573 research outputs found

    Corporate influence and the academic computer science discipline.

    Get PDF
    Prosopography of a major academic center for computer science

    Corporate influence and the academic computer science discipline. [2: MIT]

    Get PDF
    Prosopography of a major academic center for computer science, with a focus on corporatization and corruption

    Designing Per-Poor system of innovation proverbs

    Get PDF
    The purpose of the study was to explore how to create a Per-Poor innovation (PPI) approach in a way that contributes knowledge. A lot of  indigenous system research exists, but the percentage transformed into approaches, products and services is low. The study will create a low income level innovation artifact by integrating indigenous knowledge (IK) and global knowledge (GK) for Per-Poor innovators. Analogy design science research method was used to create a system of innovation proverbs. Analogy between indigenous Harambee and global sysems: Open source software, Software patterns and Kaizen was used to discover innovation rules and principles applicable to PPI. The research findings are synthesising African philosophies and provide a paradigm for integrating IK and GK. Synthesising proverbs and Theory of inventive problem solving (TRIZ) principles aided in the discovery of possible ways beeping innovation was created. The originality of this research is being first to create an indigenous PPI. Keywords: indigenous knowledge, Per-Poor innovation, proverbs, global knowledge, systems&nbsp

    Remembering Grace Murray Hopper (1906-1986)

    Get PDF

    Innovation in the Wireless Ecosystem: A Customer-Centric Framework

    Get PDF
    The Federal Communications Commission’s Notice of Inquiry in GN 09-157 Fostering Innovation and Investment in the Wireless Communications Market is a significant event at an opportune moment. Wireless communications has already radically changed the way not only Americans but people the world over communicate with each other and access and share information, and there appears no end in sight to this fundamental shift in communication markets. Although the wireless communications phenomenon is global, the US has played and will continue to play a major role in the shaping of this market. At the start of a new US Administration and important changes in the FCC, it is most appropriate that this proceeding be launched.

    Computer Science Education in Selected Countries from Sub-Saharan Africa

    Get PDF
    Computer Science education in sub-Saharan Africa has evolved over the past decades. The number of institutions offering distinct undergraduate programs has grown, thus increasing the number of students enrolling in the computer science discipline. Several computer science degree programs have emerged with one of the objectives being to satisfy the growing demand for local talent and skills. In this paper, we provide a snapshot of the evolution of undergraduate computer science education in selected countries in Sub-Saharan Africa over the past 20+ years and an overview of the developments in computer science education and observed trends. The setup of educational institutions in Africa and the operational context requires unique modalities for the design and delivery of computer science education that meets the demands of the industry, amongst others. This paper provides insights into the best practices in the computer science curricula in the selected countries, as well as an overview of the pedagogical and delivery approaches to computer science education. The paper highlights case studies from institutions in the selected countries, namely Uganda, South Africa, Ghana, Tanzania, and Kenya with a consolidated summary of the current and emerging challenges and opportunities in all these countries. The paper concludes by providing persectives on the future landscape of computer science in Sub-Saharan Africa.Computer Science Education in Selected Countries from Sub-Saharan AfricaBy Engineer Bainomugisha, Makerere University, Uganda, Karen Bradshaw, Rhodes University, South Africa, Martin Mabeifam Ujakpa, Ghana Communication Technology University, Ghana, Joyce Nakatumba-Nabende, Makerere University, Uganda, Lawrence Nderu, Jomo Kenyatta University of Agriculture and Technology, Kenya, Neema Mduma, Nelson Mandela African Institution of Science and Technology, Tanzania, Patrick Kihoza, Mzumbe University, Tanzania and Annette Irungu, Jomo Kenyatta University of Agriculture and Technology, Keny

    The role of asymptomatic carriers on the dynamics of a lymphatic filariasis model incorporating control strategies

    Get PDF
    This Research Article was published by the Results in Control and Optimization Volume 15, 2024This study presents a mathematical model to investigate the patterns of transmission in lymphatic filariasis. The model considers chronic, acute, and asymptomatic individuals and integrates key control strategies. Random synthetic data is generated robustly through numerical solutions to closely replicate real-world scenarios and encompass uncertainties. The synthetic data adheres to a Gaussian distribution to ensure validity and reliability. Following the derivation of the basic and effective reproduction number using the next generation matrix approach, Latin Hypercube Sampling (LHS) and the Partial Rank Correlation Coefficient (PRCC) algorithm is utilized to assess the parameters that significantly influence the model outputs. The study examine the trajectories of different population compartments through numerical simulations over time, with particular emphasis on the role played by asymptomatic individuals in the transmission of the disease. To assess the potential for disease elimination, the study introduces a range of strategies involving protective measures, treatment interventions, and mosquito control. These strategies are determined through sensitivity analysis. The findings demonstrate that the simultaneous implementation of all control measures has a noteworthy effect in managing lymphatic filariasis. In conclusion, the proposed model enhances understanding of lymphatic filariasis dynamics and informs effective control strategies

    January 1 - December 31, 2012

    Get PDF
    This report summarizes training, education, and outreach activities for calendar 2012 of PTI and affiliated organizations, including the School of Informatics and Computing, Office of the Vice President for Information Technology, and Maurer School of Law. Reported activities include those led by PTI Research Centers (Center for Applied Cybersecurity Research, Center for Research in Extreme Scale Technologies, Data to Insight Center, Digital Science Center) and Service and Cyberinfrastructure Centers (Research Technologies Division of University Information Technology Services, National Center for Genome Assembly Support
    • …
    corecore