Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2101 - 2130 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Probabilistic Record Linkage With Elliptic Curve Operations, Shreya Dhiren Patel Jan 2019

Probabilistic Record Linkage With Elliptic Curve Operations, Shreya Dhiren Patel

Electronic Theses and Dissertations

Federated query processing for an electronic health record infrastructure enables large epidemiology studies using data integrated from geographically dispersed medical institutions. However, government imposed privacy regulations prohibit disclosure of patient's health record outside the context of clinical care, thereby making it difficult to determine which records correspond to the same entity in the process of query aggregation.

Privacy-preserving record linkage is an actively pursued research area to facilitate the linkage of database records under the constraints of regulations that do not allow the linkage agents to learn sensitive identities of record owners. In earlier works, scalability has been shown to …


Large Scale Online Multiple Kernel Regression With Application To Time-Series Prediction, Doyen Sahoo, Steven C. H. Hoi, Bin Lin Jan 2019

Large Scale Online Multiple Kernel Regression With Application To Time-Series Prediction, Doyen Sahoo, Steven C. H. Hoi, Bin Lin

Research Collection School Of Computing and Information Systems

Kernel-based regression represents an important family of learning techniques for solving challenging regression tasks with non-linear patterns. Despite being studied extensively, most of the existing work suffers from two major drawbacks as follows: (i) they are often designed for solving regression tasks in a batch learning setting, making them not only computationally inefficient and but also poorly scalable in real-world applications where data arrives sequentially; and (ii) they usually assume that a fixed kernel function is given prior to the learning task, which could result in poor performance if the chosen kernel is inappropriate. To overcome these drawbacks, this work …


The Application Of Cloud Resources To Terrain Data Visualization, Gregory J. Larrick Jan 2019

The Application Of Cloud Resources To Terrain Data Visualization, Gregory J. Larrick

EWU Masters Thesis Collection

In this thesis, the recent trends in cloud computing, via virtual machine hosted servers, are applied to the field of big data visualization. In particular, we investigate the visualization of terrain data acquired from several major open data sets with a graphics library for browser based rendering. Similar terrain data visualization solutions have not fully taken advantage of remote computational resources. In this thesis, we show that, by using a collection of Amazon EC-2 machines for fetching and decoding of terrain data, in conjunction with modern graphics libraries, three dimensional terrain information may be viewed and interacted with by many …


Global Inference For Aspect And Opinion Terms Co-Extraction Based On Multi-Task Neural Networks, Jianfei Yu, Jing Jiang, Rui Xia Jan 2019

Global Inference For Aspect And Opinion Terms Co-Extraction Based On Multi-Task Neural Networks, Jianfei Yu, Jing Jiang, Rui Xia

Research Collection School Of Computing and Information Systems

Extracting aspect terms and opinion terms are two fundamental tasks in opinion mining. The recent success of deep learning has inspired various neural network architectures, which have been shown to achieve highly competitive performance in these two tasks. However, most existing methods fail to explicitly consider the syntactic relations among aspect terms and opinion terms, which may lead to the inconsistencies between the model predictions and the syntactic constraints. To this end, we first apply a multi-task learning framework to implicitly capture the relations between the two tasks, and then propose a global inference method by explicitly modelling several syntactic …


Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi Jan 2019

Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi

Copyright, Fair Use, Scholarly Communication, etc.

Recently, big data investment has become important for organizations, especially with the fast growth of data following the huge expansion in the usage of social media applications, and websites. Many organizations depend on extracting and reaching the needed reports and statistics. As the investments on big data and its storage have become major challenges for organizations, many technologies and methods have been developed to tackle those challenges.

One of such technologies is Hadoop, a framework that is used to divide big data into packages and distribute those packages through nodes to be processed, consuming less cost than the traditional storage …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Content-Based Music Retrieval Of Irish Traditional Music Via A Virtual Tin Whistle, Pierre Beauguitte, Hung-Chuan Huang Jan 2019

Content-Based Music Retrieval Of Irish Traditional Music Via A Virtual Tin Whistle, Pierre Beauguitte, Hung-Chuan Huang

Conference papers

We present a mobilephon eapplication associating a virtual musical instrument (emulating a tin whistle) to a content based music retrieval system for Irish Traditional Music (ITM). It performs tune recognition, following the architecture of the existing query-by-playing software Tunepal (Duggan & O’Shea, 2011). After explaining the motivation for this project in Section 2 and presenting some relatedworkinSection3,wedescribeourproposedapplicationinSection4. Section5discussescurrentshortcomings of our project and potential future directions.


