon the sheer amount of data contained on a single subject in just one place. Literature Reviews are really helpful for most researchers as they don't necessarily have to look all over the place to find sources when they could just look in one place to find everything that they needed. Although the review may not be as dense as the researcher wanted, you can also trace back through the sources of the literature review, seemingly opening up your available sources exponentially. Usually the sources that are used in a literature review are some of the best sources on that topic, so by using those sources you can almost guarantee a solid paper.
Wednesday, February 24, 2010
#4 Open Topic (freewrite, 10 minutes)
Yet another freewrite. I really like these because it gives me a chance to rant and rave, whereas the ones with topics really aren't freewrites at all. Since this morning I have been closely watching my camera to no avail. Apparently it had to stay in Pennsylvania since 1pm and never made it near here at all. Hopefully it will come tomorrow so I will have a chance to use it once I get done with school at 7. I was really taken back by the length of my English Research Prospectus that is due on Sunday. Originally I didn't think it would be very long, so when I learned that it had to be upwards of 10 pages for the introduction I was thoroughly astounded. I think I'm going to really try and drill out a rough rough draft tonight so that I will be able to truly appreciate my camera when it arrives tomorrow.
Recently I have started watching Hockey during the Olympics, and have rieally started to like it a lot. I seem to support many of the teams so it makes it that much more fun to see them duke it out until the very end.
i dont know what to write about I dont know what to write about
So I really do like the snow, at least when it gets us out of school. Right now I've come to the conclusion that there aren't going to be anymore huge snows this semester, so I'm pretty much just looking forward to Spring at this point. I haven't been on my motorcycle since last August, so I'm really looking forward to getting it out and riding it around a little bit. Hopefully it warms up soon so I will have time to ride it around before we move out of this townhouse and move back to my fiancées parents house in Broadway, Virginia (our hometown).
I have also recently been thinking a little about my mother. I haven't talked to her since October because she does nothing but badmouth both my fiancée, and her parents. I told her clearly that I wasn't going to have anything to do with her as long as she was doing this, and I have certainly stuck to my word. I'm going to have to see her over Spring Break, during my bridal shower, so I was really thinking about emailing her soon if i ever get a chance to from school work.
#2 Open Topic (freewrite, 10 minutes)
Another free-write, woo! This week I'll talk about photography a bit more to start off with. Since I am getting married soon and will be going to Peru for my honeymoon, my fiancée and I made a deal that I would be able to get a DSLR camera since I'm getting more and more into photography. Last Saturday we took the plunge and bought a Nikon D5000 off of Amazon. I have been almost too anxious waiting to receive this new toy. Last check it was supposed to be here maybe today or tomorrow, but I really hope it will be here later today. With the new snow coming tonight into tomorrow Its looking very unlikely that I will be able to get to school tomorrow, so I would really like to have it to mess around with in my freetime again.
Moving to new things, I am getting more and more tired of school the longer we go. Professors are just so ignorant with their dumb busy-work assignments that do nothing but waste student time. If teachers would actually assign us work that would be pertinent to learning the subject things wouldn't be so bad, but most of the time this isn't the case. I'm so tired of having to spend the majority of my days in one area just working on homework for the entire day.
This English class is getting more and more on my nerves as well. The class seems so unorganized that it's crazy. I really don't know what exactly we are supposed to have finished at this point, but I know that I've done everything that the schedule has said. On the other hand, I don't really know if I have done those things correctly because the descriptions for each assignment are about as minimal as can be.
Now back onto the topic of my honeymoon and wedding. We are going to have the bridal shower in just over 3 weeks. We decided to have it over spring break because teachers give me so much homework that I am basically unable to go home over any other weekend other than spring break. I believe we sent out just over 40 invitations, so hopefully most of those people will show up. The theme is springtime in Paris, so that should definitely be fun since I can't really get enough of Paris. After this party it'll all be smooth sailing, with only wedding invitations to send out and then the actual wedding. Recently we had to find another marriage officiant for the wedding. We did at first have my fiancées mothers pastor, but he came out not too long ago that he didn't actually accept us because we have been living together before married (don't get me started on the retarded religious crap). Thankfully we managed to find a non-secular lady marriage officiant near home, so we accepted her immediatedly.
Saturday, February 20, 2010
#3 (this is not a freewrite) Types of Writing in your Field (150-250 words
Monday, February 15, 2010
#5 Open Topic (freewrite, 10 minutes)
Onto different things, we have finally sent out our Save The Date cards to everyone, and I've heard back from a lot of people that they have received them. We have also picked the time and date for the wedding shower, which is coming up way too fast. We had to have it done over spring break in order for us both to attend. My professors this semester just wont let up with the busy work, and I have various things do every single week all the way up until finals. This was basically the only time that I would be able to do it, because I really hate missing class because I feel like I miss so much and the teachers are sticklers for late work and act like they don't understand that people really do have other, better things to be doing.
