Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 46

Full-Text Articles in Engineering

Quantum Computing And Its Applications In Healthcare, Vu Giang Jan 2023

Quantum Computing And Its Applications In Healthcare, Vu Giang

OUR Journal: ODU Undergraduate Research Journal

This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.


Science And Food Fictions: Agricultural Technologies, The Evolution Of The Modern Industrial Diet, And Calls For A Food Revolution, Tracey Daniels-Lerberg Sep 2022

Science And Food Fictions: Agricultural Technologies, The Evolution Of The Modern Industrial Diet, And Calls For A Food Revolution, Tracey Daniels-Lerberg

Green Humanities: A Journal of Ecological Thought in Literature, Philosophy & the Arts

[First paragraph] Individual food choices are culturally and historically contingent practices that arise through an amalgamation of often hidden political, scientific, and economic policies that shape desire and influence access. Food, like all other man-made mechanisms of control and authority, has been used “as a political tool for […] subjugating (either economically or politically) other nations” according to William A. Dando, a professor at the University of North Dakota, who in 1975 urged American agricultural officials not to use food as “a weapon” against starving nations, something he feared was eminently possible given the economic and political climate of agricultural …


The Development Of An Inexpensive Alternative To Industry Solar Simulators, Raines A. Vanhuss Jan 2022

The Development Of An Inexpensive Alternative To Industry Solar Simulators, Raines A. Vanhuss

OUR Journal: ODU Undergraduate Research Journal

Solar cells are a prominent renewable energy source used in the twenty-first century. In order for the technology to grow, research lab equipment is needed to measure and characterizes these cells. This report covers solar simulator devices and proposes an alternative design solution to lessen the cost of solar cell lab equipment. Common household light sources were tested by generating I-V characteristics using an amorphous silicon solar cell. The light bulb that generated the best I-V curve was selected and then tested for the optimal distance between the light source and the solar panel. The alternative solar simulator was then …


Reconstructing The Radio, Daniel Burzek, Otilia Popescu Jan 2022

Reconstructing The Radio, Daniel Burzek, Otilia Popescu

OUR Journal: ODU Undergraduate Research Journal

The goal of the research presented in this paper is to examine the techniques used for the construction of early radios, specifically crystal radios. The paper begins with a brief summary of the history that led to the transition from wired to wireless communication. Next, the paper examines the components used in building a crystal radio including basic antenna design and the resonant circuit, and it also takes a close look at the point-contact rectifier, which was a catalyst in the use of radio waves for communications and allowed for even the most inexperienced person to construct their own home …


Fixed-Point Proximity Minimization: A Theoretical Review And Numerical Study, Daniel Weddle, Jianfeng Guo Jan 2021

Fixed-Point Proximity Minimization: A Theoretical Review And Numerical Study, Daniel Weddle, Jianfeng Guo

OUR Journal: ODU Undergraduate Research Journal

This study examines the relatively recent development of a “fixed-point proximity” approach to one type of minimization problem, considers its application to image denoising, and explores convergence and divergence of the iterative algorithm beyond a (previously supplied) theoretically guaranteed convergence bound on one of the parameters (𝜆). While reviewing the fixed-point proximity approach and its application to image denoising, we aim to communicate the concepts and details in a way that will facilitate understanding for undergraduates and for scholars from other subfields. In the latter portion of our study, the numerical experiment provides thought-provoking data on the effects that parameters …


Human Supremacy As Posthuman Risk, Daniel Estrada Jul 2020

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …


Detection Of Rouge Drones Based On Radio Frequency Classification, Akash V. Gosai, Sachin Shetty Jun 2020

Detection Of Rouge Drones Based On Radio Frequency Classification, Akash V. Gosai, Sachin Shetty

OUR Journal: ODU Undergraduate Research Journal

The current classification of RF signals from the drone is achieved by leveraging raw signal information of a specific band. The modulation scheme that was found prevailing in commercial drones is Orthogonal Frequency Division Multiplexing (OFDM). OFDM can demodulated to provide information about a raw drone signal. This extracted data is coupled with a machine learning algorithm that is used to classify the signal. Testing of this research is needed to identify better equipment and an optimized test scenario that captures quality data that can be used to train a machine learning algorithm.


Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger May 2020

Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger

The Journal of Sociotechnical Critique

For the last decade, I’ve been studying the topic of the driving impairment of smartphones. While this began as an exclusively academic project, it has increasingly compelled public engagement. One example of this came in an opinion piece I wrote in 2018 in response to a new traffic law. I take the opportunity here to fill out the academic backstory of this particular op-ed, reflect on how this larger project has evolved to include an unanticipated public-facing edge, and abstract some lessons about public writing.


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun Jan 2020

The Influence Of Blockchain Technology On Fraud And Fake Protection, Youngju Yun

OUR Journal: ODU Undergraduate Research Journal

No abstract provided.


Cognitive Resource Management In 5g Networks, Kelvin M. Franco-Argueta Jan 2020

Cognitive Resource Management In 5g Networks, Kelvin M. Franco-Argueta

OUR Journal: ODU Undergraduate Research Journal

The 4G LTE network offers a high speed connectivity that is predicated on the construction platform of the 3G network and relies on an Internet Protocol (IP) for data transmission and reception. This platform’s utility is quickly becoming exhausted as the frequency spectrum approaches maximum device connectivity capacity. To improve network capacity, we must expand the bandwidth that our devices operate on. To effectively carry out this task, a self-configurable network must be employed in the development of the 5g network. This article aims to explore the technologies which form the platform for the 5G network and the cognitive resource …


Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice Jan 2020

Topical Review Of Vulnerability Management For Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice

OUR Journal: ODU Undergraduate Research Journal

The progress towards an interconnected digital world offers an exciting level of advancement for humanity. Unfortunately, this “online” connection is not safe from the threats and dangers typically associated with physical operations. With the foundation of Cyber Command of DoD cyberspace, the United States Government is taking a prominent stance in cyberspace operations. Like the federal government, both industries and individuals are not immune and are oftentimes unknowingly at risk to cyberattack. This report hopes to bring awareness to common vulnerabilities in multi-user networks by describing a historical background on cyber security as well as outlining current methods of vulnerability …


Application Of Quantum Cryptography To Cybersecurity And Critical Infrastructures In Space Communications, Rita Meraz, Linda Vahala Jan 2020

Application Of Quantum Cryptography To Cybersecurity And Critical Infrastructures In Space Communications, Rita Meraz, Linda Vahala

OUR Journal: ODU Undergraduate Research Journal

As society becomes more dependent on technology and the internet, critical infrastructure, which provides the fundamental services that millions of people depend on, becomes more vulnerable to cyber threats. This paper presents the importance of cybersecurity in critical infrastructure addressing the communications sector which is prevailed by space systems. It gives an overview of laser communications via satellite, and it argues the utility that quantum cryptography can provide to secure the data transmitted between communication satellites and ground stations from cyber attacks. Common encryption algorithms are briefly introduced as well as a review on quantum computing. Quantum cryptography is still …


Systemic Analysis Of The Use Of Artificial Intelligence (Ai) In Regulating Terrorist Content On Social Media Ecosystem Using Functional Dependency Network Analysis (Fdna), Alaina Roman, C. Ariel Pinto Jan 2020

Systemic Analysis Of The Use Of Artificial Intelligence (Ai) In Regulating Terrorist Content On Social Media Ecosystem Using Functional Dependency Network Analysis (Fdna), Alaina Roman, C. Ariel Pinto

