Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Series

2018

Institution
Keyword
Publication
File Type

Articles 391 - 417 of 417

Full-Text Articles in Social and Behavioral Sciences

Protected Area Planning And Management: Supporting Local Stakeholder Participation With An Asset-Based, Biocultural Approach, Nicole M. Wengerd Jan 2018

Protected Area Planning And Management: Supporting Local Stakeholder Participation With An Asset-Based, Biocultural Approach, Nicole M. Wengerd

Antioch University Full-Text Dissertations & Theses

Given the uncertainties and risks of anthropogenic climate change, the urgency to conserve biodiversity has renewed urgency that has prompted a number of international forums, treaties, and agencies to advocate for the establishment of new and/or expansion of existing protected areas. One of the most broadly recognized efforts to expand the global protected area network can be found in the Aichi Biodiversity Targets, outlined in the Convention on Biological Diversity Strategic Plan for 2011-2020, adopted in 2010 by 196 countries. Target 11 calls for the expansion of terrestrail and inland water areas, as well as coastal marine areas. While the …


Influences Of Forest Edges And Human Activities On The Dry Season Ranging Patterns Of Chimpanzees (Pan Troglodytes Schweinfurthii) In Nyungwe National Park, Rwanda, Enathe Hasabwamariya Jan 2018

Influences Of Forest Edges And Human Activities On The Dry Season Ranging Patterns Of Chimpanzees (Pan Troglodytes Schweinfurthii) In Nyungwe National Park, Rwanda, Enathe Hasabwamariya

Antioch University Full-Text Dissertations & Theses

Great apes, our closest biological relatives are threatened globally by the increasing anthropogenic pressures on their habitat. The major threats to the eastern chimpanzees (Pan troglodytes schweinfurthii) are hunting for bush meat and illegal trade in chimpanzee infants, habitat loss or fragmentation and disease transmission (IUCN, 2010). Nyungwe National Park (NNP), Rwanda has a population of chimpanzees that face several threats, including hunting for bushmeat, habitat degradation from forest fires and human-wildlife conflicts, and much of these impacts are concentrated at forest edges. The main objectives of this research were to assess the use of forest edges by chimpanzees along …


Crop Height Estimation With Unmanned Aerial Vehicles, Carrick Detweiler, David Anthony, Sebastian Elbaum Jan 2018

Crop Height Estimation With Unmanned Aerial Vehicles, Carrick Detweiler, David Anthony, Sebastian Elbaum

School of Computing: Faculty Publications

An unmanned aerial vehicle (UAV) can be configured for crop height estimation. In some examples, the UAV includes an aerial propulsion system, a laser scanner configured to face downwards while the UAV is in flight, and a control system. The laser scanner is configured to scan through a two-dimensional scan angle and is characterized by a maxi mum range. The control system causes the UAV to fly over an agricultural field and maintain, using the aerial propulsion system and the laser scanner, a distance between the UAV and a top of crops in the agricultural field to within a programmed …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …


Bibliography For Interstices 2018: Beyond Human: Emotion And Ai, Kristin Laughtin-Dunker Jan 2018

Bibliography For Interstices 2018: Beyond Human: Emotion And Ai, Kristin Laughtin-Dunker

Library Displays and Bibliographies

An annotated list of materials in the Leatherby Libraries to accompany the Interstices 2018: Beyond Human: Emotion and AI event held at Chapman University in February 2018. The event featured Lisa Joy, co-creator and executive producer of HBO’s Emmy winning hit series Westworld, Jon Gratch, Director for Virtual Human Research at the University of Southern California’s (USC) Institute for Creative Technologies and Caroline Bainbridge, a Professor of Psychoanalysis and Culture in the Department of Media, Culture and Language at the University of Roehampton London. The Leatherby Libraries also hosted two book club discussions of The Positronic …


The Importance Of Friends And Family To Recreational Gambling, At-Risk Gambling, And Problem Gambling, Alissa Mazar, Robert J. Williams, Edward J. Stanek Iii, Martha Zorn, Rachel A. Volberg Jan 2018

The Importance Of Friends And Family To Recreational Gambling, At-Risk Gambling, And Problem Gambling, Alissa Mazar, Robert J. Williams, Edward J. Stanek Iii, Martha Zorn, Rachel A. Volberg

Biostatistics and Epidemiology Faculty Publications Series

Background

The variables correlated with problem gambling are routinely assessed and fairly well established. However, problem gamblers were all ‘at-risk’ and ‘recreational’ gamblers at some point. Thus, it is instructive from a prevention perspective to also understand the variables which discriminate between recreational gambling and at-risk gambling and whether they are similar or different to the ones correlated with problem gambling. This is the purpose of the present study.