As I said in my last freewrite, we booked our trip to Peru on June the 28th, and I am really already getting ready for it. Like I said above, I have really stepped up my search for photography equipment that i will need (want) for my trip to Peru. I really can't wait to relax for a little and enjoy the scenery while I shoot some magnificent scenes. With all the school work recently I haven't really been able to look into the things that we will be able to do there, but Machu Picchu is definitely at the top of the list.
#4 What did you see on your way to work/school/etc. (pick one commute)? (freewrite, 10 minutes)
#2 What are your strengths? (freewrite, 10 minutes)
For the most part, I beleive that my main strenght that I will bring to my future career is my ability to work with a group. Although most people see programmers as lonely beings that just sit in their offices all day, it really is quite different from that. In most settings the programmers need to coordinate with many other people that are together as a single team. Most programming projects that you do in the real world are large, and need much more than one person working on them, and I believe that I would thrive in this situation. I really enjoy working with others on projects because it allows everyone to bounce ideas off of each other, meaning that everyone gets to learn completely new ideas and methods of doing things while the projects are done in a much better manner because of this.
Another strength that I will bring to my future career is persistence. Although it is quite hard to be persistent in college, I still manage to be persistent until I finish absolutely everything. Most of the time I like to do things in one grouping, and rarely do I like to stop and start again because i feel that it is much easier to get off track in this situation. This would greatly help in my future career as it will help my employer to get exactly what they want, a finished product. My employer will be able to count on my in any situation as I can guarantee that I will work my absolute hardest until I finish the task at hand.
I dont know what to write about anymore I dont know what to write about anymroe I dont know what to write about anymore I dont know what to write about anymore I dont know what to write about anymore I dont know what to write about anymore i dont know what to write about anymore I dont know what to write about anymore I dont know what to write about anymore.
Another skill that I feel will be helpful in my future career would be the knowledge of the technical abilities that many Computer Science majors lack. Through most of the classes here at Mason, I have mostly learned things that will never come to help us in the real world. Luckily, some of the things I have learned will help me emensly when it comes to joining the workforce. Things like methodologies into the way that computer programmers get things done will really help, and it will better allow me to fit into any workplace that I am able to get into. Not only their methodologies, but the different methods of programming and the insight behind this will really help me in my career. Not only have I learned how to manipulate the programming code to work, but I am not starting to learn the methods of coding which would better suit a group environment.
#1 Researching/Writing Goals and Aspirations (freewrite, 10 minutes)
Sunday, February 14, 2010
Observation and Description Exercise: One Hour of Uninterrupted Listening (250-500 words)
Wednesday, February 10, 2010
Science Article Summary - 15
Russia to Plan Deflection of Asteroid From Earth
[1] | E. Barry, “Russia to Plan Deflection of Asteroid From Earth,” The New York Times, Dec. 2009. [Online]. Available: http://www.nytimes.com/2009/12/31/world/europe/31asteroid.html?_r=1&ref=space. [Accessed Feb. 10, 2010]. |
After movies like Armageddon, people get very weary when they hear about the possibility of asteroids hitting Earth, and this is very evident with Russia's newest pet project. The head of Russia's Space Agency, Anatoly Perminov, said that Russia plans to try and deflect the asteroid, code-named Apophis, or "destruction", in order to keep it from hitting the Earth in 2032. Although the scientists say that it is about three times as big as the Tunguska meteorite that hit Siberia in the early 1900s, NASA gives it very small odds that it will actually come in contact with the Earth. Nonetheless, Russia still feels the need to intervene, and they say there is just enough time to design and build a spacecraft that can do the deflection job. Among the methods proposed, Russian scientists have said that electric motors that turn its trajectory, striking it with missiles, or sending up satellites that use gravitation pull to change the orbit are at the top of the list. None of the proposed methods have even slighted at the hint of using nuclear weapons, despite the widespread success rates in some of Hollywood's best asteroid filled movies.
Even though Perminov has been called the most influential person to ever articulate such a plan, many still have doubts with his reasoning. Since it isn't very likely to even hit the Earth, many people don't see the need for such risks. Scientists have noted that a wrong move could manage to have a horrible effect, instead sending it colliding into the Earth rather than avoiding it.
Science Article Summary - 14
Dark Liquor Makes For Worse Hangovers
[1] | L. Sanders, “Dark Liquor Makes For Worse Hangovers,” Wired Science, Feb. 2010. [Online]. Available: http://www.wired.com/wiredscience/2009/12/dark-liquor-makes-for-worse-hangovers/#more-16015. [Accessed Feb. 10, 2010]. |
Researchers have finally released a study that hits at home with most college students. They have found that dark liquors make for a much hangover the morning after drinking. In order to complete the study, the researchers recruited 95 healthy individuals and divided them into teams which drank bourbon, vodka, and tonic water. Once the individuals had the blood alcohol level of .11 they were put to bed with sleep monitoring equipment which monitored them throughout the night. At 7 am the next morning the subjects were woken up, and what the researchers found was astonishing. Using a scale to measure the severity of the hangover, bourbon drinkers were overall much worse than those that drank vodka. Although this seems like a big difference, the alcohol showed no different effects with sleeping ability or cognitive tests.
Researchers note that this outcome could be expected. They note that bourbon, and dark liquors in general, have over 37 times as many toxic compounds as vodka does, ranging from acetone, acetaldehyde, tannins, and furfural. The researchers noted that as a good rule of thumb, the lighter the liquor, the less of these toxins contained in them.
Although this research probably won't stop people from drinking dark liquors, researchers hope that people can use this data as a way to be more responsible with their drinking. If someone has a sensitive task to be done in the morning, such as driving, one might want to stay away from the dark liquors and instead choose the lighter liquors.
Science Article Summary - 13
2009’s Sleepy Sun Finally Woke Up in December
Science Article Summary - 12
Feds Announce New Actions to Battle Asian Carp
Science Article Summary - 11
Fastest Wings on Earth Show Extremes of Sexual Selection
[1] B. Keim, “Fastest Wings on Earth Show Extremes of Sexual Selection,” Wired Science, Feb. 2010. [Online]. Available: http://www.wired.com/wiredscience/2010/02/wing-resonance/. [Accessed: Feb. 10, 2010].Researches observing the club-winged manakin bird have said that they have found the world's best example of sexual selection. Instead of dynamically adapting their wings to flight, their wings have instead been adapted to create a mating sound that attracts the opposite sex. Found in the western Andes mountains, this bird is able to place their wings over their back in order to create a high frequency sound due to their irregularities found in their wings. The main irregularities found in their wings is that the feathers have seven district ridges and they have a single feather with an abnormally thick tip. In order to make the noise, the bird places its wings behind its back and shakes their wings over 107 times per second, which to put that in perspective, is more than the hummingbird. Each shake of the feathers allows the thick feather tip to grind into the ridges of the other feather, creating the same effect as putting a spoon over wooden slats. In order to back up the frequency of 1,500 vibrations per second, the male has been suited with relatively thick breast muscles that dampen the effect of the extreme vibrations. Overall the study is not only to reveal the adaptations that birds take on, but it shows how the sexual selection process outweighs all other needs, creating a bird with decreased wing functions.
Sunday, February 7, 2010
Refined Research Problem Statement
As issues of security are starting to get greater and greater, the general public is really starting to see a gradual shift in the methods of security. One of the main methods that we are shifting our paradigm to is Biometrics, the way we uniquely identify humans based on physical or behavioral traits. It seems like this issue would be just as foolproof as the normal password and PIN security method, but in reality it has just as many vulnerabilities and pitfalls.
(*) Introduce to background of the research area.
Now that the massive shift to biometrics is taking place, many people are finding that the biometric data given to these security machines can be compromised against peoples liking. Not only are there ways for attackers to gain access and to duplicate some of your biometric data, the companies or agencies that actually choose to implement the security methods can use your own biometric data against you. Some biometric methods are capable of telling your sex, skin color, race, and even sometimes your thoughts. This opens up the capabilities for the company, or even someone else with the capabilities, to use that data against your will.
(*) State the key issue, the overall research problem, specific research question/s. There may be 1-3 separate questions connected to research problem area. Should be formulated in a very clear language in a form of a question.
Although Biometrics seems fine to most people outside of the Computer Science field, many people are finding plenty of issues with the new methods which biometrics entails. The largest issue with the biometric method would be the privacy concerns found with the use of gathered biometric data.
I am studying the advancement of biometrics with respect to the privacy of the individuals who use the system because I want to find out how the entities that implement these systems can use the biometric data against the user in order to help the user understand how their privacy is being violated and what new things can be done to fix the problem.
(*) Statement of relevance to the field. Define your audience of experts.
Since the advancement of biometrics is continuing, the key issues found within this topic will only grow worse. By acknowledging the issues, the Computer Science field will be able to better serve the general public instead of merely pleasing everyone in the technology field. By solving this problems now instead of later, we will be able to truly find a better method of security, be it in biometrics or not, and in the end solving this problem of privacy within the biometrics field will revolution both security and technology.
The audience of experts for this topic would be biometric, security, and human-computer interaction experts. Almost every topic in Computer Science correlates to biometrics in some form or fashion, so almost any scholarly being in the Computer Science field would find this problem and solution interesting.
(*) Introduce your proposed methods of study, in brief, if you can at this time.
A general proposal of my study methods would be primarily based on others research since I am unable to design my own biometric systems. It would be best to decipher scholarly articles to search for methods that would be relevant to the privacy and advancement of biometrics. If methods of this type can be merged into a singular method, the effect may be strong enough to fix the problem.
(*) Introduce limitations of the study, if you can at this time.
Although it will be easy to find sources regarding the topics that are already designed and being implemented, the limitation begins at the design of new systems. I have had a wealth of experience in my college career, but it isn't at the point that I can go out and design a new biometric system to solve this problem.
(*) Note scholarly publications (1-3 publications, by title) where you might be able to publish the resulting paper you would write.
Security & Privacy Magazine, IEEE
Journal of the ACM
Computer Law and Security Review
[1] A. Squicciarini and E. Bertino, "Privacy Preserving Multi-Factor Authentication with Biometrics,"Identity, 2006, pp. 63-71.
[2] A.M. Froomkin, "The Death of Privacy?," Stanford Law Review, vol. 52, 2000, pp. 1461-1543.
[3] D. Bala, "Biometrics and information security," Kennesaw, Georgia: ACM, 2008, pp. 64-66.
[4] J. Woodward, "Biometrics: privacy's foe or privacy's friend?," Proceedings of the IEEE, vol. 85, 1997, pp. 1480-1492.
[5] S. Prabhakar, S. Pankanti, and A. Jain, "Biometric recognition: security and privacy concerns,"Security & Privacy, IEEE, vol. 1, 2003, pp. 33-42.
[6] S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System," 2008, pp. 130-139.
Saturday, February 6, 2010
#4 Refine Your Research Topic/Question/Problem (freewrite, 10 minutes)
First I would like to start with refining my research problem. I really wanted to stick with something that deals with the privacy part of biometrics. For example, I am fairly curious as to what companies or other agencies actually do with the biometric data. One refined question could be:
I am studying the advancement of biometrics with respect to the privacy of the individuals who use the system because I want to find out how the entities that implement these systems can use the biometric data against the user in order to help the user understand how their privacy is being violated and what new things can be done to fix the problem.
Possible answers would be the subject that I have heard of in class (but not researched) which is called cancelable biometrics. We all know that our own biometric data cannot be changed because we cannot just change our fingerprints, but with this new method the security system would implement some sort of hashing or manipulation algorithm which would safeguard the user from even having to lose their biometric data in the first place. As for the issues of their privacy being used against them, the companies that create these security systems should also do algorithms which hide important data from the company. This would then safeguard the user from racism or other privacy-eluding acts that would allow the company to figure out the users color, race, gender, and in some highly technological security systems, their thoughts.
Another issue that I would like to get into would be the issue regarding the national DNA database for newborns. Although this doesn't seem like biometrics, under the shell it is being used as an uniquely identifiable source, which categorizes it as biometrics.
Science Article Summary - 10
Evidence Builds on Color of Dinosaurs
[1] | C. Zimmer, “Evidence Builds on Color of Dinosaurs,” The New York Times, Feb. 2010. [Online]. Available: http://www.nytimes.com/2010/02/05/science/05dino.html?ref=science. [Accessed Feb. 6, 2010]. |
After the thriller "Jurassic Park" most people would think that scientists had a fairly good idea of the color of dinosaurs, but the case is much the opposite. Up until last week, many paleontologists had no overwhelming evidence for the colors of dinosaurs, but luckily, a group of researchers at Yale have finally been able to identify what dinosaurs actually looked like over 125 million years ago. Since feathers have pigment-loaded sacs called melanosomes, the researchers were able to work in conjunction with biologist Matthew Shawkey to predict the color of feathers from the melanosomes only. This discovery by the researchers not only uncovers our curiosities about the characteristics of the ancient creatures, but it also supports that birds are actually descendants from dinosaurs.
One main find using this process has been the discovery of the Anchiornis's unique color pattern, which just happens to very close to the present day Silver Spangled Hamburgs chickens. The researchers noted that the Anchiornis, just like the present day chicken breed, used their colors for some visual function. These functions can range from attracting mates to using their black and white limbs to escape predators, which apparently confuses predators and is more popularly seen in Zebras.
Science Article Summary - 9
Altitude Causes Weight Loss Without Exercise
[1] T. Ghose, “Altitude Causes Weight Loss Without Exercise,” Wired Science, Feb. 2010. [Online]. Available: http://www.wired.com/wiredscience/2010/02/high-altitude-weight-loss/#more-17539. [Accessed Feb. 6, 2010].We know that most people in the world are overweight, and just a influx of weight-loss medication hits the general public in commercial form, researchers have finally found a better, more relaxing way to help lose weight. Instead of exercising to lose the weight, researchers have found that retreats as short as a week in high elevation areas can make you lose the weight and help you to better keep it off. The good thing about this method is that the overweight people do not have to eat any differently, they can eat as much as they want, the only requirement is that they do it in the higher elevations. All seems fairly straightforward with this method, but underneath the shell one can also find a plethora of issues with this method. Not only is it harder for the obese to get up to the high elevation, but once they are there they are more prone to various health problems including altitude sickness, edema, and heart attacks. The main issue, heart attacks, is said to be a very serious problem as inflammation can be made worse by the stronger attitudinal pressures, so anyone wishing to try this technique should take extreme caution.
