Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

1,887 Full-Text Articles 2,865 Authors 345,680 Downloads 64 Institutions

All Articles in Science and Technology Studies

Faceted Search

1,887 full-text articles. Page 1 of 60.

Is There A Clubbing Effect Underlying Chinese Research Citation Increases?, Li Tang, Philip Shapira, Jan Youtie 2014 SelectedWorks

Is There A Clubbing Effect Underlying Chinese Research Citation Increases?, Li Tang, Philip Shapira, Jan Youtie

Philip Shapira

There is increasing evidence that citations to Chinese research are rising sharply. A variety of explanations have been explored in previous studies. This research aims to explore another potential explanation – whether there exists a “clubbing” effect in China’s surge in research citations, in which a higher rate of internal citing takes place among Chinese most influential researchers. Focusing on the most highly cited research articles in nanotechnology, we found that a larger proportion of Chinese nanotechnology research citations are localized within individual, institutional and national boundaries. Both descriptive and statistical tests suggest that highly cited Chinese papers are more ...


Where’S The Rhetoric? Broader Impacts In Collaborative Research, Leah Ceccarelli 2014 University of Iowa

Where’S The Rhetoric? Broader Impacts In Collaborative Research, Leah Ceccarelli

Poroi

Rhetoricians involved in funded collaborative research with scientists have discussed some of their own rhetorical choices in conveying to their research partners the unique and valuable contributions made by rhetorical inquiry. But different definitions of what expertise is offered by someone trained in rhetoric as a field of study shape their conclusions, as does the fact that most are in the early stages of this collaborative work. They have provided an energetic start to what promises to be a spirited, valuable, and lengthy conversation about how rhetoricians of science might think about the broader impacts of their research.


With Whom Do We Speak? Building Transdisciplinary Collaborations In Rhetoric Of Science, Caroline Gottschalk Druschke 2014 University of Iowa

With Whom Do We Speak? Building Transdisciplinary Collaborations In Rhetoric Of Science, Caroline Gottschalk Druschke

Poroi

There is a necessary and growing preoccupation in rhetoric of science with the real-world consequences of our work and with the mediating role rhetoric should play at the nexus of science-publics-policy. Emerging from these discussions are calls by Gross, Ceccarelli, and Herndl for thoughtful and practical action. This paper builds from this preoccupation with thoughtful praxis, highlighting three funded collaborations that offer a vision for engaged, mutually beneficial, consequential collaborations in rhetoric of science. Taken together, these collaborations constitute an argument for Herndl’s “applied rhetoric of science.” They move beyond transactional models of collaboration and posit a transdisciplinary vision ...


Usos E Significados Da Tecnologia Na Academia, João Monteiro Matos 2014 SelectedWorks

Usos E Significados Da Tecnologia Na Academia, João Monteiro Matos

João Monteiro Matos

This study seeks to understand how the academic population – professors and researchers perceives, uses, and interacts with new information and communication technologies (ICT) in their everyday working practices. The main goal is to understand whether these new technologies can be an indicator of different scientific cultures, using the metaphor of the “two cultures” introduced by Charles Snow (1963).

I make use of this metaphor to examine differences and specificities of two scientific communities: the natural sciences and the social sciences community at two institutions of the University of Lisbon.

This research follows a mixed methods strategy, combining the application of ...


Unpacking The Matthew Effect In Citations, Jian Wang 2014 SelectedWorks

Unpacking The Matthew Effect In Citations, Jian Wang

Jian Wang

One problem confronting the use of citation-based metrics in science studies and research evaluations is the Matthew effect. This paper reviews the role of citations in science and decomposes the Matthew effect in citations into three components: networking, prestige, and appropriateness. The networking and prestige effects challenge the validity of citation-based metrics, but the appropriateness effect does not. Using panel data of 1,279 solo-authored papers’ citation histories and fixed effects models, we test these three effects controlling for unobserved paper characteristics. We find no evidence of retroactive networking effect and only weak evidence of prestige effect (very small and ...


