UC Irvine Electronic Theses and Dissertations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
LC-MS/MS Method Development for Quantitative Analysis of Cyanogenic
LC-MS/MS METHOD DEVELOPMENT FOR QUANTITATIVE ANALYSIS OF CYANOGENIC GLYCOSIDES IN ELDERBERRY AND LIPID PEROXIDATION PRODUCTS IN MICE _______________________________________ A Dissertation presented to the Faculty of the Graduate School at the University of Missouri-Columbia _______________________________________________________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy _____________________________________________________ by MICHAEL KWAME APPENTENG Dr. C. Michael Greenlief, Dissertation Supervisor May 2021 © Copyright by Michael Kwame Appenteng 2021 All Rights Reserved The undersigned, appointed by the dean of the Graduate School at the University of Missouri-Columbia, have examined the dissertation entitled. LC-MS/MS Method Development for Quantitative Analysis of Cyanogenic Glycosides in Elderberry and Lipid Peroxidation Products in Mice presented by Michael Kwame Appenteng, a candidate for the degree of Doctor of Philosophy in Chemistry, and hereby certify that, in their opinion, it is worthy of acceptance. Professor C. Michael Greenlief Professor Silvia S. Jurisson Professor John D. Brockman Professor Chung-Ho Lin DEDICATION This dissertation is dedicated to my dear wife, Naa Adjorkor Sowah and delightful son, Frank Cudjoe Appenteng, for their love, unwavering support, and inspiration. Also, to my selfless parents, Frank Cudjoe and Comfort Asaku, who in little, never compromised on quality education. ACKNOWLEDGMENTS I have received a great deal of support and assistance throughout my research, dissertation writing and entire graduate school experience. I would first like to express my deepest appreciation to my advisor, Dr. C. Michael Greenlief for his unparalleled mentorship, patient and invaluable scientific insights and contributions to my work. Being part of the Greenlief research group has exposed me to great research projects, which have shaped me into an effective and efficient researcher. -
Examples of Personal Assistance Service Devices
Examples Of Personal Assistance Service Devices Megascopic and log Buddy palisading some winger so inward! Combinatorial and conceptional Irwin partaking so needily that Saundra elate his imbrication. Lophodont Olaf homesteads moralistically while Tonnie always gaugings his overturns tubulate straightforward, he fluking so immaterially. You decide how can protect against a medicare patrol program responsibilities of assistance service section of information about As such, the State is now at a decision point regarding the future direction of portable wireless devices and the ongoing support of the infrastructure. Americans, many of whom could receive services in their own homes. Personal Assistance Services associated with the Life Satisfaction of Persons with Physical Disabilities? Our aircraft are not equipped with refrigerators. You have permission to copy material in box manual during your ownuse if proper credit is given. To reduce costs. Foot powder should first be used in available with protective conductive footwear because it provides insulation, reducing the conductive ability of the shoes. The person will agree to deal with assisted living will be sufficient view examples of technology helps users have to listen to? CILs have the potential, with training, to support parents with disabilities, especially to advocate regarding transportation, housing, financial advocacy, and assistive technology issues, and church offer parent support groups. ILRU is a program of TIRR Memorial Hermann, a nationally recognized medical rehabilitation facility for persons with disabilities. Instructions: please deduct this snippet directly into post page contribute your website template. Business Leadership Network and offer American Association of hat with Disabilities. AI capabilities are in software cloud, running the connected device seen and used by the user simply serving as an terms and output device. -
Nevada's Digital Data Laws in The
21 NEV. L.J. 379 CONVENIENCE OR CONFIDENTIALITY: NEVADA’S DIGITAL DATA LAWS IN THE AGE OF ALWAYS-LISTENING DEVICES E. Sebastian Cate-Cribari* TABLE OF CONTENTS INTRODUCTION ................................................................................................ 379 I. HISTORICAL CONTEXT FOR MODERN ISSUES ...................................... 380 A. Development of Always-Listening Devices .................................. 380 B. Always-Listening Devices in the Law .......................................... 383 C. Nevada’s Historical Approach to Recordings ............................. 385 II. PROSECUTION MOVES ALWAYS-LISTENING DEVICES INTO EVIDENCE ............................................................................................ 388 A. Transcripts and Recordings Under Nevada’s Hearsay Laws ...... 388 B. Transcripts and Recordings Under Nevada’s Authentication Laws ............................................................................................. 389 C. Transcripts Irrelevant When Recordings Available .................... 390 III. PROTECTING NEVADANS’ CONSTITUTIONAL RIGHTS .......................... 393 A. Fourth Amendment Protections and Always-Listening Device Data .............................................................................................. 394 B. First Amendment Issues yet Unanswered .................................... 398 IV. WHAT’S THE USE? REAL WORLD IMPACT OF LEGAL CHANGES ......... 398 A. Always-Listening Devices in Criminal Cases .............................. 398 B. Always-Listening -
A New Era: Digital Curtilage and Alexa-Enabled Smart Home Devices
Touro Law Review Volume 36 Number 2 Article 12 2020 A New Era: Digital Curtilage and Alexa-Enabled Smart Home Devices Johanna Sanchez Touro Law Center Follow this and additional works at: https://digitalcommons.tourolaw.edu/lawreview Part of the Constitutional Law Commons, Fourth Amendment Commons, Internet Law Commons, Law Enforcement and Corrections Commons, and the Supreme Court of the United States Commons Recommended Citation Sanchez, Johanna (2020) "A New Era: Digital Curtilage and Alexa-Enabled Smart Home Devices," Touro Law Review: Vol. 36 : No. 2 , Article 12. Available at: https://digitalcommons.tourolaw.edu/lawreview/vol36/iss2/12 This Article is brought to you for free and open access by Digital Commons @ Touro Law Center. It has been accepted for inclusion in Touro Law Review by an authorized editor of Digital Commons @ Touro Law Center. For more information, please contact [email protected]. Sanchez: A New Era: Digital Curtilage A NEW ERA: DIGITAL CURTILAGE AND ALEXA-ENABLED SMART HOME DEVICES Johanna Sanchez* I. INTRODUCTION ....................................................................664 II. SOCIERY’S BENEFITS DERIVED FROM THE ALEXA-ENABLED SMART HOME DEVICES .......................................................667 A. A New Form of Electronic Surveillance...............667 1. What is a smart device? ..............................667 2. What is voice recognition? ..........................668 3. The Alexa-enabled Echo device assists law enforcement .......................................................669 4. -
Computer-Supported Cooperative Work: History and Focus
Computer-Supported Cooperative Work: Historv and Focus d Jonathan Grudin, University of California, Irvine en years ago, hen Greif of MIT and Paul Cashman of Digital Equipment Corporation organized a workshop that had far-reaching effects. Twenty people from different fields -but with a shared interest in how people work -gathered to explore technology’s role in the work environment and coined the term “computer-supported cooperative work” to describe it. Since then, thousands of researchers and developers have responded to this ini- tiative. Although the first CSCW conferences were held in the United States, the topic was picked up immediately in Europe and Asia, where related work and seri- ous interest already existed. This article describes the people and the work found under the CSCW umbrella. Why i984? An earlier approach to group support, called “office automation,” had run out of steam by 1984. OA’s primary problem was not technical, although technical chal- lenges certainly existed; it was in understanding system requirements. In the mid- CSCW and groupware 1960s, tasks such as filling seats on airplane flights or printing payroll checks had emerged in the 1980s been translated into requirements that resulted (with some trial and error) in suc- cessful mainframe systems. In the mid-l970s, minicomputers promised to support from shared interests groups and organizations in more sophisticated, interactive ways, and OA was born. OA tried to extend and integrate single-user applications, such as word processors and among product spreadsheets, to support groups and departments. But what were the precise re- developers and quirements for such systems? Building technology was not enough. -
Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G
Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G. Parker1,2 1College of Computer and Information Science 2Bouvé College of Health Sciences Northeastern University 360 Huntington Ave. Boston, MA 02115 Boston, United States [email protected], [email protected], [email protected] ABSTRACT significantly higher rates of health problems (e.g., diabetes) Throughout the world, organizations empower youth to than more affluent communities [17,29,44]. Previous work participate in civic engagement to impact social change, has examined how youth-led activism can be effective in and adult-youth collaborations are instrumental to the addressing these challenges and affecting social change success of such initiatives. However, little is known about [9,47]. In fact, throughout the world, many organizations how technology supports this activism work, despite the have created youth-led programs with the goals of solving fact that tools such as Social Networking Applications community problems and empowering youth to educate (SNAs) are increasingly being leveraged in such contexts. their peers about issues of concern [33]. These We report results from a qualitative study of SNA use organizations provide youth with resources needed to run within a youth empowerment organization. Using the social action initiatives (e.g., support for collective analytical lens of object-oriented publics, our findings organizing). As adult staff work together with youth, they reveal opportunities and challenges that youth and staff face create an environment that nurtures youth’s confidence that when they use SNAs. We describe the illegibility of youth they can take on social problems. -
Surname Given Homefac Homedept Grandtotal Abarbanel-Uemurataro
Surname Given HomeFac HomeDept GrandTotal Abarbanel-UemuraTaro GEST 7 Abbas Ali GENIE CSIGUA 72.39 Abbas Sadiq GENIE CSIGUA 52.66 Abbes Chahreddine SSOC DVMOUA 10 Abbott Kevin SSOC PSYOUA 24 Abbott Caleb ARTS THEAUA 0.33 Abdallah Sara SSAN ACTPNUA 2.41 Abdennur Victoria ARTS ILSAUA 191.09 Abdesselam Aziz GENIE CSIGUA 117.78 Abdul-Majid Sawsan GENIE ELGGUA 14.98 Abdulnour Joseph SSAN ACTPNUA 3 Abdulridha Alaa GENIE CVGGUA 39.57 Abou-Hsab Georges ARTS LLMAUA 28.24 Abtahi Yasmine EDU EDUTEUA 39.06 Achab Karim ARTS ILSAUA 74.33 Acharya Ram SSOC ECOOUA 34 Adesina Opeyemi GENIE CSIGUA 3 Adlington Tara SSAN SINFNUA 8 Ado Abdoulkadre GEST 8 Afonso Carla SSAN SINFNUA 1.22 Afshar Zanjani Kaveh SSOC APIOUA 5 Agbaglah Gbemeho Gilou GENIE MCGGUA 1 Aggor-Boateng Adolphine SSOC SOCOUA 99 Aguer Céline SCIEN BCHSUA 1 Ahluwalia Kyle ARTS THEAUA 14 Ahmad Shamilah SSAN SINFNUA 4 Ahmed Mohamed GENIE ELGGUA 13.99 Ahola-Sidaway Janice EDU EDUDEUA 6 Ait Hammou Abdou GEST 21.5 Aizu Yoriko ARTS LLMAUA 67.19 Akhigbe Okhaide GEST 9.5 Akl Joyce ARTS LLMAUA 15.47 Al Hassan Lina ARTS ILSAUA 2.92 Alainachi Imad GENIE CVGGUA 1 Alamgir-Arif Rizwana SSOC ECOOUA 3 Albert Anne-Andrée SSAN SINFNUA 3.8 Alekseevskaia Mariia SSOC SOCOUA 3 Alencar Dos SantosVito Assis GENIE CVGGUA 3 Al-Fattal Rouba SSOC POLOUA 12 Al-Hasoo Basam ARTS LLMAUA 3.93 Alja'Afreh Mohammad GENIE CSIGUA 3 Al-Jarrah Ahmad GENIE MCGGUA 6 Allain Rhéal ARTS ILSAUA 17.32 Almansour Husham GENIE CVGGUA 1 Almaskut Ahmed SSAN ACTPNUA 16 Al-Mulla Zaid GEST 6 Alphonse Jean Roger EDU EDUFEUA 19.66 Alqawasmeh Yousef -
More Than Writing Text: Multiplicity in Collaborative Academic Writing
More Than Writing Text: Multiplicity in Collaborative Academic Writing Ida Larsen-Ledet Ph.D. Thesis Department of Computer Science Aarhus University Denmark More Than Writing Text: Multiplicity in Collaborative Academic Writing A Thesis Presented to the Faculty of Natural Sciences of Aarhus University in Partial Fulfillment of the Requirements for the Ph.D. Degree. by Ida Larsen-Ledet November 2, 2020 Abstract This thesis explores collaborative academic writing with a focus on how it is medi- ated by multiple technologies. The thesis presents findings from two empirical stud- ies with university students and researchers: The first combined semi-structured interviews with visualizations of document editing activity to explore transitions through co-writers’ artifact ecologies along with co-writers’ motivations for per- forming these transitions. The second study was a three-stage co-design workshop series that progressed from dialog through ideation to exploration of a prototype for a shared editor that was based on the participants’ proposed features and designs. The contribution from the second study to this thesis is the analysis of participants’ viewpoints and ideas. The analyses of these findings contribute a characterization of co-writers’ practical and social motivations for using multiple tools in their collaborations, and the chal- lenges this poses for sharing and adressing the work. Multiplicity is also addressed in terms of co-writers bringing multiple and diverse needs and preferences into the writing, and how these may be approached in efforts to design and improve support for collaborative writing. Additionally, the notion of text function is introduced to describe the text’s role as a mediator of the writing. -
An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications
Putting Computing in Context: An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications W. KEITH EDWARDS Georgia Institute of Technology Context-aware computing exposes a unique tension in how information about human context is modeled and used. On the one hand, approaches that use loosely structured information have been shown to be useful in situations where humans are the final consumers of contextual information; these approaches have found favor in many CSCW applications. On the other hand, more rigidly structured information supports machine interpretation and exchange; these approaches have been explored in the ubiquitous computing community. The system presented here, dubbed Intermezzo, represents an exploration of a space between these two extremes. Intermezzo combines a loose data structuring with a number of unique features designed to allow applications to embed special- ized semantic interpretations of data into the infrastructure, allowing them to be reused by other applications. This approach can enable the construction of applications that can take advantage of rich, layered interpretations of context without requiring that they understand all aspects of that context. This approach is explored through the creation of two higher-level services that provide context-enhanced session management and context-enhanced access control. Categories and Subject Descriptors: D.2.11 [Software Engineering]: Software Architectures— Domain-specific architectures; H.5.3 [Information Interfaces and Presentation]: Group and Organization Interfaces—Collaborative computing; H.3.4 [Information Storage and Retrieval]: Systems and Software—Distributed systems, current awareness systems General Terms: Design, Human Factors Additional Key Words and Phrases: Collaboration, context-aware computing, data representations, coordination 1. INTRODUCTION All work—like everything else in our lives—occurs in some setting. -
The Imaginary of Internet Patrice Flichy
1 The imaginary of Internet Patrice Flichy I The Ideal Scientific Community Summary The Internet is the result of an imagined, technological construction in a particular social environment: academic computer science departments. This article considers the intentions and socio-technological choices of the initial designers of the Internet era. It focuses on the definition of the concept of network computing, the setting up of the network and its uses, the creation of a single world network and finally, hypertext projects and tools for accessing information. The earliest Internet model built in this framework has remained an unavoidable reference for all Internautes to this day. How can the success of the Internet be explained? Most analysts see the world as undergoing a major technological revolution comparable to the development of the steam engine or electricity, with the Internet at the summit of the third wave so dear to Alvin Toffler: high- tech, anti-industrial and based primarily on services and technology. This technological determinism often goes hand in hand with technological optimism which sees the Internet as the spearhead of a profound social transformation affecting the corporate world, the state and social relations alike. Others, however, consider that the prophets of the Internet have a short memory. A few years ago their peers and sometimes they themselves claimed that the image would replace writing, the videotext would supplant the press, offices would be paper-free and the cable would be the downfall of mass media since everyone would henceforth be able to express themselves without recognized intermediaries. Understandably, with this discourse on the communication revolution repeated every time a new medium starts to appear, attentive observers sometimes have the impression that history is stuttering. -
Artificial Intelligence for Marketing: Practical Applications, Jim Sterne © 2017 by Rising Media, Inc
Trim Size: 6in x 9in k Sterne ffirs.tex V1 - 07/19/2017 7:25am Page i Artificial Intelligence for Marketing k k k Trim Size: 6in x 9in k Sterne ffirs.tex V1 - 07/19/2017 7:25am Page ii Wiley & SAS Business Series The Wiley & SAS Business Series presents books that help senior-level managers with their critical management decisions. Titles in the Wiley & SAS Business Series include: Analytics in a Big Data World: The Essential Guide to Data Science and Its Applications by Bart Baesens A Practical Guide to Analytics for Governments: Using Big Data for Good by Marie Lowman Bank Fraud: Using Technology to Combat Losses by Revathi Subramanian Big Data Analytics: Turning Big Data into Big Money by Frank Ohlhorst Big Data, Big Innovation: Enabling Competitive Differentiation through by Evan Stubbs k Business Analytics k Business Analytics for Customer Intelligence by Gert Laursen Business Intelligence Applied: Implementing an Effective Information and Communications Technology Infrastructure by Michael Gendron Business Intelligence and the Cloud: Strategic Implementation Guide by Michael S. Gendron Business Transformation: A Roadmap for Maximizing Organizational Insights by Aiman Zeid Connecting Organizational Silos: Taking Knowledge Flow Management to the Next Level with Social Media by Frank Leistner Data-Driven Healthcare: How Analytics and BI Are Transforming the Industry by Laura Madsen Delivering Business Analytics: Practical Guidelines for Best Practice by Evan Stubbs Demand-Driven Forecasting: A Structured Approach to Forecasting, Second -
Divining a Digital Future
Divining a Digital Future Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell 2011 The MIT Press Cambridge, Massachusetts London, England Contents Preface vii Acknowledgments ix 1 Introduction : The Myth and Mess of Ubiquitous Computing 1 I 7 2 Contextualizing Ubiquitous Computing 9 3 Making Room for the Social and Cultural 45 4 A Role for Ethnography : Methodology and Theory 61 II 91 5 What Lies Beneath 95 6 Mobility and Urbanism 117 7 Rethinking Privacy 137 8 Domesticity and Its Discontents 161 III 185 9 Reimagining Ubiquitous Computing : A Conclusion 187 References 211 Index 245 Preface We wrote the proposal for this book in a stark modernist hotel room in Geneva, while attending a new media conference there. In between con- ference sessions, extravagant French-infl uenced desserts, and a memorable trip to the International Museum of the Reformation, we sketched out a plan for how it might take shape. We knew from the outset that we wanted to critically interrogate the idea of “ ubiquitous computing ” (or “ ubicomp ” ). It was a project that we had been circling around in various publications and talks for several years, and the time seemed ripe to take a more comprehensive look. Much of this project ’ s distinctiveness and whatever success it achieves relies on the interdisciplinary nature of our collaboration. Dourish is a com- puter scientist whose work lies at the intersection of computer science and social science; Bell is a cultural anthropologist with a primary concern in information technology as a site of cultural production along with the con- sequences for technology innovation and diffusion.