Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3451 - 3480 of 6722
Full-Text Articles in Physical Sciences and Mathematics
Assessing The Impacts Of Electronic Commerce Diffusion On Development, Gerard De Leoz, Sajda Qureshi, Lotfollah Najjar
Assessing The Impacts Of Electronic Commerce Diffusion On Development, Gerard De Leoz, Sajda Qureshi, Lotfollah Najjar
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
While the concept of economic development has been widely used to understand the health and wealth of countries, it is accepted that the access to the internet for electronic commerce transactions enable generation in income and improvements in lives. However, with the rise of disparities in income within countries, electronic commerce opportunities can be limited to the few with internet access. In this paper, we investigate how e-commerce diffusion affects economic development and factors of electronic commerce diffusion that promote or impede economic development. Using data available through international data collection agencies, we analyze three ASEAN members with relatively close …
Using Omaha System Documentation To Understand Physical Activity Among Rural Women, Jeanette Melissa Olsen
Using Omaha System Documentation To Understand Physical Activity Among Rural Women, Jeanette Melissa Olsen
Theses and Dissertations
Rural women are more inactive and have different barriers to physical activity than those who live in more urban settings, yet few studies have specifically examined physical activity and associated factors in this population. Clinical data documented with standardized terminology by nurses caring for rural women may provide an opportunity to generate evidence that informs and improves nursing care. However, the knowledge to be gained and utility of nurses' clinical documentation in regard to physical activity have not been explored. Accordingly, the purpose of this study was to increase understanding of physical activity and associated factors among rural women by …
Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua
Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua
Computer Science Faculty Publications
There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by the big file size of video data and fixed bandwidth allocation in constant routing paths. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select …
Moving Average Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Doyen Sahoo, Zhi-Yong Liu
Moving Average Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Doyen Sahoo, Zhi-Yong Liu
Research Collection School Of Computing and Information Systems
On-line portfolio selection, a fundamental problem in computational finance, has attracted increasing interest from artificial intelligence and machine learning communities in recent years. Empirical evidence shows that stock's high and low prices are temporary and stock prices are likely to follow the mean reversion phenomenon. While existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied, leading to poor performance in certain real datasets. To overcome this limitation, this article proposes a multiple-period mean reversion, or so-called "Moving Average Reversion" (MAR), and …
Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin
Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin
Kno.e.sis Publications
Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations. This paper presents the architecture of a modern platform to discover the structure, function, and operation of gangs through the lens of social media. Preliminary analysis of social media posts shared in the greater Chicago, IL region demonstrate the platform’s …
Domain Specific Document Retrieval Framework On Near Real-Time Social Health Data, Swapnil Soni
Domain Specific Document Retrieval Framework On Near Real-Time Social Health Data, Swapnil Soni
Kno.e.sis Publications
With the advent of web search and microblogging, the percentage of Online Health Information Seekers (OHIS) using these services to share and seek health information in real-time has increased exponentially. Recently, Twitter has emerged as one of the primary mediums for sharing and seeking of the latest information related to a variety of topics, including health information. Although Twitter is an excellent information source, the identification of useful information from the deluge of tweets is one of the major challenges. Twitter search is limited to keyword-based techniques to retrieve information for a given query and sometimes the results do not …
Pediapp Finder: Creating A Pediatric Application Database, Sara Pro, Adrianne Leblanc, April Wasjutin, Robert Williams
Pediapp Finder: Creating A Pediatric Application Database, Sara Pro, Adrianne Leblanc, April Wasjutin, Robert Williams
Dissertations, Masters Theses, Capstones, and Culminating Projects
It is estimated that of the 85% of Americans that own cell phones, over half of these cell phone owners use apps on their phone (Fox & Duggan, 2012; Purcell, 2011). According to the U.S. Food and Drug Administration (2013), by 2015, 500 million mobile device users will be using mobile health, or “m-Health” apps. Healthcare professionals are increasingly adopting mobile technology as an innovative, cost-efficient, and timesaving tool that may promote patient wellness and disease prevention (Kumar, 2013; mHealth Bible, 2013). Although mobile technology is a natural fit to the field of occupational therapy, research demonstrates that few resources …
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes
Theses and Dissertations
Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Breaking The News: First Impressions Matter On Online News, Julio Reis, Fabr´Icio Benevenuto, Pedro Olmo, Raquel Prates, Haewoon Kwak, Jisun An
Breaking The News: First Impressions Matter On Online News, Julio Reis, Fabr´Icio Benevenuto, Pedro Olmo, Raquel Prates, Haewoon Kwak, Jisun An
Research Collection School Of Computing and Information Systems
A growing number of people are changing the way they consume news, replacing the traditional physical newspapers and magazines by their virtual online versions or/and weblogs. The interactivity and immediacy present in online news are changing the way news are being produced and exposed by media corporations. News websites have to create effective strategies to catch people’s attention and attract their clicks. In this paper we investigate possible strategies used by online news corporations in the design of their news headlines. We analyze the content of 69,907 headlines produced by four major global media corporations during a minimum of eight …
Efficient Reverse Top-K Boolean Spatial Keyword Queries On Road Networks, Yunjun Gao, Xu Qin, Baihua Zheng, Gang Chen
Efficient Reverse Top-K Boolean Spatial Keyword Queries On Road Networks, Yunjun Gao, Xu Qin, Baihua Zheng, Gang Chen
Research Collection School Of Computing and Information Systems
Reverse k nearest neighbor (RkNN) queries have a broad application base such as decision support, profile-based marketing, and resource allocation. Previous work on RkNN search does not take textual information into consideration or limits to the Euclidean space. In the real world, however, most spatial objects are associated with textual information and lie on road networks. In this paper, we introduce a new type of queries, namely, reverse top-k Boolean spatial keyword (RkBSK) retrieval, which assumes objects are on the road network and considers both spatial and textual information. Given a data set P on a road network and a …
An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley
CCE Theses and Dissertations
Business intelligence (BI) systems have been widely recognized as a leading technology for many years. However, despite the high priority and importance placed on BI, there has been a significant lack of BI system implementation (BISI) success. BI systems are not considered to be conventional information systems (IS) and often rely on the integration of a complex information infrastructure. Consequently, the degree of information quality (IQ) and system quality (SQ) have not met expectations for BISI success.
