Emotion Extraction and Entrainment in Social Media: The Case of U.S. Immigration and Border Security
|
|
- Bernard Golden
- 5 years ago
- Views:
Transcription
1 Emotion Extraction and Entrainment in Social Media: The Case of U.S. Immigration and Border Security Wingyan Chung Dept. of Decision and Info. Sciences, School of Business Administration, Stetson University DeLand, Florida, U.S.A. Saike He State Key Lab of Management and Control for Complex Systems, Chinese Academy of Sciences Beijing, China Daniel Dajun Zeng Dept. of MIS, U. of Arizona Tucson, Arizona, U.S.A. and Chinese Academy of Sciences Beijing, China Victor Benjamin Dept. of MIS Eller College of Management University of Arizona Tucson, Arizona, U.S.A. Abstract Emotion plays an important role in shaping public policy and business decisions. The growth of social media has allowed people to express their emotion publicly in an unprecedented manner. Textual content and user linkages fostered by social media networks can be used to examine emotion types, intensity, and contagion. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues in November The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies. Keywords emotion; social media analytics; text mining; social network analysis; entrainment; influence; U.S. immigration policy; border security. I. INTRODUCTION Emotion plays an important role in shaping public policy and business decisions. Politicians and marketers often create their agendas based on public emotion expressed in mass media. As social media are increasingly used to share ideas and opinions, analyzing the intensity and types of emotion in these messages can help decision makers develop more appropriate strategies to address the needs of their constituents. The United States (U.S.) immigration policy has recently gained widespread attention on social media as well as on national and international media. Because the U.S. population consists primarily of immigrants or descendants of immigrants, public policy on immigration has strategic and long-term effects on the economy, foreign policy, and national security [1]. As nearly twelve million undocumented immigrants reside in the United States, the U.S. Government and Congress are under tremendous pressure of developing timely legislations for reforming immigration policies, which have a strong impact on U.S. border security. How to gauge the emotion of the public on border security, immigration, and related policy issues becomes a concern for decision makers and politicians. Unfortunately, there is little work on social-media-based security informatics that could potentially benefit related policy decision making. By analyzing the content and linkage information in social media, policy makers and social scientists interested in immigration and border security could possibly obtain useful answers to such questions as: Who are the most influential leaders in the social media community? How are different types of emotion changing over time as new events emerge? How does emotion spread and entrain in the community? What are the network relationships among participants in immigration and border security discussion on social media? In this research, we developed an approach to collecting and analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues during November The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. II. LITERATURE REVIEW The analysis of emotion in social media relates to literature in social computing, social media and network analysis, and emotion entrainment. We review below these domains with a view of informing the analysis of emotion in social-mediabased security informatics. A. Social Media Analytics in Security Informatics Social media analytics (SMA) is a rich set of tools and technologies most recently applied to security informatics [2, 3]. Traditional domains that SMA is used include business intelligence, online product review analysis, and security informatics [4-6]. Among these technologies, sentiment analysis and emotion extraction are important tools for understanding large amounts of social media data [7]. Researchers have developed a specialized lexicon to support emotion extraction [8]. The lexicon contains over 13,000 1
2 entries of term-category, in which a term may belong to one or more of the eight emotion categories (anger, anticipation, disgust, fear, joy, sadness, surprise, trust) [9]. Network analysis is another SMA application in which users within a large community are analyzed to reveal their levels of influence. Traditionally, social network analysis examines network dynamics in a small scale [10]. Advances in information technologies enable new capabilities of network analysis, such as identifying opinion leaders in discussion forums [11], finding expertise in networks [12], analyzing business stakeholder networks [13], and visualizing networked relationships of infectious disease transmission [14]. Although social media are increasingly important information sources for understanding public sentiment, little work is found in analyzing emotion to support intelligence and security informatics decision making. B. Emotion Analysis and Entrainment The proliferation of social media has made them the hub of information generation and diffusion. One important problem is to characterize and identify influentials, which can be defined as users who influence the opinions or emotions of others in large scale. Previous work quantifies user influence based on various structural measures, such as in/out-degree, betweenness, and PageRank [15]. The idea is based on social linkages developed in human interaction that facilitate spread of human emotion. These linkages play a critical role in large social media communities by facilitating exchange of information and confirmation of authoritative and influential positions. However, they have not been examined widely in social-media-based security informatics. Recent works also attempt to model the spread of human behavior in social networks [16-19]. Emotion entrainment, which accounts for the synchronous convergence of human emotions, has been