Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

United States

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur Jan 2023

Convolutional-Neural-Network-Based Des-Level Aerodynamic Flow Field Generation From Urans Data, John P. Romano, Oktay Baysal, Alec C. Brodeur

Mechanical & Aerospace Engineering Faculty Publications

The present paper culminates several investigations into the use of convolutional neural networks (CNNs) as a post-processing step to improve the accuracy of unsteady Reynolds-averaged Navier–Stokes (URANS) simulations for subsonic flows over airfoils at low angles of attack. Time-averaged detached eddy simulation (DES)-generated flow fields serve as the target data for creating and training CNN models. CNN post-processing generates flow-field data comparable to DES resolution, but after using only URANS-level resources and properly training CNN models. This document outlines the underlying theory and progress toward the goal of improving URANS simulations by looking at flow predictions for a class of …


Ai And The Future Of Work: What We Know Today, Steven M. Miller, Thomas H. Davenport Dec 2021

Ai And The Future Of Work: What We Know Today, Steven M. Miller, Thomas H. Davenport

Research Collection School Of Computing and Information Systems

To contribute to a better understanding of the contemporary realities of AI workplace deployments, the authors recently completed 29 case studies of people doing their everyday work with AI-enabled smart machines. Twenty-three of these examples were from North America, mostly in the US. Six were from Southeast Asia, mostly in Singapore. In this essay, we compare our findings on job and workplace impacts to those reported in the MIT Task Force on the Work of the Future report, as we consider that to be the most comprehensive recent study on this topic.


A Comparison Of Prospective Space-Time Scan Statistics And Spatiotemporal Event Sequence Based Clustering For Covid-19 Surveillance, Fuyu Xu, Kate Beard Jun 2021

A Comparison Of Prospective Space-Time Scan Statistics And Spatiotemporal Event Sequence Based Clustering For Covid-19 Surveillance, Fuyu Xu, Kate Beard

Teaching, Learning & Research Documents

The outbreak of the COVID-19 disease was first reported in Wuhan, China, in December 2019. Cases in the United States began appearing in late January. On March 11, the World Health Organization (WHO) declared a pandemic. By mid-March COVID-19 cases were spreading across the US with several hotspots appearing by April. Health officials point to the importance of surveillance of COVID-19 to better inform decision makers at various levels and efficiently manage distribution of human and technical resources to areas of need. The prospective space-time scan statistic has been used to help identify emerging COVID-19 disease clusters, but results from …


The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist May 2021

The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist

Honors Theses

Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …


A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey Apr 2020

A Comprehensive Cybersecurity Policy For The United States Government According To Cyberattacks And Exploits In The 21st Century, Diana Hallisey

Honors Program Contracts

Adversaries launch cyberattacks or cyber-exploits with contrasting intentions and desired outcomes. A cyberattack is a malicious attempt by a state, third party, or individual to disrupt a computer’s network; whereas, a cyber-exploit is an action that uncovers and steals “confidential” information from a computer’s data. 1 Within this research paper, the main adversary of such cyberattacks and/or exploits will be the nation-state. The victims of these cyberattacks will range from multinational corporations, such as Sony, to nuclear programs in Iran. This essay will focus on four motivations behind such cyberattacks: (1) private sector hacking (the theft of intellectual property) (2) …


The New Legal Landscape For Text Mining And Machine Learning, Matthew Sag Jan 2019

The New Legal Landscape For Text Mining And Machine Learning, Matthew Sag

Faculty Articles

Now that the dust has settled on the Authors Guild cases, this Article takes stock of the legal context for TDM research in the United States. This reappraisal begins in Part I with an assessment of exactly what the Authors Guild cases did and did not establish with respect to the fair use status of text mining. Those cases held unambiguously that reproducing copyrighted works as one step in the process of knowledge discovery through text data mining was transformative, and thus ultimately a fair use of those works. Part I explains why those rulings followed inexorably from copyright's most …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki Jan 2018

Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki

Cyber Security Capstone Research Project Reports

According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.

