The Poverty Of The Neuroscience Of Poverty: Policy Payoff Or False Promise?, 2017 University of Pennsylvania Law School
The Poverty Of The Neuroscience Of Poverty: Policy Payoff Or False Promise?, Amy L. Wax
Research in deprivation neuroscience has grown rapidly over the past 15 years. Studies in this field examine brain structure and function of individuals from disadvantaged backgrounds. Many attempt to link brain characteristics to behavioral and cognitive deficits found more commonly in deprived populations.
The article assesses claims by neuroscientists and policy-oriented commentators that deprivation neuroscience can help generate more effective strategies for addressing poverty and deprivation. It concludes that research in this field has no unique practical payoff for reducing or alleviating poverty and its effects, over and above what is known or can be discovered from behavioral science and ...
Yale’S Environmental Performance Index: The Construction And Use Of A Composite Index For Global Sustainability, Zach Wendling
Yale Day of Data
No abstract provided.
Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney
The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study. Web analytics technology ...
Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney
Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...
Cognitive Sociology, 2017 CUNY Graduate Center
Cognitive Sociology, Michael W. Raphael
Publications and Research
Cognitive sociology is the study of the conditions under which meaning is constituted through processes of reification. Cognitive sociology traces its origins to writings in the sociology of knowledge, sociology of culture, cognitive and cultural anthropology, and more recently, work done in cultural sociology and cognitive science. Its central questions revolve around locating these processes of reification since the locus of cognition is highly contentious. Researchers consider how individuality is related to notions of society (structures, institutions, systems, etc.) and notions of culture (cultural forms, cultural structures, sub-cultures, etc.). These questions further explore how these answers depend on learning processes ...
Vibration-Induced Aerodynamic Loads On Large Horizontal Axis Wind Turbine Blades, 2017 University of Wollongong
Vibration-Induced Aerodynamic Loads On Large Horizontal Axis Wind Turbine Blades, Xiong Liu, Cheng Lu, Shi Liang, Ajit R. Godbole, Yan Chen
Faculty of Engineering and Information Sciences - Papers
The blades of a large Horizontal Axis Wind Turbine (HAWT) are subjected to significant vibrations during operation. The vibrations affect the dynamic flow field around the blade and consequently alter the aerodynamic forces on the blade. In order to better understand the influence of blade vibrations on the aerodynamic loads, the dynamic stall characteristics of an S809 airfoil undergoing translational motion as well as pitching motion were investigated using Computational Fluid Dynamics (CFD) techniques. Simulation results indicated that both the out-of-plane and in-plane translational motions of the airfoil affect the unsteady aerodynamic forces significantly. In order to investigate the effects ...
Micromechanics-Based Investigation Of Fouled Ballast Using Large-Scale Triaxial Tests And Discrete Element Modeling, 2017 University of Wollongong
Micromechanics-Based Investigation Of Fouled Ballast Using Large-Scale Triaxial Tests And Discrete Element Modeling, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn
Faculty of Engineering and Information Sciences - Papers
Railway ballast comprises unbounded discrete grains that are often used to form a load-bearing platform for tracks. Ballast degradation as trains pass over the tracks and infiltration of external fines including slurried (pumped) fine subgrade soils are two of the main reasons for ballast fouling. Fouling causes tracks to settle and also reduces the load-bearing capacity, which is associated with a reduction in internal friction and increased lateral spreading of the ballast layer. This paper presents a study of mobilized friction angle, volumetric behavior, and associated evolutions of contact and fabric anisotropy of fouled ballast subjected to monotonic triaxial loading ...
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, 2016 Tufts University
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
Military Cyber Affairs
China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace. However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese ...
A Qualitative Exploration Of The Workplace Culture Of Women In Information Technology Careers, 2016 Brandman University
A Qualitative Exploration Of The Workplace Culture Of Women In Information Technology Careers, Andrea Hemphill-Merrills
The information technology (IT) industry is one of the fastest growing industries in the United States. According to the U.S, Department of Labor and Statistics (2015), employment opportunities are it is projected to grow by 12 percent from 2014 to 2024. While the number of employed women have increased, this has not been the case in the IT industry where the number of women has been in consistent decline since 1991. In order for the U.S. to be able to fill the demand for IT professionals, it must have access to a talent pool that includes women. There ...
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, 2016 Wright State University - Main Campus
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video ...
Gale-Shapley Matching In An Evolutionary Trade Network Game, 2016 Iowa State University
Gale-Shapley Matching In An Evolutionary Trade Network Game, Leigh Tesfatsion
This study investigates the performance of Gale-Shapley matching in an evolutionary market context. Computational experimental findings are reported for an evolutionary match-and-play trade network game in which resource-constrained traders repeatedly choose and refuse trade partners in accordance with GaleShapley matching, participate in risky trades modeled two-person prisoner's dilemma games, and evolve their trade behavior over time. Particular attention is focused on correlations between ex ante market structure and the formation of trade networks, and between trade network formation and the types of trade behavior and social welfare outcomes that these trade networks support.