Method

Between September 2013 to May 2014, a representative sample of 9,523 Massachusetts adults was administered a comprehensive survey of their past year gambling behavior and problem gambling symptomatology. Based on …


Urban Areas In Coastal Zones, Richard C. Dawson, M. Shah Alam Khan, Vivien Gornitz, Maria Fernanda Lemos, Larry Atkinson, Julie Pullen, Juan Camilo Osorio, Lindsay Usher, Cynthia Rosenzweig (Ed.), William Solecki (Ed.), Patricia Romero-Lankao (Ed.), Shagun Mehrotra (Ed.), Shobhakar Dhakal (Ed.), Somayya Ali Ibrahim (Ed.) Jan 2018

Urban Areas In Coastal Zones, Richard C. Dawson, M. Shah Alam Khan, Vivien Gornitz, Maria Fernanda Lemos, Larry Atkinson, Julie Pullen, Juan Camilo Osorio, Lindsay Usher, Cynthia Rosenzweig (Ed.), William Solecki (Ed.), Patricia Romero-Lankao (Ed.), Shagun Mehrotra (Ed.), Shobhakar Dhakal (Ed.), Somayya Ali Ibrahim (Ed.)

CCPO Publications

[First Paragraph] Coastal cities have been subjected to extreme weather events since the onset of urbanization. Climatic change, in particular sea level rise, coupled with rapid urban development are amplifying the challenge of managing risks to coastal cities. Moreover, urban expansion and changes and intensification in land use further pressure sensitive coastal environments through pollution and habitat loss.


Neutrosophic Optimization And Its Application On Structural Designs, Florentin Smarandache, Mridula Sarkar, Tapan Kumar Roy Jan 2018

Neutrosophic Optimization And Its Application On Structural Designs, Florentin Smarandache, Mridula Sarkar, Tapan Kumar Roy

Branch Mathematics and Statistics Faculty and Staff Publications

In the real world, uncertainty or vagueness is prevalent in engineering and management computations. Commonly, such uncertainties are included in the design process by introducing simplified hypothesis and safety or design factors. In case of structural and pavement design, several design methods are available to optimize objectives. But all such methods follow numerous monographs, tables and charts to find effective thickness of pavement design or optimum weight and deflection of structure calculating certain loop of algorithm in the cited iteration process. Most of the time, designers either only take help of a software or stop the cited procedure even after …


Neutrosophic Multi-Criteria Decision Making, Florentin Smarandache, Jun Ye, Yanhui Guo Jan 2018

Neutrosophic Multi-Criteria Decision Making, Florentin Smarandache, Jun Ye, Yanhui Guo

Branch Mathematics and Statistics Faculty and Staff Publications

The notion of a neutrosophic quadruple BCK/BCI-number is considered in the first article (“Neutrosophic Quadruple BCK/BCI-Algebras”, by Young Bae Jun, Seok-Zun Song, Florentin Smarandache, and Hashem Bordbar), and a neutrosophic quadruple BCK/BCI-algebra, which consists of neutrosophic quadruple BCK/BCI-numbers, is constructed. Several properties are investigated, and a (positive implicative) ideal in a neutrosophic quadruple BCK-algebra and a closed ideal in a neutrosophic quadruple BCI-algebra are studied. Given subsets A and B of a BCK/BCI-algebra, the set NQ(A,B), which consists of neutrosophic quadruple BCK/BCInumbers with a condition, is established. Conditions for the set NQ(A,B) to be a (positive implicative) ideal of a …


Word-Level Neutrosophic Sentiment Similarity, Florentin Smarandache, Mihaela Colhon, Stefan Vladutescu, Xenis Negrea Jan 2018

Word-Level Neutrosophic Sentiment Similarity, Florentin Smarandache, Mihaela Colhon, Stefan Vladutescu, Xenis Negrea