OUR Journal: ODU Undergraduate Research Journal

This research is a systemic analysis of emerging risks to the use Artificial Intelligence (AI) in regulating terrorist content on social media ecosystems using Functional Dependency Network Analysis (FDNA), a proven system-design-and-analysis tool). The research has three phases: 1) framing the problem by identifying and describing AI ecosystem elements as intended, implied and explicit objectives, discernible attributes, and performance indictors; 2) describing the idealized problem-solved scenario, which includes detailing ‘success’ states of the ecosystem; and 3) systemic risk analysis including identifying failure scenarios for each element and establishing causalities among elemental attributes leading to failure scenarios. This research contributes toward …


Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen May 2019

Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …


Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider May 2019

Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky May 2019

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …


A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche May 2019

A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …


A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean May 2019

A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Trust is defined as a belief of a human H (`the trustor') about the ability of an agent A (the `trustee') to perform future action(s). We adopt here dispositionalism and internalism about trust: H trusts A iff A has some internal dispositions as competences. The dispositional competences of A are high-level metacognitive requirements, in the line of a naturalized virtue epistemology. (Sosa, Carter) We advance a Bayesian model of two (i) confidence in the decision and (ii) model uncertainty. To trust A, H demands A to be self-assertive about confidence and able to self-correct its own models. In the Bayesian …


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie May 2019

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …


Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou May 2019

Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to …


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …


Effects Of Vacuuming Pervious Concrete On Infiltration Rate, Demetrios E. Maurakis, Eugene G. Maurakis Oct 2017

Effects Of Vacuuming Pervious Concrete On Infiltration Rate, Demetrios E. Maurakis, Eugene G. Maurakis

Virginia Journal of Science

The objectives of this research were twofold: test the infiltration rate of pervious concrete before and after vacuum cleaning, and assess infiltration variability over time. Infiltration tests were performed on a 558.2 m2 area of pervious concrete, divided into sixteen 0.35 m2 test areas in a parking area at the Science Museum of Virginia in Richmond, Virginia on five dates from November 4-December 30, 2013. Average infiltration rates (avg.= 22.8 and 36.3 L/m2/min) immediately after vacuuming were lower than those (avg.=30.7 and 41.3 L/m2/min) before vacuuming. We hypothesize that the vacuuming lifted materials towards the surface …


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …


Section Abstracts: Biomedical And General Engineering Apr 2016

Section Abstracts: Biomedical And General Engineering

Virginia Journal of Science

Abstracts of the Biomedical and General Engineering Section for the 94th Annual Virginia Academy of Science Meeting, May 18-20, 2016, at University of Mary Washington, Fredericksburg, VA.


Section Abstracts: Astronomy, Mathematics And Physics With Material Science May 2015

Section Abstracts: Astronomy, Mathematics And Physics With Material Science

Virginia Journal of Science

Abstracts of the Astronomy, Mathematics, and Physics with Material Science Section for the 93rd Annual Meeting of the Virginia Academy of Science, May 21-23, 2015, James Madison University, Richmond, Virginia


Section Abstracts: Biomedical And General Engineering May 2015

Section Abstracts: Biomedical And General Engineering

Virginia Journal of Science

Abstracts of the Biomedical and General Engineering Section for the 93rd Annual Meeting of the Virginia Academy of Science, May 21-23, 2015, James Madison University, Richmond, Virginia


Morris Leroy Spearman Apr 2015

Morris Leroy Spearman

Virginia Journal of Science

Obituary for Morris Leroy Spearman


Section Abstracts: Astronomy, Mathematics, And Physics With Materials Science Apr 2014

Section Abstracts: Astronomy, Mathematics, And Physics With Materials Science

Virginia Journal of Science

Abstracts of the Astronomy, Mathematics, and Physics with Materials Science Section for the 92nd Annual Meeting of the Virginia Academy of Science, May 13-15, 2014, Virginia Commonwealth University, Richmond, Virginia


Section Abstracts: Biomedical And General Engineering Apr 2014

Section Abstracts: Biomedical And General Engineering

Virginia Journal of Science

Abstracts of the Biomedical and General Engineering Section for the 92nd Annual Meeting of the Virginia Academy of Science, May 13-15, 2014, Virginia Commonwealth University, Richmond, Virginia