examined in neuroscience [20] and in human social networks [21]. Whether human emotion entrains in large-scale networks of importance to national security and public policy decision making is relatively unknown. While previous methods provide quantitative analysis for social interactions, they often require explicit casual knowledge that is scarce in many scenarios. III. APPROACHES TO EMOTION ANALYSIS FOR SOCIAL- MEDIA-BASED SECURITY INFORMATICS In this research, we developed an approach to emotion analysis for social-media-based security informatics. Our approach consists of emotion extraction and entrainment of a large-scale social media network of significance to national security and public policy decision making. Through applying our approach, we examined the process of identifying influential leaders in social media networks, studied changes in emotion over time, and revealed network relationships among participants. We describe below our dataset, analyses, and preliminary findings of the two approaches to emotion analysis. A. Dataset We collected the tweets that are related to the U.S. immigration and border security discussion. To do so, we constructed carefully a list of queries by reviewing recent literature published on the topic [1, 22-24]. Filtering and collection testing helped to reduce the original 14 queries to 8 domain-specific queries: comprehensive immigration reform, illegal alien, illegal immigration, immigration debate, immigration policy, immigration reform, US border security, and US immigration. We developed a tweet crawler that collects tweet postings automatically and periodically since May As of February 15, 2015, our dataset consists of 2,418,590 tweets posted by 617,536 unique users. In this case study, we focus on the recent executive actions announced by President Obama in November 2014 to grant legal status to millions of illegal immigrants [25, 26]. We selected a subset of the data consisting of 189,012 tweets posted by 105,304 users between November 1st and November 30th of That month also recorded the highest number of tweets and the most user activities during the entire timespan of the data collection. From the users whose tweets were collected in November, we randomly selected a sample of 5,000 users for further examination of the emotion extracted from the tweets and of emotion entrainment. B. Emotion Extraction To extract emotion from each tweet, we computed values of indices in eight emotional categories defined in [9] (anger, disgust, fear, sadness, surprise, anticipation, joy, and trust). Each index represents the emotional intensity of a tweet. We used the emotion lexicon developed in [8] to identify emotional words that appear in the tweets. The lexicon contains 13,901 word-emotion entries tagged by over 2,216 human users who completed a total of 38,726 tagging assignments. Each word was assigned a sentiment polarity (positive (+1) or negative (- 1)) and is categorized into one (or more) of the eight emotional categories. Equation (1) shows the computation of the index of emotion j (ranging from 1 to 8) of tweet i, which contains n i words. M ij = where Pn i W k i=1 n i 8i 2 {1...N}, 8j 2 {1...k}...(1) M ij = Index of emotion j of Tweet i n i = Number of words in Tweet i k = Number of di erent emotion categories N = Total number of tweets being considered 8 < 1 if word(k) is in category j, where W k = k 2 {1...n i } : 0 otherwise C. Emotion Entrainment Emotion entrainment is the socialization of feelings among people who interact with each other. To examine how this process takes place in a large-scale social media network and how emotion evolves dynamically, we developed a model-free approach to detect causal relationships and to identify influential users based on the theory of emotion entrainment [27]. This theory suggests that human emotion rhythmically converges through social interactions. In this process, we consider users that are most entrained by others as influential. 2
3 We represent the emotion time series of two users x and y with two Markov processes X = x t and Y = y t. Then the entrainment strength from x to y is given by Equation (2). m m n ( X Y ) = ( t+ 1 t ) ( t+ 1 t, t ) En H x x H x x y (2) m n where, x = ( x x ), y = ( y y ), while m and n t t,..., t m+1 t t,..., t n+1 are the orders of each of the Markov processes; H(*) calculates the entropy of the probability distribution enclosed. In our experiments, we set the Markov orders m=n=3. According to our empirical analysis, this order is high enough while higher order increases computational cost without present much quantitative differences. Equation (2) can be estimated based on Simpson s rule [28] with a computational complexity of O(N log(n)). This cost is acceptable for entrainment analysis on large-scale datasets. Using Equation (3), we measured the influence of each user x based on a how others entrain towards him. ( ) = ( ) I x En y x (3) x y IV. PRELIMINARY FINDINGS In this section, we present preliminary findings of using the emotion analysis methods to examine influence of Twitter TABLE I. Social-Network-Based Method users who posted on immigration and border security issues in November 2014, and to provide descriptive statistics of the emotion scores. A. Comparison of Top Influential Users TABLE I. lists the top 10 most influential users identified by two methods. The first method uses the Betweenness Centrality score as the measure of influence of a user in the social media network formed from connections of retweets and modified-tweets. While other measures of centrality are available [15, 29], Betweenness Centrality (BC) identifies the extent to which a user serves as a bridge in immigration reform discussion, which heavily relies on the ability to find compromises and common grounds in participants of highly polarized views. The resulting top users are shown on the left of the table. Several of the listed users are out-spoken leaders in U.S. immigration and border security issues. For example, Daniel John Sobieski identified himself as a free-lance writer for various news agencies and expresses strong opinions on