To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Following Entman’s observation that policy frames define social problems, diagnose causes and suggest remedies, we examined the strategies that 12 U.S. governors (from states matched according to population size and density, demographic composition, per capita incomes, geographic proximity, and COVID-19 incidence) used to frame COVID-19 policy agendas. After scraping the governors’ statements about COVID-19 from press releases issued from January 2020 to May 2023 (N = 14,629), we leveraged ChatGPT (GPT) to identify and assess the intensity of public health, economic stability, and civic vitality frames. Subsequent analysis explored differences in the framing strategies according to the governors’ political party and gender. In the process, this study underscores the importance of AI prompt engineering to realize GPT’s transformative potential to facilitate communication research by efficiently identifying and assessing the content of policy frames.
Neuromorphic vision-based robotic tactile sensors fuse touch and vision, enabling manipulators to efficiently grip and identify objects. Precise robotic manipulation requires early detection of slips on the grasped object, which is crucial for maintaining grip stability and safety. Modern closed-loop feedback technologies use measurements from neuromorphic vision-based tactile sensors to control and prevent object slippage. Unfortunately, most of these sensors measure and report data-based rather than model-based information, resulting in less efficient control capabilities. This work proposes physical and mathematical modeling of an in-house-developed neuromorphic vision-based robotic tactile sensor that utilizes a protruded marker design to demonstrate the model-based approach. This sensor is mounted on the UR10 robotic manipulator, enabling manipulation tasks such as approaching, pressing, and slipping. The neuromorphic vision-based robotic tactile sensor-derived mathematical model revealed first-order system behavior for three manipulation-related actions under study. Experimental robotic manipulator grasping work is conducted to verify and validate the sensor’s derived mathematical FOS model. Two data analysis approaches, temporal and spatial–temporal model based, are adopted to classify the manipulator-sensor actions. A long short-term memory (LSTM) temporal classifier is engineered to exploit the sensor’s derived model. Also, the LSTM spatial–temporal classifier is designed using an event-weighted centroid of the region-of-interest features. Both LSTM methods successfully identified the robotic actions performed with an accuracy of more than 99%. Additionally, quantitative slip rate estimation is carried out based on centroid estimation, and qualitative assessment of pressing force is performed using a fuzzy logic classifier.
Lorenz dominance is a classical criterion for comparing income distributions with respect to inequality and social welfare. However, its binary nature, in which one distribution either dominates another or does not, often leads to inconclusive results when empirical Lorenz curves intersect. To overcome this limitation, we introduce the Lorenz dominance index (LDI), a continuous measure that quantifies the extent to which one Lorenz curve lies above another. The LDI provides an interpretable assessment based on the population, allowing for the evaluation of partial or near dominance and improving its usefulness in empirical settings. We derive the asymptotic distribution of the LDI and propose a nonparametric bootstrap procedure to construct confidence intervals and perform inference. Monte Carlo simulations confirm the estimator’s strong performance in finite samples and its nominal coverage. An application to household income data from China highlights the practical value of the LDI in distributional analysis.
Emphasizing how and why machine learning algorithms work, this introductory textbook bridges the gap between the theoretical foundations of machine learning and its practical algorithmic and code-level implementation. Over 85 thorough worked examples, in both Matlab and Python, demonstrate how algorithms are implemented and applied whilst illustrating the end result. Over 75 end-of-chapter problems empower students to develop their own code to implement these algorithms, equipping them with hands-on experience. Matlab coding examples demonstrate how a mathematical idea is converted from equations to code, and provide a jumping off point for students, supported by in-depth coverage of essential mathematics including multivariable calculus, linear algebra, probability and statistics, numerical methods, and optimization. Accompanied online by instructor lecture slides, downloadable Python code and additional appendices, this is an excellent introduction to machine learning for senior undergraduate and graduate students in Engineering and Computer Science.
Onlife criminology is the study of crime and social harm produced by the blurring lines between digital engagement and our everyday lives. This thought-provoking book analyses the threats of surveillance, indoctrination and abuse of personal data that can potentially affect us all.
For far too long, tech titans peddled promises of disruptive innovation - fabricating benefits and minimizing harms. The promise of quick and easy fixes overpowered a growing chorus of critical voices, driving a sea of private and public investments into increasingly dangerous, misguided, and doomed forms of disruption, with the public paying the price. But what's the alternative? Upgrades - evidence-based, incremental change. Instead of continuing to invest in untested, high-risk innovations, constantly chasing outsized returns, upgraders seek a more proven path to proportional progress. This book dives deep into some of the most disastrous innovations of recent years - the metaverse, cryptocurrency, home surveillance, and AI, to name a few - while highlighting some of the unsung upgraders pushing real progress each day. Timely and corrective, Move Slow and Upgrade pushes us past the baseless promises of innovation, towards realistic hope.
Chapter 6 looks at the failures of educational innovation during the Covid-19 crisis. As schools scrambled to adapt to remote learning, remote proctoring technologies rapidly expanded. They implemented surveillance systems that violated student privacy and disproportionately harmed vulnerable students. Despite claims of maintaining academic integrity, remote proctoring created a stressful, punitive environment that prioritized monitoring over genuine educational support while failing to do nearly enough to address the inequalities at the heart of accessing and using digital resources. Sadly, the rush to innovate missed crucial opportunities to upgrade core educational infrastructure and truly support students during a time of unprecedented challenge. As if this wasn’t bad enough, some schools continue to use remote proctoring software. A pandemic problem has thus become the new normal.
Chapter 2 shows how when the emperor of innovation isn’t wearing any clothes, upgraders can still see the naked truth of the situation. Zuckerberg promised a metaverse, a new digital reality, that would transform human connection, interaction, and commerce. But this handwavy conception of the future lacked any clear vision, let alone consumer demand. Upgraders were able to spot the folly long before it became one of the largest corporate boondoggles in modern commerce, a shorthand for corporate disfunction. In contrast to the unbridled enthusiasm of innovators, upgraders would have started with the question of why the public would ever want this product in the first place. Instead, Meta tried to sway public opinion with overly rosy futuristic promises, trying to move the market to meet their innovation, rather than solving problems that actually mattered to the public. Like other innovations, the metaverse shows how tech companies ignore the fundamentals of human behavior and social change, dooming their grand visions.
Polychrony is a virtual or artificial tempor[e]ality that is constructed by the fine augmentation or tempering of a natural set of latencies that articulate a complex networked acoustic. The art is to optimise the alignment of these disjunct temporalities as they merge in a new chronotopic fusion. This fooling with Mother Nature, however, does not come without consequences: due to the significant latency effects intrinsic to a planetary-scale network, a phenomenon called topo-rhythmia emerges. Toporhythms are derived simply as a feature of communication over distance; they are the multiple versions of a rhythm that occur at each node of a networked piece due to the temporal offsets caused by delay. To work with this feature more intentionally, rather than as an accident of relativity, we must tune or temper the network latency. Tempering is a general tactic for ontological negotiation, bringing observers and complex systems into some kind of coherency. The purpose of this article is to explore the tempering of musical time-space on networks and how that underlies the notational practices (and the alien compositional assumptions) built upon this novel orientation.
Chapter 5, “The Failed Promise of Covid Innovation,” presents the pandemic as a crucial case study of how innovative thinking let us down at a time of great vulnerability. Simply put, the early days of massive fatalities made COVID-19 a health crisis. But those days also can be seen as a powerful lens for understanding high-tech failure. From contact tracing apps to thermal imaging cameras and digital vaccine passports, there was a fever pitch of government and corporate enthusiasm for innovative solutionism that was predestined to be unreliable and, thus, in context, dangerous. While we acknowledge remarkable breakthroughs like the rapid development of mRNA vaccines, we also make the case that additional effective responses could have come from upgrading existing systems rather than trying to do things entirely new.
Balister, the second author, Groenland, Johnston, and Scott recently showed that there are asymptotically $C4^n/n^{3/4}$ many unordered sequences that occur as degree sequences of graphs with $n$ vertices. Combining limit theory for infinitely divisible distributions with a new connection between a class of random walk trajectories and a subset counting formula from additive number theory, we describe $C$ in terms of Walkup’s number of rooted plane trees. The bijection is related to an instance of the Lévy–Khintchine formula. Our main result complements a result of Stanley, that ordered graphical sequences are related to quasi-forests.
