Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2281 - 2310 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Crrn: Multi-Scale Guided Concurrent Reflection Removal Network, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot Jun 2018

Crrn: Multi-Scale Guided Concurrent Reflection Removal Network, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot

Research Collection School Of Computing and Information Systems

Removing the undesired reflections from images taken through the glass is of broad application to various computer vision tasks. Non-learning based methods utilize different handcrafted priors such as the separable sparse gradients caused by different levels of blurs, which often fail due to their limited description capability to the properties of real-world reflections. In this paper, we propose the Concurrent Reflection Removal Network (CRRN) to tackle this problem in a unified framework. Our proposed network integrates image appearance information and multi-scale gradient information with human perception inspired loss function, and is trained on a new dataset with 3250 reflection images …


On The Fintech Revolution: Interpreting The Forces Of Innovation, Disruption And Transformation In Financial Services, Peter Gomber, Robert J. Kauffman, Chris Parker, Bruce W. Weber Jun 2018

On The Fintech Revolution: Interpreting The Forces Of Innovation, Disruption And Transformation In Financial Services, Peter Gomber, Robert J. Kauffman, Chris Parker, Bruce W. Weber

Research Collection School Of Computing and Information Systems

Firms in the financial services industry have been faced with the dramatic and relatively recentemergence of new technology innovations, and process disruptions. The industry as a whole, and many newfintech start-ups are looking for new pathways to successful business models, the creation of enhanced customerexperience, and new approaches that result in services transformation. Industry and academic observers believethis to be more of a revolution than a set of less impactful changes, with financial services as a whole due formajor improvements in efficiency, in customer centricity and informedness. The long-standing dominance ofleading firms that are not able to figure out how …


Column Generation Approach For Feeder Vessel Routing And Synchronization At A Congested Transshipment Port, Jian G. Jin, Qiang Meng, Hai Wang Jun 2018

Column Generation Approach For Feeder Vessel Routing And Synchronization At A Congested Transshipment Port, Jian G. Jin, Qiang Meng, Hai Wang

Research Collection School Of Computing and Information Systems

With increasing container-shipping traffic in major transshipment ports, unsynchronized shipping services at hub ports usually lead to loss of transshipment connections, significant vessel port-stay time, and congestion. This calls for the design of feeder vessel services to pick up from and deliver containers to neighboring local ports, and, at the same time, synchronize them with long-haul services in a manner that enables efficient container transshipment. In this paper, we present a mixed integer linear programming model to optimize the feeder vessel routes and hub port synchronization with an objective to minimize the total operating and connection cost. We exploit the …


Verifiably Encrypted Cascade-Instantiable Blank Signatures To Secure Progressive Decision Management, Yujue Wang, Hwee Hwa Pang, Robert H. Deng Jun 2018

Verifiably Encrypted Cascade-Instantiable Blank Signatures To Secure Progressive Decision Management, Yujue Wang, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

In this paper, we introduce the notion of verifiably encrypted cascade-instantiable blank signatures (CBS) in a multi-user setting. In CBS, there is a delegation chain that starts with an originator and is followed by a sequence of proxies. The originator creates and signs a template, which may comprise fixed fields and exchangeable fields. Thereafter, each proxy along the delegation chain is able to make an instantiation of the template from the choices passed down from her direct predecessor, before generating a signature for her instantiation. First, we present a non-interactive basic CBS construction that does not rely on any shared …


Social Stream Classification With Emerging New Labels, Xin Mu, Feida Zhu, Yue Liu, Ee-Peng Lim, Zhi-Hua Zhou Jun 2018

Social Stream Classification With Emerging New Labels, Xin Mu, Feida Zhu, Yue Liu, Ee-Peng Lim, Zhi-Hua Zhou

Research Collection School Of Computing and Information Systems

As an important research topic with well-recognized practical values, classification of social streams has been identified with increasing popularity with social data, such as the tweet stream generated by Twitter users in chronological order. A salient, and perhaps also the most interesting, feature of such user-generated content is its never-failing novelty, which, unfortunately, would challenge most traditional pre-trained classification models as they are built based on fixed label set and would therefore fail to identify new labels as they emerge. In this paper, we study the problem of classification of social streams with emerging new labels, and propose a novel …


Libraryguru: Api Recommendation For Android Developers, Weizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen Jun 2018

Libraryguru: Api Recommendation For Android Developers, Weizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen

Research Collection School Of Computing and Information Systems

Developing modern mobile applications often require the uses of many libraries specific for the mobile platform, which can be overwhelmingly too many for application developers to find what are needed for a functionality and where and how to use them properly. This paper presents a tool, named LibraryGuru, to recommend suitable Android APIs for given functionality descriptions. It not only recommends functional APIs that can be invoked for implementing the functionality, but also recommends event callback APIs that are inherent in the Android framework and need to be overridden in the application. LibraryGuru internally builds correlation databases among various functionality …