the immigration policy proposed by President Obama. FAIR (Federation for American Immigration Reform) is concerned with border security, immigration law enforcement, amnesty, and stopping illegal immigration. TOP 10 MOST INFLUENTIAL USERS IDENTIFIED BY TWO METHODS Emotion Entrainment Method User Name URL BC Score User Name URL Entrain Score Daniel John Sobieski ladybug FAIR SHEEPDOG REPORT Michael Johns CONEXION Mickey Kaus Marty Barrack daveweigel Stellasasha? Greg Sargent Les Wenzel Jeremy W. Peters Mike Robbins Matthew Kolken Ted Skibinski Julia Preston Ken Michael Deacon Dave Ganteaume The second method uses Equation (3) as a measure of a user s influence in a social media network. In contrast with the results found by the first method, among the top three users found by the entrainment method, only CONEXION lists itself as related to Latino entrepreneurs, which may be related to immigration issues because many immigrants are Latinos. B. Distribution of emotion ratio To understand the relative strength of the emotion, we computed the ratio for the j th emotion e in top k users (sorted j by descending order of influence score calculated by (3)) as: i=1 ( ) = k k m R e j k e ij i=1 j=1 e ij, j =1,!,m; k =1,!,n where, ij e is the sum of all the j th emotion scores (among m (= 8) categories defined in [9]) of the tweets written by the i th user in the ranked list of n (= 5,000) users. Intuitively, R(e j ) k characterizes the emotion distribution over the top k users. If R(e j ) k varies significantly as k increases (as more less-influential users are involved in the calculation of ratio), (4) 3
4 the j th emotion should be considered as a critical factor for distinguishing influential users from normal users. while surprise was the least dominant emotion (with the lowest ratio). Third, the ratio for trust increases dramatically as users ranks change from 1 to n (= 5000). This means the relative amount of trust expressed in social media increasingly distinguishes influential users from less influential users, i.e. expressing less trust in social media increases user influence in the community. C. Entrainment network In this section, we examine the structure of the entrainment patterns that affect the influence of each user. The entrainment networks of twitter users named Daniel John Sobieski, SHEEPDOG REPORT and ANNA RAND are shown in Figures 2, 3(a) and 3(b) respectively. All nodes are labeled by the names of users who entrain toward the specified user (central node labeled yellow). Blue nodes have above-average entrainment strengths while white nodes have below-average strengths. The arrow on an edge indicates the entrainment direction and the thickness of an edge represents entrainment strength. We first explore two users who had the highest BC score (see Table I). The ratios of users entraining towards these two users with above-average strengths are respectively 41.53% and 42.86%. These similarly high ratios suggest that influential users are likely to be entrained by other others with similar degree of entrainment. To test this hypothesis, we further compared the second most influential user SHEEPDOG REPORT found by the second method (see Figure 1. Relative strengths of eight emotion types. Figure 1 illustrates the change in ratio of emotions in top n (= 5000) most influential users. There are three aspects worth mentioning. First, the ratios of fear, disgust, anger, and sadness decrease while the ratios of trust, joy, anticipation, and surprise increases. These results indicate that influential users are more likely to be those high in emotions related to fear, disgust, anger, and sadness. Second, fear was the most dominant emotion (with the highest ratio) in the posted tweets Figure 2. Entrainment network of Daniel John Sobieski. 4
5 security issues during November Our approach uses a comprehensive lexicon to identify emotion categories, includes algorithms to compute emotion scores and user influence scores (based on both social ties and entrainment), and present analysis findings of users network relationship and influence patterns. These results should provide strong implication for understanding social actions and for collecting social intelligence for security informatics. Table I) and the second least influential user ANNA RAND (URL: (found by the second method but not listed in Table I). These two users tweeted similar numbers of messages (46.6K v.s. 52.1K), yet had totally different influence in discussing immigration and border security in the community. The ratios of users with above-average entrainment strengths are 57.93% for SHEEPDOG REPORT and 32.00% for ANNA RAND (note the relatively sparse edges compared with the other networks shown). This result supports our hypothesis that entrainment strengths among influential users are similar to each other. The findings provide strong implications for decision makers to identify influential users or leader groups in a social media community, and for users who aspire to become leaders in their communities. This research has several limitations. First, the generalpurpose emotion lexicon used in this research was not designed specifically for the our domain and for short messages such as tweets. Future study may verify the effectiveness of such lexicon different domains and different types of messages. Second, only Twitter was used to provide social media messages, despite other SM platforms may provide abundant content in the domain. Third, our data collection was based on pre-defined keyword queries that are restricted in terms of coverage. V. SUMMARY The growth of social media enables users to express their emotion publicly and promptly, thereby helping politicians and business leaders to gauge public perception of their agendas. Textual content and user linkages fostered by social media networks can be useful in examining emotion in a large-scale manner. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border Our ongoing works include conducting a thorough evaluation of the emotion analysis results, developing metrics to understand performance, and testing the approach on new datasets. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies. ACKNOWLEDGEMENTS This paper is based upon work supported partially by funding from the U.S. National Science Foundation (through project DUE ), U.S. Department of Homeland Security (through the 2013 Summer Research Team Program (a) SHEEPDOG REPORT (b) ANNA RAND Figure 3(a) and (b). Entrainment networks of (a) SHEEPDOG REPORT and (b) ANNA RAND. 5