Although this technique does work, and seems to work even after they come down from the high elevation, the effect does seem to decrease back to normality after about six months. Researchers have noted that to make this a fully functional weight loss technique, people would have to try and go up and down the mountain in certain intervals in order to keep the weight loss function and to keep their metabolism at stable levels.
Science Article Summary - 8
Google Asks Spy Agency for Help With Inquiry Into Cyberattacks
[1] J. Markoff, “Google Asks Spy Agency for Help With Inquiry Into Cyberattacks,” The New York
#5 Learning Styles (freewrite, 10 minutes)
One problem I have in classes, particularly this semester, is that all of my teachers will teach from powerpoint presentations, which I normally would cherish, but this semester EVERY professor I have seems to fly through them. Instead of facilitating my learning ability, flying through slides only causes me to try and cram the information the teacher is feeding me, and most of the time I end up falling behind while the professor rushes to the next slide. Other than not learning quite up to par, the teachers just seem to love throwing information at us, and by flying through the slides it allows the teachers to cover well up to 3 chapters per week which seems overwhelming to most.
In my Computer Science major, I do sometimes get a chance to work as a group, and generally I do very well with this type of setting as long as everyone is willing to be a part of the team and do their share of work. I think I probably do work better with a team because it allows everyone to be a check for the work, and other than that it allows everyone to bounce ideas back and forth. Rather than creating a single method for designing and implementing a system, this method of bouncing ideas back and forth allows us to better understand every available method, thus allowing us to learn new, better things.
I find that in math classes, where slides are not available, that just copying what the professor is writing on the board verbatim is the best method. This guarantees that when I go back to study I will have every available resource and be able to complete the problems much in the same way the professor would.
Friday, February 5, 2010
#6 Open Topic (freewrite, 10 minutes)
Another topic of interest would be my wedding coming up on June 25, 2010. Time seems to be flying now, and I'm finding it even harder to concentrate and help my fiancée with it when I have so much work to do with school. Just last night we made the final decision for our honeymoon destination and we actually booked it. We will be going to Peru on June 28, and we will be staying there for almost 11 days. I can wait for this trip and all of the new things that I will be able to see in this country. Before going I would really like to save up enough money to buy a DSLR professional-grade camera so that I can get some great photography shots. I have been wanting one for a while now, and this only gives me a reason to purchase one. We haven't really figured out the itenerary for the trip yet, but I really want to make a trip to Machu Picchu one of my top priorities.
#3 (this is not a freewrite) - Survey of Current Topics in Your Field (research and brainstorm)
As security is a pressing concern in society, more Computer Scientists are quickly trying to find a way to solve the problems of security in many areas. Besides the usual password, which can be easily stolen if wanted, the new methods concern unique identifying measurements of our bodies that act as our "passwords". Many people have known about the standard fingerprint used by the police, but now the field has started to integrate this biometrics technology into many of the laptops that are being sold around the world. If you're lucky enough to have one of these laptops, you know that instead of entering your password at prompts, this feature allows you to just slide your finger across a small scanner on your laptop. The field of biometrics happens to go well over this topic though, especially as many people were trying to create copies of others fingerprints, thus making the method unsafe just like regular passwords. One other topic of interest would be eye scanners. Just like our fingerprints, the irises in our eyes are completely identical from person to person, even the irises on a single human are different from one another. This makes it a great system of security because your irises are one thing on your body that would be fairly hard to copy. We usually see this type of security software in the futuristic movies and shows, but this once futuristic technique is very close to becoming a reality.
Now that the use of biometrics is becoming more widespread, the threats against this type of security technique are finally showing themselves. Yes, it may be hard to reproduce someones iris, but if someone manages to steal this image, there really isn't any way to magically change your iris to a new uniquely identifiable iris. This scenario has paved the way for more, unusual types of storage methods which involve hashing and image processing which allows the actual image to be hidden and only shown in its processed form.
Open-Source Software
If you aren't a Computer Science major, chances are you have never heard of open-source software. Most of us are trained to use windows, and a small percentage of us are trained to use Mac's, but did you know that there is a third contender in this operating systems race? It is called Linux, and was derived from Unix a while ago as a free operating system alternative to both Windows and Mac. By free, I mean absolutely free. If you are knowledgeable enough to tweak the code found in the Linux system, you can even design your own free software systems that model Linux. Along with this operating system comes thousands upon thousands of free applications. Linux has been lucky enough to morph into a complete operating system, and by that I mean that you can do everything in Linux that you would ever dream of doing in Windows and more! The applications that are available for Linux mimic most software on Windows, and most of them even allow you more freedom if you're willing to learn a few things.