Dem Simulation Of The Behaviour Of Geogrid Stabilised Ballast Fouled With Coal, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn 2014 University of Wollongong

Dem Simulation Of The Behaviour Of Geogrid Stabilised Ballast Fouled With Coal, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn

Faculty of Engineering and Information Sciences - Papers

Geogrids are commonly used in railway construction for reinforcement and stabilisation. When railway ballast becomes fouled due to ballast breakage, infiltration of coal fines, dust and subgrade soil pumping, the reinforcement effect of geogrids decreases significantly. This paper presents results obtained from Discrete Element Method (DEM) to study the interface behaviour of coal-fouled ballast reinforced by geogrid subjected to direct shear testing. In this study, irregularly-shaped aggregates (ballast) were modelled by clumping together 10-20 spheres in appropriate sizes and positions. The geogrid was modelled by bonding a large number of small spheres together to form the desired grid geometry and ...


The Path Space Of A Directed Graph, Samuel B. G Webster 2014 University of Wollongong

The Path Space Of A Directed Graph, Samuel B. G Webster

Faculty of Engineering and Information Sciences - Papers

We construct a locally compact Hausdorff topology on the path space of a directed graph E and identify its boundary-path space ∂E as the spectrum of a commutative C*-subalgebra DE of C*(E). We then show that ∂E is homeomorphic to a subset of the infinite-path space of any desingularisation F of E. Drinen and Tomforde showed that we can realise C*(E) as a full corner of C*(F), and we deduce that DE is isomorphic to a corner of DF. Lastly, we show that this isomorphism implements the homeomorphism between the boundary-path spaces.


Smart Home Electricity Management In The Context Of Local Power Resources And Smart Grid, Weiliang Zhao, Lan Ding, Paul Cooper, Pascal Perez 2014 University of Wollongong

Smart Home Electricity Management In The Context Of Local Power Resources And Smart Grid, Weiliang Zhao, Lan Ding, Paul Cooper, Pascal Perez

Faculty of Engineering and Information Sciences - Papers

This work proposes a smart home electricity management approach that can predict and schedule electricity demand and supply by considering: the 'state' of the smart grid, local power generation capacity, and electrical consumption of household appliances. The prediction of weather conditions and the immediate and longer-term plans of the residential home occupants are crucial parameters in the smart home decision-making system that acts on behalf of the occupants. This paper provides a motivation example and associated scenarios, electrical energy supply/demand models, formalization of the cost optimization problem, and scheduling schemes for a smart home electricity management system in the ...


On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo 2014 University of Wollongong

On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers

Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data ...


Development And Validation Of A Disaster Management Metamodel (Dmm, Siti Hajar Othman, Ghassan Beydoun, Vijayan Sugumaran 2014 University of Wollongong

Development And Validation Of A Disaster Management Metamodel (Dmm, Siti Hajar Othman, Ghassan Beydoun, Vijayan Sugumaran

Faculty of Engineering and Information Sciences - Papers

Disaster Management (DM) is a diffused area of knowledge. It has many complex features interconnecting the physical and the social views of the world. Many international and national bodies create knowledge models to allow knowledge sharing and effective DM activities. But these are often narrow in focus and deal with specified disaster types. We analyze thirty such models to uncover that many DM activities are actually common even when the events vary. We then create a unified view of DM in the form of a metamodel. We apply a metamodelling process to ensure that this metamodel is complete and consistent ...


Global Intermodal Liner Shipping Network Design, Zhiyuan Liu, Qiang Meng, Shuaian Wang, Zhuo Sun 2014 University of Wollongong

Global Intermodal Liner Shipping Network Design, Zhiyuan Liu, Qiang Meng, Shuaian Wang, Zhuo Sun

Faculty of Engineering and Information Sciences - Papers

This paper presents a holistic analysis for the network design problem of the intermodal liner shipping system. Existing methods for liner shipping network design mainly deal with port-to-port demand. However, most of the demand has inland origins and/or destinations. Thus, it is necessary to cope with inland origin-destination (OD) pairs involving a change in transport mode from inland transportation to maritime shipping. A method is first proposed to convert inland OD demand to port-to-port demand. Then, a framework for global intermodal liner shipping network design is proposed. Finally, the proposed methodology is applied to and numerically verified by a ...