6 for MSI), by Stetson University s 2015 Summer Research Grant, by the National Natural Science Foundation of China under Grant No , , , , and , by the U.S. National Institute of Health under Grant No. 1R01DA , by the China Ministry of Health under Grant No. 2013ZX Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies. We thank Mr. Daniel Ballard, the conference chairs, reviewers, and coordinators for their assistance and valuable suggestions. REFERENCES [1] J. Bush, T. F. McLarty III and E. H. Alden, U.S. immigration policy. New York: Council on Foreign Relations, [2] D. Zeng, H. Chen, R. Lusch and S.-H. Li, "Social Media Analytics and Intelligence," IEEE Intelligent Systems, vol. 25, pp , [3] V. Benjamin, W. Chung, A. Abbasi, J. Chuang, C. A. Larson and H. Chen, "Evaluating Text Visualization for Authorship Analysis," Security Informatics, vol. 3, [4] H. Chen, R. Chiang and V. Storey, "Business Intelligence and Analytics," MIS Quarterly, vol. 36, pp , [5] W. Chung and T.-L. Tseng, "Discovering business intelligence from online product reviews: A ruleinduction framework," Expert Systems with Applications, vol. 39, pp , [6] W. Chung, "BizPro: Extracting and Categorizing Business Intelligence Factors from Textual News Articles," International Journal of Information Management, vol. 34, pp , [7] A. Abbasi, H. Chen, S. Thoms and T. Fu, "Affect analysis of Web forums and blogs using correlation ensembles," IEEE Transactions on Knowledge and Data Engineering, vol. 20, pp , [8] S. M. Mohammad and P. D. Turney, "Crowdsourcing a Word-Emotion Association Lexicon," Computational Intelligence, vol. 29, pp , [9] R. Plutchik, "A general psychoevolutionary theory of emotion," Emotion: Theory, research, and experience, vol. 1, pp. 3-33, [10] S. Wasserman and K. Faust, Social Network Analysis: methods and applications: Cambridge University Press, [11] X. Song, Y. Chi, K. Hino and B. Tseng, "Identifying opinion leaders in the blogosphere," Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, [12] J. Zhang, M. S. Ackerman and L. Adamic, "Expertise networks in online communities: structure and algorithms," Proc. of the 16th international conference on World Wide Web, Banff, Alberta, Canada, [13] W. Chung, H. Chen and E. Reid, "Business stakeholder analyzer: An experiment of classifying stakeholders on the Web," Journal of the American Society for Information Science and Technology, vol. 60, pp , [14] D. Zeng, H. Chen, C. Castillo-Chavez, W. B. Lober and M. Thurmond, Infectious Disease Informatics and Biosurveillance, vol. 27: Springer, [15] M. O. Jackson, Social and Economic Networks. Princeton, NJ: Princeton University Press, [16] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow and J. E. Settle, "A 61-million-person experiment in social influence and political mobilization," Nature, vol. 489, pp , [17] G. C. Kane, M. Alavi, G. J. Labianca and S. P. Borgatti, "What's different about social media networks? A framework and research agenda," MIS Quarterly, vol. 38, pp , [18] Y. Liang, X. Zheng, D. D. Zeng, X. Zhou, S. J. Leischow and W. Chung, "Exploring How the Tobacco Industry Presents and Promotes Itself in Social Media," Journal of Medical Internet Research, vol. 17, [19] T. Schreck and D. Keim, "Visual analysis of social media data," IEEE Computer, vol. 46, pp , [20] J. Bastiaansen, M. Thioux and C. Keysers, "Evidence for mirror systems in emotions," Philosophical Transactions of The Royal Society B, vol. 364, pp , [21] A. D. Kramer, J. E. Guillory and J. T. Hancock, "Experimental evidence of massive-scale emotional contagion through social networks," Proc. of the National Academy of Sciences, vol. 111, pp , [22] J. Gans, E. M. Replogle and D. J. Tichenor, "Debates on U.S. Immigration," Sage Publications, Inc., [23] M. C. LeMay, U.S. immigration: A reference handbook. Santa Barbara, Calif.: ABC-CLIO, [24] U.S. Commission on Immigration Reform, U.S. immigration policy - Restoring credibility: A report to Congress. Washington, DC (1825 Connecticut Ave., NW, Suite 511, Washington 20009): U.S. Commission on Immigration Reform, [25] L. Meckler, C. M. Nelson and E. Morath, "Obama to Protect 4 Million-Plus Immigrants From Deportation," in Wall Street Journal [26] D. Dwyer, "President Obama Offers Legal Status to Millions of Undocumented Immigrants," in ABC News [27] M. Clayton, R. Sager and U. Will, "In time with the music: the concept of entrainment and its significance for ethnomusicology," European Meetings in Ethnomusicology, vol. 11, pp. 1-82, [28] A. Kaw and E. Kalu, Numerical Methods with Applications, 1st. ed: [29] L. C. Freeman, "A set of measures of centrality based on betweenness," Sociometry, vol. 40, pp ,
Understanding the city to make it smart
Understanding the city to make it smart Roberta De Michele and Marco Furini Communication and Economics Department Universty of Modena and Reggio Emilia, Reggio Emilia, 42121, Italy, marco.furini@unimore.it
More informationLatest trends in sentiment analysis - A survey
Latest trends in sentiment analysis - A survey Anju Rose G Punneliparambil PG Scholar Department of Computer Science & Engineering Govt. Engineering College, Thrissur, India anjurose.ar@gmail.com Abstract
More informationA STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA
A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA Qian Xu *, Xianxue Meng Agricultural Information Institute of Chinese Academy
More informationInteroperable systems that are trusted and secure
Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,
More informationSentiment Analysis of User-Generated Contents for Pharmaceutical Product Safety
Sentiment Analysis of User-Generated Contents for Pharmaceutical Product Safety Haruna Isah, Daniel Neagu and Paul Trundle Artificial Intelligence Research Group University of Bradford, UK Haruna Isah