Luckily Linux is finally starting to become mainstream as it morphs into an easier system to use for those people that don't want to learn the basic commands for Linux systems. Dell and other personal computer providers have started to ship computers with the offer of having Linux pre-installed, showing just how acceptable this alternative operating system is. It has even become so mainstream recently that some K-12 school have decided to install Linux on their schools computers. It allows them to save so much money over the pricey Windows operating systems, allowing them to focus on better things for our youth.
Software Engineering
As many software companies are growing bigger and releasing bigger software, the theory of software engineering is starting to take a real hold. Instead of flailing around trying to finish a piece of software, the idea behind software engineering is that you will choose a design method to follow during the entire process. This allows companies to be more efficient with their software releases and to be more impermeable to many software design flaws. These methods make sure that adequate processes are taken throughout the course of the software design process, thus reducing the chances for failure at the end of the design phase. Not only does this help the customers with more reliable, efficient software, but this allows the companies to be much more efficient with the way that they design software. Most of the processes are designed to allow the software companies to fail early if they are going to fail at all, that way that precious money can be saved. If a company is a month from a major release and they realize that the software is horrible because of their design process, that company will lose a plethora in money just trying to restart or revive the project. All of this may seem irrelevant or unneeded for small groups working on small software packages, but anyone that does any process, regardless of a Computer Science major or not, uses the processes found in Software Engineering.
Tuesday, February 2, 2010
Science Article Summary - 7
Wireless Optical Transmission Key to Secure, Safe and Rapid Indoor Communications
[1] | “Wireless optical transmission key to secure, safe and rapid indoor communications,” Jan. 28, 2010. [Online].Available: http://www.sciencedaily.com/releases/2010/01/100127211857.htm. [Accessed: Feb. 2, 2010]. |
Researchers at Penn State University have finally discovered a new method to wireless transmission that was previously unheard of. Apparently light is much more efficient than the presently used radio waves when it comes to data transmission, boasting a very large bandwidth with speeds of over a gigabit per second. Although this new method would require direct line of site to the source, a system with multiple source elements has been devised to rid the user of this problem. This allows it to be just as usable as the current radio wave wireless networks, but an added bonus with the light waves is that the waves will not travel through walls, allowing for a much more secure network. Without infiltrating through the walls like radio waves, the signal from your network will not be seen from outside the room, meaning that anyone who wishes to attack your network will actually have to be inside of your house.
Another important functionality of light waves is that the frequencies do not impede on the radio wave frequencies that many special areas use, such as hospitals or airport bases. This would mean that such areas will finally be able to access an entirely new dimension that seemed impossible before, allowing them to take advantage of the possibilities of a networking system.
The final advantage is that the light waves have the functionality to directly distribute high resolution images at extremely fast speeds. This could possibly change our entire views on high definition television as televisions would be able to be wireless, thus ridding the need of those long cables that run throughout entire houses.
Science Article Summary - 6
[1] | K. Johnson, “Hundreds of Quakes Are Rattling Yellowstone,” The New York Times, Feb. 2010.[Online]. Available: http://www.nytimes.com/2010/02/01/science/01yellowstone.html?ref=science. [Accessed Feb. 2, 2010]. |
Monday, February 1, 2010
#2 What Are You Passionate About? (freewrite, 10 minutes)
I really find that I like many things from the classes that I have taken in college. For example I really enjoyed some of the biology classes that I have taken, and have pondered the fact that there is a Computer Science degree with applied biology. There are a few other classes that I have had an affinity towards, but all in all I think that Computer Science is the best for me. I have been extremely passionate about this subject since my last years in high school, and I do not regret anything about joining George Mason with my major already set and am very happy that I have made it this far to date.
#1 Recent Dream (freewrite, 10 minutes)
The majority of my really vivid dreams happen at my mothers house, in Timberville, Virginia. It is in a beautifully wooded area off the beaten path, so it definitely allows my imagination to wander where ever I please. The most recent memory was actually last night, making it a really conveinent experience. I remember setting out in the rolling wooded hills with my fiancées father. We were hunting for deer, and my fiancées father had the gun. All that I remember from my dream is that we were watching hundreds, if not thousands of wandering deer pass by, moving on to a different plot of land. This normally wouldn't be a problem when we are hunting, but my fiancées father really likes to kill bucks and the deer that were passing us all happened to be does. The majority of my dream encompassed us standing in the frigid snowy woods watching the deer, it seemed like it must have spanned the entire day. When the day was coming to a close the large herd of female deer final came to a halt. A little while after this, we knew the big bucks were getting ready to come out. A moment later I looked up to the small hill across from us to see a small group of bucks running. This also wouldn't be much of a problem, but the bucks were being chased by a wolf, which happened to look like my fiancées fathers Siberian husky. My fiancées father has a strict policy against anything that hunts animals like that, so he seeks out to kill the predatory animals. The rest of my dream consisted of him shooting and killing the wolf-husky looking animal that was chasing the deer before I finally awoke just after 8 a.m this morning. The ironic thing about this entire thing is that the predatory animal really did look like my fiancées fathers husky, but it was just that his love for deer in general just took over. It almost seemed like a fight against his views, on one end he wanted to save the deer that he seeks to shoot, but then again he really wouldn't want to kill his Siberian husky who is his pride and joy. Another ironic part about this dream is that wolves are not found around here, but the closest thing to that animal in those woods would be a coyote. I have actually been hunting with him on that land, and I specifically remember him saying that he would should predatory animals if he saw them, anything from coyotes to foxes.