A Model For Acid-Mediated Tumour Growth With Nonlinear Acid Production Term, Andrew B. Holder, Marianito R. Rodrigo, Miguel A. Herrero 2014 University of Wollongong

A Model For Acid-Mediated Tumour Growth With Nonlinear Acid Production Term, Andrew B. Holder, Marianito R. Rodrigo, Miguel A. Herrero

Faculty of Engineering and Information Sciences - Papers

This article considers a mathematical model for tumour growth based on an acid-mediated hypothesis, i.e. the assumption that tumour progression is facilitated by acidification of the region around the tumour-host interface. The resulting destruction of the normal tissue environment promotes tumour growth. We will derive and analyse a reaction-diffusion model for tumour progression that includes different aspects of pathological and healthy cell metabolism to check tumour growth. Our results can provide insights into the governing dynamics of invasive processes that may suggest possible intervention strategies, leading to the design of new and better experiments or treatments.


First Steps Towards Hearts And Minds? Usaid’S Countering Violent Extremism Policies In Africa, Daniel P. Aldrich 2014 SelectedWorks

First Steps Towards Hearts And Minds? Usaid’S Countering Violent Extremism Policies In Africa, Daniel P. Aldrich

Daniel P Aldrich

The United States government has adopted new approaches to counter violent extremist organizations around the world. “Soft security” and development programs include focused educational training for groups vulnerable to terrorist recruitment, norm messaging through local radio programming, and job creation in rural communities. This article evaluates the effectiveness of one set of these multi-vectored, community-level programs through data from 200 respondents in two similar, neighboring towns in northern Mali, Africa. The data show that residents in Timbuktu who were exposed to the programming for up to five years displayed measurably altered civic behavior and listening patterns in comparison with their ...


Cellular Automaton Simulation Of Hot Deformation Of Trip Steel, Ying Zhi, Xianghua Liu, Hailiang Yu 2014 University of Wollongong

Cellular Automaton Simulation Of Hot Deformation Of Trip Steel, Ying Zhi, Xianghua Liu, Hailiang Yu

Faculty of Engineering and Information Sciences - Papers

The recrystallization process of hot deformed austenite of TRIP steel was predicted using Cellular Automaton (CA) combined with the principles of physical metallurgy. A model was developed for prediction of the dynamic and static recrystallization microstructure evolution and properties of hot deformed austenite for TRIP steel. The theoretical modeling of recrystallization was based on dislocation density. The microstructure evolution of austenite recrystallization of TRIP steel (such as the grain shape and size, volume fraction, kinetics curve of recrystallization) was predicted both visually and quantitatively. The distribution and variation of the dislocation density and flow stress were also obtained, and the ...


Kms States On C* - Algebras Associated To Higher-Rank Graphs, Astrid an Huef, Marcelo Laca, Iain Raeburn, Aidan Sims 2014 University of Wollongong

Kms States On C* - Algebras Associated To Higher-Rank Graphs, Astrid An Huef, Marcelo Laca, Iain Raeburn, Aidan Sims

Faculty of Engineering and Information Sciences - Papers

Consider a higher rank graph of rank k. Both the Cuntz-Krieger algebra and Toeplitz-Cuntz-Krieger algebra of the graph carry natural gauge actions of the torus Tk, and restricting these guage actions to one parameter subgroups of Tk gives dynamical systems involving actions of the real line. We study the KMS states of these dynamical systems. We find that for large inverse temperatures B, the simplex of KMS B states of the Toeplitz-Cuntz-Krieger algebra has dimension d one less than the number of vertices in the graph. We also show that there is a preferred dynamics for which there is a ...


Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au 2014 University of Wollongong

Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au

Faculty of Engineering and Information Sciences - Papers

A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected , meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can ...