Branch Mathematics and Statistics Faculty and Staff Publications

In the specialised literature, there are many approaches developed for capturing textual measures: textual similarity, textual readability and textual sentiment. This paper proposes a new sentiment similarity measures between pairs of words using a fuzzy-based approach in which words are considered single-valued neutrosophic sets. We build our study with the aid of the lexical resource SentiWordNet 3.0 as our intended scope is to design a new word-level similarity measure calculated by means of the sentiment scores of the involved words. Our study pays attention to the polysemous words because these words are a real challenge for any application that processes …


Netnographic Slog: Creative Elicitation Strategies To Encourage Participation In An Online Community Of Practice For Early Education And Care, Ruth Wallace Jan 2018

Netnographic Slog: Creative Elicitation Strategies To Encourage Participation In An Online Community Of Practice For Early Education And Care, Ruth Wallace

Research outputs 2014 to 2021

Active, participatory netnography, in contrast to passive netnography, is essential if researchers are to gain rich rewards from the rigorous collection of qualitative data. However, researchers should be aware of the ‘netnographic slog’; “the blood, sweat and tears” associated with eliciting quality data and encouraging active participation in online communities.

This article examines the – Supporting Nutrition for Australian Childcare (SNAC) – online community of practice, established to support healthy eating practices in early childhood education and care settings. To ensure research rigour, Kozinets’ netnographic steps were employed. Garnering member participation in this online community was a slog; most community …


Reimagining The Cultural Significance Of Wetlands: From Perth’S Lost Swamps To The Beeliar Wetlands, Danielle Brady, Jeffrey Murray Jan 2018

Reimagining The Cultural Significance Of Wetlands: From Perth’S Lost Swamps To The Beeliar Wetlands, Danielle Brady, Jeffrey Murray

Research outputs 2014 to 2021

The history of Perth, Western Australia, has been characterised by the incremental loss of its wetlands. While disputes about wetlands are often framed solely in terms of the environment, they are places of cultural significance too. The extensive wetlands of central Perth, food gathering and meeting places for Noongar people are now expunged from the landscape. Urban dwellers of Perth are largely unaware that the seasonal lakes and wetlands of the centre of the city were the larders, gardens, hideouts, dumps and playgrounds of previous generations; both Noongar and Settler. The loss of social memory of these lost cultural/natural places …


Detecting Fake News In Social Media Networks, Monther Aldwairi, Ali Alwahedi Jan 2018

Detecting Fake News In Social Media Networks, Monther Aldwairi, Ali Alwahedi

All Works

© 2018 The Authors. Published by Elsevier Ltd. Fake news and hoaxes have been there since before the advent of the Internet. The widely accepted definition of Internet fake news is: fictitious articles deliberately fabricated to deceive readers'. Social media and news outlets publish fake news to increase readership or as part of psychological warfare. Ingeneral, the goal is profiting through clickbaits. Clickbaits lure users and entice curiosity with flashy headlines or designs to click links to increase advertisements revenues. This exposition analyzes the prevalence of fake news in light of the advances in communication made possible by the emergence …


A Supply Chain Profile Of A School-Based Feeding Program Using The Centralized Kitchen Model, Eden Delight Miro, J. Lemuel Martin, Leslie Lopez, Joselito Secson, Carmela Oracion, Jhoel Loanzon Jan 2018

A Supply Chain Profile Of A School-Based Feeding Program Using The Centralized Kitchen Model, Eden Delight Miro, J. Lemuel Martin, Leslie Lopez, Joselito Secson, Carmela Oracion, Jhoel Loanzon

Mathematics Faculty Publications

There has recently been renewed interest and a growing demand for school feeding programs. In the Philippines, the government, through the Department of Education (DepEd), Department of Social Welfare and Development (DSWD), and non-government organizations such as the Ateneo Center for Educational Development (ACED), has initiated such programs to address the prevalence of malnutrition among Filipino school-age children. In 2011, ACED introduced the ACED Blueplate Centralized Kitchen (ABCK) model for large-scale school feeding. This study aims to provide a supply chain profile of the first and largest city-wide implementation of the ABCK model in the Philippines to date, which is …


Neutropsychic Personality / A Mathematical Approach To Psychology (Third Enlarged Edition), Florentin Smarandache Jan 2018

Neutropsychic Personality / A Mathematical Approach To Psychology (Third Enlarged Edition), Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

Neutropsyche is the psychological theory that studies the soul or spirit using the neutrosophy and neutrosohic theories. In other words: Neutrosophic Psychological Theory. It is based on triadic neutrosophic psychological concepts of the form (A, neutA, antiA).