Chapter 8 explains why there has been so much enthusiasm for integrating AI into multiple dimensions of the hiring process, from resume screening to interview bots, despite these endeavors being marred by fundamental flaws, including, in some cases, integrating bias, unreliable pseudoscientific methods, and dehumanizing interactions. In addition to analyzing the incentives that have motivated companies to use flawed, innovative tools, we provide a road map for how to develop and use responsible AI upgrades in the hiring process.
In Chapter 9, we argue that cybersecurity professionals embody the ideal of the careful, systematic upgrading that Move Slow and Upgrade has been advocating for. Unlike the flashy innovations that we’ve criticized in earlier chapters, cybersecurity professionals focus on making small, proven improvements through such practices as privacy by design and zero-trust architecture. Recognizing that no single change can solve complex problems, they layer multiple safeguards while acknowledging that human behavior – from falling for scams to knowingly taking risks – is often the main vulnerability. By discussing how cybersecurity teams do quality work, we aim to offer important lessons about how other industries might benefit from adopting an upgrading mindset.
To address the challenges of low detection accuracy, missed detections, and high false detection rates for small targets in PCB defect detection tasks, this study proposes an enhanced YOLOv8 methodology incorporating feature focusing and multi-scale fusion techniques. Initially, a lightweight GTADH module is integrated into the detection head of YOLOv8, employing a shared convolution and task alignment mechanism to minimize model parameters while enhancing classification and localization accuracy. Subsequently, an adaptive feature-focusing module is introduced into the feature fusion network to bolster the detection capabilities for small targets via multi-scale feature fusion. Finally, the reverse residual moving block (iRMB) and attention mechanisms are combined within the backbone network to facilitate efficient extraction and fusion of feature information, preserving finer details of small targets. Experimental results demonstrate that the Improved YOLO algorithm achieves a 1.3% increase in detection accuracy and a 7.3% enhancement in mAP50:90 evaluation standards compared to the original YOLOv8s algorithm on the PCB defect dataset, while also reducing model size by 60%, thus showcasing its effectiveness in small target detection tasks.
Chapter 1, “Introduction,” welcomes you to day 1 of your new life as an upgrader. In this introduction we not only provide an overview of the book’s thesis for better problem solving and more effective technological advancement, we start to draw out the contours of what it means to be an Upgrader. This loosely nit cohort of changemakers has rejected both the inadequacy of the status quo and the destructiveness of innovation. Here, you’ll begin to learn what it means to solve some of the most urgent problems facing our society today through the lens of upgrades. We’ll also begin to provide examples of ways that innovations have fallen flat, or blown up completely, in the past. Crucially, upgraders aren’t just backseat drivers in the journey of social change, they are forward looking experts who are often able to see the dangers of pending innovations before they occur. In your life as an upgrader, you’ll not only be able to avoid these missteps yourself, but you’ll be able to see the innovation traps so many others are poised to fall into.
Chapter 3 dives deep into the beating heart of cryptocurrency, the paradoxical technology that has made early adherents billions, while adding nothing of real value to society. By any measure, crypto has failed at its stated goal: creating a better financial system. Looking to Bitcoin, we show how the core innovation – a distributed encrypted database – makes a terrible payment system, with slow, expensive, uncorrectable transactions. But crypto enthusiasts ignore more than a decade of failure, doubling down on grandiose claims about solving everything from financial inclusion to corporate governance while ignoring the far easier, low-tech solutions to these very real needs. We include an interview with an early supporter of the massive crypto currency Ethereum, who came to see how crypto became “just a tool for the wealthy to become wealthier” rather than fulfilling its promise of financial inclusion for the world’s 1.7 billion unbanked people.
Chapter 4 critically examines the fact that sometimes innovations not only fail to solve crucial problems, but are the problem itself. Specifically, it explains why Ring doorbell exemplifies the threat of home surveillance innovation. The billion-dollar Amazon subsidiary sold millions of Americans on the promise of security via surveillance without any credible evidence that its system works. But rather than encouraging people to adopt proven security upgrades, such as better locks and secure package drops, Ring wins customers by making its digital innovation seem essential amid a climate of rising fear. By fighting against boring yet effective alternatives, Ring’s anxiety-inducing features have further normalized intensive networked surveillance and helped turn innocuous neighborly interactions into potential threats.