More informationPREFACE. Introduction
PREFACE Introduction Preparation for, early detection of, and timely response to emerging infectious diseases and epidemic outbreaks are a key public health priority and are driving an emerging field of
More informationGeneral Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY
General Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY 1. Introduction In 2014 1 the European Commission proposed the creation of a Global Internet Policy Observatory (GIPO) as a concrete
More informationAn Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation
Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance
More informationBuilding Collaborative Networks for Innovation
Building Collaborative Networks for Innovation Patricia McHugh Centre for Innovation and Structural Change National University of Ireland, Galway Systematic Reviews: Their Emerging Role in Co- Creating
More informationFake News and Indifference to Scientific Fact: President Trump's Confused Tweets on Global Warming, Climate Change and Weather
Instituto Complutense de Análisis Económico Fake News and Indifference to Scientific Fact: President Trump's Confused Tweets on Global Warming, Climate Change and Weather David E. Allen School of Mathematics
More informationWFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )
WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN (2016-2019) Hosted by The China Association for Science and Technology March, 2016 WFEO-CEIT STRATEGIC PLAN (2016-2019)
More informationTruthy: Enabling the Study of Online Social Networks
arxiv:1212.4565v2 [cs.si] 20 Dec 2012 Karissa McKelvey Filippo Menczer Center for Complex Networks and Systems Research Indiana University Bloomington, IN, USA Truthy: Enabling the Study of Online Social
More informationTourism network analysis 1
Tourism network analysis 1 Tourism and tourism systems can be defined in many ways, but, even if there is scarce agreement on possible definition, a tourism system, like many other economic and social
More informationExploring the New Trends of Chinese Tourists in Switzerland
Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:
More informationSocial Network Analysis and Its Developments
2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science
More informationUnderstanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30
Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM
More informationTheoretical Framework of Agricultural Scientific and Technological Competitiveness. Kun Du
International Conference on Economy, Management and Education Technology (ICEMET 2015) Theoretical Framework of Agricultural Scientific and Technological Competitiveness Kun Du College of Co-operatives,
More informationA Regional University-Industry Cooperation Research Based on Patent Data Analysis
A Regional University-Industry Cooperation Research Based on Patent Data Analysis Hui Xu Department of Economics and Management Harbin Institute of Technology Shenzhen Graduate School Shenzhen 51855, China
More informationPublic Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education
Public Discussion January 10, 2017 11:00 a.m. to 1:15 p.m. EST #NASEMscicomm Division of Behavioral and Social Sciences and Education Sponsors Committee on the Science of Science Communication: A Research
More informationPatent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis
Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis by Chih-Ping Wei ( 魏志平 ), PhD Institute of Service Science and Institute of Technology Management National Tsing Hua
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationArkPSA Arkansas Political Science Association
ArkPSA Arkansas Political Science Association Book Review Computational Social Science: Discovery and Prediction Author(s): Yan Gu Source: The Midsouth Political Science Review, Volume 18, 2017, pp. 81-84
More informationWhite paper The Quality of Design Documents in Denmark
White paper The Quality of Design Documents in Denmark Vers. 2 May 2018 MT Højgaard A/S Knud Højgaards Vej 7 2860 Søborg Denmark +45 7012 2400 mth.com Reg. no. 12562233 Page 2/13 The Quality of Design
More informationScience Impact Enhancing the Use of USGS Science
United States Geological Survey. 2002. "Science Impact Enhancing the Use of USGS Science." Unpublished paper, 4 April. Posted to the Science, Environment, and Development Group web site, 19 March 2004
More informationIntroduction to Foresight
Introduction to Foresight Prepared for the project INNOVATIVE FORESIGHT PLANNING FOR BUSINESS DEVELOPMENT INTERREG IVb North Sea Programme By NIBR - Norwegian Institute for Urban and Regional Research
More informationHaodong Yang, Ph.D. Candidate
Haodong Yang, Ph.D. Candidate College of Computing and Informatics Drexel University, Philadelphia, PA 19104 Cell: +1(215)-858-8879 Email: haodong.yang@drexel.edu EDUCATION Ph.D., Information Studies Drexel
More informationTABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH
PROGRAM OVERVIEW TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH 02 03 04 05 07 1 WHERE ENTREPRENEURS AND POLICY LEADERS COME TOGETHER. BUSINESS INSPIRES AND
More informationInformation Sociology
Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.
More informationElements of Artificial Intelligence and Expert Systems
Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio
More informationFINAL ACTIVITY AND MANAGEMENT REPORT
EUROPEAN COMMISSION RESEARCH DG MARIE CURIE MOBILITY ACTIONS INDIVIDUAL DRIVEN ACTIONS PERIODIC SCIENTIFIC/MANAGEMENT REPORT FINAL ACTIVITY AND MANAGEMENT REPORT Type of Marie Curie action: Intra-European
More informationSocial Media Intelligence in Practice: The NEREUS Experimental Platform. Dimitris Gritzalis & Vasilis Stavrou June 2015
Social Media Intelligence in Practice: The NEREUS Experimental Platform Dimitris Gritzalis & Vasilis Stavrou June 2015 Social Media Intelligence in Practice: The NEREUS Experimental Platform 3 rd Hellenic
More informationKeywords: DSM, Social Network Analysis, Product Architecture, Organizational Design.