A …


A Uniform Database Of Teleseismic Shear-Wave Splitting Measurements For The Western And Central United States: December 2014 Update, Bin B. Yang, Kelly H. Liu, Haider H. Dahm, Stephen S. Gao Mar 2016

A Uniform Database Of Teleseismic Shear-Wave Splitting Measurements For The Western And Central United States: December 2014 Update, Bin B. Yang, Kelly H. Liu, Haider H. Dahm, Stephen S. Gao

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

We present a new version of a shear-wave splitting (SWS) database for the western and central United States (WCUS) using broadband seismic data recorded up to the end of 2014 to update a previous version that used data recorded prior to the end of 2012, when the USArray Transportable Array stations were still recording in the easternmost region of theWCUS. A total of 7452 pairs of additional measurements recorded by 1202 digital broadband seismic stations are obtained, and all the measurements in the previous database are rechecked. The resulting uniform SWS database contains a total of 23,448 pairs of well-defined …


A Comparison Of A Multistate Inpatient Ehr Database To The Hcup Nationwide Inpatient Sample., Jonathan P Deshazo, Mark A Hoffman Sep 2015

A Comparison Of A Multistate Inpatient Ehr Database To The Hcup Nationwide Inpatient Sample., Jonathan P Deshazo, Mark A Hoffman

Manuscripts, Articles, Book Chapters and Other Papers

BACKGROUND: The growing availability of electronic health records (EHRs) in the US could provide researchers with a more detailed and clinically relevant alternative to using claims-based data.

METHODS: In this study we compared a very large EHR database (Health Facts©) to a well-established population estimate (Nationwide Inpatient Sample). Weighted comparisons were made using t-value and relative difference over diagnoses and procedures for the year 2010.

RESULTS: The two databases have a similar distribution pattern across all data elements, with 24 of 50 data elements being statistically similar between the two data sources. In general, differences that were found are consistent …


Mantle Transition Zone Discontinuities Beneath The Contiguous United States, Stephen S. Gao, Kelly H. Liu Aug 2014

Mantle Transition Zone Discontinuities Beneath The Contiguous United States, Stephen S. Gao, Kelly H. Liu

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

Using over 310,000 high-quality radial receiver functions recorded by the USArray and other seismic stations in the contiguous United States, the depths of the 410 km and 660 km discontinuities (d410 and d660) are mapped in over 1,000 consecutive overlapping circles with a radius of 1⁰. The average mantle transition zone (MTZ) thickness for both the western and central/eastern U.S. is within 3 km from the global average of 250 km, suggesting an overall normal MTZ temperature beneath both areas. The Pacific Coast Ranges and the southern Basin and Range Province are underlain by a depressed d410, indicating higher-than-normal temperature …


A Uniform Database Of Teleseismic Shear Wave Splitting Measurements For The Western And Central United States, Kelly H. Liu, Ahmed Elsheikh, Awas Lemnifi, Uranbaigal Purevsuren, Melissa Ray, Hesham Refayee, Bin B. Yang, Youqiang Yu, Stephen S. Gao May 2014

A Uniform Database Of Teleseismic Shear Wave Splitting Measurements For The Western And Central United States, Kelly H. Liu, Ahmed Elsheikh, Awas Lemnifi, Uranbaigal Purevsuren, Melissa Ray, Hesham Refayee, Bin B. Yang, Youqiang Yu, Stephen S. Gao

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

We present a shear wave splitting (SWS) database for the western and central United States as part of a lasting effort to build a uniform SWS database for the entire North America. The SWS measurements were obtained by minimizing the energy on the transverse component of the PKS, SKKS, and SKS phases. Each of the individual measurements was visually checked to ensure quality. This version of the database contains 16,105 pairs of splitting parameters. The data used to generate the parameters were recorded by 1774 digital broadband seismic stations over the period of 1989-2012, and represented all the available data …


A Comparison Of Information Security Curricula In China And The Usa, Huaying Chen, Sean B. Maynard, Atif Ahmad Dec 2013

A Comparison Of Information Security Curricula In China And The Usa, Huaying Chen, Sean B. Maynard, Atif Ahmad

Australian Information Security Management Conference

Information Security (InfoSec) education varies in its content, focus and level of technicality across the world. In this paper we investigate the differences between graduate InfoSec programs in top universities in China and in the United States of America (USA). In China, curriculum emphasises Telecommunication, Computer Science and InfoSec Technology, whilst in the USA in addition to Computer Science and InfoSec Technology the curriculum also emphasises Enterprise‐level Security Strategy and Policy, InfoSec Management, and Cyber Law. The differences are significant and will have a profound impact on both the perceptions and capabilities of future generations of information security professionals on …


