Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 5186

Full-Text Articles in Engineering

Using Scrum To Teach Standards-Based K-12 Computer Science: A Prosepectus For A Master’S Level Methods Class At Buffalo State, Noah M. Pierce May 2021

Using Scrum To Teach Standards-Based K-12 Computer Science: A Prosepectus For A Master’S Level Methods Class At Buffalo State, Noah M. Pierce

Career & Technical Education Theses

Computer Science has been increasingly prevalent in K-12 education in recent decades. Most Americans believe that Computer Science is as important as other skills taught in school; further, parents are putting pressure on districts to offer Computer Science programs (1.1). To meet this demand, many teacher preparation programs are adding Computer Science Education to their offering of degrees. This thesis investigates Agile and Scrum product development as a potential method of Computer Science instruction, explores the standards relevant to a Computer Science teacher, and offers a prospectus for a new Graduate Level Methods class to prepare Computer Science teachers ...


Pandemic Policymaking, Philip D. Waggoner Apr 2021

Pandemic Policymaking, Philip D. Waggoner

Journal of Social Computing

This study leverages a high dimensional manifold learning design to explore the latent structure of the pandemic policymaking space only based on bill-level characteristics of pandemic-focused bills from 1973 to 2020. Results indicate the COVID-19 era of policymaking maps extremely closely onto prior periods of related policymaking. This suggests that there is striking uniformity in Congressional policymaking related to these types of large-scale crises over time, despite currently operating in a unique era of hyperpolarization, division, and ineffective governance.


Deeppredict: A Zone Preference Prediction System For Online Lodging Platforms, Yihan Ma, Hua Sun, Yang Chen, Jiayun Zhang, Yang Xu, Xin Wang Apr 2021

Deeppredict: A Zone Preference Prediction System For Online Lodging Platforms, Yihan Ma, Hua Sun, Yang Chen, Jiayun Zhang, Yang Xu, Xin Wang

Journal of Social Computing

Online lodging platforms have become more and more popular around the world. To make a booking in these platforms, a user usually needs to select a city first, then browses among all the prospective options. To improve the user experience, understanding the zone preferences of a user’s booking behavior will be helpful. In this work, we aim to predict the zone preferences of users when booking accommodations for the next travel. We have two main challenges: (1) The previous works about next information of Points Of Interest (POIs) recommendation are mainly focused on users’ historical records in the same ...


Estimating Multiple Socioeconomic Attributes Via Home Location—A Case Study In China, Shichang Ding, Xin Gao, Yufan Dong, Yiwei Tong, Xiaoming Fu Apr 2021

Estimating Multiple Socioeconomic Attributes Via Home Location—A Case Study In China, Shichang Ding, Xin Gao, Yufan Dong, Yiwei Tong, Xiaoming Fu

Journal of Social Computing

Inferring people’s Socioeconomic Attributes (SEAs), including income, occupation, and education level, is an important problem for both social sciences and many networked applications like targeted advertising and personalized recommendation. Previous works mainly focus on estimating SEAs from peoples’ cyberspace behaviors and relationships, such as the content of tweets or the social networks between online users. Besides cyberspace data, alternative data sources about users’ physical behavior, like their home location, may offer new insights. More specifically, in this paper, we study how to predict a person’s income level, family income level, occupation type, and education level from his/her ...


Learning Universal Network Representation Via Link Prediction By Graph Convolutional Neural Network, Weiwei Gu, Fei Gao, Ruiqi Li, Jiang Zhang Apr 2021

Learning Universal Network Representation Via Link Prediction By Graph Convolutional Neural Network, Weiwei Gu, Fei Gao, Ruiqi Li, Jiang Zhang

Journal of Social Computing

Network representation learning algorithms, which aim at automatically encoding graphs into low-dimensional vector representations with a variety of node similarity definitions, have a wide range of downstream applications. Most existing methods either have low accuracies in downstream tasks or a very limited application field, such as article classification in citation networks. In this paper, we propose a novel network representation method, named Link Prediction based Network Representation (LPNR), which generalizes the latest graph neural network and optimizes a carefully designed objective function that preserves linkage structures. LPNR can not only learn meaningful node representations that achieve competitive accuracy in node ...


Using Twitter Bios To Measure Changes In Self-Identity: Are Americans Defining Themselves More Politically Over Time?, Nick Rogers, Jason J. Jones Apr 2021

Using Twitter Bios To Measure Changes In Self-Identity: Are Americans Defining Themselves More Politically Over Time?, Nick Rogers, Jason J. Jones

Journal of Social Computing

Are Americans weaving their political views more tightly into the fabric of their self-identity over time? If so, then we might expect partisan disagreements to continue becoming more emotional, tribal, and intractable. Much recent scholarship has speculated that this politicization of Americans’ identity is occurring, but there has been little compelling attempt to quantify the phenomenon, largely because the concept of identity is notoriously difficult to measure. We introduce here a methodology, Longitudinal Online Profile Sampling (LOPS), which affords quantifiable insights into the way individuals amend their identity over time. Using this method, we analyze millions of "bios" on the ...