9 TH INTERNATIONAL DESIGN STRUCTURE MATRIX CONFERENCE, DSM 07 16 18 OCTOBER 2007, MUNICH, GERMANY SOCIAL NETWORK TECHNIQUES APPLIED TO DESIGN STRUCTURE MATRIX ANALYSIS. THE CASE OF A NEW ENGINE DEVELOPMENT
More informationConfidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)
WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting
More informationLet s know each other. Myself INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND ITS BUSINESS APPLICATION 5/10/2016. Suwarn Kr.
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND ITS BUSINESS APPLICATION 2016/05/08 Professional Training in Informationand CommunicationTechnology (ICT) and E-Governance For Class IIIOfficers
More informationTHE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES
THE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES Osamah A.M Ghaleb 1,Anna Saro Vijendran 2 1 Ph.D Research Scholar, Department of Computer Science, Sri Ramakrishna College of Arts and Science,(India)
More informationSOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE
KONTEKSTY SPOŁECZNE, 2016, Vol. 4, No. 1 (7), 13 17 SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE In this interview Professor Anabel Quan-Haase, one of the world s leading researchers
More informationAnalysing Megatrends to Better shape the future of Tourism
Issues Paper Analysing Megatrends to Better shape the future of Tourism 2-3 October 2017 OECD, Paris 2 Background information This note is provided as background information at the High Level Meeting on
More informationThe role of universities in attaining regional competitiveness under adversity a research proposal
The role of universities in attaining regional competitiveness under adversity a research proposal Abstract Cherie Courseault Trumbach Sandra J. Hartman Olof Lundberg This study examines the role of the
More informationAdvanced Analytics for Intelligent Society
Advanced Analytics for Intelligent Society Nobuhiro Yugami Nobuyuki Igata Hirokazu Anai Hiroya Inakoshi Fujitsu Laboratories is analyzing and utilizing various types of data on the behavior and actions
More informationCHAPTER 8 RESEARCH METHODOLOGY AND DESIGN
CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN 8.1 Introduction This chapter gives a brief overview of the field of research methodology. It contains a review of a variety of research perspectives and approaches
More informationAchieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters
Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.
More informationAnalysis of Data Mining Methods for Social Media
65 Analysis of Data Mining Methods for Social Media Keshav S Rawat Department of Computer Science & Informatics, Central university of Himachal Pradesh Dharamshala (Himachal Pradesh) Email:Keshav79699@gmail.com
More informationGlobal Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016
Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in
More informationMarch 27, The Information Technology Industry Council (ITI) appreciates this opportunity
Submission to the White House Office of Science and Technology Policy Response to the Big Data Request for Information Comments of the Information Technology Industry Council I. Introduction March 27,
More informationThe Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation
The Method Toolbox of TA PACITA Summer School 2014 Marie Louise Jørgensen, mlj@tekno.dk The Danish Board of Technology Foundation The TA toolbox Method Toolbox Classes of methods Classic or scientific
More informationDISTRIBUTION A: Approved for public release.
AFRL-OSR-VA-TR-2013-0217 Social Dynamics of Information Kristina Lerman Information Sciences Institute University of Southern California July 2013 Final Report DISTRIBUTION A: Approved for public release.
More informationResearch of key technical issues based on computer forensic legal expert system
International Symposium on Computers & Informatics (ISCI 2015) Research of key technical issues based on computer forensic legal expert system Li Song 1, a 1 Liaoning province,jinzhou city, Taihe district,keji
More informationPolarization Analysis of Twitter Users Using Sentiment Analysis
Polarization Analysis of Twitter Users Using Sentiment Analysis Nicha Nishikawa, Koichi Yamada, Izumi Suzuki, and Muneyuki Unehara s165044@stn.nagaokaut.ac.jp, {yamada, suzuki, unehara}@kjs.nagaokaut.ac.jp
More informationTowards a Magna Carta for Data
Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier
More informationSome Reflections on Digital Literacy
Some Reflections on Digital Literacy Harald Gapski Abstract Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy,
More informationPublic Perceptions Survey on. Extractive Industries
Public Perceptions Survey on Extractive Industries Public Perceptions Survey on Extractive Industries In January 2014, the World Bank Institute commissioned RIWI corporation to conduct an online survey
More informationTHE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE. D. M. Berube, NCSU, Raleigh
THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE D. M. Berube, NCSU, Raleigh Some problems are wicked and sticky, two terms that describe big problems that are not resolvable by simple and traditional solutions.
