Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li Dec 2021

Evaluating Technology-Mediated Collaborative Workflows For Telehealth, Christopher Bondy Ph.D., Pengcheng Shi, Pamela Grover Md, Vicki Hanson, Linlin Chen, Rui Li

Articles

Goals: This paper discusses the need for a predictable method to evaluate gains and gaps of collaborative technology-mediated workflows and introduces an evaluation framework to address this need. Methods: The Collaborative Space Analysis Framework (CS-AF), introduced in this research, is a cross-disciplinary evaluation method designed to evaluate technology-mediated collaborative workflows. The 5-step CS-AF approach includes: (1) current-state workflow definition, (2) current-state (baseline) workflow assessment, (3) technology-mediated workflow development and deployment, (4) technology-mediated workflow assessment, (5) analysis, and conclusions. For this research, a comprehensive, empirical study of hypertension exam workflow for telehealth was conducted using the CS-AF approach. Results: The CS-AF …


Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko Jan 2021

Predictive Modeling Of Critical Temperatures In Superconducting Materials, Markus Hofmann, Natalia Sizochenko

Articles

n this study, we have investigated quantitative relationships between critical temperaturesof superconductive inorganic materials and the basic physicochemical attributes of these materials(also called quantitative structure-property relationships). We demonstrated that one of the mostrecent studies (titled "A data-driven statistical model for predicting the critical temperature of asuperconductor” and published in Computational Materials Science by K. Hamidieh in 2018) reportson models that were based on the dataset that contains 27% of duplicate entries. We aimed todeliver stable models for a properly cleaned dataset using the same modeling techniques (multiplelinear regression, MLR, and gradient boosting decision trees, XGBoost). The predictive ability ofour best …


Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao Dec 2020

Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao

Articles

It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …


Comparing Tagging Suggestion Models On Discrete Corpora, Bojan Bozic, Andre Rios, Sarah Jane Delany Jan 2020

Comparing Tagging Suggestion Models On Discrete Corpora, Bojan Bozic, Andre Rios, Sarah Jane Delany

Articles

This paper aims to investigate the methods for the prediction of tags on a textual corpus that describes diverse data sets based on short messages; as an example, the authors demonstrate the usage of methods based on hotel staff inputs in a ticketing system as well as the publicly available StackOverflow corpus. The aim is to improve the tagging process and find the most suitable method for suggesting tags for a new text entry.


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly Jan 2017

Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly

Articles

n recent years, data analytics has been a growing phenomenon in many fields, including sport, and there has been an increased focus on how technology will impact the work of coaching andperformance professionals. This paper provides a reflection of the use of data analytics within the Gaelic Athletic Association’s (GAA) football coaching practice in Ireland, and evaluates for coaches how to enhance kick- out distribution and effectiveness. Specifically, the study aimed to dissect and analyse kick- out strategies to assess from a coaching perspective, the impact on distribution andeffectiveness. The research is a …


Mobilaudio – A Multimodal Content Delivery Platform For Geo-Services, James Carswell, Keith Gardiner, Charlie Cullen Mar 2016

Mobilaudio – A Multimodal Content Delivery Platform For Geo-Services, James Carswell, Keith Gardiner, Charlie Cullen

Articles

Delivering high-quality context-relevant information in a timely manner is a priority for location-based services (LBS) where applications require an immediate response based on spatial interaction. Previous work in this area typically focused on ever more accurately determining this interaction and informing the user in the customary graphical way using the visual modality. This paper describes the research area of multimodal LBS and focuses on audio as the key delivery mechanism. This new research extends familiar graphical information delivery by introducing a geoservices platform for delivering multimodal content and navigation services. It incorporates a novel auditory user interface (AUI) that enables …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder Aug 2013

Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder

Articles

The primary objective of college education in applied disciplines is that it is relevant to the expectations for new professionals entering the labor market. Academic institutions should therefore pay close attention to the ever-changing skills and knowledge expectations in the labor market. These trends are not easy to track, however. Surveys of new professionals about their experiences in their first jobs or surveys of employers about their experiences with new hires suffer from low response rates, nonresponse bias, and the one-time nature of survey research. A better way to track labor market trends is to continually analyze human factors job …


Indoor Positioning For Smartphones Using Asynchronous Ultrasound Trilateration, Viacheslav Filonenko, Charlie Cullen, James Carswell Jun 2013

Indoor Positioning For Smartphones Using Asynchronous Ultrasound Trilateration, Viacheslav Filonenko, Charlie Cullen, James Carswell

Articles

Modern smartphones are a great platform for Location Based Services (LBS). While outdoor LBS for smartphones has proven to be very successful, indoor LBS for smartphones has not yet fully developed due to the lack of an accurate positioning technology. In this paper we present an accurate indoor positioning approach for commercial off-the-shelf (COTS) smartphones that uses the innate ability of mobile phones to produce ultrasound, combined with Time-Difference-of-Arrival (TDOA) asynchronous trilateration. We evaluate our indoor positioning approach by describing its strengths and weaknesses, and determine its absolute accuracy. This is accomplished through a range of experiments that involve variables …


Spatial Search Techniques For Mobile 3d Queries In Sensor Web Environments, Junjun Yin, James Carswell Mar 2013

Spatial Search Techniques For Mobile 3d Queries In Sensor Web Environments, Junjun Yin, James Carswell

