Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D (1)
- 3D Publishing (1)
- Archaeological practice (1)
- Artificial Intelligence (AI) (1)
- Collaborative research (1)
-
- Cybersecurity (1)
- Data Mining (DM) (1)
- Digital Technologies (1)
- Embodiment (1)
- Estonia (1)
- Expert System (ES) (1)
- Exploratory Factor Analysis (EFA) (1)
- GIS (1)
- Landscape archaeology (1)
- Library System (1)
- Mesoamerica (1)
- Natural Language Processing (NLP) (1)
- Photogrammetry (1)
- Policy (1)
- Recommender Systems (RM) (1)
- Risk Society framework (1)
- Ulrich Beck (1)
- Virtual reality (1)
- Web-based archaeology (1)
- WebGIS (1)
Articles 1 - 5 of 5
Full-Text Articles in Social and Behavioral Sciences
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto
Department of Anthropology: Faculty Publications
While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology
Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi
Artificial Intelligence(Ai) Application In Library Systems In Iran: A Taxonomy Study, Asefeh Asemi, Adeleh Asemi
Library Philosophy and Practice (e-journal)
With introducing and developing AI logic, this science as a branch of computer science could impact and improve all sciences which used computer systems. LIS also could get benefit from AI in many areas. This paper survey applications of AI in library and information science and introduce the potential of library system to apply AI techniques. Intelligent systems have contributed for many librarian purposes like cataloging, indexing, information retrieval, reference, and other purposes. We applied Exploratory Factor Analysis (EFA) as a primer method for identification of the most applicable AI techniques categories in LIS. ESs are the most usable intelligent …
Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez
Using Virtual Reality And Photogrammetry To Enrich 3d Object Identity, Cole Juckette, Heather Richards-Rissetto, Hector Eluid Guerra Aldana, Norman Martinez
Department of Anthropology: Faculty Publications
The creation of digital 3D models for cultural heritage is commonplace. With the advent of efficient and cost effective technologies archaeologists are making a plethora of digital assets. This paper evaluates the identity of 3D digital assets and explores how to enhance or expand that identity by integrating photogrammetric models into VR. We propose that when a digital object acquires spatial context from its virtual surroundings, it gains an identity in relation to that virtual space, the same way that embedding the object with metadata gives it a specific identity through its relationship to other information. We explore this concept …
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …
Crop Height Estimation With Unmanned Aerial Vehicles, Carrick Detweiler, David Anthony, Sebastian Elbaum
Crop Height Estimation With Unmanned Aerial Vehicles, Carrick Detweiler, David Anthony, Sebastian Elbaum
School of Computing: Faculty Publications
An unmanned aerial vehicle (UAV) can be configured for crop height estimation. In some examples, the UAV includes an aerial propulsion system, a laser scanner configured to face downwards while the UAV is in flight, and a control system. The laser scanner is configured to scan through a two-dimensional scan angle and is characterized by a maxi mum range. The control system causes the UAV to fly over an agricultural field and maintain, using the aerial propulsion system and the laser scanner, a distance between the UAV and a top of crops in the agricultural field to within a programmed …