William L. McGill’s research while affiliated with University of Maryland, College Park and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (21)


End-of-Life Corrosion Estimation and Profile of Ship Hull Structure: Non-Parametric Statistical Analysis of Medium Endurance Cutters
  • Article

April 2022

·

42 Reads

·

4 Citations

ASCE-ASME J Risk and Uncert in Engrg Sys Part B Mech Engrg

·

K.A. Stambaugh Karl A.

·

William L. McGill

Corrosion in hull structure of Coast Guard cutters is a primary degradation mode that accounts for a significant portion of depot budgets and the occasional unavailability of ships in general. Corrosion exhibits great variability spatially and temporally. This paper presents, summarizes, and analyzes a one-of-a-kind data set for end-of-life corrosion estimation and profile of ship hull structure. The data set was created over several years and on several vessels, and collected by maintenance personnel at several geographic locations. This study analyzes wastage data due to corrosion that were systematically collected in 2007 to 2008 from twelve 210-foot Medium Endurance Cutters, commissioned in 1964 to 1969, in the form of thickness measurement using visual inspection and ultrasonic testing methods. A total of 76,091 thickness measurements were analyzed at positions covering the entire hulls. The measured corrosion levels mean is about 0.02 to 0.04 inches (1 in. = 25.4 mm), i.e., 6 to 14% of the as-built thicknesses after no more than 43 years of use of these 12 cutters as of 2007; however, the analysis of outliers indicates that the average wastage values can be misleading in predicting extreme corrosion. A method is proposed for estimating the counts and intensity of outliers. Examining geographic locations of the operations of these cutters and corrosion revealed that southern warm water led to appreciably larger corrosion compared to the northern colder waters, at a ratio of about 1.25 to 1.5.


LinkIT: A Ludic Elicitation Game for Eliciting Risk Perceptions

October 2012

·

31 Reads

·

4 Citations

The mental models approach, a leading strategy to develop risk communications, involves a time- and labor-intensive interview process and a lengthy questionnaire to elicit group-level risk perceptions. We propose that a similarity ratings approach for structural knowledge elicitation can be adopted to assist the risk mental models approach. The LinkIT game, inspired by games with a purpose (GWAP) technology, is a ludic elicitation tool designed to elicit group understanding of the relations between risk factors in a more enjoyable and productive manner when compared to traditional approaches. That is, consistent with the idea of ludic elicitation, LinkIT was designed to make the elicitation process fun and enjoyable in the hopes of increasing participation and data quality in risk studies. Like the mental models approach, the group mental model obtained via the LinkIT game can hence be generated and represented in a form of influence diagrams. In order to examine the external validity of LinkIT, we conducted a study to compare its performance with respect to a more conventional questionnaire-driven approach. Data analysis results conclude that the two group mental models elicited from the two approaches are similar to an extent. Yet, LinkIT was more productive and enjoyable than the questionnaire. However, participants commented that the current game has some usability concerns. This presentation summarizes the design and evaluation of the LinkIT game and suggests areas for future work.


Utilization of Existing Blast Analysis Software Packages for the Back-Calculation of Blast Loads

August 2012

·

51 Reads

·

1 Citation

Journal of Performance of Constructed Facilities

Recent increases in the number of terrorist bombings and explosions have led to increased need for postblast investigators. Numerous advances have been made in the area of chemical analysis of explosive residues, but little work has been done to aid postblast investigators in the determination of explosive charge weight using postblast structural damage. This technical note discusses the results of a review of existing blast analysis software packages for their ability to be used as a forensic tool supporting postblast investigations. The recurring limitations of the software found in this review are discussed. It is determined that individually the software packages do not show much promise as such a tool, but that when used concurrently, they may have some value to the postblast investigator. However limited knowledge about the built-in safety factors as well as the ability to specify and modify boundary conditions in the software packages have left the authors to pursue other avenues.


Fig. 1. The TriCO network
Fig. 3. Example of TrICO-powered monitoring system
Fig. 4. F-value with increasing number of NCP  
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach
  • Conference Paper
  • Full-text available

July 2012

·

89 Reads

·

4 Citations

One of the main goals of all online social communities is to promote a stable, or perhaps, growing membership built around topics of like interest. Yet, communities are not impermeable to the potentially damaging effects resulting from those few participants that choose to behave in a manner that is counter to established norms of behavior. Typical moderators in online social communities are the ones tasked to reduce the risks associated with unhealthy user behavior by rapidly identifying and removing damaging posts and consequently taking action against the perpetrating user. Yet, the sheer volume of posts relative to the number of moderators available for review suggests a need for modern tools aimed at prioritizing posts based on the assessed risk each user poses to the community. To accomplish this, we propose a threat analysis model. Our model, referred to as TrICO (Threat requires Intent Capability and Opportunity) is implemented using Bayesian Networks, and achieves early detection of damaging behavior in online social communities. To the best of our knowledge, this is the first user-centered model for usage policy enforcement in online sites. We apply our model to a comprehensive data set characterizing the entirety of a popular discussion forum. Our results show that the TrICO model provides accurate results.

Download

Participatory risk management: concept and illustration

January 2012

·

34 Reads

International Journal of Social Computing and Cyber-Physical Systems

This paper introduces the concept of participatory risk management (PRM), the outsourcing of parts of the risk management process to a wide audience of participants, whether from communities affected by risk or netizens willing to lend a helping (analytic) hand. PRM consists of six parts that closely follows the ISO31000 risk management framework: tasking and requirements, participatory risk identification, participatory risk analysis, participatory risk evaluation, participatory risk mitigation and communication. Each phase leverages one or more modern crowdsourcing concepts, such as participatory sensing, human computation, and games with a purpose. A potential PRM gaming system for incentivising community risk management through rewarding play is presented as an example application of PRM.


Uncertainty Arithmetic on Excel Spreadsheets: Add-In for Intervals, Probability Distributions, and Probability Boxes

November 2011

·

33 Reads

·

2 Citations

Despite their limitations as a platform for calculations, Microsoft Excel spreadsheets enjoy widespread use throughout much of engineering and science, and they have emerged as a lingua franca for computations in some quarters. Given their ubiquity, it would be useful if Excel spreadsheets could express uncertainty in inputs and propagate uncertainty through calculations. We describe an add-in for Microsoft Excel that supports arithmetic on uncertain numbers, which include intervals, probability distributions, and p-boxes (i.e., bounds on probability distributions). The software enables native calculations in Excel with these objects and ordinary scalar (real) numbers. The add-in supports basic arithmetic operations (+, –, x, ÷, ˆ, min, max), standard mathematical functions (exp, sqrt, atan, etc.), and Excel-style cell referencing for both function arguments and uncertain number results. Graphical depictions of uncertain numbers are created automatically. Using function overloading, the standard Excel syntax is extended for uncertain numbers so that the software conducts uncertainty analyses almost automatically and does not require users to learn entirely new conventions or special-purpose techniques.



What to look for in the aftermath of an explosion? A review of blast scene damage observables

April 2011

·

80 Reads

·

22 Citations

Engineering Failure Analysis

A review of existing literature dealing with the behavior of often-used building materials subject to blast loading is presented. Our focus is on the types of structural damage that might be observed at a blast scene, and in particular how this evidence can be used to infer characteristics of the blast (e.g., size and position of the charge). We consider two simple questions: what does damage look like in the wake of a blast for different structural materials (i.e., “what damage is seen?”) and what must the blast pressure have been to cause this damage (i.e., “what does the damage mean?”). This review looks at reinforced concrete, masonry, steel, glass, and timber. We propose the following principle for interpreting observed damage at a blast scene: if damage is present, a limit state was exceeded. The results from this review will be of great interest to post-blast investigators that seek to understand the size and position of a blast.


Eliciting risk perceptions with an online game: Preliminary results

March 2011

·

15 Reads

·

2 Citations

William L. McGill

·

Yan Cao

·

Miao Jiang

·

[...]

·

Gale Lauser

We describe a scientific casual browser game called LinkIT for eliciting societal risk perceptions in the form of mental models represented as influence diagrams. Given this knowledge, we can highlight similarities and differences across demographic groups as well as compare individual responses with expert models. These comparisons inform how risk should be best communicated to resolve knowledge gaps and misperceptions. Here we introduce the LinkIT concept, present preliminary results and propose future work.


Participatory Risk Management: Managing Community Risk Through Games

September 2010

·

32 Reads

·

5 Citations

This paper introduces the concept of participatory risk management (PRM). By involving community members and netizens in the risk management process we believe the community will become safer and participants will become smarter in dealing with risks. A PRM gaming system concept for incentivizing community risk management through rewarding play is presented as an example application of PRM.


Citations (18)


... The other PdM physics-based models include the prognostic model of physics-offailure Tinga & Loendersloot, 2019), the RUL model of ship hull structure profile (Ayyub et al., 2022), and ship hull tanker profile . These models were tested and evaluated by comparing them with their corresponding simulations. ...

Reference:

A REVIEW OF PREDICTIVE MAINTENANCE APPROACHES FOR CORROSION DETECTION AND MAINTENANCE OF MARINE STRUCTURES
End-of-Life Corrosion Estimation and Profile of Ship Hull Structure: Non-Parametric Statistical Analysis of Medium Endurance Cutters
  • Citing Article
  • April 2022

ASCE-ASME J Risk and Uncert in Engrg Sys Part B Mech Engrg

... The first several result pages were reviewed and many of them were deemed out of scope for this project due to considering only one risk, such as [13][14][15][16], or based on proving a theory, such as [17]. Several related papers were found, such as [18][19][20][21], that provided insightful information. Kappes et al. [18] provides insight into the challenges of analyzing multi-hazard risks. ...