A Trade Network Game With Endogenous Partner Selection, 2016 Iowa State University
A Trade Network Game With Endogenous Partner Selection, Leigh Tesfatsion
This paper develops a Trade Network Game (TNG) that combines evolution ary game play with endogenous partner selection. Resource-constrained buyers and sellers choose and refuse trade partners on the basis of continually updated expected payoffs. Partner selection takes place in accordance with a "deferred choice and refusal" mechanism that is shown to have interesting stability, optimality, and uniqueness properties. The iterated prisoner's dilemma strategies used by buyers and sellers to conduct their trades are evolved over time via a genetic algorithm that biases reproduction in favor of strategies that have been successful in past trades..
A Computational Laboratory For Evolutionary Trade Network, 2016 Iowa State University
A Computational Laboratory For Evolutionary Trade Network, David Mcfadzean, Deron Stewart, Leigh Tesfatsion
This study presents, motivates, and Illustrates the use of a computational laboratory for the Investigation of evolutionary trade network formation among strategically Interacting buyers, sellers, and dealers. The computational laboratory, referred to as the Trade Network Game Laboratory (TNG Lab), Is targeted for the Microsoft Windows desktop. The TNG Lab is both modular and extensible, and has a clear, easily operated graphical user interface. It permits visualization of the formation and evolution of trade networks by means of real-time animations. Data tables and charts reporting descriptive performance statistics are also provided In real time. The capabilities of the TNG Lab ...
Using Photogrammetry To Document, Analyze, And Reverse-Engineer Grave Markers, 2016 Center for Regional Heritage Research, Stephen F. Austin State University
Using Photogrammetry To Document, Analyze, And Reverse-Engineer Grave Markers, Robert Z. Selden Jr.
Robert Z. Selden Jr.
There are a wide range of applications for three-dimensional (3D) data in archaeology, and a diverse array of methods for collecting and analyzing those data. In this article, free 3D photogrammetry software (Autodesk 123D Catch) is used to document a series of grave markers. The data are subsequently exported to Geomagic Design X to demonstrate and briefly discuss the various potential analyses that might be used to illustrate the effects of preservation treatments and marker degradation through time. Further, one marker is reverse-engineered, illustrating the capacity of 3D modeling to expedite the process of design, should elements warrant replacement. Additional ...
3d Scan Data For Caddo Ceramic Vessels From The George C. Davis Site (41ce19), 2016 Center for Regional Heritage Research, Stephen F. Austin State University
3d Scan Data For Caddo Ceramic Vessels From The George C. Davis Site (41ce19), Robert Z. Selden Jr.
Robert Z. Selden Jr.
On June 8, 2015, the intact and reconstructed vessels from the George C. Davis site (41CE19) were scanned (3D) in advance of an analysis of 3D geometric morphometrics. These data were collected using a Creaform GoSCAN50 running VXElements via the scanner direct control function in Geomagic Design X. All data associated with this project are available in Zenodo under a Creative Commons Attribution license, where they can be downloaded for use in additional projects. These data have the capacity to augment numerous research designs in the digital humanities and ceramic studies, as well as a wide range of comparative research ...
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, 2016 Faculty of Information and Media Studies, Western University
Remembering Me: Big Data, Individual Identity, And The Psychological Necessity Of Forgetting, Jacquelyn A. Burkell
Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories ...
Spaceways: Airspace In Outer Space, 2016 Embry-Riddle Aeronautical University
Spaceways: Airspace In Outer Space, Scott Haeffelin
Space Traffic Management Conference
Forecasted future demand in space travel is driving the need for the development of space traffic management. Currently, orbital space traffic is mostly unregulated with internationally agreed upon best practices and self-interest driving space operators to avoid collisions with other spacecraft. This paper explores the future of space travel by presenting a concept of creating “airspace in space” or spaceways to manage the ever growing volumes of space traffic. Spaceways are analogous to airspace for aircraft with the goal of increasing levels of safety and reducing probabilities of collision. These goals can be achieved by creating traffic rules, defining valuable ...
An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., 2016 Novus Access & Ivy Tech Community College
An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth
Journal of Science Education for Students with Disabilities
This study examined the potential relationship of accessible hands-on science learning experiences to the development of positive beliefs concerning one’s capacity to function in the sciences and motivation to consider science as a college major and career. Findings from Likert survey items given before and after engaging in accessible hands-on science laboratories show that students who were blind or had low vision (BLV) were more likely to agree with the following items after engaging in accessible science experiences: 1) I plan on enrolling as a science major in college; 2) My educational experiences, so far, have given me the ...
Technical Risk In The Mass Media: Introduction, 2016 University of New Hampshire
Technical Risk In The Mass Media: Introduction, Allan Mazur
RISK: Health, Safety & Environment
Special editor, Professor Mazur introduces and explains the origins of the symposium.
Mass Media As An Information Channel And Public Arena, 2016 University of New Hampshire
Mass Media As An Information Channel And Public Arena, Hans Peter Peters
RISK: Health, Safety & Environment
Professor Peters argues that several functions of mass media compete and that attempts to improve risk coverage must avoid optimizing one at the expense of others.