How To Better Identify Venture Capital Network Communities: Exploration Of A Semi-Supervised Community Detection Method, Hong Xiong, Ying Fan Apr 2021

How To Better Identify Venture Capital Network Communities: Exploration Of A Semi-Supervised Community Detection Method, Hong Xiong, Ying Fan

Journal of Social Computing

In the field of Venture Capital (VC), researchers have found that VC companies are more likely to jointly invest with other VC companies. This paper attempts to realize a semi-supervised community detection of the VC network based on the data of VC networking and the list of industry leaders. The main research method is to design the initial label of community detection according to the evolution of components of the VC industry leaders. The results show that the community structure of the VC network has obvious distinguishing characteristics, and the aggregation of these communities is affected by the type of ...


Jack Voltaic 3.0 Cyber Research Report, Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, Ryan Hruska Mar 2021

Jack Voltaic 3.0 Cyber Research Report, Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, Ryan Hruska

ACI Technical Reports

The Jack Voltaic (JV) Cyber Research project is an innovative, bottom-up approach to critical infrastructure resilience that informs our understanding of existing cybersecurity capabilities and identifies gaps. JV 3.0 contributed to a repeatable framework cities and municipalities nationwide can use to prepare. This report on JV 3.0 provides findings and recommendations for the military, federal agencies, and policy makers.


Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields Feb 2021

Disruptive Technologies With Applications In Airline & Marine And Defense Industries, Randall K. Nichols, Hans C. Mumm, Wayne Lonstein, Suzanne Sincavage, Candice M. Carter, John-Paul Hood, Randall Mai, Mark Jackson, Bart Shields

NPP eBooks

Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they ...


Preface And Acknowledgments, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores Jan 2021

Preface And Acknowledgments, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores

Indiana STEM Education Conference

No abstract provided.


Goals And Proceedings Information, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores Jan 2021

Goals And Proceedings Information, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores

Indiana STEM Education Conference

No abstract provided.


Contents, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores Jan 2021

Contents, William S. Walker Iii, Lynn A. Bryan, Siddika Selcen Guzey, Elizabeth Suazo-Flores

Indiana STEM Education Conference

No abstract provided.


The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya Jan 2021

The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya

Journal of International Technology and Information Management

This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system ...


Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd Jan 2021

Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd

Journal of International Technology and Information Management

This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with ...


A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong Jan 2021

A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong

Faculty of Engineering and Information Sciences - Papers: Part B

In recent years, machine learning-based cyber intrusion detection methods have gained increasing popularity. The number and complexity of new attacks continue to rise; therefore, effective and intelligent solutions are necessary. Unsupervised machine learning techniques are particularly appealing to intrusion detection systems since they can detect known and unknown types of attacks as well as zero-day attacks. In the current paper, we present an unsupervised anomaly detection method, which combines Sub-Space Clustering (SSC) and One Class Support Vector Machine (OCSVM) to detect attacks without any prior knowledge. The proposed approach is evaluated using the well-known NSL-KDD dataset. The experimental results demonstrate ...


Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin Jan 2021

Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin

Faculty of Engineering and Information Sciences - Papers: Part B

The identification of protein-protein interaction (PPI) is one of the most important tasks to understand the biological functions and disease mechanisms. Although numerous databases of biological interactions have been published in debt to advanced high-throughput technology, the study of inter-species protein-protein interactions, especially between human and bacterium pathogens, remains an active yet challenging topic to harness computational models tackling the complex analysis and prediction tasks. In this paper, we comprehensively revisit the prediction task of human-bacterium protein-protein interactions (HB-PPI), which is a first ever endeavour to report an empirical evaluation in learning and predicting HB-PPI based on machine learning models ...


Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall Jan 2021

Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall

Faculty of Engineering and Information Sciences - Papers: Part B

Background and purpose: The purpose of this work is to present the clinical experience from the first-in-human trial of real-time tumor targeting via MLC tracking for stereotactic ablative body radiotherapy (SABR) of lung lesions. Methods and materials: Seventeen patients with stage 1 non-small cell lung cancer (NSCLC) or lung metastases were included in a study of electromagnetic transponder–guided MLC tracking for SABR (NCT02514512). Patients had electromagnetic transponders inserted near the tumor. An MLC tracking SABR plan was generated with planning target volume (PTV) expanded 5 mm from the end-exhale gross tumor volume (GTV). A clinically approved comparator plan was ...