Agent-Based Iot Coordination For Smart Cities Considering Security And Privacy, Iván García-Magariño, Geraldine Gray, Rajarajan Muttukrishnan, Waqar Asif Jan 2019

Agent-Based Iot Coordination For Smart Cities Considering Security And Privacy, Iván García-Magariño, Geraldine Gray, Rajarajan Muttukrishnan, Waqar Asif

Conference papers

The interest in Internet of Things (IoT) is increasing steeply, and the use of their smart objects and their composite services may become widespread in the next few years increasing the number of smart cities. This technology can benefit from scalable solutions that integrate composite services of multiple-purpose smart objects for the upcoming large-scale use of integrated services in IoT. This work proposes an agent-based approach for supporting large-scale use of IoT for providing complex integrated services. Its novelty relies in the use of distributed blackboards for implicit communications, decentralizing the storage and management of the blackboard information in the …


Web Archives At The Nexus Of Good Fakes And Flawed Originals, Michael L. Nelson Jan 2019

Web Archives At The Nexus Of Good Fakes And Flawed Originals, Michael L. Nelson

Computer Science Faculty Publications

[Summary] The authenticity, integrity, and provenance of resources we encounter on the web are increasingly in question. While many people are inured to the possibility of altered images, the easy accessibility of powerful software tools that synthesize audio and video will unleash a torrent of convincing “deepfakes” into our social discourse. Archives will no longer be monopolized by a countable number of institutions such as governments and publishers, but will become a competitive space filled with social engineers, propagandists, conspiracy theorists, and aspiring Hollywood directors. While the historical record has never been singular nor unmalleable, current technologies empower an unprecedented …


Clinical Big Data And Deep Learning: Applications, Challenges, And Future Outlooks, Ying Yu, Liangliang Liu, Yaohang Li, Jianxin Wang Jan 2019

Clinical Big Data And Deep Learning: Applications, Challenges, And Future Outlooks, Ying Yu, Liangliang Liu, Yaohang Li, Jianxin Wang

Computer Science Faculty Publications

The explosion of digital healthcare data has led to a surge of data-driven medical research based on machine learning. In recent years, as a powerful technique for big data, deep learning has gained a central position in machine learning circles for its great advantages in feature representation and pattern recognition. This article presents a comprehensive overview of studies that employ deep learning methods to deal with clinical data. Firstly, based on the analysis of the characteristics of clinical data, various types of clinical data (e.g., medical images, clinical notes, lab results, vital signs and demographic informatics) are discussed and details …


Toward Using High-Frequency Coastal Radars For Calibration Of S-Ais Based Ocean Vessel Tracking Models, Ben Freidrich Jan 2019

Toward Using High-Frequency Coastal Radars For Calibration Of S-Ais Based Ocean Vessel Tracking Models, Ben Freidrich

Theses and Dissertations (Comprehensive)

Most of the world relies on ships for transportation, shipping, and tourism. Automatic Identification System messages are transmitted from ships and provide a wealth of positional data on these open ocean vessels. This data is being utilized to determine the optimal path for ships, as well as predicting where a ship may be going in the near future. It has only been in the past decade that Automatic Identification Systems (AIS) signals have been easily received with satellites (S-AIS) so there have been few studies that look at using available information and pairing it with the new abundance of ship …


Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou Jan 2019

Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou

Information Technology & Decision Sciences Faculty Publications

Automated trading, which is also known as algorithmic trading, is a method of using a predesigned computer program to submit a large number of trading orders to an exchange. It is substantially a real-time decision-making system which is under the scope of Enterprise Information System (EIS). With the rapid development of telecommunication and computer technology, the mechanisms underlying automated trading systems have become increasingly diversified. Considerable effort has been exerted by both academia and trading firms towards mining potential factors that may generate significantly higher profits. In this paper, we review studies on trading systems built using various methods and …


Modeling Location-Based Social Network Data With Area Attraction And Neighborhood Competition, Thanh Nam Doan, Ee-Peng Lim Jan 2019

