Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Applied Mathematics (1)
- Arts and Humanities (1)
- Communication (1)
- Computer Engineering (1)
-
- Computer and Systems Architecture (1)
- Critical and Cultural Studies (1)
- Digital Humanities (1)
- Engineering (1)
- Feminist, Gender, and Sexuality Studies (1)
- Gender, Race, Sexuality, and Ethnicity in Communication (1)
- Information Security (1)
- Metaphysics (1)
- OS and Networks (1)
- Other Applied Mathematics (1)
- Other Philosophy (1)
- Philosophy (1)
- Physics (1)
- Quantum Physics (1)
- Race, Ethnicity and Post-Colonial Studies (1)
- Science and Technology Studies (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Theory and Algorithms (1)
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Quantum Computing And Its Applications In Healthcare, Vu Giang
Quantum Computing And Its Applications In Healthcare, Vu Giang
OUR Journal: ODU Undergraduate Research Journal
This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In 2017, Amazon discontinued an attempt at developing a hiring algorithm which would enable the company to streamline its hiring processes due to apparent gender discrimination. Specifically, the algorithm, trained on over a decade’s worth of resumes submitted to Amazon, learned to penalize applications that contained references to women, that indicated graduation from all women’s colleges, or otherwise indicated that an applicant was not male. Amazon’s algorithm took up the history of Amazon’s applicant pool and integrated it into its present “problematic situation,” for the purposes of future action. Consequently, Amazon declared the project a failure: even after attempting to …
A Comparative Study On Machine Learning Algorithms For Network Defense, Abdinur Ali, Yen-Hung Hu, Chung-Chu (George) Hsieh, Mushtaq Khan
A Comparative Study On Machine Learning Algorithms For Network Defense, Abdinur Ali, Yen-Hung Hu, Chung-Chu (George) Hsieh, Mushtaq Khan
Virginia Journal of Science
Network security specialists use machine learning algorithms to detect computer network attacks and prevent unauthorized access to their networks. Traditionally, signature and anomaly detection techniques have been used for network defense. However, detection techniques must adapt to keep pace with continuously changing security attacks. Therefore, machine learning algorithms always learn from experience and are appropriate tools for this adaptation. In this paper, ten machine learning algorithms were trained with the KDD99 dataset with labels, then they were tested with different dataset without labels. The researchers investigate the speed and the efficiency of these machine learning algorithms in terms of several …