The Wider Impact Of A National Cryptocurrency, Dennis Ng, Paul Griffin Jun 2018

The Wider Impact Of A National Cryptocurrency, Dennis Ng, Paul Griffin

Research Collection Lee Kong Chian School Of Business

This study looks at the impact of a national cryptocurrency on the payment landscape in the midst of the rise of globalpublic cryptocurrencies and interest from central banks in a possible national cryptocurrency. The impacts are analysed for consumers, merchants, banks,payment providers, international money transfer operators and central banks.The study analyses the pros and cons for each player with an overall impactranking. There is a particular emphasis on central banks as they hold key regulatory oversight for economic and financial matters affecting a country.Whilst finding that there is an overall benefit, there are also significant risks. A sandbox approach is …


Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken May 2018

Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken

Dissertations

Despite the importance of individuals coming together for social group-activities (e.g., pick-up volleyball), the process by which such groups coalesce is poorly understood, and as a consequence is poorly supported by technology. This is despite the emergence of Event-Based Social Network (EBSN) technologies that are specifically designed to assist group coalescing for social activities. Existing theories focus on group development in terms of norms and types, rather than the processes involved in initial group coalescence. This dissertation addresses this gap in the literature through four studies focusing on understanding the coalescing process for interest-based group activities within urban environments and …


Recta: Regulon Identification Based On Comparative Genomics And Transcriptomics Analysis, Xin Chen, Anjun Ma, Adam Mcdermaid, Hanyuan Zhang, Chao Liu, Huansheng Cao, Qin Ma May 2018

Recta: Regulon Identification Based On Comparative Genomics And Transcriptomics Analysis, Xin Chen, Anjun Ma, Adam Mcdermaid, Hanyuan Zhang, Chao Liu, Huansheng Cao, Qin Ma

School of Computing: Faculty Publications

Regulons, which serve as co-regulated gene groups contributing to the transcriptional regulation of microbial genomes, have the potential to aid in understanding of underlying regulatory mechanisms. In this study, we designed a novel computational pipeline, regulon identification based on comparative genomics and transcriptomics analysis (RECTA), for regulon prediction related to the gene regulatory network under certain conditions. To demonstrate the effectiveness of this tool, we implemented RECTA on Lactococcus lactis MG1363 data to elucidate acid-response regulons. A total of 51 regulons were identified, 14 of which have computational-verified significance. Among these 14 regulons, five of them were computationally predicted to …


Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi May 2018

Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi

The African Journal of Information Systems

The storage and retrieval of information are important functions of information systems (IS). These IS functions have been realized for decades, due to the maturity of the relational database technology. In recent years, the concept of Semantic Information System (SIS) has emerged as IS in which information is represented with explicit semantic based on its meaning rather than its syntax to enable its automatic and intelligent processing by computers. At present, there is a shortage of discussions on the topic of semantic data storage in IS as compared to the relational database storage counterpart. This study uses a combination of …


Analysis Of 2016-17 Major League Soccer Season Data Using Poisson Regression With R, Ian D. Campbell May 2018

Analysis Of 2016-17 Major League Soccer Season Data Using Poisson Regression With R, Ian D. Campbell

Undergraduate Theses and Capstone Projects

To the outside observer, soccer is chaotic with no given pattern or scheme to follow, a random conglomeration of passes and shots that go on for 90 minutes. Yet, what if there was a pattern to the chaos, or a way to describe the events that occur in the game quantifiably. Sports statistics is a critical part of baseball and a variety of other of today’s sports, but we see very little statistics and data analysis done on soccer. Of this research, there has been looks into the effect of possession time on the outcome of a game, the difference …


Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher May 2018

Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher

Conference papers

Activity discovery is a challenging machine learning problem where we seek to uncover new or altered behavioural patterns in sensor data. In this paper we motivate and introduce a novel approach to evaluating activity discovery systems. Pre-annotated ground truths, often used to evaluate the performance of such systems on existing datasets, may exist at different levels of abstraction to the output of the output produced by the system. We propose a method for detecting and dealing with this situation, allowing for useful ground truth comparisons. This work has applications for activity discovery, and also for related fields. For example, it …


Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao May 2018

Quantitative Phenotype Analysis To Identify, Validate And Compare Rat Disease Models, Yiqing Zhao

Theses and Dissertations

Introduction

The laboratory rat has been widely used as an animal model in biomedical research. There are many strains exhibiting a wide variety of phenotypes. Capturing these phenotypes in a centralized database provides researchers with an easy method for choosing the appropriate strains for their studies. Current resources such as NBRP and PhysGen provided some preliminary work in rat phenotype databases. However, there are drawbacks in both projects: (1) small number of animals (6 rats) used by NBRP; (2) NBRP project is a one-time effort for each strain; (3) PhysGen web interface only enables queries within a single study – …


Ai: Augmentation, More So Than Automation, Steven M. Miller May 2018

Ai: Augmentation, More So Than Automation, Steven M. Miller

Asian Management Insights

The take-up of Artificial Intelligence (AI)-enabled systems in organisations is expanding rapidly. Integrating AI-enabled automation with people into workplace processes and societal systems is a complex and evolving challenge. The articles takes a managerial perspective on how firms can effectively deploy human minds and intelligent machines in the workplace.


