This list contains the titles and publication years of 599 articles from two Archaeology journals, Ancient Mesoamerica and Latin American Antiquity that contain the term, 'bone'. The articles named in this list were used as the dataset to generate LDA topic models for related research.
Six topic models were generated using Latent Dirichlet Allocation, an algorithm that considers the probability of words co-occurring in a document given a collection of documents. The collection of documents that these particular models are based on include 599 articles that include the term 'bone' from two archaeology journals, Ancient Mesoamerica and Latin American Antiquity.
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on July 27, 2020, at 2:00 pm EDT.
Due to technical difficulties, the presentation starts at 8:47.
The presenter was Claudio Aspesi, Senior Research Analyst. He joined Sanford C. Bernstein & Co., LLC, in 2004 covering European media stocks. Previously he was Global Senior Vice President of Strategy at EMI Music and was responsible for defining the company’s business model as the music industry entered the digital age. Before joining EMI Music in 2002, Mr. Aspesi was a member of the executive team at Airclic, an Internet infrastructure company, and prior to that a Principal at McKinsey and Co., working with many leading media and entertainment companies. Mr. Aspesi graduated with the highest honors from Universita Luigi Bocconi, Milan, with a Laurea in Economia Aziendale.
Session Description - Open data and metadata - opportunities, risks, and possible actions
Research data is at the core of what universities do. Its value to researchers is, of course, paramount - and open science offers significant benefits to the scientific community. But this data, and the attached metadata, are increasingly valuable for third parties as well. We will discuss how research data and metadata increasingly overlaps with all the other data produced by academic institutions, how it is becoming increasingly valuable outside the academic community, and how it could become even more valuable in the future. The collection, analysis, synthesis and preservation of data and metadata, however, pose significant issues as well; for example, data can and is being used to evaluate individuals (with the biases implicit in developing algorithms to analyze them). More broadly, the collection and analysis of data raises privacy and academic freedom concerns, and so does the lack of transparency and accountability of third party users. Ultimately, the deployment of data analytics and Artificial Intelligence tools should fit with the broader values of the academic community, such as equity and sustainability - whether it does so is controversial.
In addition to the need to establish principles for the use of data analytics and Artificial Intelligence, there are also significant ethical questions that need to be addressed, and that pose significant challenges, and there are questions about how to ensure the long term preservation of data and metadata.
We will close the presentation with a look at possible steps that the academic community ought to take to address all these issues. We hope that a discussion will follow, in order to address questions and issues, as well as to gather points of view from participants
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on July 13, 2020, at 2:00 pm EDT.
Jeffrey Layne Blevins (PhD) - is Head of the Journalism Department at the University of Cincinnati and editor of Democratic Communiqué. His scholarly focus is the political economy of U.S. media industries, and his most research includes data visualizations of social media activity involving social justice issues and the spread of misinformation on Twitter. The Communiqué is the official publication of the Union for Democratic Communications
Victoria Carr (PhD) - Professor of Early Childhood Education/Human Development and Executive Director of the Arlitt Center for Education, Research, and Sustainability at the University of Cincinnati, conducts research related to play and learning environments, teacher pedagogies, and children’s experiences in nature. Her research on nature playscapes and STEM education has been supported by the US National Science Foundation. She serves as Co-Editor for Children, Youth & Environments, co-chair of the Leave No Child Inside Greater Cincinnati Collaborative, and as a Board of Directors member for Cincinnati Nature Center. She is an advocate for mindful, sustainable and child-friendly communities.
Theresa Culley (PhD) - is a Professor and Head of the Department of Biological Sciences. As a plant biologist, she co-founded and currently serves as Editor-in-Chief of Applications in Plant Sciences, an online methods journal published by the Botanical Society of America in association with Wiley Publishing. The journal highlights novel methods in all areas of the plant sciences, serving established professionals as well as junior researchers around the world.
Steven Lange - Director, graduated from Heidelberg College in Tiffin, Ohio with a Bachelor of Science degree in Biology. Steve became our director in 2013. He has over 25 years of experience in the leather industry, including tannery, finishing, and automotive cutting/wrapping operations. In addition to continually growing our roster of clients, he has taught over 200 students in our various classes. His knowledge of leather testing procedures and processes is unrivaled. In his free time, he volunteers for the Leader Dogs for the Blind organization, is the editor of the JALCA (Journal of the American Leather Chemists Association) and enjoys spending time with his family and dogs.
Publications have long been the currency for academia. The first publication can be the hardest. And today’s scholarly articles are more than pdfs and can include multi-media supplemental materials including raw or additional data, videos, interactive maps, and other components of your scholarship process. In this one hour web session, UC faculty who are journal editors will discuss how to - dentify the right journal for your work - avoid predatory journals - maximize your research impact through altmetrics and data publishing - increase your understanding of the publishing process through opportunities such as being a guest editor on a special issue or serving as a reviewer. This event is free and open to all seeking to publish their scholarship and maximize its impact.
The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach.
This article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.
This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker & Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy.
The FCC reported that there were about 3.1 million smartphone thefts in 2013. Today nearly everyone owns at least one smart device, and many people tend to keep personal or business information on these same devices. If your device is lost the first reaction you might have is to use attempt to use 3rd party software to locate or wipe the sensitive data from your device, but what happens when the connection to those services is severed? The Fail-Safe Erase application aims to provide you with the ability to wipe your device after its disconnected from reaching network services. After setting up a personalized password and a wipe timer, the Fail-Safe Erase application will run in the background while looking for those services. Once the connection to GPS, network, and cellular service is interrupted the wipe timer begins its countdown. If the user does not access their device to interrupt the wipe timer within the time set by the user, the device will begin to wipe itself of all personal data. Fail-Safe Erase aims to ensure that if you can’t gain access to your mobile device, remotely or physically, the private data on it will be securely erased, hopefully before it falls into the wrong hands.
The use of the GoCart application will have the ability to enhance grocery shoppers’ experience by taking the shopping list and generating the most efficient shopping path. According to the Time Use Institute, the average shopping trip takes 45 minutes. In part, the time spent is attributed to confusing store layout, congested aisles, and uninformed staff (Marks, 2015). Results from our grocery shopping experience has shown that more time is directed towards roaming through the aisles searching for the items. There are applications dealing with allowing us to create a virtual list, but none directed towards the location of the items. Along with GoCart creating the most productive shopping path with the virtual list, there will also be a map with the store layout that pinpoints each item. Having GoCart will make the next trip to the grocery store quick and painless.
Nibbler is an android application used to search and find restaurants based on specific
filters applied by the user. Nibbler gives users the ability to apply multiple filters to their
searches and allows those with dietary restrictions or food allergies to find restaurants that fit
their specific diet. Nibbler also aims to eliminate the issue of analysis paralysis by limiting the
return on food locations that are returned to the user after completing a search. The reason for
this is simple, if there are too many options, then an individual can overanalyze or overthink the
situation. This way the user still has everything they originally searched for, but the decision is
easier due to the fact that they are limited in their options. The application is simple to use and
anyone with an android device can navigate the simple UI. This allows users to store personal
data and health information safely and securely.