More informationThe Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation
The Study on the Architecture of Public knowledge Service Platform Based on Chang ping Hu, Min Zhang, Fei Xiang Center for the Studies of Information Resources of Wuhan University, Wuhan,430072,China,
More informationTechnologies Worth Watching. Case Study: Investigating Innovation Leader s
Case Study: Investigating Innovation Leader s Technologies Worth Watching 08-2017 Mergeflow AG Effnerstrasse 39a 81925 München Germany www.mergeflow.com 2 About Mergeflow What We Do Our innovation analytics
More informationSocial Data Analytics Tool (SODATO)
Social Data Analytics Tool (SODATO) Abid Hussain 1 and Ravi Vatrapu 1,2 1 CSSL, Department of IT Management, Copenhagen Business School, Denmark 2 MOTEL, Norwegian School of Information Technology (NITH),
More informationOECD WORK ON ARTIFICIAL INTELLIGENCE
OECD Global Parliamentary Network October 10, 2018 OECD WORK ON ARTIFICIAL INTELLIGENCE Karine Perset, Nobu Nishigata, Directorate for Science, Technology and Innovation ai@oecd.org http://oe.cd/ai OECD
More informationTitle: Greece: The new stratification in digital era Author: Panagiotopoulou Milena Affiliation: University of Crete. Abstract
Title: Greece: The new stratification in digital era Author: Panagiotopoulou Milena Affiliation: University of Crete Abstract This paper represents preliminary theoretical considerations about the development
More informationNeuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop
In collaboration with the Committee on Science, Technology, and Law Background: Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop March 6, 2018 Keck Center of the
More informationSpecial issue on behavior computing
Knowl Inf Syst (2013) 37:245 249 DOI 10.1007/s10115-013-0668-0 EDITORIAL Special issue on behavior computing LongbingCao Philip S Yu Hiroshi Motoda Graham Williams Published online: 19 June 2013 Springer-Verlag
More informationGlobalizing IPR Protection: How Important Might RTAs Be?
Globalizing IPR Protection: How Important Might RTAs Be? Keith Maskus, University of Colorado Boulder (keith.maskus@colorado.edu) NAS Innovation Policy Forum National and International IP Policies and
More informationThe Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases
Vol. 8 No. 20 ISSN -2233-9140 The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases KIM Gyu-Pan Director General of Advanced Economies Department
More informationSocial Network Analysis in HCI
Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it
More informationEthics Guideline for the Intelligent Information Society
Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationExecutive summary. AI is the new electricity. I can hardly imagine an industry which is not going to be transformed by AI.
Executive summary Artificial intelligence (AI) is increasingly driving important developments in technology and business, from autonomous vehicles to medical diagnosis to advanced manufacturing. As AI
More informationStudy on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie
International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development
More informationRemembrances Souvenirs Memoria
Research recherche investigación Remembrances Souvenirs Memoria May 8, 9 & 10, 2001 Vancouver British Columbia Canada Les 8, 9 et 10 mai, 2001 Vancouver (Colombie- Britannique) Canada www.canadatourism.com/tsa
More informationMOTIVATING BLACK COMMUNITIES TO PARTICIPATE IN THE 2020 CENSUS
MOTIVATING BLACK COMMUNITIES TO PARTICIPATE IN THE 2020 CENSUS Key findings from qualitative and quantitative research among Black adults Conducted February April 2018, by Hart Research and Brossard Research
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, www.ijcea.com ISSN 2321-3469 Furqan Iqbal Department of Computer Science and Engineering, Lovely Professional
More informationConstruction and Measure of the Evaluation Index System of Regional Soft Power - Taking Shandong Province as an Example
Studies in Sociology of Science Vol. 3, No. 4, 2012, pp. 85-91 DOI:10.3968/j.sss.1923018420120304.ZR0289 ISSN 1923-0176 [Print] ISSN 1923-0184 [Online] www.cscanada.net www.cscanada.org Construction and
More informationComparative Study of various Surveys on Sentiment Analysis
Comparative Study of various Surveys on Milanjit Kaur 1, Deepak Kumar 2. 1 Student (M.Tech Scholar), Computer Science and Engineering, Lovely Professional University, Punjab, India. 2 Assistant Professor,
More informationPolicy Partnership on Science, Technology and Innovation Strategic Plan ( ) (Endorsed)
2015/PPSTI2/004 Agenda Item: 9 Policy Partnership on Science, Technology and Innovation Strategic Plan (2016-2025) (Endorsed) Purpose: Consideration Submitted by: Chair 6 th Policy Partnership on Science,
More informationWhat Leads To Impactful Foresight
What Leads To Impactful Foresight 30 years of Canadian Government Foresight Jonathan Calof PhD Telfer School of Management, University of Ottawa Brian Colton, NRC Research Study Challenge: Initiated from
More informationEmerging Medical Technology in Politics and Society
Emerging Medical Technology in Politics and Society LSA2018 Lübeck Summer Academy on Medical Technology IHK zu Lübeck, MediaDocks, Lübeck, 4 July 2018 Christopher Coenen, KIT-ITAS 1 This Talk Artificial
More informationThe New Delhi Communiqué
India-EU Ministerial Science Conference 7-8 February 2007, New Delhi The New Delhi Communiqué BACKGROUND TO CONFERENCE At their Summit in Helsinki in October 2006, the leaders of the EU and India reiterated
More informationIJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron
Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad
More informationEVCA Strategic Priorities
EVCA Strategic Priorities EVCA Strategic Priorities The following document identifies the strategic priorities for the European Private Equity and Venture Capital Association (EVCA) over the next three
More informationEnsuring Adequate Policies and Resources for the 2020 Census
Ensuring Adequate Policies and Resources for the 2020 Census Background The census is one of the most important elements of U.S. democracy. Article I, Section 2, Clause 3 of the U.S. Constitution mandates
More informationUsing Data Analytics and Machine Learning to Assess NATO s Information Environment
Using Data Analytics and Machine Learning to Assess NATO s Information Environment Col Richard Blunt, CapDev JISR, SACT HQ Allied Command Transformation Blandy Road, Norfolk, VA UNITED STATES Richard.blunt@act.nato.int
More informationDomestic Reform and Global Integration: The Evolution of China s Innovation System and Innovation Policies
Domestic Reform and Global Integration: The Evolution of China s Innovation System and Innovation Policies Dr. Lan Xue, Professor and Dean School of Public Policy and Management Tsinghua University Emerging
More informationForesight for Canadian Animal Health. Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA)
Foresight for Canadian Animal Health Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA) USAHA/AAVLD Greensboro, NC October, 2012 Shared Vision Framework Road Map Tools & Applications 2 Animal
More informationIf These Crawls Could Talk: Studying and Documenting Web Archives Provenance
If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby
More informationCulturally and Linguistically Diverse Young People and Digital Citizenship:
Culturally and Linguistically Diverse Young People and Digital Citizenship: A Pilot Study Executive Summary technologies have fundamentally reshaped the meaning and function of citizenship in the internet
More informationWhat is a collection in digital libraries?
