Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

The Future Possibility Of Consumer-Grade Quantum Computers, Peter Dolan May 2018

The Future Possibility Of Consumer-Grade Quantum Computers, Peter Dolan

Missouri S&T’s Peer to Peer

Quantum computers are rapidly evolving and are on the edge of becoming useful for the first time. The theoretical limit of computational speed for quantum computers would put even small-scale quantum computers well ahead of any classical computer. With more researchers attempting to build their own, it has become a race to see who can create the first truly useful quantum computer. Once such computers become both useful and prevalent, massive advancements in many fields of science can be achieved, leading to a scientific revolution. Advances in quantum computing lead some researchers and consumers to question whether the technology can …


The Viability Of Quantum Computing, Brennan Michael King May 2018

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that electronics may …


The Dangers Of Human-Like Bias In Machine-Learning Algorithms, Daniel James Fuchs May 2018

The Dangers Of Human-Like Bias In Machine-Learning Algorithms, Daniel James Fuchs

Missouri S&T’s Peer to Peer

Machine learning algorithms (MLAGs), frequently used in artificial intelligence (AI), rely on using patterns across sets of data to derive decision-making intelligence. In recent years, as society continues to give increasing authority to ML-driven AIs, these algorithms have demonstrated the ability to take on human-like discriminatory biases. Microsoft's "Tay," for example, a social media-based chatbot, went from resembling a normal teenage girl to displaying racist and sexist attitudes in a mere sixteen hours). Tay and many other ML-driven implementations across a wide variety of fields have replicated numerous human biases. In most cases, these human-like biases originated due to improper …


Defining Consciousness, Adam Bateman Aug 2017

Defining Consciousness, Adam Bateman

Missouri S&T’s Peer to Peer

A researcher trying to develop a conscious artificial intelligence or examine consciousness in plants would be completely unable to do so without first obtaining a clear, concise, and global definition. This idea is what originally inspired my research. The main method of research to be used will be to thoroughly examine scholarly articles pertaining to consciousness and different theories of the mind. After gathering data and different ideas, I will create a definition that is plausible, and is optimized in terms of being useful to researchers. Currently, the issue is that there are an incredible amount of mental features that …


Biosensors For Cancer Detection Applications, Shannon Griffin Aug 2017

Biosensors For Cancer Detection Applications, Shannon Griffin

Missouri S&T’s Peer to Peer

Cancer is one of the most deadly diseases, and current detection options are ineffective. Recently, a large amount of research has been conducted for the development of biosensors able to detect cancer biomarkers. Many biosensors have been created for cancer detecting purposes. I examined literature reviews outlining current biosensing methods. These reviews provided an overview of the sensing techniques that are currently in existence as well as evaluations of their effectiveness. I also read experimental reports that outline the construction of biosensors fabricated in laboratories and the results of their testings. These papers help to showcase the feasibility and effectiveness …


Exploring Potential Flaws And Dangers Involving Machine Learning Technology, David Nicholas Skoff Aug 2017

Exploring Potential Flaws And Dangers Involving Machine Learning Technology, David Nicholas Skoff

Missouri S&T’s Peer to Peer

This paper seeks to explore the ways in which machine learning and AI may influence the world in the future and the potential for the technology to be misused or exploited. In 1959 Arthur Samuel defined machine learning as “the field of study that gives computers the ability to learn without being explicitly programmed” (Munoz). This paper will also seek to find out if there is merit to the current worry that robots will take over some jobs based in cognitive abilities. In the past, a human was required to perform these jobs, but with the rise of more complex …


Network Security: Internet Protocol Version Six Security, Hannah Reinbolt Aug 2017

Network Security: Internet Protocol Version Six Security, Hannah Reinbolt

Missouri S&T’s Peer to Peer

It is no secret that the pool of public internet addresses available with Internet Protocol version Four (IPv4) is gone. (Morphy, 2011) Thus the migration to the more roomy Internet Protocol version Six (IPv6) has begun. This migration is a complex process including different security procedures and updates that require time and knowledge. This paper will dive into scientific writings, with databases like Scopus and IEEE, about various security risks in the IPv6 protocol such as tunneling practices, router issues and issues with Internet Protocol Security (IPsec). This paper will overview security practices to better clarify common vulnerabilities in IPv6. …


Graphene Valley, Daniel Applebaum Feb 2016

Graphene Valley, Daniel Applebaum

Missouri S&T’s Peer to Peer

Silicon Valley in northern California is the proverbial hub of technological innovation and industry. Its namesake derives from the fact that silicon acts as the main component in modern electronics; however, a new material called graphene is challenging its role. In its early years of research, it was evident that the qualities of graphene far exceeded expectations. Industries are going mad trying to come up with applications and consumer products. While headway has been made, it is hard to say how long it will take to see products advertising their new graphene capabilities. Before touch screens or graphene-based microprocessors can …


Innumeracy: The Product Of Misrepresentation, Elizabeth Cundiff Feb 2016

Innumeracy: The Product Of Misrepresentation, Elizabeth Cundiff

Missouri S&T’s Peer to Peer

Innumeracy refers to one’s inability to understand mathematics. Or, more simply, innumeracy is mathematical illiteracy. The main problem with innumeracy is the fact that most of society does not see it as a problem. In fact, many people boast about their innumeracy. Consider a table of five people at a restaurant: they split the check and attempt to calculate the tip. More often than not, at least one individual at the table will joke about the fact that they don’t know how to do make that simple calculation. This flippancy toward the prevalence of mathematics has become an accepted norm, …


Why Smart Watches Shouldn't Just Become A Trend: Using Smart Watches In The Treatment Of Diabetes, Caelan Rapp Feb 2016

Why Smart Watches Shouldn't Just Become A Trend: Using Smart Watches In The Treatment Of Diabetes, Caelan Rapp

Missouri S&T’s Peer to Peer

As mobile technologies have advanced, the idea of using them in health care applications has expanded greatly. In a 2011 paper by Boulos et al, the impact of mobile technology such as smartphones in health care was examined. Numerous benefits of the implementations were noted, such as how smartphones are able to provide a connection between both doctors and patients due to the network access capabilities of the device. Additionally, using the existing monitoring and sensor technologies on a smartphone can eliminate the need for other external devices, thus reducing the maintenance required by the patient. All in all, keeping …


The Implications Of Rfid Technology In University Id Cards, Michael Beaver Feb 2016

The Implications Of Rfid Technology In University Id Cards, Michael Beaver

Missouri S&T’s Peer to Peer

Radio frequency identification (RFID) chips have been rising in popularity because of their usefulness and convenience, and have now made their way into the ID cards of universities. An RFID chip is an identification device that, when powered by some nearby source, sends out a signal with information that was stored in the chip. RFID physical security systems work just like a lock and key, with the RFID chip acting as the key. Instead of having a unique pattern, RFID chips have an identification code that is read by the lock. Some RFID chips also hide this code behind a …


Cs In Hs: Promoting Computer Science Education In High School, Trevor Ross Feb 2016

Cs In Hs: Promoting Computer Science Education In High School, Trevor Ross

Missouri S&T’s Peer to Peer

The world is in the midst of a technology revolution. Each day, new computing devices are introduced, hundreds of new websites are created, and people who have never used the Internet are trying it out for the first time. Nearly two thirds of Americans currently own a smartphone, and that number will only continue to climb (Fingas, 2014). Even cars, thermostats and refrigerators are becoming computerized and connected. This isn't groundbreaking information; most people are aware of this. What isn’t common knowledge, however, is who creates this technology. How does Google always seem to know exactly what you are asking …