Small Field In-Air Output Factors: The Role Of Miniphantom Design And Dosimeter Type, Kirbie Warrener, Benjamin Hug, Paul Liu, Anna Ralston, Martin A. Ebert, David McKenzie, Natalka Suchowerska 2014 University of Wollongong

Small Field In-Air Output Factors: The Role Of Miniphantom Design And Dosimeter Type, Kirbie Warrener, Benjamin Hug, Paul Liu, Anna Ralston, Martin A. Ebert, David Mckenzie, Natalka Suchowerska

Faculty of Engineering and Information Sciences - Papers

The commissioning of treatment planning systems and beam modeling requires measured input parameters. The measurement of relative output in-air, Sc is particularly difficult for small fields. The purpose of this study was to investigate the influence of miniphantom design and detector selection on measured Sc values for small fields and to validate the measurements against Monte Carlo simulations. Measurements were performed using brass caps (with sidewalls) or tops (no sidewalls) of varying heights and widths. The performance of two unshielded diodes (60012 and SFD), EBT2 radiochromic film, and a fiber optic dosimeter (FOD) were compared for fields defined by MLCs ...


Removal Of Pharmaceuticals, Steroid Hormones, Phytoestrogens, Uv-Filters, Industrial Chemicals And Pesticides By Trametes Versicolor: Role Of Biosorption And Biodegradation, Luong Nguyen, Faisal Ibney Hai, Shufan Yang, Jinguo Kang, Frederic Leusch, Felicity Roddick, William E. Price, Long D. Nghiem 2014 University of Wollongong

Removal Of Pharmaceuticals, Steroid Hormones, Phytoestrogens, Uv-Filters, Industrial Chemicals And Pesticides By Trametes Versicolor: Role Of Biosorption And Biodegradation, Luong Nguyen, Faisal Ibney Hai, Shufan Yang, Jinguo Kang, Frederic Leusch, Felicity Roddick, William E. Price, Long D. Nghiem

Faculty of Engineering and Information Sciences - Papers

This study reports the removal of 30 diverse trace organic contaminants (TrOC) by live (biosorption þ biodegradation), intracellular enzyme-inhibited and chemically inactivated (biosorption only) whole-cell preparations and the fungal extracellular enzyme extract (predominantly laccase) from Trametes versicolor (ATCC 7731). Because phenolic substrates are amenable to degradation by laccase, all 14 phenolic TrOC were readily biodegraded. On the other hand, only eight of the 16 non-phenolic TrOC were readily biodegraded while the removal of hydrophilic TrOC (log D < 3) was negligible. With the exception of diclofenac, no non-phenolic TrOC were degraded by the extracellular enzyme extract. The whole-cell culture showed considerably higher degradation of at least seven compounds, indicating the importance of biosorption and subsequent degradation by intracellular and/or mycelium associated enzymes. Improvement (20e90%) of enzymatic degradation of four phenolic and seven non-phenolic TrOC was achieved in the presence of a redox mediator. Compared with the whole-cell culture, mediator-amended extracellular extract achieved better removal of six TrOC, but lower removal of six others. A particular concern was the increased toxicity of the treated media when the redox-mediator was used. In addition to reporting the white-rot fungal removal of two UV filters, three phytoestrogens and a few other pharmaceutically active TrOC for the first time, this study provides unique insights into their removal mechanisms.


Outlier Robust Small Area Estimation, Ray Chambers, Hukum Chandra, Nicola Salvati, Nikos Tzavidis 2014 University of Wollongong

Outlier Robust Small Area Estimation, Ray Chambers, Hukum Chandra, Nicola Salvati, Nikos Tzavidis

Faculty of Engineering and Information Sciences - Papers

Recently proposed outlier robust small area estimators can be substantially biased when outliers are drawn from a distribution that has a different mean from that of the rest of the survey data. This naturally leads one to consider an outlier robust bias correction for these estimators. We develop this idea, proposing two different analytical mean-squared error estimators for the ensuing bias-corrected outlier robust estimators. Simulations based on realistic outlier-contaminated data show that the bias correction proposed often leads to more efficient estimators. Furthermore, the mean-squared error estimation methods proposed appear to perform well with a variety of outlier robust small ...


Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong 2014 University of Wollongong

Identity Based Identification From Algebraic Coding Theory, Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identification (IBI) schemes based on algebraic coding theory. We first revisit an existing code-based IBI scheme which is derived by combining the Courtois-Finiasz-Sendrier signature scheme and the Stern zero-knowledge identification scheme. Previous results have shown that this IBI scheme ...


Digital Commons powered by bepress