Critical Asset and Portfolio Risk Analysis for Homeland Security
  • Citing Article
  • July 2008

... Despite the significant contributions of the aforementioned research studies and blast models, they are incapable of: (1) efficiently predicting the performance of all feasible blast wall and building material design alternatives due to the significant computational time and effort required by numerical blast assessment models to analyze each possible combination of blast wall type, building material and facility location Sorensen and McGill 2012); (2) quantifying the effectiveness of feasible frangible blast wall types including sand-filled, water-filled, and wood walls in reducing reflected pressure and impulse loading on facilities; and (3) visualizing the anticipated facility damage areas based upon blast charge weight, blast wall type, and building material combinations. To overcome these limitations, this paper presents the development of an innovative model that is capable of efficiently quantifying and visualizing blast effects on facilities behind blast walls of various materials in order to support designers in their critical task of identifying the most effective design for blast walls and facility hardening. ...

Utilization of Existing Blast Analysis Software Packages for the Back-Calculation of Blast Loads
  • Citing Article
  • August 2012

Journal of Performance of Constructed Facilities

... When operations on the interval discretizations are handled with interval analysis, the method constitutes verified computation for probability distributions. The methods of probability bounds analysis are available in several software implementations, including multiple free demonstration programs (e.g., Berleant and Zhang 2004), a full-featured stand-alone commercial program (Ferson 2002), an advanced add-in for Microsoft Excel developed for NASA (Ferson et al. 2011), and a package in development for the statistical computing language R (R Development Core Team 2010). ...

Uncertainty Arithmetic on Excel Spreadsheets: Add-In for Intervals, Probability Distributions, and Probability Boxes
  • Citing Conference Paper
  • November 2011

... including Bayesian methods [15,16,17,18], random sets [19,20,21], sets of probability measures [22], evidence theory-based methods (such as Dempster-Shafer Theory) [23,24,25,26] and interval probabilities [27] of which probability bounds methods [28] and fuzzy stochastic methods [29,30] are extensions. Furthermore, a study of Monte Carlo methods for the general case of propagating imprecise probabilities is given for instance in [31] or [32]. ...

Estimating parameter distributions in structural reliability assessment using the Transferable Belief Model
  • Citing Article
  • May 2008

Computers & Structures

... Qualitative and quantitative studies of bad behavior in online settings have been carried out considering newsgroups, 26 online chat and video communities, 36 and online multiplayer video games. 37 More recently, an emerging line of work has focused on misbehavior and deception in forums, 38,39 community-answering questions, 40 and social networks in general. 39 ...

Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach

... Examples of E&S hazards, which are directly-controllable by SCs include: type of fuel in manufacturing and transportation, wastewater intensity and unfair labour wages. Non-directly controllable E&S risks include natural disasters (tornados, droughts, etc.), political unrest, famine, war, etc. Natural disasters have received more attention in the academic literature (see, for example : Yang, 2007;Ayyub et al., 2009;Bilsel and Ravindran, 2012;Vazquez-Brust et al., 2012;Kungwalsong andRavindran, 2012, 2014) as they have been included in the list of disruptive risks, which occur infrequently but which can bring considerable damages to the SC. Risks stemming from supplier irresponsibility in terms of violation of ethical and environmental standards have only recently become a prominent topic within the field of supply management and global sourcing. ...

Risk Analysis of a Protected Hurricane-Prone Region. II: Computations and Illustrations

Natural Hazards Review

... In this regard, it is perhaps surprising, that the wellestablished approach to representing the failure of flood defence infrastructure, using probability distributions known as fragility curves (e.g., Apel et al., 2004;Ayyub et al., 2009;Schultz et al., 2010;Simm & Tarrant, 2018;USACE, 1996;Vorogushyn et al., 2010) as part of the risk analysis process, is not universally implemented. Many flooding studies still rely on methods that have, as a prerequisite, an assumption that flood defences and related infrastructure cannot fail. ...

Risk Analysis of a Protected Hurricane-Prone Region. I: Model Development

Natural Hazards Review

... However, policymakers already make decisions in a more complicated context than a wellstructured elicitation instrument could likely control for, addressing, for example, distributional effects of government investment, risk perception, and public engagement. (49,50) These results thus suggest that communication issues-already prominent in the risk and technology literature (51,52) -are an even more important challenge when using elicitations to characterize future outcomes. ...

LinkIT: A Ludic Elicitation Game for Eliciting Risk Perceptions
  • Citing Article
  • October 2012

... As floor systems concave under blast load, the net upward loads at upper floors and tension force appear frequently, therefore, a column will collapse if the applied tension load results in an internal stress that is larger than the material's tensile strength. The column's cross-section subsequently starts to lengthen, shrink, or neck until the combined failure modes (buckling, necking, and shear tearing) tear it apart into two pieces Duc Ngo (2007), Sorensen and McGill (2011). The concept of uplifting due to explosion is shown in Fig. 14 Duc Ngo (2007). ...

What to look for in the aftermath of an explosion? A review of blast scene damage observables
  • Citing Article
  • April 2011

Engineering Failure Analysis