Automatic Vulnerability Detection And Repair, Siqi Ma May 2018

Automatic Vulnerability Detection And Repair, Siqi Ma

Dissertations and Theses Collection (Open Access)

Vulnerability becomes a major threat to the security of many systems, including computer systems (e.g., Windows and Linux) and mobile systems (e.g., Android and iOS). Attackers can steal private information and perform harmful actions by exploiting unpatched vulnerabilities. Vulnerabilities often remain undetected for a long time as they may not affect the typical functionalities of systems. Thus, it is important to detect and repair a vulnerability in time. However, it is often difficult for a developer to detect and repair a vulnerability correctly and timely if he/she is not a security expert. Fortunately, automatic repair approaches significantly assist developers to …


Cslc Tutoring Portal, Brian Hodges May 2018

Cslc Tutoring Portal, Brian Hodges

Theses/Capstones/Creative Projects

A web portal designed for the Computer Science Learning Center to track students requesting help


Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi May 2018

Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi

Theses and Dissertations

This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships.

In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer …


Entity Summarization Of Reviews And Micro-Reviews, Thanh Son Nguyen May 2018

Entity Summarization Of Reviews And Micro-Reviews, Thanh Son Nguyen

Dissertations and Theses Collection (Open Access)

Along with the regular review content, there is a new type of user-generated content arising from the prevalence of mobile devices and social media, that is micro-review. Micro-reviews are bite-size reviews (usually under 200 char- acters), commonly posted on social media or check-in services, using a mobile device. They capture the immediate reaction of users, and they are rich in information, concise, and to the point. Both reviews and micro-reviews are useful for users to get to know the entity of interest, thus facilitating users in making their decision of purchasing or dining. However, the abundant number of both reviews …


Recommending Apis For Software Evolution, Ferdian Thung May 2018

Recommending Apis For Software Evolution, Ferdian Thung

Dissertations and Theses Collection (Open Access)

Softwares are constantly evolving. This evolution has been made easier through the use of Application Programming Interfaces (APIs). By leveraging APIs, developers reuse previously implemented functionalities and concentrate on writing new codes. These APIs may originate from either third parties or internally from other compo- nents of the software that are currently developed. In the first case, developers need to know how to find and use third party APIs. In the second case, developers need to be aware of internal APIs in their own software. In either case, there is often too much information to digest. For instance, finding the …


Finding All Nearest Neighbors With A Single Graph Traversal, Yixin Xu, Qi Jianzhong, Borovica‐Gajic Renata, Kulik Lars May 2018

Finding All Nearest Neighbors With A Single Graph Traversal, Yixin Xu, Qi Jianzhong, Borovica‐Gajic Renata, Kulik Lars

Research Collection School Of Computing and Information Systems

Finding the nearest neighbor is a key operation in data analysis and mining. An important variant of nearest neighbor query is the all nearest neighbor (ANN) query, which reports all nearest neighbors for a given set of query objects. Existing studies on ANN queries have focused on Euclidean space. Given the widespread occurrence of spatial networks in urban environments, we study the ANN query in spatial network settings. An example of an ANN query on spatial networks is finding the nearest car parks for all cars currently on the road. We propose VIVET, an index-based algorithm to efficiently process ANN …


Anflo: Detecting Anomalous Sensitive Information Flows In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar May 2018

Anflo: Detecting Anomalous Sensitive Information Flows In Android Apps, Biniam Fisseha Demissie, Mariano Ceccato, Lwin Khin Shar

Research Collection School Of Computing and Information Systems

Smartphone apps usually have access to sensitive user data such as contacts, geo-location, and account credentials and they might share such data to external entities through the Internet or with other apps. Confidentiality of user data could be breached if there are anomalies in the way sensitive data is handled by an app which is vulnerable or malicious. Existing approaches that detect anomalous sensitive data flows have limitations in terms of accuracy because the definition of anomalous flows may differ for different apps with different functionalities; it is normal for “Health” apps to share heart rate information through the Internet …


Evidence Aggregation For Answer Re-Ranking In Open-Domain Question Answering, Shuohang Wang, Mo Yu, Jing Jiang, Wei Zhang, Xiaoxiao Guo, Shiyu Chang, Zhiguo Wang, Tim Klinger, Gerald Tesauro, Murray Campbell May 2018

