Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Policy

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 55

Full-Text Articles in Computer Engineering

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan Oct 2023

Dynamic Mechanism Of Science Based Technological Innovation And Industrial Evolution—Take Semiconductor, Digital Computer And Radio Technologies As Examples, Yi Zhang, Qiang Yan

Bulletin of Chinese Academy of Sciences (Chinese Version)

By studying the technological innovation and industrial development process of semiconductor, digital computer and radio, this study analyzes the path, conditions and force of science-based technological innovation and its industrialization, establishes a chain reaction model of large-scale technological innovation and diffusion, and compares it with market-based technological innovation. It is found that the large-scale aggregation of scientific research institutions and industrial laboratories accelerates the speed of technological innovation, and diffuses along two paths of scientific research institutions to enterprises and enterprises to enterprises, forming a chain reaction of large-scale technological innovation. Strategic demand is the basic driving force for the …


Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan Aug 2023

Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …


On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao Aug 2023

On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …


Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi Aug 2023

Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li Apr 2023

Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …


Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang Mar 2023

Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the process of comprehensively promoting Chinese-style modernization, we must adhere to scientific and technological selfreliance and self-improvement as the strategic support for national development, and scientific and technological innovation is the main driving force for high-quality economic development. As one of the carriers, the innovation consortium formed by enterprises as main entities aims to realize the deep integration of innovation chain and industrial chain, accelerating the transformation of scientific and technological achievements into real productivity, and solving the problem of disconnection between scientific research activities and industrial demand. On the basis of reviewing and summarizing the evolution of the …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Thoughts On New It Technique System, Ninghui Sun Jan 2022

Thoughts On New It Technique System, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new period of information society dominated by digital economy. To adapt to the requirements of the new development stage of China, and to achieve the key technologies development, it is necessary to accelerate the construction of a new selfreliance and self-improvement IT technique system. The article gives some thoughts on the demand, principle, and key method on above issues, and the new paradigm of research at Institute of Computing Technology, Chinese Academy of Sciences.


Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang Jan 2022

Thoughts On Innovation Of Future Network Architecture, Yunjie Liu, Tao Huang, Shou Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Currently, network technology is deeply integrated with the physical world. Traditional network architectures cannot support the differentiated, customizable, and deterministic needs of industrial Internet and other services. Exploring new network architecture and core technology has officially become the strategic commanding heights of the global Internet competition. To this end, the paper reviews the evolution and trends of the network, analyzes how to achieve high-performance, low-cost, intelligent network development strategies for establishing an autonomous and controllable future network. Two conclusions are drawn as follows. (1) Through the exploration of network construction in recent decades, integration, openness, intelligence, customization and integration of …


Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun Jan 2022

Preface To Topic “Build And Strengthen China’S Information Tech-System”, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

Self-reliance and self-strengthening at high level does not depend on a single technique, but on the formation of an advantageous national tech-system, so called "country-as-a-platform". Information tech-system refers to the whole one that closely connects devices, components, complete machine, system software, middleware, and application software with a series of technical standards and intellectual property rights. We are entering the IT 3.0 era characterized by integration of human-cyber-physical world. The IT 3.0 era will certainly produce a new tech-system different from the IT 1.0 and IT 2.0 eras, which is a rare opportunity for China to build a self-reliance and self-strengthening …


From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan Jan 2022

From Chip Design To Chip Learning, Yunji Chen, Zidong Du, Qi Guo, Wei Li, Yijun Tan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Chip is the foundation of the modern information society. As the world is entering a new era of human-cyber-physical ternary computing, with diverse intelligent applications over trillions of devices, chip with specialized architecture will be heavily demanded in both numbers and types. However, chip design is very costly, which usually requires a long design cycle, complicated process, and high professional developers. Hence, there is a large gap between the need of tremendous chips and the high cost of chip design in the new era. This study proposes Chip Learning, a learning-based method to perform the entire chip design, including logic …


Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun Jan 2022

Opportunities And Challenges Of Building Cpu Ecosystem With Open-Source Mode, Yungang Bao, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

RISC-Ⅴ has been obtained huge attentions and extensively invested over the past decade due to its exciting slogan that "Instruction Sets Want to be Free". Based on RISC-Ⅴ, we are able to build a "human community with a shared future" in the CPU chip area, although there are still many challenges. China should explore its capability to make more contributions in building the open-source chip ecosystem.


Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie Jan 2022

Ubiquitous Operating System: Toward The Blue Ocean Of Human-Cyber-Physical Ternary Ubiquitous Computing Mei, Hong Mei, Donggang Cao, Tao Xie

Bulletin of Chinese Academy of Sciences (Chinese Version)

In response to the new patterns and scenarios of future human-cyber-physical ternary ubiquitous computing, a new kind of operating system named Ubiquitous Operating System (UOS) is emerging and under exploration for further development. The human-cyberphysical ternary ubiquitous computing has many new features, such as open and dynamic environment, diverse requirements, and complex application scenarios. New ubiquitous applications pose special demands on ubiquitous sensing and connection, lightweight computing and artificial intelligence, dynamic adaptation, feedback and control, natural human-computer-interaction, etc. To support these new requirements, a software definition mechanism is in need to flexibly control hardware, data resources, platforms, and applications. This …


Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun Jan 2022

Information Superbahn: Towards New Type Of Cyberinfrastructure, Zhiwei Xu, Guojie Li, Ninghui Sun

Bulletin of Chinese Academy of Sciences (Chinese Version)

The world is entering a new era of human-cyber-physical ternary computing with diverse intelligent applications over trillions of devices. This calls for a new type of cyberinfrastructure characterized by a planet-scale, high-goodput, low-entropy computing network, colloquially named Information Superbahn. This article highlights the vision of Information Superbahn, including fundamental requirements, key scientific problems, and a candidate system architecture. The goal of building the Information Superbahn is to natively support humancyber-physical systems and low-entropy computing modes, to reduce the effects of systems disorder. Compared with existing network computing systems, such as Internet, cloud computing, big data and Internet of Things, Information …


Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang Jan 2022

Improving Cyberspace Security Situation From Perspective Of “Talent, Finance And Infrastructure”, Binxing Fang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Cyberspace security has been an important part in ensuring economic development and supporting the progress of modern science and technology. As more and more applications are relying on information technology (IT), it becomes very important to improve the security situation of cyberspace. How to take effective measures to practically improve the cyberspace security situation has become the core problem disscussed in this paper. This paper addresses it from the perspectives of "talent, finance and infrastructure". First, on the premise of insufficient supply of cyberspace security talents, this paper proposes to establish the ability certification of talents transferred from other IT …


Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang Jan 2022

Thinking On New System For Big Data Technology, Xueqi Chegn, Shenghua Liu, Ruqing Zhang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, there are such significant improvements on the performance and efficiency of big data technology and system. As it is widely applied in various fields, big data has empowered industrial intelligence, and is the key step into the intelligent stage of information society. Therefore, we are facing greater challenges nowadays, such as the paradox of data flooding and high-value data lacking, the complexity and uncertainty of big data analysis, and the difficulty to balance the data on sharing and circulation, and trustworthiness and security. Moreover, these challenges will not only promote the innovation and change of big data …


The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo Jan 2021

The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo

All Faculty Scholarship

Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


The Perils And Promises Of Artificial General Intelligence, Brian S. Haney Jun 2019

The Perils And Promises Of Artificial General Intelligence, Brian S. Haney

Journal of Legislation

No abstract provided.


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo Nov 2016

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

All Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …