Relationship and Connectivity of Incomplete Data Collection

Author(s):  
Li M. Chen
2021 ◽  
pp. 146879412110610
Author(s):  
Lotje de Vries ◽  
Tim Glawion

Qualitative empirical enquiries into dynamics of security and insecurity often include a blind spot that bear theoretical ramifications because only those areas and respondents that allow for relatively safe fieldwork are studied. To transparently articulate the spheres of projection that creep into our knowledge production, we propose a distinction between inner and outer circles as highly fluid but separate geographical, socio-political and methodological spaces. Drawing on fieldwork in the Central African Republic and South Sudan, we discuss the risks posed by incomplete data and subsequently flawed inferences. We argue that the perceptions of fear projected onto the outer circle shape people’s behaviour more than measurable insecurity incidents and that increased interaction between actors in both circles reduces the perceived threats coming from the outer circles. We demonstrate how studying insecurity from inner circles risks securitizing outer circles while further centralizing the inner ones. We thus urge transparency in data collection and the related inferences that underpin our knowledge production.


1987 ◽  
Vol 2 (1) ◽  
pp. 31-46
Author(s):  
Joy Cumming ◽  
Adrian Coulston ◽  
John Elkins

Author(s):  
Tianxiang He

The development of artificial intelligence (AI) technology is firmly connected to the availability of big data. However, using data sets involving copyrighted works for AI analysis or data mining without authorization will incur risks of copyright infringement. Considering the fact that incomplete data collection may lead to data bias, and since it is impossible for the user of AI technology to obtain a copyright licence from each and every right owner of the copyrighted works used, a mechanism that can free the data from copyright restrictions under certain conditions is needed. In the case of China, it is crucial to check whether China’s current copyright exception model can take on the role and offer that kind of function. This chapter suggests that a special AI analysis and data mining copyright exception that follows a semi-open style should be added to the current exceptions list under the Copyright Law of China.


Author(s):  
Anirwan Anirwan ◽  
Muhammad Akmal Ibrahim ◽  
Hasniati Hasniati ◽  
Suryadi Lambali

The implementation of poverty reduction policies in Makassar City is still reaping many problems. Various poverty reduction programs launched by the government have not been able to eradicate poverty effectively. In the implementation of these various poverty reduction programs, the response of the target group tends to be negative, causing fragmentation at the level of implementation. Therefore, this study aims to identify and analyze the process of implementing poverty reduction policies in Makassar City from the perspective of group behavior. The research method used is a qualitative method with data collection techniques through in-depth interviews, field observations, and review of poverty documents. The research data were analyzed by qualitative analysis. The results show that the community is basically very responsive to the existence of poverty reduction policies in the form of multi-purpose social security assistance distributed by the Makassar City Social Service because some of them feel helped by the assistance, but some also feel that the policies are not well targeted due to incomplete data collection. equitable and fair. The inaccuracy of policy targets (assistance for beneficiaries) for the poor causes social jealousy in the community which has an impact on street level publicity and policy performance so that it does not significantly reduce poverty in Makassar City.


2014 ◽  
Vol 47 (6) ◽  
pp. 1992-1999 ◽  
Author(s):  
Sudhir Babu Pothineni ◽  
Nagarajan Venugopalan ◽  
Craig M. Ogata ◽  
Mark C. Hilgart ◽  
Sergey Stepanov ◽  
...  

The calculation of single- and multi-crystal data collection strategies and a data processing pipeline have been tightly integrated into the macromolecular crystallographic data acquisition and beamline control softwareJBluIce. Both tasks employ wrapper scripts around existing crystallographic software.JBluIceexecutes scripts through a distributed resource management system to make efficient use of all available computing resources through parallel processing. TheJBluIcesingle-crystal data collection strategy feature uses a choice of strategy programs to help users rank sample crystals and collect data. The strategy results can be conveniently exported to a data collection run. TheJBluIcemulti-crystal strategy feature calculates a collection strategy to optimize coverage of reciprocal space in cases where incomplete data are available from previous samples. TheJBluIcedata processing runs simultaneously with data collection using a choice of data reduction wrappers for integration and scaling of newly collected data, with an option for merging with pre-existing data. Data are processed separately if collected from multiple sites on a crystal or from multiple crystals, then scaled and merged. Results from all strategy and processing calculations are displayed in relevant tabs ofJBluIce.


2020 ◽  
Vol 9 (20) ◽  
Author(s):  
George CM Siontis ◽  
Romy Sweda ◽  
Stephan Windecker

Abstract COVID‐19 has reached pandemic levels in March 2020 and impacted public health with unpredictable consequences. 1, 2 The conduct of clinical research in areas unrelated to COVID‐19 has been disrupted and will be further affected. Researchers, trial participants and study personnel have to overcome challenges to sustain proper and safe conduct of clinical trials (i.e. logistical challenges, lower enrollment than expected, difficulties in follow‐up and outcome assessment/adjudication, incomplete data collection, research funding prolongation).


Author(s):  
S.W. Hui ◽  
D.F. Parsons

The development of the hydration stages for electron microscopes has opened up the application of electron diffraction in the study of biological membranes. Membrane specimen can now be observed without the artifacts introduced during drying, fixation and staining. The advantages of the electron diffraction technique, such as the abilities to observe small areas and thin specimens, to image and to screen impurities, to vary the camera length, and to reduce data collection time are fully utilized. Here we report our pioneering work in this area.


Author(s):  
Weiping Liu ◽  
Jennifer Fung ◽  
W.J. de Ruijter ◽  
Hans Chen ◽  
John W. Sedat ◽  
...  

Electron tomography is a technique where many projections of an object are collected from the transmission electron microscope (TEM), and are then used to reconstruct the object in its entirety, allowing internal structure to be viewed. As vital as is the 3-D structural information and with no other 3-D imaging technique to compete in its resolution range, electron tomography of amorphous structures has been exercised only sporadically over the last ten years. Its general lack of popularity can be attributed to the tediousness of the entire process starting from the data collection, image processing for reconstruction, and extending to the 3-D image analysis. We have been investing effort to automate all aspects of electron tomography. Our systems of data collection and tomographic image processing will be briefly described.To date, we have developed a second generation automated data collection system based on an SGI workstation (Fig. 1) (The previous version used a micro VAX). The computer takes full control of the microscope operations with its graphical menu driven environment. This is made possible by the direct digital recording of images using the CCD camera.


1997 ◽  
Vol 6 (4) ◽  
pp. 34-47 ◽  
Author(s):  
Steven H. Long ◽  
Lesley B. Olswang ◽  
Julianne Brian ◽  
Philip S. Dale

This study investigated whether young children with specific expressive language impairment (SELI) learn to combine words according to general positional rules or specific, grammatic relation rules. The language of 20 children with SELI (4 females, 16 males, mean age of 33 months, mean MLU of 1.34) was sampled weekly for 9 weeks. Sixteen of these children also received treatment for two-word combinations (agent+action or possessor+possession). Two different metrics were used to determine the productivity of combinatorial utterances. One metric assessed productivity based on positional consistency alone; another assessed productivity based on positional and semantic consistency. Data were analyzed session-by-session as well as cumulatively. The results suggest that these children learned to combine words according to grammatic relation rules. Results of the session-by-session analysis were less informative than those of the cumulative analysis. For children with SELI ready to make the transition to multiword utterances, these findings support a cumulative method of data collection and a treatment approach that targets specific grammatic relation rules rather than general word combinations.


Sign in / Sign up

Export Citation Format

Share Document