Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Scott Kerlin is active.

Publication


Featured researches published by Scott Kerlin.


international conference on information technology: new generations | 2011

A Model-Based Testing Using Scenarios and Constraints-based Modular Petri Nets

Hassan Reza; Scott Kerlin

Software testing is considered as a dominant factor for producing high quality software systems. Testing is a costly activity and constitutes more than fifty percent of software development cost. In this paper, we propose a method to generate a suite of test cases using model-based testing technique that takes as an input a model of a system specified in Constraints-based Modular Petri-nets (CMPNs) and scenarios. More specifically, scenarios are used to document system requirements and are transformed into Constraints-based Modular Petri-nets (CMPNs). Using the CMPNs as a model for model-based testing purpose, we then should be able to automatically generate system level test cases. The feasibility of this work is illustrated by a simple case study.


Proceedings of SPIE | 2015

The use of 3D scanning for sporting applications

Kevin Friel; Pann Ajjimaporn; Jeremy Straub; Scott Kerlin

This paper describes the process and research that went into creating a set of 3D models to characterize a golf swing. The purpose of this work is to illustrate how a 3D scanner could be used for assessing athlete performance in sporting applications. In this case, introductory work has been performed to show how the scanner could be used to show the errors a golfer made in a swing. Multiple factors must be taken into account when assessing golfers’ swings including the position and movement of the golfer’s hands, arms, and foot placement as well as the position of the club head and shaft of the golf club.


Proceedings of SPIE | 2015

A very low-cost 3D scanning system for whole-body imaging

Jeremy Straub; Scott Kerlin

A low-cost, high resolution 3D scanning system has been developed at the University of North Dakota that creates 3D models (complete with color and texture data) using hardware and software with a cost of approximately


Journal of Cyber Security Technology | 2017

An incremental and approximate local outlier probability algorithm for intrusion detection and its evaluation

Connor Hamlet; Jeremy Straub; Matthew Russell; Scott Kerlin

5,000. This paper presents the design, testing and initial uses for this scanning hardware; it also discusses the efficacy of this technology for a variety of applications and the utility of being able to capture high-quality scans at low cost. A discussion of the required operating conditions and the limitations that this places on the applications the scanner is suitable for is also included.


Proceedings of SPIE | 2015

Impact of lighting and attire on 3D scanner performance

Pann Ajjimaporn; Dakota Feist; Jeremy Straub; Scott Kerlin

ABSTRACT This paper proposes a novel incremental modification to the Local Outlier Probabilities algorithm, which is commonly used for anomaly detection, to allow it to detect outliers nearly instantly in data streams. The proposed incremental algorithm’s strength is based on denying the insertion of incremental points into the data set. This precludes the anomaly scores of other points having to update (saving valuable computational time) while resulting in a small amount of error, as compared to an exact approach. This work aims to allow low-resource machines, such as small or older satellites, to perform incremental anomaly detection on large static data sets quickly, trading accuracy impairment for speed of detection.


electro information technology | 2017

Teaching software project management using project based learning (PBL) and group projects

Jeremy Straub; Scott Kerlin; David Whalen

This paper considers the impact of lighting and attire on the performance of a previously created low-cost 3D scanning system. It considers the effect of adjusting the lighting configuration and of the subject’s clothing on the quality of the scans and the number and types of objects that can be scanned. The experimentation performed tested different types (colors and textures) of clothing to assess which produced the best scans and multiple lighting configurations. This paper presents the results from this experimentation and, from this, make generalizations about optimizing visible light scanner performance before concluding with a discussion of scanner efficacy.


electro information technology | 2017

Analysis of student characteristics and feeling of efficacy in a first undergraduate artificial intelligence course

Jeremy Straub; Scott Kerlin; Eunjin Kim

While not included at some institutions and relegated to 3 (minimum) hours of core coverage by the ACM / IEEE Computer Society model curriculum, project management is becoming an integral component of computer science education. The prevalence of failed software projects dictates a focus on this discipline which provides the tools and processes relevant to effective performance of software creation, research and numerous other activities. Computer science students, however, are typically users of these skills and thus benefit from a practical, hands-on-approach that emphasizes learning usable skills over management theory (which they, generally, lack the foundational knowledge for). This paper compares and contrasts three different approaches taken to given students experience with a software project and its management with three different levels of project management emphasis at the University of North Dakota. Their learning relative to pre-defined outcomes was assessed and other sources of benefit were identified.


electronic imaging | 2016

Evaluation of the durability of 3D printed keys produced by computational processing of image data

Jeremy Straub; Scott Kerlin

An introductory artificial intelligence course may represent the first subject exposure for many students. Prior to taking this course, students may have formed perceptions regarding the difficulty of artificial intelligence from books, television, movies and other media featuring extrapolations of the technology. This paper analyzes what effects student perceptions of their ability to succeed in an introductory artificial intelligence course. It presents analysis of the association that exists between student characteristics and feelings of efficacy in an introductory undergraduate-level artificial intelligence course. This exploratory work demonstrates fifty-one statistically significant correlations between different characteristics and indications of efficacy or performance.


Three-Dimensional Imaging, Visualization, and Display 2016 | 2016

Evaluation of the use of 3D printing and imaging to create working replica keys

Jeremy Straub; Scott Kerlin

Possession of a working 3D printed key can, for most practical purposes, convince observers that an illicit attempt to gain premises access is authorized. This paper seeks to assess three things. First, work has been performed to determine how easily the data for making models of keys can be obtained through manual measurement. It then presents work done to create a model of the key and determine how easy key modeling could be (particularly after a first key of a given key ‘blank’ has been made). Finally, it seeks to assess the durability of the keys produced using 3D printing.


Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2016 | 2016

Evaluation of the use of laser scanning to create key models for 3D printing separate from and augmenting visible light sensing

Jeremy Straub; Scott Kerlin

This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the easiness of gaining the required data for key production and an understanding of how well keys produced under this method work. The results of an experiment to characterize this are discussed and generalized to different key types. The effect of alternate sources of data on imaging requirements is considered.

Collaboration


Dive into the Scott Kerlin's collaboration.

Top Co-Authors

Avatar

Jeremy Straub

Oklahoma State University–Stillwater

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ronald Marsh

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar

Michael Hirsch

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar

Michael Parsons

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar

Pann Ajjimaporn

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar

Skye Leake

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar

Thomas McGuire

University of North Dakota

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benjamin Kading

University of North Dakota

View shared research outputs
Researchain Logo
Decentralizing Knowledge