What is a collection in digital libraries? Changing: collection concepts, collection objects, collection management, collection issues Tefko Saracevic, Ph.D. This work is licensed under a Creative Commons
More informationOpportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit
Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft
More informationthe royal society of new zealand: gateway to science and technology strategic priorities
the royal society of new zealand: gateway to science and technology strategic priorities www.royalsociety.org.nz gateway to science and technology in new zealand the royal society of new zealand has operated
More informationHarmonic Distortion Levels Measured at The Enmax Substations
Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned
More informationTechnology First. Make India Innovate, Excel Globally and Prosper. 5-6 September 2018
Indian Technology Congress - 2018 5-6 September 2018 NIMHANS Convention Centre, Bengaluru, India Technology First Make India Innovate, Excel Globally and Prosper Implementing transformational technologies
More informationTHE ELECTRONIC COMMERCE CHALLENGE IN CHINA S ECONOMIC DEVELOPMENT
THE ELECTRONIC COMMERCE CHALLENGE IN CHINA S ECONOMIC DEVELOPMENT Yuanzong Fu, Utah State University, yfu@cc.usu.edu Jeffrey J. Johnson, Utah State University, jjohnson@b202.usu.edu ABSTRACT The potential
More informationPROGRAM ANNOUNCEMENT. New Jersey Institute of Technology. MSPhM Systems Engineering. Newark. Fall 2008
PROGRAM ANNOUNCEMENT November 2007 Institution: New Program Title: Degree Designation: Degree Abbreviation: CIP Code and Nomenclature (if possible): Campus(es) where the program will be offered: Date when
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationAnalogy Engine. November Jay Ulfelder. Mark Pipes. Quantitative Geo-Analyst
Analogy Engine November 2017 Jay Ulfelder Quantitative Geo-Analyst 202.656.6474 jay@koto.ai Mark Pipes Chief of Product Integration 202.750.4750 pipes@koto.ai PROPRIETARY INTRODUCTION Koto s Analogy Engine
More informationIN INTELLIGENCE THE ROLE OF OPEN SOURCES. January 15, by Dr. John NOMIKOS, Director of Research, ISRIA. Athens, GREECE.
ISRIA Spotting Dangers, Watching the World www.isria.com THE ROLE OF OPEN SOURCES IN INTELLIGENCE January 15, 2006 by Dr. John NOMIKOS, Director of Research, ISRIA Athens, GREECE. As the threat that was
More informationETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION
More informationPOLICY SIMULATION AND E-GOVERNANCE
POLICY SIMULATION AND E-GOVERNANCE Peter SONNTAGBAUER cellent AG Lassallestraße 7b, A-1020 Vienna, Austria Artis AIZSTRAUTS, Egils GINTERS, Dace AIZSTRAUTA Vidzeme University of Applied Sciences Cesu street
More informationResearch on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry
Journal of Advanced Management Science Vol. 4, No. 2, March 2016 Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry Jian Xu and Zhenji Jin School of Economics
More informationISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationMSC Project Workplan
Social Media Analytics Research and Training for the U.S. Coast Guard David Ebert APPROVED June 13, 2018 Abstract: This research project will increase the understanding of information and intelligence
More informationThe Unexpectedly Large Census Count in 2000 and Its Implications
1 The Unexpectedly Large Census Count in 2000 and Its Implications Reynolds Farley Population Studies Center Institute for Social Research University of Michigan 426 Thompson Street Ann Arbor, MI 48106-1248
More informationGlobal Alzheimer s Association Interactive Network. Imagine GAAIN
Global Alzheimer s Association Interactive Network Imagine the possibilities if any scientist anywhere in the world could easily explore vast interlinked repositories of data on thousands of subjects with
More information