Destination Areas provide faculty and students with new tools to identify and solve complex, 21st-century problems in which Virginia Tech already has significant strengths and can take a global leadership role. The initiative represents the next step in the evolution of the land-grant university to meet economic and societal needs of the world. DAs connect the full span of relevant knowledge necessary for addressing issues comprehensively. Humanistic, scientific, and technological perspectives are addressed in relationship to one another and they are treated as complementary to overcome traditional academic boundaries, such as those that separate the STEM fields and liberal arts. [http://provost.vt.edu/destination-areas.html]

Collections in this community

Recent Submissions

  • Radiation Search Operations using Scene Understanding with Autonomous UAV and UGV 

    Christie, Gordon; Shoemaker, Adam; Kochersberger, Kevin; Tokekar, Pratap; McLean, Lance; Leonessa, Alexander (Virginia Tech, 2016-08-31)
    Autonomously searching for hazardous radiation sources requires the ability of the aerial and ground systems to understand the scene they are scouting. In this paper, we present systems, algorithms, and experiments to ...
  • Description of future drought indices in Virginia 

    Kang, Hynwoo; Sridhar, Venkataramana (Elsevier, 2017-07-20)
    This article presents projected future drought occurrences in five river basins in Virginia. The Soil and Water Assessment Tool (SWAT) and the Coupled Model Intercomparison Project Phase 5 (CMIP5) climate models were used ...
  • Costs of Using Unmanned Aircraft on Crop Farms 

    Ireland-Otto, Nancy; Ciampitti, Ignacio A.; Blanks, Mark T.; Burton, Robert O. Jr.; Balthazor, Travis (American Society of Farm Managers and Rural Appraisers, 2016)
    Excitement is high about the potential uses of unmanned aerial systems (UAS) in agriculture. We budgeted the costs of high-yield, non-irrigated corn production on two fields on a “representative” farm located in Northeastern ...
  • A collaboration workflow from sound-based composition to performance of electroacoustic music using «Pure Data» as a framework. 

    Tsoukalas, Kyriakos (Bauhaus Universitat Weimer, 2011-08)
    This paper describes a workflow for composers, engineers and performers to collaborate, using Pure Data (PD) as a framework, towards the design of electroacoustic musical instruments intended for live performances of ...
  • Sustainability-Based Flood Hazard Mapping of the Swannanoa River Watershed 

    Ahmadisharaf, Ebrahim; Kalyanapu, Alfred J.; Chung, Eun-Sung (2017-09-26)
    An integrated framework is presented for sustainability-based flood hazard mapping of the Swannanoa River watershed in the state of North Carolina, U.S. The framework uses a hydrologic model for rainfall–runoff transformation, ...
  • Land Cover Change in Northern Botswana: The Influence of Climate, Fire, and Elephants on Semi-Arid Savanna Woodlands 

    Fox, John Tyler; Vandewalle, Mark E.; Alexander, Kathleen A. (2017-10-25)
    Complex couplings and feedback among climate, fire, and herbivory drive short- and long-term patterns of land cover change (LCC) in savanna ecosystems. However, understanding of spatial and temporal LCC patterns in these ...
  • Medical Monitoring Applications for Wearable Computing 

    Raskovic, Dejan; Martin, Thomas; Jovanov, Emil (The British Computer Society, 2004-04-01)
    Medical monitors have benefited from technological advances in the field of wireless communication, processing and power sources. These advances have made possible miniaturization and prolonged operating times of medical ...
  • Predictive therapeutic planning for irreversible electroporation treatment of spontaneous malignant glioma 

    Garcia, Paulo A.; Kos, Bor; Rossmeisl, John H. Jr.; Pavliha, Denis; Miklavčič, Damijan; Davalos, Rafael V. (Wiley, 2017-07-25)
    Purpose: Irreversible electroporation (IRE) has been developed as a promising minimally invasive treatment to ablate spontaneous brain tumors with pulsed electric fields in canine patients. The purpose of the study is to ...
  • Review of user interface devices for ambient assisted living smart homes for older people 

    O'Mullane, B.A.; Knapp, R.B.; Bond, R. (International Society for Gerontechnology, 2010)
    Smart homes generally focus on issues to do with security, health, energy savings and entertainment, issues which grow in importance as we age. The sensors, actuators and entertainment devices required to build such a ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
  • Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
  • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
  • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
  • A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions 

    Abdelhadi, Ahmed; Shajaiah, Haya; Clancy, Charles (IEEE, 2015-10-08)
    Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
  • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
  • Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

    Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
    Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
  • Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared 

    Hiller, Janine; McMullen, Matthew S.; Chumney, Wade M.; Baumer, David L. (Boston University School of Law, 2011)
    The importance of the adoption of Electronic Health Records (EHRs) and the associated cost savings cannot be ignored as an element in the changing delivery of health care. However, the potential cost savings predicted in ...
  • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

    Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, T. Charles (Virginia Tech, 2013-11-01)
    A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
  • Optic Nerve Hypoplasia Is a Pervasive Subcortical Pathology of Visual System in Neonates 

    Liang, Chen; Kerr, Alicia; Qui, Yangfengzhong; Cristofoli, Francesca; Van Esch, Hilde; Fox, Michael A.; Mukherjee, Konark (ARVO, 2017-11)
    PURPOSE. Optic nerve hypoplasia (ONH) is the most common cause of childhood congenital blindness in developed nations, yet the fundamental pathobiology of ONH remains unknown. The objective of this study was to employ a ...

View more