Articles

Developing mobile geo-information systems for sensor web applications involves technologies that can access linked geographical and semantically related Internet information. Additionally, in tomorrow’s Web 4.0 world, it is envisioned that trillions of inexpensive micro-sensors placed throughout the environment will also become available for discovery based on their unique geo-referenced IP address. Exploring these enormous volumes of disparate heterogeneous data on today’s location and orientation aware smartphones requires context-aware smart applications and services that can deal with “information overload”. 3DQ (Three Dimensional Query) is our novel mobile spatial interaction (MSI) prototype that acts as a next-generation base for human interaction within …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …


Mobile Visibility Querying For Lbs, James Carswell, Keith Gardiner, Junjun Jin Dec 2010

Mobile Visibility Querying For Lbs, James Carswell, Keith Gardiner, Junjun Jin

Articles

This article describes research carried out in the area of mobile spatial interaction (MSI) and the development of a 3D mobile version of a 2D web-based directional query processor. The TellMe application integrates location (from GPS, GSM, WiFi) and orientation (from magnetometer/accelerometer) sensor technologies into an enhanced spatial query processing module capable of exploiting a mobile device’s position and orientation for querying real-world spatial datasets. This article outlines our technique for combining these technologies and the architecture needed to deploy them on a sensor enabled smartphone (i.e. Nokia Navigator 6210). With all these sensor technologies now available on off-the-shelf devices, …


3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin Aug 2010

3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin

Articles

3DQ (Three Dimensional Query) is our mobile spatial interaction (MSI) prototype for location and orientation aware mobile devices (i.e. today's sensor enabled smartphones). The prototype tailors a military style threat dome query calculation using MSI with hidden query removal functionality for reducing “information overload” on these off-the-shelf devices. The effect gives a more accurate and expected query result for Location-Based Services (LBS) applications by returning information on only those objects visible within a user’s 3D field-of-view. Our standardised XML based request/response design enables any mobile device, regardless of operating system and/or programming language, to access the 3DQ web-service interfaces.


Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton Jan 2010

Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton

Articles

While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


A Generic Approach To Computer-Based Clinical Practice Guideling Management Using The Eca Rule Paradigm And Active Databases, Bing Wu, Kudakwashe Dube Jan 2009

A Generic Approach To Computer-Based Clinical Practice Guideling Management Using The Eca Rule Paradigm And Active Databases, Bing Wu, Kudakwashe Dube

Articles

The increasing demand for reduced cost and improved quality of service in healthcare has prompted the call for better management of medical knowledge. The main emphasis has been on knowledge that is acquired through experience and medical research and then formalised into Clinical Practice Guidelines (CPGs). This paper presents a generic approach to CPG information and knowledge management that uses the Event-Condition-Action (ECA) rule paradigm and active databases within a unified management framework. The paper focuses on an approach for facilitating the use and management of CPGs by clinicians through delivering the CPGs at the point-of-care by a computerised mechanism.


Printed Document Authentication Using Texture Coding, Jonathan Blackledge, Khaled Mahmoud Jan 2009

Printed Document Authentication Using Texture Coding, Jonathan Blackledge, Khaled Mahmoud

Articles

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton Jan 2006

Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton

Articles

Computer software is somewhat of a problem child for intellectual property law. Courts and legislatures have struggled to encourage innovations in software development while, at the same time, attempting to avoid undesirable digital information monopolies. Neither the patent nor the copyright system has provided a particularly satisfactory paradigm for software protection. Although patents have received greater attention than copyrights in the software context (consider, for example, the recent BlackBerry case), copyright law arguably creates more insidious undercurrents in today's marketplace. This is partly because we have not yet appreciated the potential impact of recent developments in programming methodology and digital …


Capturing The Dialectic Between Principles And Cases, Kevin D. Ashley Jan 2004

Capturing The Dialectic Between Principles And Cases, Kevin D. Ashley

Articles

Theorists in ethics and law posit a dialectical relationship between principles and cases; abstract principles both inform and are informed by the decisions of specific cases. Until recently, however, it has not been possible to investigate or confirm this relationship empirically. This work involves a systematic study of a set of ethics cases written by a professional association's board of ethical review. Like judges, the board explains its decisions in opinions. It applies normative standards, namely principles from a code of ethics, and cites past cases. We hypothesized that the board's explanations of its decisions elaborated upon the meaning and …


Designing Electronic Casebooks That Talk Back: The Cato Program, Kevin D. Ashley Jan 2000

Designing Electronic Casebooks That Talk Back: The Cato Program, Kevin D. Ashley

Articles

Electronic casebooks offer important benefits of flexibility in control of presentation, connectivity, and interactivity. These additional degrees of freedom, however, also threaten to overwhelm students. If casebook authors and instructors are to achieve their pedagogical goals, they will need new methods for guiding students. This paper presents three such methods developed in an intelligent tutoring environment for engaging students in legal role-playing, making abstract concepts explicit and manipulable, and supporting pedagogical dialogues. This environment is built around a program known as CATO, which employs artificial intelligence techniques to teach first-year law students how to make basic legal arguments with cases. …


A Formal Preparation For Object-Oriented Query Optimisation, Catherine Higgins Jan 1996

A Formal Preparation For Object-Oriented Query Optimisation, Catherine Higgins

Articles

This paper describes work that is in progress on a formalised preparation to object-oriented query optimisation. Such preparation is conducive to the development of optimisation strategies. As an example of a formal preparation, this paper presents a formalised object algebra, a suggested optimisation method and an implementation of an algebraic converter suitable for DAPLEX.