Teaching Science and Values in Political Science Using Computer-assisted Instruction
In: Teaching political science, Volume 13, Issue 3, p. 124
ISSN: 0092-2013
26921 results
Sort by:
In: Teaching political science, Volume 13, Issue 3, p. 124
ISSN: 0092-2013
In: Studia Universitatis Babeş-Bolyai. Mathematica, Volume 67, Issue 4, p. 677-692
ISSN: 2065-961X
"In this work, we establish some new midpoint and trapezoidal type inequalities for prequasiinvex functions via the Katugampola fractional integrals. Some of the results obtained in this paper are generalizations of some earlier results in the literature."
In: Socioeconomica: the scientific journal for theory and practice of socio-economic development, Volume 5, Issue 10, p. 189-202
ISSN: 2217-7558
Mobile, wearable, and ubiquitous computing devices are increasingly replacing personal computers for many everyday tasks. In this thesis, we treat these devices not as individual computers but as part of a larger computing environment and explore the challenges and opportunities presented.We start by outlining our vision for this environment, focusing in particular on interacting with public devices that do not belong to a single user but are instead provided to the public by businesses and organizations such as restaurants, shopping centers, employers, universities, and governments. Software running in this environment will treat all the currently available devices as a single computer using the unique capabilities of each device to provide an enhanced user experience.A software architecture is proposed to simplify writing applications that make use of many different devices. We propose a runtime environment to allow HTML and JavaScript applications to execute on a diverse set of devices and develop a concept for virtual components that allows user interfaces to spread across multiple displays without requiring foreknowledge of available devices and their capabilities. For device discovery and communication a JSON encoded protocol is used that operates on top of a number of transport protocols including UDP, TCP, and WebSockets. In addition, a secure boot mechanism is described for providing trusted access to public devices. Lastly, several example applications are provided that make use of this environment and their differences and unique capabilities are discussed.
BASE
In: American behavioral scientist: ABS, Volume 10, Issue 5, p. 2-5
ISSN: 1552-3381
Computer techniques of information processing are useful not only for retrieving desired references from diverse col lections but also for managing large-scale bibliographies with a common focus. Dr. Hesung Chun Koh, Director of the Korea Project at the Human Relations Area Files, de scribes the use of computers in developing a comprehen sive social science bibliography on Korea.
In: MSSET - Modeling and Simulation in Science, Engineering & Technology
In: SpringerBriefs in computer science
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular.
In: Studia Universitatis Babeş-Bolyai. Mathematica, Volume 62, Issue 4, p. 479-494
ISSN: 2065-961X
In: Teaching Political Science, Volume 13, Issue 3, p. 124-127
In: Gender: Zeitschrift für Geschlecht, Kultur und Gesellschaft, Volume 13, Issue 3, p. 137-152
ISSN: 2196-4467
Mit zunehmender akademischer Karrierestufe sinkt der Anteil von Frauen im Bereich der Informatik. Wir fragen nach möglichen Zugängen von Frauen zum Studium und zur Promotion in der Informatik sowie nach Bedingungen der beruflichen Sozialisation. Es wurden 14 teilstrukturierte Interviews mit IT-Promovendinnen durchgeführt. Anhand von Erzählungen und Beschreibungen wurden förderliche und hinderliche Bedingungen als strukturelle Öffnungen, Schließungen und Hierarchisierungen identifiziert. Hierarchisierungen finden sich u. a. in der geschlechterbezogenen Zuteilung und Übernahme von Arbeitstätigkeiten. Trotz der Wahrnehmung von Geschlechtergerechtigkeit sind die Zugänge zu einer männlich dominierten Disziplin strukturell reglementiert. Öffnungsprozesse jedoch weisen auf Möglichkeiten des Vergessens von Geschlecht und in der Folge auch auf Möglichkeiten der strukturellen Durchsetzung von Gleichberechtigung hin.
In: International journal Vallis Aurea, Volume 1, Issue 1, p. 27-40
ISSN: 1849-8485
In the world of autonomous underwater vehicles (AUV) the prominent form of sensing has been sonar due to cloudy water conditions and dispersion of light. Although underwater conditions are highly suitable for sonar, this does not mean that vision techniques should be completely ignored. There are situations where visibility is high, such is in calm waters, and where light dispersion is not an issue, such as shallow water or near the surface. In addition, even when visibility is low, once a certain proximity to an object exists, visibility can increase. The focus of this project is this gap in capability for AUVs, with an emphasis on computer-aided detection through machine learning and computer vision techniques. All experimentation utilizes the Stingray AUV, a small and unique vehicle designed by San Diego iBotics. The first experiment is detection of an anchored buoy, which mimics the real world application of mine detection for the Navy. The second experiment is detection of a pipe, which mimics pipes in bays and harbors. The current algorithm for this application uses boosting machine learning on hue, saturation, value (HSV) to create a classifier followed by post processing techniques to clean the resulting binary image. There are many further applications for computer- aided detection and classification of objects underwater, from environmental to military
BASE
This dataset describes the temporal evolution of collaborations in Computer Science based on papers that have been published between 1970 to 2016. It contains several data files in CSV format which embody information such as the author of publications for each year, its citations and the papers it is cited by. It also contains the inferred gender information of all authors. The publication and citation details are taken from DBLP and Aminer datasets respectively. This dataset along with the gender information is obtained from the methodology as specified in the 'Data' section of following paper https://arxiv.org/pdf/1704.05801.pdf
GESIS