Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Physical Sciences and Mathematics

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 41

Full-Text Articles in Psychology

Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani Mar 2024

Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani

Undergraduate Research Symposium

Vigilance decrement is the decline in the ability to monitor and detect behaviorally important signals over time, a phenomenon that can arise even after 30 minutes of watch (Mackworth, 1948). Recently, McCarley & Yamani (2021) found bias shifts, sensitivity losses, and attentional lapses contribute to vigilance decrement, but when each effect is isolated, there was little evidence that sensitivity loss affected vigilance decrement. With the introduction of partially autonomous vehicles, vigilance decrement may be problematic for drivers who must monitor the autonomous system for failures and takeover requests. Thus, this pilot study aims to extend McCarley and Yamani (2021) and …


Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong Jan 2024

Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong

Computer Science Faculty Publications

Neurological disabilities cause diverse health and mental challenges, impacting quality of life and imposing financial burdens on both the individuals diagnosed with these conditions and their caregivers. Abnormal brain activity, stemming from malfunctions in the human nervous system, characterizes neurological disorders. Therefore, the early identification of these abnormalities is crucial for devising suitable treatments and interventions aimed at promoting and sustaining quality of life. Electroencephalogram (EEG), a non-invasive method for monitoring brain activity, is frequently employed to detect abnormal brain activity in neurological and mental disorders. This study introduces an approach that extends the understanding and identification of neurological disabilities …


The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel Oct 2023

The Prevalence Of Burnout In Saudi Arabia Dental Hygienists, Nouf Hamad Aldayel

Dental Hygiene Theses & Dissertations

Purpose: The purpose of this pilot study was to assess the prevalence of burnout in Saudi Arabian dental hygienists and identify risk factors associated with burnout. Methods: A descriptive survey design using the Copenhagen Burnout Inventory (CBI) assessed burnout among a convenience sample of n=123 Saudi dental hygienists. The survey was disseminated electronically to 1,000 Saudi Arabian dental hygienists. The CBI measures three subscales: personal, work-related, and client/patient-related burnout on a five-point Likert-type scale. The survey also included six demographic questions, two Likert-type, one “yes/no,” and one openended question, related to burnout. Descriptive statistics, one-way between subject’s ANOVA, independent samples …


A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes Oct 2023

A New Method To Determine The Posterior Distribution Of Coefficient Alpha, John Mart V. Delosreyes

Psychology Theses & Dissertations

There is a focus within the behavioral/social sciences on non-physical, psychological constructs (i.e., constructs). These constructs are indirectly measured using measurement instruments that consist of questions that capture the manifestations of these constructs. The indirect nature of measuring constructs results in a need of ensuring that measurement instruments are reliable. The most popular statistic used to estimate reliability is coefficient alpha as it is easy to compute and has properties that make it desirable to use. Coefficient alpha’s popularity has resulted in a wide breadth of research into its qualities. Notably, research about coefficient alpha’s distribution has led to developments …


Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull Jan 2023

Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull

Philosophy Faculty Publications

Hypothetical thought experiments allow researchers to gain insights into widespread moral intuitions and provide opportunities for individuals to explore their moral commitments. Previous thought experiment studies in virtual reality (VR) required participants to come to an on-site laboratory, which possibly restricted the study population, introduced an observer effect, and made internal reflection on the participants’ part more difficult. These shortcomings are particularly crucial today, as results from such studies are increasingly impacting the development of artificial intelligence systems, self-driving cars, and other technologies. This paper explores the viability of deploying thought experiments in commercially available in-home VR headsets. We conducted …


Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen Jan 2023

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen

Psychology Faculty Publications

Objective

We investigated secondary–task–based countermeasures to the vigilance decrement during a simulated partially automated driving (PAD) task, with the goal of understanding the underlying mechanism of the vigilance decrement and maintaining driver vigilance in PAD.

Background

Partial driving automation requires a human driver to monitor the roadway, but humans are notoriously bad at monitoring tasks over long periods of time, demonstrating the vigilance decrement in such tasks. The overload explanations of the vigilance decrement predict the decrement to be worse with added secondary tasks due to increased task demands and depleted attentional resources, whereas the underload explanations predict the vigilance …


Light Water Sustainability Program: Optimizing Information Automation Using A New Method Based On System-Theoretic Process Analysis, Jeffrey Joe, Larry Hettinger, Marvin Dainoff, Patrick Murray, Yusuke Yamani Jan 2023

Light Water Sustainability Program: Optimizing Information Automation Using A New Method Based On System-Theoretic Process Analysis, Jeffrey Joe, Larry Hettinger, Marvin Dainoff, Patrick Murray, Yusuke Yamani

Psychology Faculty Publications

This report describes the interim progress for research supporting the design and optimization of information automation systems for nuclear power plants. Much of the domestic nuclear fleet is currently focused on modernizing technologies and processes, including transitioning toward digitalization in the control room and elsewhere throughout the plant, along with a greater use of automation, artificial intelligence, robotics, and other emerging technologies. While there are significant opportunities to apply these technologies toward greater plant safety, efficiency, and overall cost-effectiveness, optimizing their design and avoiding potential safety and performance risks depends on ensuring that human-performance-related organizational and technical design issues are …


Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray Aug 2022

Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray

Electrical & Computer Engineering Theses & Dissertations

Affective computing is an exciting and transformative field that is gaining in popularity among psychologists, statisticians, and computer scientists. The ability of a machine to infer human emotion and mood, i.e. affective states, has the potential to greatly improve human-machine interaction in our increasingly digital world. In this work, an ensemble model methodology for detecting human emotions across multiple subjects is outlined. The Continuously Annotated Signals of Emotion (CASE) dataset, which is a dataset of physiological signals labeled with discrete emotions from video stimuli as well as subject-reported continuous emotions, arousal and valence, from the circumplex model, is used for …


Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna Mar 2022

Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna

Undergraduate Research Symposium

Human-autonomy teaming (HAT) has become an important area of research due to the autonomous systems being developed for different applications, such as remotely controlled aircraft. Many remotely controlled vehicles will be controlled by automated systems, with a human monitor that may be monitoring multiple vehicles simultaneously. The attention and working memory capacity of operators of remote-controlled vehicles must be maintained at appropriate levels during operation. However, there is currently no direct method of determining working memory capacity, which is important because it is a measure for how memory is being stored for a short term and interacting with long term …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna Jan 2022

Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna

Computer Science Faculty Publications

Our subjective visual experiences involve complex interaction between our eyes, our brain, and the surrounding world. It gives us the sense of sight, color, stereopsis, distance, pattern recognition, motor coordination, and more. The increasing ubiquity of gaze-aware technology brings with it the ability to track gaze and pupil measures with varying degrees of fidelity. With this in mind, a review that considers the various gaze measures becomes increasingly relevant, especially considering our ability to make sense of these signals given different spatio-temporal sampling capacities. In this paper, we selectively review prior work on eye movements and pupil measures. We first …


The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez Nov 2021

The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez

Political Science & Geography Faculty Publications

This paper contends that Maritime Domain Awareness Center (MDAC) design should be a holistic approach integrating established knowledge about human factors, decision making, cognitive tasks, complexity science, and human information interaction. The design effort should not be primarily a technology effort that focuses on computer screens, information feeds, display technologies, or user interfaces. The existence of a room with access to vast amounts of information and wall-to-wall video screens of ships, aircraft, weather data, and other regional information does not necessarily correlate to possessing situation awareness. Fundamental principles of human-centered information design should guide MDAC design and technology selection, and …


Analysis Of Reading Patterns Of Scientific Literature Using Eye-Tracking Measures, Gavindya Jayawardena, Sampath Jayarathna, Jian Wu Apr 2021

Analysis Of Reading Patterns Of Scientific Literature Using Eye-Tracking Measures, Gavindya Jayawardena, Sampath Jayarathna, Jian Wu

College of Sciences Posters

Scientific literature is crucial for researchers to inspire novel research ideas and find solutions to various problems. This study presents a reading task for novice researchers using eye-tracking measures. The study focused on the scan paths, fixation, and pupil dilation frequency of the participants. In this study, 3 participants were asked to read a pre-selected research paper while wearing an eye-tracking device (PupilLabs Core 200Hz). We specified sections of the research paper as areas of interest (title, abstract, motivation, methodology, conclusion)to analyze the eye-movements. Then we extracted eye-movements data from the recordings and processed them using an eye-movement processing pipeline. …


Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz Jan 2021

Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz

VMASC Publications

Over the last few years, the Human Factors and Ergonomics (HF/E) discipline has significantly benefited from new human-centric engineered digital solutions of the 4.0 industrial age. Technologies are creating new socio-technical interactions between human and machine that minimize the risk of design-induced human errors and have largely contributed to remarkable improvements in terms of process safety, productivity, quality, and workers’ well-being. However, despite the Oil&Gas (O&G) sector is one of the most hazardous environments where human error can have severe consequences, Industry 4.0 aspects are still scarcely integrated with HF/E. This paper calls for a holistic understanding of the changing …


Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen Jan 2021

Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen

Educational Foundations & Leadership Faculty Publications

Adaptive learning is an educational method that uses computer algorithms and artificial intelligence (AI) to customize learning materials and activities based on each user's model. Adaptive learning has been used for more than 20 years. However, it is still unique, and no other system could bring more or even similar capabilities than the ones adaptive technology offers, including the application of AI, psychology, psychometrics, machine learning, and providing a personalized learning environment. However, there are not many studies on its practicality, usefulness, improving students' learning skills, students' perception, etc., due to the limited number of institutes investing in this new …


Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan Jan 2021

Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

Incorporating human behavior is a current challenge for agent-based modeling and simulation (ABMS). Human behavior includes many different aspects depending on the scenario considered. The scenario context of this paper is strategic coalition formation, which is traditionally modeled using cooperative game theory, but we use ABMS instead; as such, it needs to be validated. One approach to validation is to compare the recorded behavior of humans to what was observed in our simulation. We suggest that using an interactive simulation is a good approach to collecting the necessary human behavior data because the humans would be playing in precisely the …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker Dec 2020