Sunday, January 31, 2010
#7 List of Research Questions/Problems (freewrite, 5-5-5 minutes)
Identify the parts and how they interrelate
What are the parts of your topic, and how do they relate to each other?
How do they scan for facial recognition?
What kind of computer architeture and systems are needed for biometrics security?
Can different types of biometric devices be used concurrently?
How is your topic part of a larger system?
Is biometrics better than normal types of security?
How is biometric security better than password security?
Trace is own history and its role in a larger history
How and why has your topic changed through time, as something with its own history?
Why is biometrics just becoming big now?
How will biometrics change in the future as technology grows more complex
How and why is your topic an episode in a larger history?
How will biometrics shape the future of security around the world?
Could biometrics fail at being secure in the future, making us revert back to other security measures?
Identify its characteristics and the categories that include it
What kind of thing is your topic? What is its range of variation? How are instances of it similar to and different from another?
How will biometric security better secure the systems that need securing?
Why are the security measures of today outdated and needing to be replaced by biometric devices?
To what larger categories can your topic be assigned? How does that help us understand it?
How will computer security benefit from the advancement of biometrics?
We all know about fingerprints, but what other methods of biometric security measures are there?
Determine its value
What values does your topic reflect? What values does it support? Contradict?
Are the uses of biometric data again privacy laws or the privacy of individuals?
Should the authorities have access to your biological data such as hand and face patters?
How good or bad is your topic? Is it useful?
Could biometrics be used for bad purposes?
What are the consequences and methods for fighting compromised biometric data?
Audio Compression
Identify the parts and how they interrelate
What are the parts of your topic, and how do they relate to each other?
How does audio compresssion relate to the actually devices that make the sounds?
Why is there a need for audio compression even when storage is so affordable?
What are the different methods of audio compression and how do they differ?
Among hte different methods of audio compression, which sound better to the human ear?
How is your topic part of a larger system?
How can the different audio compressions be used to trick your mind?
Trace is own history and its role in a larger history
How and why has your topic changed through time, as something with its own history?
How has audio compression changed with the invention of CD's, MP3's and DVD's?
Have differnt audio compression methods been designed to fit the new technology advances in sound storage?
How has audio compression advanced with the invention of newer and better audio technologies?
Determine its value
How good or bad is your topic? Is it useful?
Does audio compression take the sound quality away form the listener?
What are the best methods of audio compression?
Network Security
Identify the parts and how they interrelate
What are the parts of your topic, and how do they relate to each other?
How are wireless and wired security similar?
Which is less secure, wireless or wired networks?
How is your topic part of a larger system?
How is cryptography used in the process of network security?
How is the method of data transfer across wireless networks vulnerable to attacks?
Trace is own history and its role in a larger history
How and why has your topic changed through time, as something with its own history?
With the invention of newer wireless technologies, has the advancement of security in the wireless field been less needed?
How and why is your topic an episode in a larger history?
What new technologies are on the horizon of breaking through, and will they be able to secure networks better?
Identify its characteristics and the categories that include it
What kind of thing is your topic? What is its range of variation? How are instances of it similar to and different from another?
How are the instances of a wired network and wireless network similar?
Of the wired and wireless networks, which are the more secure and why?
What are some different, unseen methods of securing networks?
Determine its value
What values does your topic reflect? What values does it support? Contradict?
Speaking of Google, Should their views on network security allow them to collect random information from their users?
What are the criminal charges placed against someone who infiltrates a computer network?
How good or bad is your topic? Is it useful?
How could an attacker take advantage of a vulnerable wired or wireless network?
Saturday, January 30, 2010
#6 Refined List of Research Topics (freewrite, 5-5-5 minutes)
This topic covers some very easily implemented programming concepts and some very intricate, complex ones. The most basic, which I have done in a CS class, was to implement a very easy and basic eye scanner, something which could have been more complex and maybe fashioned into something usable. Most of the biometrics stuff I have learned about deals with security issues on computers and many other places. With a single eye scanner security can be made much more impermiable. Just like your fingerprint, your eyes are also extremely unique, and now that I'm thinking about it, I think i've read that it is the most distinguishable thing about us humans. Other uses of biometrics would be to test your gait. I remember hearing about this in a lecture with Professor Heishman some time ago. Apparently this can be used to detect people that should or should not be in the room at the time, almost like a under-floor security detection system. Biometrics can also help with the disabled. Just like scanners can use your eyes to secure certain places or things, they can also use them for people missing limbs so that they will be able to work in a better fashion in order to ease their lives.