This study was designed to determine how an organization may gain benefits in the context of BISI by uncovering the antecedents and critical …
Advances In Knowledge Discovery And Data Mining Part Ii, Tru Cao, Ee Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda
Advances In Knowledge Discovery And Data Mining Part Ii, Tru Cao, Ee Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda
Research Collection School Of Computing and Information Systems
No abstract provided.
Beyond Traits: Social Context Based Personality Model, Jaroslaw Kochanowicz, Ah-Hwee Tan, Daniel Thalmann
Beyond Traits: Social Context Based Personality Model, Jaroslaw Kochanowicz, Ah-Hwee Tan, Daniel Thalmann
Research Collection School Of Computing and Information Systems
The relation between individual’s personality and environmental context is a key issue in psychology, recently also in character simulations. This paper contributes to both domains by proposing a socio-cognitive, contextual personality model - a new voice in a century old problem of personality, but also an approach to simulating groups of more humanlike agents. After analyzing the influence of popularity of ‘trait personality models’ on psychology and computer simulation, we propose Social Context based Personality model - a continuation and specification of the Cognitive-Affective Personality System theory. The discussion, model and implementation are provided, followed by an example application in …
Cpas - Campus Parking Availability System, Jacob Lambert
Cpas - Campus Parking Availability System, Jacob Lambert
Chancellor’s Honors Program Projects
No abstract provided.
Campus Parking Availability System, David Lu
Campus Parking Availability System, David Lu
Chancellor’s Honors Program Projects
No abstract provided.
A Nested Recursive Logit Model For Route Choice Analysis, Tien Mai, Mogens Fosgerau, Emma Frejinger
A Nested Recursive Logit Model For Route Choice Analysis, Tien Mai, Mogens Fosgerau, Emma Frejinger
Research Collection School Of Computing and Information Systems
We propose a route choice model that relaxes the independence from irrelevant alternatives property of the logit model by allowing scale parameters to be link specific. Similar to the recursive logit (RL) model proposed by Fosgerau et al. (2013), the choice of path is modeled as a sequence of link choices and the model does not require any sampling of choice sets. Furthermore, the model can be consistently estimated and efficiently used for prediction.A key challenge lies in the computation of the value functions, i.e. the expected maximum utility from any position in the network to a destination. The value …
Self-Organizing Neural Networks Integrating Domain Knowledge And Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Jacek M. Zurada
Self-Organizing Neural Networks Integrating Domain Knowledge And Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Jacek M. Zurada
Research Collection School Of Computing and Information Systems
The use of domain knowledge in learning systems is expected to improve learning efficiency and reduce model complexity. However, due to the incompatibility with knowledge structure of the learning systems and real-time exploratory nature of reinforcement learning (RL), domain knowledge cannot be inserted directly. In this paper, we show how self-organizing neural networks designed for online and incremental adaptation can integrate domain knowledge and RL. Specifically, symbol-based domain knowledge is translated into numeric patterns before inserting into the self-organizing neural networks. To ensure effective use of domain knowledge, we present an analysis of how the inserted knowledge is used by …
Report On The Fg 2015 Video Person Recognition Evaluation, J.R. Beveridge, H. Zhang, B.A. Draper, P.J. Flynn, Z. Feng, P. Huber, J. Kittler, Zhiwu Huang, Li S., Li Y., M. Kan, R. Wang, S. Shan, X. Chen, Li H., G. Hua, V. Struc, J. Krizaj, C. Ding, D. Tao
Report On The Fg 2015 Video Person Recognition Evaluation, J.R. Beveridge, H. Zhang, B.A. Draper, P.J. Flynn, Z. Feng, P. Huber, J. Kittler, Zhiwu Huang, Li S., Li Y., M. Kan, R. Wang, S. Shan, X. Chen, Li H., G. Hua, V. Struc, J. Krizaj, C. Ding, D. Tao
Research Collection School Of Computing and Information Systems
This report presents results from the Video Person Recognition Evaluation held in conjunction with the 11th IEEE International Conference on Automatic Face and Gesture Recognition. Two experiments required algorithms to recognize people in videos from the Point-and-Shoot Face Recognition Challenge Problem (PaSC). The first consisted of videos from a tripod mounted high quality video camera. The second contained videos acquired from 5 different handheld video cameras. There were 1401 videos in each experiment of 265 subjects. The subjects, the scenes, and the actions carried out by the people are the same in both experiments. Five groups from around the world …
Characterizing Silent Users In Social Media Communities, Wei Gong, Ee-Peng Lim, Feida Zhu
Characterizing Silent Users In Social Media Communities, Wei Gong, Ee-Peng Lim, Feida Zhu
Research Collection School Of Computing and Information Systems
