Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2851 - 2880 of 6721

Full-Text Articles in Physical Sciences and Mathematics

Internet Health Information Seeking And The Patient-Physician Relationship: A Systematic Review, Sharon Swee-Lin Tan, Nadee Goonawardene Jan 2017

Internet Health Information Seeking And The Patient-Physician Relationship: A Systematic Review, Sharon Swee-Lin Tan, Nadee Goonawardene

Research Collection School Of Computing and Information Systems

Background: With online health information becoming increasingly popular among patients, concerns have been raised about the impact of patients' Internet health information-seeking behavior on their relationship with physicians. Therefore, it is pertinent to understand the influence of online health information on the patient-physician relationship. Objective: Our objective was to systematically review existing research on patients' Internet health information seeking and its influence on the patient-physician relationship. Methods: We systematically searched PubMed and key medical informatics, information systems, and communication science journals covering the period of 2000 to 2015. Empirical articles that were in English were included. We analyzed the content …


Power Budgets For Cubesat Radios To Support Ground Communications And Inter-Satellite Links, Otilia Popescu Jan 2017

Power Budgets For Cubesat Radios To Support Ground Communications And Inter-Satellite Links, Otilia Popescu

Engineering Technology Faculty Publications

CubeSats are a class of pico-satellites that have emerged over the past decade as a cost-effective alternative to the traditional large satellites to provide space experimentation capabilities to universities and other types of small enterprises, which otherwise would be unable to carry them out due to cost constraints. An important consideration when planning CubeSat missions is the power budget required by the radio communication subsystem, which enables a CubeSat to exchange information with ground stations and/or other CubeSats in orbit. The power that a CubeSat can dedicate to the communication subsystem is limited by the hard constraints on the total …


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …


Geodesic Merging, Konstantinos Georgatos Jan 2017

Geodesic Merging, Konstantinos Georgatos

Publications and Research

We pursue an account of merging through the use of geodesic semantics, the semantics based on the length of the shortest path on a graph. This approach has been fruitful in other areas of belief change such as revision and update. To this end, we introduce three binary merging operators of propositions defined on the graph of their valuations and we characterize them with a finite set of postulates. We also consider a revision operator defined in the extended language of pairs of propositions. This extension allows us to express all merging operators through the set of revision postulates.


Concept-Based Interactive Search System, Yi-Jie Lu, Phuong Anh Nguyen, Hao Zhang, Chong-Wah Ngo Jan 2017

Concept-Based Interactive Search System, Yi-Jie Lu, Phuong Anh Nguyen, Hao Zhang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Our successful multimedia event detection system at TREC-VID 2015 showed its strength on handling complex concepts in a query. The system was based on a large number of pre-trained concept detectors for textual-to-visual relation. In this paper, we enhance the system by enabling human-in-the-loop. In order to facilitate a user to quickly find an information need, we incorporate concept screening, video reranking by highlighted concepts, relevance feedback and color sketch to refine a coarse retrieval result. The aim is to eventually come up with a system suitable for both Ad-hoc Video Search and Known-Item Search. In addition, as the increasing …


Discovering Historic Traffic-Tolerant Paths In Road Networks, Pui Hang Li, Man Lung Yiu, Kyriakos Mouratidis Jan 2017

Discovering Historic Traffic-Tolerant Paths In Road Networks, Pui Hang Li, Man Lung Yiu, Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

Historic traffic information is valuable in transportation analysis and planning, e.g., evaluating the reliability of routes for representative source-destination pairs. Also, it can be utilized to provide efficient and effective route-search services. In view of these applications, we propose the k traffic-tolerant paths (TTP) problem on road networks, which takes a source-destination pair and historic traffic information as input, and returns k paths that minimize the aggregate (historic) travel time. Unlike the shortest path problem, the TTP problem has a combinatorial search space that renders the optimal solution expensive to find. First, we propose an exact algorithm with effective pruning …


Xic Clustering By Baseyian Network, Kyle J. Handy Jan 2017

Xic Clustering By Baseyian Network, Kyle J. Handy

Graduate Student Theses, Dissertations, & Professional Papers

No abstract provided.


Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson Dec 2016

Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson

Leila A. Halawi

Historically, information systems have focused on capturing, storing, managing, and reporting explicit knowledge.
Organizations today recognize the need to integrate both explicit and tacit knowledge in formal information systems. Knowledge management continues to be a critical strategy for an organization to achieve a sustainable competitive advantage, and consequently succeed in today's knowledge-based economy. Knowledge management systems (KMS) are a class of information systems that manage, store and distribute knowledge. Knowledge management systems have proliferated in practice. In turn, theoretical research on knowledge management and knowledge management systems has proliferated. Knowledge management systems have emerged as powerful sources of competitive advantage. …


Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto Dec 2016

Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto

Robert M Pallitto

Agents in contemporary societies are faced continually with choices regarding engagement with technological artifacts. They can choose to engage or decline engagement after considering the costs and benefits in each case. However, certain aspects of the surveillance society may be irresistible in a number of ways, so that refusal to engage with them is not a realistic option. The proliferation of the Internet of Things (IoT), particularly as embedded in “smart city” initiatives, helps to make surveillance technologies potentially irresistible. After laying the conceptual groundwork for discussing irresistible bargains, this essay offers a two-part normative critique, focusing on the asymmetrical …


Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson Dec 2016

Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson

Rose-Hulman Undergraduate Research Publications

With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.


Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio Dec 2016

Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio

Master's Projects

In this research, we predict User's Future Request using Data Mining Algorithm. Usage of the World Wide Web has resulted in a huge amount of data and handling of this data is getting hard day by day. All this data is stored as Web Logs and each web log is stored in a different format with different Field names like search string, URL with its corresponding timestamp, User ID’s that helps for session identification, Status code, etc. Whenever a user requests for a URL there is a delay in getting the page requested and sometimes the request is denied. Our …


Deep Data Analysis On The Web, Xuanyu Liu Dec 2016

Deep Data Analysis On The Web, Xuanyu Liu

Master's Projects

Search engines are well known to people all over the world. People prefer to use keywords searching to open websites or retrieve information rather than type typical URLs. Therefore, collecting finite sequences of keywords that represent important concepts within a set of authors is important, in other words, we need knowledge mining. We use a simplicial concept method to speed up concept mining. Previous CS 298 project has studied this approach under Dr. Lin. This method is very fast, for example, to mine the concept, FP-growth takes 876 seconds from a database with 1257 columns 65k rows, simplicial complex only …


Handling Relationships In A Wiki System, Yashi Kamboj Dec 2016

Handling Relationships In A Wiki System, Yashi Kamboj

Master's Projects

Wiki software enables users to manage content on the web, and create or edit web pages freely. Most wiki systems support the creation of hyperlinks on pages and have a simple text syntax for page formatting. A common, more advanced feature is to allow pages to be grouped together as categories. Currently, wiki systems support categorization of pages in a very traditional way by specifying whether a wiki page belongs to a category or not. Categorization represents unary relationship and is not sufficient to represent n-ary relationships, those involving links between multiple wiki pages.

In this project, we extend Yioop, …


Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang Dec 2016

Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang

University of New Orleans Theses and Dissertations

Nowadays, many applications are continuously generating large-scale geospatial data. Vehicle GPS tracking data, aerial surveillance drones, LiDAR (Light Detection and Ranging), world-wide spatial networks, and high resolution optical or Synthetic Aperture Radar imagery data all generate a huge amount of geospatial data. However, as data collection increases our ability to process this large-scale geospatial data in a flexible fashion is still limited. We propose a framework for processing and analyzing large-scale geospatial and environmental data using a “Big Data” infrastructure. Existing Big Data solutions do not include a specific mechanism to analyze large-scale geospatial data. In this work, we extend …


Web-Based Integrated Development Environment, Hien T. Vu Dec 2016

Web-Based Integrated Development Environment, Hien T. Vu

Master's Projects

As tablets become more powerful and more economical, students are attracted to them and are moving away from desktops and laptops. Their compact size and easy to use Graphical User Interface (GUI) reduce the learning and adoption barriers for new users. This also changes the environment in which undergraduate Computer Science students learn how to program. Popular Integrated Development Environments (IDE) such as Eclipse and NetBeans require disk space for local installations as well as an external compiler. These requirements cannot be met by current tablets and thus drive the need for a web-based IDE. There are also many other …


Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper Dec 2016

Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan Dec 2016

Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan

Computer Science and Software Engineering

The goal of this senior project centered around improving the quality of student and teacher experiences when visiting the library. The task of finding a book amongst the shelves is an arduous one, which I felt could be improved upon through implementation and testing of a Book Lookup system for the Cal Poly Robert E. Kennedy Library. Development for this project was done using a Python framework. Testing and earlier designs were also created using JavaScript and PHP. Repeated tests were conducted on the accuracy of the software and its ability to decrease user search-time when compared to conventional methods.


Ios Application For Inventory In Small Retail Stores, Andrea Savage Dec 2016

Ios Application For Inventory In Small Retail Stores, Andrea Savage

Computer Science and Software Engineering

Currently, small retail stores with low technology budgets such as those right here in San Luis Obispo are struggling to integrate new technologies into their companies. This mobile application built for iOS with a Firebase backend is seeking to remove their barriers to entry. I built this application to give small retail stores a customizable application that allows them to display products electronically to customers and maintain accurate inventory both in one place. The construction of this application hinged around three major design decisions: UI design of the color management views, organization of the database, and accessing the database with …


The Utility Of Mobile Phones For Health Among Women Living With Hiv In Urban Malawi, Linda Marie Dietrich Dec 2016

The Utility Of Mobile Phones For Health Among Women Living With Hiv In Urban Malawi, Linda Marie Dietrich

Theses and Dissertations

The use of mobile phones are becoming ubiquitous with growing interest by healthcare providers to utilize mobile phone technology for various health-related applications, called mHealth. This is especially true in low-income countries such as those in sub-Saharan Africa. When implementing mHealth applications, it is important to understand the dynamic social, cultural and environmental factors where mHealth will be implemented to ensure that interventions developed are effective. A qualitative study to explore the sociotechnical factors experienced by women participating in an HIV support group in urban Malawi was conducted to enhance our understanding of women’s experience with mobile phone use and …


A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang Dec 2016

A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang

Research & Publications

The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate our approach using the Eucalyptus cloud computing infrastructure where we observe a 100 percent detection rate for abnormal login events and data copies to outside systems.


Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee Dec 2016

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee

Kno.e.sis Publications

We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …


Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready Dec 2016

Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready

Sustainability and Social Justice

My internship, or fellowship as it was commonly referred to, was funded by a non-profit organization out of Williamsburg Virginia called AidData. This fellowship took place in in the country of Ghana, West-Africa beginning in May of 2016 and continued for 14 weeks with 40 hours each week. The objective of this internship was to provide in-depth training on the use of geographic Information Systems to Private and Public sectors within the country to allow for increased efficiency, and transparency through data visualization. In accordance with the requirement of Clark Universities GISDE master’s program this paper will delve into the …


Iterated Random Oracle: A Universal Approach For Finding Loss In Security Reduction, Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang Dec 2016

Iterated Random Oracle: A Universal Approach For Finding Loss In Security Reduction, Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang

Research Collection School Of Computing and Information Systems

The indistinguishability security of a public-key cryptosystem can be reduced to a computational hard assumption in the random oracle model, where the solution to a computational hard problem is hidden in one of the adversary’s queries to the random oracle. Usually, there is a finding loss in finding the correct solution from the query set, especially when the decisional variant of the computational problem is also hard. The problem of finding loss must be addressed towards tight(er) reductions under this type. In EUROCRYPT 2008, Cash, Kiltz and Shoup proposed a novel approach using a trapdoor test that can solve the …


Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal Dec 2016

Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Online reviews increase consumer visits, increase the time spent on the website, and create a sense of community among the frequent shoppers. Because of the importance of online reviews, online retailers such as Amazon.com and eOpinions provide detailed guidelines for writing reviews. However, though these guidelines provide instructions on how to write reviews, reviewers are not provided instructions for writing product-specific reviews. As a result, poorly-written reviews are abound and a customer may need to scroll through a large number of reviews, which could be up to 6000 pixels down from the top of the page, in order to find …


Zero++: Harnessing The Power Of Zero Appearances To Detect Anomalies In Large-Scale Data Sets, Guansong Pang, Kai Ming Ting, David Albrecht, Huidong Jin Dec 2016

Zero++: Harnessing The Power Of Zero Appearances To Detect Anomalies In Large-Scale Data Sets, Guansong Pang, Kai Ming Ting, David Albrecht, Huidong Jin

Research Collection School Of Computing and Information Systems

This paper introduces a new unsupervised anomaly detector called ZERO++ which employs the number of zero appearances in subspaces to detect anomalies in categorical data. It is unique in that it works in regions of subspaces that are not occupied by data; whereas existing methods work in regions occupied by data. ZERO++ examines only a small number of low dimensional subspaces to successfully identify anomalies. Unlike existing frequencybased algorithms, ZERO++ does not involve subspace pattern searching. We show that ZERO++ is better than or comparable with the state-of-the-art anomaly detection methods over a wide range of real-world categorical and numeric …


Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang Dec 2016

Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

Relation classification is the task of classifying the semantic relations between entity pairs in text. Observing that existing work has not fully explored using different representations for relation instances, especially in order to better handle the asymmetry of relation types, in this paper, we propose a neural network based method for relation classification that combines the raw sequence and the shortest dependency path representations of relation instances and uses mirror instances to perform pairwise relation classification. We evaluate our proposed models on two widely used datasets: SemEval-2010 Task 8 and ACE-2005. The empirical results show that our combined model together …


Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen Dec 2016

Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen

Research Collection School Of Computing and Information Systems

Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …


From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan Dec 2016

From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan

Research Collection School Of Computing and Information Systems

With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …


Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan Dec 2016

Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Automatically identifying characters in movies has attracted researchers' interest and led to several significant and interesting applications. However, due to the vast variation in character appearance as well as the weakness and ambiguity of available annotation, it is still a challenging problem. In this paper, we investigate this problem with the supervision of actor-character name correspondence provided by the movie cast. Our proposed framework, namely, Cast2Face, is featured by: 1) we restrict the assigned names within the set of character names in the cast; 2) for each character, by using the corresponding actor and movie name as keywords, we retrieve …


Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo Dec 2016

Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo

Research Collection School Of Computing and Information Systems

The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of evaluation in candidate selection. Thus, it is imperative that resumes are complete, free of errors and well-organized. We present an automated resume evaluation tool called 'CareerMapper'. Our tool is designed to conduct …