S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan Apr 2013

S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


A Model Of Icts Adoption For Sustainable Development: An Investigation Of Small Business In The United States And China, Jie Xiong, Sajda Qureshi Jan 2013

A Model Of Icts Adoption For Sustainable Development: An Investigation Of Small Business In The United States And China, Jie Xiong, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Factors Affecting Information And Communications Technology Adoption Of Small Businesses: Studies In China And United States, Jie Xiong, Sajda Qureshi Jan 2012

Factors Affecting Information And Communications Technology Adoption Of Small Businesses: Studies In China And United States, Jie Xiong, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Small businesses in China and United States generate the largest share of economic activity and employment. As the driving force behind the economic growth of both countries, Information and Communications Technology (ICTs) has fundamentally shaped the two countries. This research-in-progress paper reports the research model we conduct to analyze the factors that will affect ICTs adoption of small businesses in both countries. The purpose of the paper is to (1) report proposals of the current status of the research project (2) build an understanding of ICTs adoption in both countries (3) build the framework to explore the relationship between ICTs …


Analysis Of Information And Communications Technology Adoption Between Small Businesses In China And The United States, Jie Xiong, Sajda Qureshi Jan 2012

Analysis Of Information And Communications Technology Adoption Between Small Businesses In China And The United States, Jie Xiong, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

This paper reports on two case studies, the Information and Communications Technology (ICT) adoption among small businesses conducted in both United States and China. One small business from Nebraska (United States of America) and one small business from Sichuan (China) were chosen for comparison. The purpose of this paper is to conduct a comparative case study based on the ICT adoption among small businesses in China and the United States. This paper will: (i) build an understanding of small business ICT in both areas, (ii) explore the relationship between the ICT development in less cutting-edge areas of China and the …


Global Project Management: Pedagogy For Distributed Teams, Benjamin Kok Siew Gan, Randy Weinberg, Selma Limam Mansar May 2010

Global Project Management: Pedagogy For Distributed Teams, Benjamin Kok Siew Gan, Randy Weinberg, Selma Limam Mansar

Research Collection School Of Computing and Information Systems

This paper reflects on pedagogy for teaching collaborative global projects across universities in different countries. Over a period of four years, students at three universities - one in the United States, one in Singapore and one in the Middle East - enrolled in a course called "Global Project Management". In this course, coordinated across locations, students experience a global project with distant team members. We describe the course experience and student perceptions of the requisite skills, collaboration tools and challenges bearing on effective global project work.


Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead Jan 2008

Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead

Theses: Doctorates and Masters

In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …


Teaching "Global Project Management" With Distributed Team Projects, Randy Weinberg, Benjamin Gan Jun 2007

Teaching "Global Project Management" With Distributed Team Projects, Randy Weinberg, Benjamin Gan

Research Collection School Of Computing and Information Systems

The education of rising professionals must keep pace with changing forces of globalization and the realities of distributed work. Students who understand the basics of global project management, teamwork and collaboration are likely to find themselves at a competitive advantage over those who do not. This article describes the experiences in an undergraduate course called Global Project Management offered concurrently at two universities, one in the U.S. and one in Singapore, and incorporating collaborative student projects.


Neural Network Diagnosis Of Malignant Melanoma From Color Images, Fikret Erçal, Hsi-Chieh Lee, William V. Stoecker, Randy Hays Moss, Anurag Chawla Jan 1994

Neural Network Diagnosis Of Malignant Melanoma From Color Images, Fikret Erçal, Hsi-Chieh Lee, William V. Stoecker, Randy Hays Moss, Anurag Chawla

Computer Science Faculty Research & Creative Works

Malignant melanoma is the deadliest form of all skin cancers. Approximately 32,000 new cases of malignant melanoma were diagnosed in 1991 in the United States, with approximately 80% of patients expected to survive 5 years. Fortunately, if detected early, even malignant melanoma may be treated successfully, Thus, in recent years, there has been rising interest in the automated detection and diagnosis of skin cancer, particularly malignant melanoma. Here, the authors present a novel neural network approach for the automated separation of melanoma from 3 benign categories of tumors which exhibit melanoma-like characteristics. The approach uses discriminant features, based on tumor …