Neutropsychic Personality is a neutrosophic dynamic open psychological system of tendencies to feel, think, and act specific to each individual, based on

Neutrosophic Refined Memory: that restructured the division of memory into: consciousness, aconsciousness (which we introduce as a blend of consciousness and unconsciousness), and unconsciousness. Aconscious was further subdivided into preconscious, subconscious, semiconscious = semiunconscious, subunconscious, and preunconscious …


Apocalyptic Rhetoric And Subversive Framing In "The Uninhabitable Earth", Louisa A. D'Orvidio Jan 2018

Apocalyptic Rhetoric And Subversive Framing In "The Uninhabitable Earth", Louisa A. D'Orvidio

Honors Projects

Capturing the public's attention with messages of climate change is immediately important in the face of the threat of global warming. As science communicators and climate scientists struggle to effectively communicate the risks of climate change to the general public, a cross-disciplinary understanding of exemplary communication events is essential to furthering the field of climate change communication. By applying theories of rhetorical criticism to the arguments in the viral, and controversial, New York Magazine cover piece "The Uninhabitable Earth" by David Wallace-Wells, this study evaluated the dominant frames, appeals and persuasive narratives utilized in the article. The analysis drew conclusion …


The Use Of Item Response Theory In Survey Methodology: Application In Seat Belt Data, Mark K. Ledbetter, Norou Diawara, Bryan E. Porter Jan 2018

The Use Of Item Response Theory In Survey Methodology: Application In Seat Belt Data, Mark K. Ledbetter, Norou Diawara, Bryan E. Porter

Mathematics & Statistics Faculty Publications

Problem: Several approaches to analyze survey data have been proposed in the literature. One method that is not popular in survey research methodology is the use of item response theory (IRT). Since accurate methods to make prediction behaviors are based upon observed data, the design model must overcome computation challenges, but also consideration towards calibration and proficiency estimation. The IRT model deems to be offered those latter options. We review that model and apply it to an observational survey data. We then compare the findings with the more popular weighted logistic regression. Method: Apply IRT model to the observed data …


Emotion In The Common Model Of Cognition, Othalia Larue, Robert West, Paul Rosenbloom, Christopher L. Dancy, Alexei V. Samsonovich, Dean Petters, Ion Juvina Jan 2018

Emotion In The Common Model Of Cognition, Othalia Larue, Robert West, Paul Rosenbloom, Christopher L. Dancy, Alexei V. Samsonovich, Dean Petters, Ion Juvina

Faculty Journal Articles

Emotions play an important role in human cognition and therefore need to be present in the Common Model of Cognition. In this paper, the emotion working group focuses on functional aspects of emotions and describes what we believe are the points of interactions with the Common Model of Cognition. The present paper should not be viewed as a consensus of the group but rather as a first attempt to extract common and divergent aspects of different models of emotions and how they relate to the Common Model of Cognition.


Introduction: Symposium On “Forensics, Statistics, And Law”, Brandon L. Garrett Jan 2018

Introduction: Symposium On “Forensics, Statistics, And Law”, Brandon L. Garrett

Faculty Scholarship

No abstract provided.


Research Agenda In Developing Core Reference Ontology For Human Intelligence/Machine-Intelligence Electronic Medical Records System, Ziniya Zahedi, Teddy Steven Cotter Jan 2018

Research Agenda In Developing Core Reference Ontology For Human Intelligence/Machine-Intelligence Electronic Medical Records System, Ziniya Zahedi, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

Beginning around 1990, efforts were initiated in the medical profession by the U.S. government to transition from paper based medical records to electronic medical records (EMR). By the late 1990s, EMR implementation had already encountered multiple barriers and failures. Then President Bush set forth the goal of implementing electronic health records (EHRs), nationwide within ten years. Again, progress toward EMR implementation was not realized. President Obama put new emphasis on promoting EMR and health care technology. The renewed emphasis did not overcome many of the original problems and induced new failures. Retrospective analyses suggest that failures were induced because programmers …


Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe Jan 2018

Economics-Based Risk Management Of Distributed Denial Of Service Attacks: A Distance Learning Case Study, Omer Keskin, Unal Tatar, Omer Poyraz, Ariel Pinto, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Managing risk of cyber systems is still on the top of the agendas of Chief Information Security Officers (CISO). Investment in cybersecurity is continuously rising. Efficiency and effectiveness of cybersecurity investments are under scrutiny by boards of the companies. The primary method of decision making on cybersecurity adopts a risk-informed approach. Qualitative methods bring a notion of risk. However, particularly for strategic level decisions, more quantitative methods that can calculate the risk and impact in monetary values are required. In this study, a model is built to calculate the economic value of business interruption during a Distributed Denial-of-Service (DDoS) attack …


Towards A Physio-Cognitive Model Of Slow-Breathing, Chris Dancy Jan 2018

Towards A Physio-Cognitive Model Of Slow-Breathing, Chris Dancy

Faculty Conference Papers and Presentations

How may controlled breathing be beneficial, or detrimental to behavior? Computational process models are useful to specify the potential mechanisms that lead to behavioral adaptation during different breathing exercises. We present a physio-cognitive model of slow breathing implemented within a hybrid cognitive architecture, ACT-R/Φ. Comparisons to data from an experiment indicate that the physiological mechanisms are operating in a manner that is consistent with actual human function. The presented computational model provides predictions of ways that controlled breathing interacts with mechanisms of arousal to mediate cognitive behavior. The increasing use of breathing techniques to counteract effects of stressors makes it …


Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang Jan 2018

Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang

Research Collection School Of Computing and Information Systems

The paradigm of aging-in-place — where the elderly live and age in their own homes, independently and safely, with care provided by the community — is compelling, especially in societies that face both shortages in institutionalized eldercare resources, and rapidly-aging populations. Internet-of-Things (IoT) technologies, particularly in-home monitoring solutions, are commercially available, and can be a fundamental enabler of smart community eldercare, if they are dependable. In this paper, we present our findings on system performance of solutions from two vendors, which we have deployed at scale for technology-enabled community care. In particular, we highlight the importance of quantifying actual system …


Cyber Security And Criminal Justice Programs In The United States: Exploring The Intersections, Brian K. Payne, Lora Hadzhidimova Jan 2018

Cyber Security And Criminal Justice Programs In The United States: Exploring The Intersections, Brian K. Payne, Lora Hadzhidimova

Sociology & Criminal Justice Faculty Publications

The study of cyber security is an interdisciplinary pursuit that includes STEM disciplines as well as the social sciences. While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship. In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework. Results show that while there are a number of cyber crime courses included in criminal justice majors there are not …


The Logic And Limits Of Event Studies In Securities Fraud Litigation, Jill E. Fisch, Jonah B. Gelbach, Jonathan Klick Jan 2018

The Logic And Limits Of Event Studies In Securities Fraud Litigation, Jill E. Fisch, Jonah B. Gelbach, Jonathan Klick

All Faculty Scholarship

Event studies have become increasingly important in securities fraud litigation after the Supreme Court’s decision in Halliburton II. Litigants have used event study methodology, which empirically analyzes the relationship between the disclosure of corporate information and the issuer’s stock price, to provide evidence in the evaluation of key elements of federal securities fraud, including materiality, reliance, causation, and damages. As the use of event studies grows and they increasingly serve a gatekeeping function in determining whether litigation will proceed beyond a preliminary stage, it will be critical for courts to use them correctly.

This Article explores an array of …


My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos Jan 2018

My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos

Department of Information Systems & Computer Science Faculty Publications

A typical learning management system (LMS) provides a tool for teachers to upload and create links to resources, create online assessments and provide immediate evaluation to students. As much as it tries to be student centered, most LMS remains a tool for instruction rather than learning. In a learning generation that is bound by very high online social capital, connectedness to the family weakens. my.Eskwela (My School) redefines LMS to include a parent component to address the need for inclusive participation of parents in the teaching-learning process. Basis for re-design came from the low user acceptance of teachers in using …


Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen Jan 2018

Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

Online social media platforms generally attempt to mitigate hateful expressions, as these comments can be detrimental to the health of the community. However, automatically identifying hateful comments can be challenging. We manually label 5,143 hateful expressions posted to YouTube and Facebook videos among a dataset of 137,098 comments from an online news media. We then create a granular taxonomy of different types and targets of online hate and train machine learning models to automatically detect and classify the hateful comments in the full dataset. Our contribution is twofold: 1) creating a granular taxonomy for hateful online comments that includes both …