Audio Compression
Although I havn't had any formal classes on this topic, I have seen enough of it to be interested. No matter what you're listening to, each file has a certain file type extension. These correlate to the compressions that the audio has undergone. I am really interested in figuring out what these compressions actually mean for us humans, and to what extent the sound quality drops in our minds. I am also interested in learning about DRM. I know that many music companies sell their music with this type of security integrated so that the buyer won't be able to do anything illegal with that piece of music. While on the topic of audio compression, I would also like to know how the compression is done. I know most of it can be done on a computer with various software, but in what manner does the program actually compress the file to make it smaller? It would be interesting to learn about the function and algorithms put in place to actually compress the files. Does the software just pick out pieces of the music in different increments so that the song sounds the same, or is there just another algorithm for piecing the music apart while still allowing the original sounds to come through?
Network Security
I haven't had a formal class on this topic either, but while messing around with the topic on Linux I have opened my interests for this topic. I've heard many instances of network security being very easy to break, allowing intruders into your home network where a lot of delicate information can be stored. I know that WEP is the source of the problems, but I would think that after a while of being used it would either be honed down to be perfect, or another passwording system with better integrity would be implemented and take over. In this topic I also know that there is cryptography. I did a short project on this within the first year of joining George Mason University, and I know that the very basic level is completely overwhelming for a beginner in Computer Science. During that project we learned that there are many various ways to crypt data and other information that you don't want to be found, and I know that various network traffic can be made secure, both via your browser (for example Google https) and in a terminal via secure file transfer, both of which are still widely used today. I would be interested in learning some of the more secure ways of crypting data, and learning the uses of each one and how exactly they crypt and secure your data.
#5 List of Research Topics (freewrite, 5 minutes)
Biometric security uses
Global Warming
Clean fuels
Audio Compression
Robotics
Software Engineering models
Computer hardware
Linux/Opensource(free) software
Operating Systems
Database integrity
Computer Ethics
Computer architectures
Unsolveable problems (Formal Methods and Models)
Social Networks
Programming languages
Network Security
Cryptography
#4 Current Major and Career Goals (freewrite, 10 minutes)
My current major will fit into my plans perfectly. I really want to work in the computer sector, and my major will fit into that category perfectly. I hope that the training and knowledge that I am getting at George Mason will actually be of some help to me in the job place. I know most people say that the things we learn in college are useless, and most of the stuff done in the real world job force are completely the opposite of what we've learned.
If i decided on a French minor, I think that it will greatly help with my current career goals and plans for the future. If I really want to go to Germany to work, or even grad school, another language would be almost necessary. I believe that even if I don't get to go to Germany, there are plenty of jobs and colleges in France that would fill my needs, meaning that the knowledge of the language would help me quite a bit.
In 5 years I see myself having a job, making a lower salary because I will just be at entyr-level status. In both 10 ad 15 years I really see myself having a well paying job (hopefully) doing something I love, and hopefully by this time I will be completely proficient will all activities needed.
Wednesday, January 27, 2010
#3 One Significant Person or Significant Event freewrites and expand it (freewrite, 10 minutes)
Science Article Summary - 5
Science Article Summary - 5
Shoes may have changed how we run
Using slow-motion footage of experienced runners, highly sensitive scales and 3-D motion analysis scientists have uncovered the fact that barefoot runners run very differently from those of us who wear running shoes. The main difference is that barefoot runners hit the ground with their forefoot or mid-foot, while most people that wear shoes hit the ground with their heel. Although these seem like simple adaptations, the method that barefoot runners use has been proven to reduce risk for certain types of injuries that can be attributed to the impacts created from running with shoes. Rather than landing smoothly, those of us who run with shoes create an impact comparable to "hitting your heel with a hammer up to three times your body weight," showing just how injuries are so easily obtained with shoes. Don't be too worried, not all of this pressure gets directly placed onto the heel because most modern day shoes have become much more comforting, to the point where most of the impact is diminished. Although moderns shoes seem to save us from the pain that we should be enduring, it still is very true that striking the ground with your forefoot or mid-foot can almost completely eliminate the force, making barefoot running more comfortable in all senses.
It is very unlikely that these findings will change the running shoe industry anytime soon, but it is a start to thinking of new and better things. Although barefoot running may be more efficient, many runners that are already used to running with shoes may find a hard feat in the switch. Professor Lieberman, the professor behind this research, notes that runners already accustomed to shoes will have to use their calf muscles and Achilles tendon much more rigorously, meaning that runners trying to switch their styles may end up hurting themselves in the long run.