Evidence Aggregation For Answer Re-Ranking In Open-Domain Question Answering, Shuohang Wang, Mo Yu, Jing Jiang, Wei Zhang, Xiaoxiao Guo, Shiyu Chang, Zhiguo Wang, Tim Klinger, Gerald Tesauro, Murray Campbell

Research Collection School Of Computing and Information Systems

A popular recent approach to answering open-domain questions is to first search for question-related passages and then apply reading comprehension models to extract answers. Existing methods usually extract answers from single passages independently. But some questions require a combination of evidence from across different sources to answer correctly. In this paper, we propose two models which make use of multiple passages to generate their answers. Both use an answer-reranking approach which reorders the answer candidates generated by an existing state-of-the-art QA model. We propose two methods, namely, strength-based re-ranking and coverage-based re-ranking, to make use of the aggregated evidence from …


Big Data For Climate Change Actions And The Paradox Of Citizen Informedness, Kustini Lim-Wavde, Robert J. Kauffman May 2018

Big Data For Climate Change Actions And The Paradox Of Citizen Informedness, Kustini Lim-Wavde, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Advanced sensor technology, social media, and other information technologies have provided us with “big data” on climate change. Due to the World Meteorological Organization’s Global Climate Observing System, climate observations and records, as well as discussions on climate-related concerns such as measurement of air temperature, are widely available now. The United Nations’ Global Pulse visualises public engagement on climate change globally, with data such as the volume of climate-related tweets. Big data, data analytics, and the sharing of scientific results in the popular press have created, as a result, an unprecedented level of citizen informedness—the degree to which citizens have …


Discovering Hidden Topical Hubs And Authorities In Online Social Networks, Roy Ka-Wei Lee, Tuan-Anh Hoang, Ee-Peng Lim May 2018

Discovering Hidden Topical Hubs And Authorities In Online Social Networks, Roy Ka-Wei Lee, Tuan-Anh Hoang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Finding influential users in online social networks is an important problem with many possible useful applications. HITS and other link analysis methods, in particular, have been often used to identify hub and authority users in web graphs and online social networks. These works, however, have not considered topical aspect of links in their analysis. A straightforward approach to overcome this limitation is to first apply topic models to learn the user topics before applying the HITS algorithm. In this paper, we instead propose a novel topic model known as Hub and Authority Topic (HAT) model to combines the two process …


Understanding The Effects Of Taxi Ride-Sharing: A Case Study Of Singapore, Yazhe Wang, Baihua Zheng, Ee Peng Lim May 2018

Understanding The Effects Of Taxi Ride-Sharing: A Case Study Of Singapore, Yazhe Wang, Baihua Zheng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

This paper studies the effects of ride-sharing among those calling on taxis in Singapore for similar origin and destination pairs at nearly the same time of day. It proposes a simple yet practical framework for taxi ride-sharing and scheduling, to reduce waiting times and travel times during peak demand periods. The solution method helps taxi users save money while helping taxi drivers serve multiple requests per day, thus increasing their earnings. A comprehensive simulation study is conducted, based on real taxi booking data for the city of Singapore, to evaluate the effect of various factors of the ride-sharing practice, e.g., …


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh Apr 2018

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Small Web-Based Denormalized Database Effectiveness Threshold, Min Young Lee Apr 2018

Small Web-Based Denormalized Database Effectiveness Threshold, Min Young Lee

Undergraduate Research Celebration 2018

No abstract provided.


Blockchain: Technical Review, Evan D. Poff Apr 2018

Blockchain: Technical Review, Evan D. Poff

Marriott Student Review

This review of blockchain technology accompanies the article "Strategic Implications of Blockchain."


Buzzwords, Evan D. Poff Apr 2018

Buzzwords, Evan D. Poff

Marriott Student Review

This feature will explain the following buzzwords:

  • Blockchain
  • Cryptocurrency
  • Work-Life Integration
  • Passive Equities
  • Risk-Adjusted Returns


Efficient Reduced Bias Genetic Algorithm For Generic Community Detection Objectives, Aditya Karnam Gururaj Rao Apr 2018

Efficient Reduced Bias Genetic Algorithm For Generic Community Detection Objectives, Aditya Karnam Gururaj Rao

Theses

The problem of community structure identification has been an extensively investigated area for biology, physics, social sciences, and computer science in recent years for studying the properties of networks representing complex relationships. Most traditional methods, such as K-means and hierarchical clustering, are based on the assumption that communities have spherical configurations. Lately, Genetic Algorithms (GA) are being utilized for efficient community detection without imposing sphericity. GAs are machine learning methods which mimic natural selection and scale with the complexity of the network. However, traditional GA approaches employ a representation method that dramatically increases the solution space to be searched by …