The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker

Psychology Theses & Dissertations

The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …


Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller Apr 2020

Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller

Psychology Theses & Dissertations

System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …


Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin Jan 2019

Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

The classification of facial expression has been extensively studied using adult facial images which are not appropriate ground truths for classifying facial expressions in children. The state-of-the-art deep learning approaches have been successful in the classification of facial expressions in adults. A deep learning model may be better able to learn the subtle but important features underlying child facial expressions and improve upon the performance of traditional machine learning and feature extraction methods. However, unlike adult data, only a limited number of ground truth images exist for training and validating models for child facial expression classification and there is a …


A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna Jan 2019

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common neurological disorders among children, that affects different areas in the brain that allows executing certain functionalities. This may lead to a variety of impairments such as difficulties in paying attention or focusing, controlling impulsive behaviours and overreacting. The continuous symptoms may have a severe impact in the long-term. This paper explores the ADHD identification studies using eye movement data and functional Magnetic Resonance Imaging (fMRI). This study discusses different machine learning techniques, existing models and analyses the existing literature. We have identified the current challenges and possible future directions …


The Use Of Item Response Theory In Survey Methodology: Application In Seat Belt Data, Mark K. Ledbetter, Norou Diawara, Bryan E. Porter Jan 2018

The Use Of Item Response Theory In Survey Methodology: Application In Seat Belt Data, Mark K. Ledbetter, Norou Diawara, Bryan E. Porter

Mathematics & Statistics Faculty Publications

Problem: Several approaches to analyze survey data have been proposed in the literature. One method that is not popular in survey research methodology is the use of item response theory (IRT). Since accurate methods to make prediction behaviors are based upon observed data, the design model must overcome computation challenges, but also consideration towards calibration and proficiency estimation. The IRT model deems to be offered those latter options. We review that model and apply it to an observational survey data. We then compare the findings with the more popular weighted logistic regression. Method: Apply IRT model to the observed data …


Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu Jan 2017

Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu

Information Technology & Decision Sciences Faculty Publications

Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An important research question to explore is to what extent gender plays a role in mediating the factors that affect cybersecurity beliefs and behaviors of employees. In this vein, we conducted a cross-sectional survey study among employees of diverse organizations. We used structural equation modelling to assess the effect of gender as a …


Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii Oct 2016

Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii

Psychology Theses & Dissertations

Mediation and moderated mediation models are two commonly used models for indirect effects analysis. In practice, missing data is a pervasive problem in structural equation modeling with psychological data. Multiple imputation (MI) is one method used to estimate model parameters in the presence of missing data, while accounting for uncertainty due to the missing data. Unfortunately, commonly used MI methods are not equipped to handle categorical variables or nonlinear variables such as interactions. In this study, we introduce a general MI framework that uses the Bayesian bootstrap (BB) method to generate posterior inferences for indirect effects and gradient boosted machine …


Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad Jul 2016

Computational Modeling Of Facial Response For Detecting Differential Traits In Autism Spectrum Disorders, Manar D. Samad

Electrical & Computer Engineering Theses & Dissertations

This dissertation proposes novel computational modeling and computer vision methods for the analysis and discovery of differential traits in subjects with Autism Spectrum Disorders (ASD) using video and three-dimensional (3D) images of face and facial expressions. ASD is a neurodevelopmental disorder that impairs an individual’s nonverbal communication skills. This work studies ASD from the pathophysiology of facial expressions which may manifest atypical responses in the face. State-of-the-art psychophysical studies mostly employ na¨ıve human raters to visually score atypical facial responses of individuals with ASD, which may be subjective, tedious, and error prone. A few quantitative studies use intrusive sensors on …


Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor Jan 2015

Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor

Computational Modeling & Simulation Engineering Faculty Publications

Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The …


91st Annual Meeting Of The Virginia Academy Of Science: Proceedings May 2013

91st Annual Meeting Of The Virginia Academy Of Science: Proceedings

Virginia Journal of Science

Proceedings of the 91st Annual Meeting of the Virginia Academy of Science, held at Virginia Polytechnic Institute and State University, May 22-24, 2013.


A Three Dimensional Green's Function Solution Technique For The Transport Of Heavy Ions In Laboratory And Space, Candice Rockell Gerstner Apr 2011

A Three Dimensional Green's Function Solution Technique For The Transport Of Heavy Ions In Laboratory And Space, Candice Rockell Gerstner

Mathematics & Statistics Theses & Dissertations

In the future, astronauts will be sent into space for longer durations of time compared to previous missions. The increased risk of exposure to ionizing radiation, such as Galactic Cosmic Rays and Solar Particle Events, is of great concern. Consequently, steps must be taken to ensure astronaut safety by providing adequate shielding. The shielding and exposure of space travelers is controlled by the transport properties of the radiation through the spacecraft, its onboard systems and the bodies of the individuals themselves. Meeting the challenge of future space programs will therefore require accurate and efficient methods for performing radiation transport calculations …