Modeling Location-Based Social Network Data With Area Attraction And Neighborhood Competition, Thanh Nam Doan, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Modeling user check-in behavior helps us gain useful insights about venues as well as the users visiting them. These insights are important in urban planning and recommender system applications. Since check-in behavior is the result of multiple factors, this paper focuses on studying two venue related factors, namely, area attraction and neighborhood competition. The former refers to the ability of a spatial area covering multiple venues to collectively attract check-ins from users, while the latter represents the extent to which a venue can compete with other venues in the same area for check-ins. We first embark on empirical studies to …


An Economic Analysis Of Consumer Learning On Entertainment Shopping Websites, Jin Li, Zhiling Guo, Geoffrey K.F. Tso Jan 2019

An Economic Analysis Of Consumer Learning On Entertainment Shopping Websites, Jin Li, Zhiling Guo, Geoffrey K.F. Tso

Research Collection School Of Computing and Information Systems

Online entertainment shopping, normally supported by the pay-to-bid auction mechanism, represents an innovative business model in e-commerce. Because the unique selling mechanism combines features of shopping and online auction, consumers expect both monetary return and entertainment value from their participation. We propose a dynamic structural model to analyze consumer behaviors on entertainment shopping websites. The model captures the consumer learning process, based both on individual participation experiences and also on observational learning of historical auction information. We estimate the model using a large data set from an online entertainment shopping website. Results show that consumers’ initial participation incentives mainly come …


An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain Jan 2019

An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain

Wayne State University Theses

Security threats using intent based inter component communication (ICC) channels in Android are under constant scrutiny of software engineering researchers. Though prior research provides empirical evidence on the existence of collusive communication channels in popular android apps, little is known about developers’willful involvement and motivation to exploit these channels.To shed light on this matter, in this paper we devised a novel methodology to deterministically identify developers’ involvement in establishing collusive inter app communication channels. We incorporate static analysis and relational database technology to discover sensitive collusive channels and domain knowledge of the Android SDK to build a model to identify …


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan Dec 2018

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan

LSU Master's Theses

The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen Dec 2018

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …


Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK …


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …


The Rise Of Real-Time Retail Payments, Zhiling Guo Dec 2018

The Rise Of Real-Time Retail Payments, Zhiling Guo

MITB Thought Leadership Series

TRANSACTING for just about anything using our mobile phones has become commonplace, and so many consumers will be intrigued to discover that after making a purchase it can still take longer for payment to reach a vendor’s bank account than it does for the purchased goods to be delivered.


Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham Dec 2018

Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham

MITB Thought Leadership Series

BIKE-SHARING programmes face many of the issues encountered by their counterparts in the carsharing world. But in Singapore, there are a number of factors that have a unique impact on the industry. These include the regulatory structure and the significant fines for those companies who do not abide by these regulations. When this is combined with the competitive nature of the industry in one of the world's most dynamic cities, it becomes clear that first movers who leverage machine learning and prediction will come to dominate the industry


Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim Dec 2018

Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In recent years, the use of digital tools and technologies in educational institutions are continuing to generate large amounts of digital traces of student learning behavior. This study presents a proof-of-concept analytics system that can detect at-risk students along their learning journey. Educators can benefit from the early detection of at-risk students by understanding factors which may lead to failure or drop-out. Further, educators can devise appropriate intervention measures before the students drop out of the course. Our system was built using SAS ® Enterprise Miner (EM) and SAS ® JMP Pro.


Comparison Mining From Text, Maksim Tkachenko Dec 2018

Comparison Mining From Text, Maksim Tkachenko

Dissertations and Theses Collection (Open Access)

Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.

If …


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …


Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li Dec 2018

Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li

Research Collection School Of Computing and Information Systems

Android is the most widely used mobile operating system with billions of users and devices. The popularity of Android apps have enticed malware writers to target them. Recently, Jamrozik et al. proposed an approach, named Boxmate, to mine sandboxes to protect Android users from malicious behaviors. In a nutshell, Boxmate analyzes the execution of an app, and collects a list of sensitive APIs that are invoked by that app in a monitoring phase. Then, it constructs a sandbox that can restrict accesses to sensitive APIs not called by the app. In such a way, malicious behaviors that are not observed …