Laboratory Learning Objectives Measurement: Relationships Between Student Evaluation Scores And Perceived Learning, Sasha Nikolic, Thomas Suesse, Kosta Jovanovic, Zarko Stanisavljevic Jan 2021

Laboratory Learning Objectives Measurement: Relationships Between Student Evaluation Scores And Perceived Learning, Sasha Nikolic, Thomas Suesse, Kosta Jovanovic, Zarko Stanisavljevic

Faculty of Engineering and Information Sciences - Papers: Part B

Contribution: This article provides evidence that perceived learning has a relationship and influences the way students evaluate laboratory experiments, facilities, and demonstrators. Background: Debate continues on the capability and/or reliability of students to evaluate teaching and/or learning. Understanding such relationships can help educators decode evaluation data to develop more effective teaching experiences. Research Question: Does a relationship exist between student evaluation scores and perceived learning? Methodology: Perceived learning across the cognitive, psychomotor, and affective domains was measured using the Laboratory Learning Objectives Measurement (LLOM) tool at an Australian (344 students) and Serbian (181 students) university. A multilevel statistical ...


Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus Dec 2020

Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus

Journal of Media Literacy Education

Reviewing the history of media literacy education might help us to identify how creating media as an approach can contribute to fostering knowledge, understanding technical issues, and to establishing a critical attitude towards technology and data. In a society where digital devices and services are omnipresent and decisions are increasingly based on data, critical analysis must penetrate beyond the “outer shell” of machines – their interfaces – through the technology itself, and the data, and algorithms, which make these devices and services function. Because technology and data constitute the basis of all communication and collaboration, media literate individuals must in the ...


Diversity Of Idea Flows And Economic Growth, Alex Pentland Nov 2020

Diversity Of Idea Flows And Economic Growth, Alex Pentland

Journal of Social Computing

What role does access to diverse ideas play in economic growth? New forms of geo-located communications and economic data allow measurement of human interaction patterns and prediction of economic outcomes for individuals, communities, and nations at a fine granularity, with the strongest predictors of income, productivity, and growth being measures of diversity and frequency of physical interaction between communities (clusters of interaction). This finding provides both new investment opportunities and new methods of risk assessment. Access and use of these data raise privacy and security risks, and the final section of the paper describes how these challenges can be controlled.


Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West Nov 2020

Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West

Journal of Social Computing

In many societies, appearing slim (corresponding to a small body-mass index) is considered attractive. The fashion industry has been attempting to cater to this trend by designing outfits that can enhance the appearance of slimness. Two anecdotal rules, widespread in the world of fashion, are to choose dark clothes and avoid horizontal stripes, in order to appear slim. Thus far, empirical evidence has been unable to conclusively determine the validity of these rules, and there is consequently much controversy regarding the impact of both color and patterns on the visual perception of weight. In this paper, we aim to close ...


Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu Nov 2020

Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu

Journal of Social Computing

This paper poses a question: How many types of social relations can be categorized in the Chinese context? In social networks, the calculation of tie strength can better represent the degree of intimacy of the relationship between nodes, rather than just indicating whether the link exists or not. Previou research suggests that Granovetter measures tie strength so as to distinguish strong ties from weak ties, and the Dunbar circle theory may offer a plausible approach to calculating 5 types of relations according to interaction frequency via unsupervised learning (e.g., clustering interactive data between users in Facebook and Twitter). In ...


A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang Nov 2020

A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang

Journal of Social Computing

Past studies on the Chinese internet management system have revealed a smart internet management system that takes advantage of time to filter content with collective action potential. How and why such a system was institutionalized? We offer a historical institutional analysis to explain the way in which the system evolved. We implement social network analysis to examine the Weibo posts of recurrent events, the elections in Area A in 2016 and 2018, to identify pattern changes in the system. There are two aspects of the changes: the centralization of the command line to a single authority and the implementation of ...


Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran Nov 2020

Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran

Journal of Social Computing

The Chicago Array of Things (AoT) project, funded by the US National Science Foundation, created an experimental, urban-scale measurement capability to support diverse scientific studies. Initially conceived as a traditional sensor network, collaborations with many science communities guided the project to design a system that is remotely programmable to implement Artificial Intelligence (AI) within the devices—at the "edge" of the network—as a means for measuring urban factors that heretofore had only been possible with human observers, such as human behavior including social interaction. The concept of "software-defined sensors" emerged from these design discussions, opening new possibilities, such as ...


Social Computing Unhinged, James Evans Nov 2020

Social Computing Unhinged, James Evans

Journal of Social Computing

Social computing is ubiquitous and intensifying in the 21st Century. Originally used to reference computational augmentation of social interaction through collaborative filtering, social media, wikis, and crowdsourcing, here I propose to expand the concept to cover the complete dynamic interface between social interaction and computation, including computationally enhanced sociality and social science, socially enhanced computing and computer science, and their increasingly complex combination for mutual enhancement. This recommends that we reimagine Computational Social Science as Social Computing, not merely using computational tools to make sense of the contemporary explosion of social data, but also recognizing societies as emergent computers of ...


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and ...


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Brave New World - Mobility, Rhonda S. Binda Aug 2020

Brave New World - Mobility, Rhonda S. Binda

Open Educational Resources

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, city governments worldwide are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and ...


Human Supremacy As Posthuman Risk, Daniel Estrada Jul 2020

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of ...