Silent users often constitute a significant proportion of an online user-generated content system. In the context of social media such as Twitter, users can opt to be silent all or most of the time. They are often called the invisible participants or lurkers. As lurkers contribute little to the online content, existing analysis often overlooks their presence and voices. However, we argue that understanding lurkers is important in many applications such as recommender systems, targeted advertising, and social sensing. This research therefore seeks to characterize lurkers in social media and propose methods to profile them. We examine 18 weeks of …
Advances In Knowledge Discovery And Data Mining: 19th Pacific-Asia Conference, Pakdd 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part I, Tru Cao, Ee-Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda
Advances In Knowledge Discovery And Data Mining: 19th Pacific-Asia Conference, Pakdd 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part I, Tru Cao, Ee-Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda
Research Collection School Of Computing and Information Systems
No abstract provided.
Mining Patterns Of Unsatisfiable Constraints To Detect Infeasible Paths, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar
Mining Patterns Of Unsatisfiable Constraints To Detect Infeasible Paths, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar
Research Collection School Of Computing and Information Systems
Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to these approaches but with a different objective. It is to analyze code of real systems to build patterns of unsatisfiable constraints in infeasible paths. The resulting patterns can be used to detect infeasible paths without the use of constraint solver and evaluation of function calls involved, thus improving scalability. The patterns can be built gradually. Evaluation of the proposed approach shows …
Map: A Computational Model For Adaptive Persuasion, Yilin Kang, Ah-Hwee Tan
Map: A Computational Model For Adaptive Persuasion, Yilin Kang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
While a variety of persuasion agents have been created and applied in different domains such as marketing, military training and health industry, there is a lack of a model which provides a unified framework for different persuasion strategies. Specifically, persuasion is not adaptable to the individuals’ personal states in different situations. Grounded in the Elaboration Likelihood Model (ELM), this paper presents a computational model called Model for Adaptive Persuasion (MAP) for virtual agents. MAP is a semi-connected network model which enables an agent to adapt its persuasion strategies through feedback. We have implemented and evaluated a MAP-based virtual nurse agent …
Discovering The Rise And Fall Of Software Engineering Ideas From Scholarly Publication Data, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar
Discovering The Rise And Fall Of Software Engineering Ideas From Scholarly Publication Data, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar
Research Collection School Of Computing and Information Systems
For researchers and practitioners of a relatively young discipline like software engineering, an enduring concern is to identify the acorns that will grow into oaks -- ideas remaining most current in the long run. Additionally, it is interesting to know how the ideas have risen in importance, and fallen, perhaps to rise again. We analyzed a corpus of 19,000+ papers written by 21,000+ authors across 16 software engineering publication venues from 1975 to 2010, to empirically determine the half-life of software engineering research topics. We adapted existing measures of half-life as well as defined a specific measure based on publication …
Big Data And Smart Cities, Amit P. Sheth
Trade-In Vehicle Value Optimizing Systems And Methods For Sellers, Buyers, And Dealerships, Lloyd D. Snell, Brad M. Rosenhamer
Trade-In Vehicle Value Optimizing Systems And Methods For Sellers, Buyers, And Dealerships, Lloyd D. Snell, Brad M. Rosenhamer
Lloyd D Snell
Computer-implemented methods and computer systems for offering vehicles, which are subject to sale agreements between sellers and buyers, on online markets and soliciting additional offers for these vehicles by third parties. This additional offering may generate additional revenues, above the agreed upon prices between the initial seller and buyer, and these revenues can be shared by sellers, buyers, and service providers. For example, a seller may contract with a dealer to sell a used car for a certain price, which may be a part of a trade-in transaction. Information about the car, including a price, is then posted on a …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim
A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim
Jeremy Straub
Pokémon is an entertainment franchise with a large fan base. This project uses well-known Pokémon characters to demonstrate the operations of a question selection system. Presented in the form of a game where the computer attempts to guess the user-selected character, the system attempts to minimize the number of questions required for this purpose by identifying questions that most constrain the decision space. The decision making process is refined based on actual user behavior.
Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin
Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin
Jeremy Straub
Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.