Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3451 - 3480 of 6722

Full-Text Articles in Physical Sciences and Mathematics

Assessing The Impacts Of Electronic Commerce Diffusion On Development, Gerard De Leoz, Sajda Qureshi, Lotfollah Najjar May 2015

Assessing The Impacts Of Electronic Commerce Diffusion On Development, Gerard De Leoz, Sajda Qureshi, Lotfollah Najjar

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

While the concept of economic development has been widely used to understand the health and wealth of countries, it is accepted that the access to the internet for electronic commerce transactions enable generation in income and improvements in lives. However, with the rise of disparities in income within countries, electronic commerce opportunities can be limited to the few with internet access. In this paper, we investigate how e-commerce diffusion affects economic development and factors of electronic commerce diffusion that promote or impede economic development. Using data available through international data collection agencies, we analyze three ASEAN members with relatively close …


Using Omaha System Documentation To Understand Physical Activity Among Rural Women, Jeanette Melissa Olsen May 2015

Using Omaha System Documentation To Understand Physical Activity Among Rural Women, Jeanette Melissa Olsen

Theses and Dissertations

Rural women are more inactive and have different barriers to physical activity than those who live in more urban settings, yet few studies have specifically examined physical activity and associated factors in this population. Clinical data documented with standardized terminology by nurses caring for rural women may provide an opportunity to generate evidence that informs and improves nursing care. However, the knowledge to be gained and utility of nurses' clinical documentation in regard to physical activity have not been explored. Accordingly, the purpose of this study was to increase understanding of physical activity and associated factors among rural women by …


Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua May 2015

Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua

Computer Science Faculty Publications

There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by the big file size of video data and fixed bandwidth allocation in constant routing paths. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select …


Moving Average Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Doyen Sahoo, Zhi-Yong Liu May 2015

Moving Average Reversion Strategy For On-Line Portfolio Selection, Bin Li, Steven C. H. Hoi, Doyen Sahoo, Zhi-Yong Liu

Research Collection School Of Computing and Information Systems

On-line portfolio selection, a fundamental problem in computational finance, has attracted increasing interest from artificial intelligence and machine learning communities in recent years. Empirical evidence shows that stock's high and low prices are temporary and stock prices are likely to follow the mean reversion phenomenon. While existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied, leading to poor performance in certain real datasets. To overcome this limitation, this article proposes a multiple-period mean reversion, or so-called "Moving Average Reversion" (MAR), and …


Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin May 2015

Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin

Kno.e.sis Publications

Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations. This paper presents the architecture of a modern platform to discover the structure, function, and operation of gangs through the lens of social media. Preliminary analysis of social media posts shared in the greater Chicago, IL region demonstrate the platform’s …


Domain Specific Document Retrieval Framework On Near Real-Time Social Health Data, Swapnil Soni May 2015

Domain Specific Document Retrieval Framework On Near Real-Time Social Health Data, Swapnil Soni

Kno.e.sis Publications

With the advent of web search and microblogging, the percentage of Online Health Information Seekers (OHIS) using these services to share and seek health information in real-time has increased exponentially. Recently, Twitter has emerged as one of the primary mediums for sharing and seeking of the latest information related to a variety of topics, including health information. Although Twitter is an excellent information source, the identification of useful information from the deluge of tweets is one of the major challenges. Twitter search is limited to keyword-based techniques to retrieve information for a given query and sometimes the results do not …


Pediapp Finder: Creating A Pediatric Application Database, Sara Pro, Adrianne Leblanc, April Wasjutin, Robert Williams May 2015

Pediapp Finder: Creating A Pediatric Application Database, Sara Pro, Adrianne Leblanc, April Wasjutin, Robert Williams

Dissertations, Masters Theses, Capstones, and Culminating Projects

It is estimated that of the 85% of Americans that own cell phones, over half of these cell phone owners use apps on their phone (Fox & Duggan, 2012; Purcell, 2011). According to the U.S. Food and Drug Administration (2013), by 2015, 500 million mobile device users will be using mobile health, or “m-Health” apps. Healthcare professionals are increasingly adopting mobile technology as an innovative, cost-efficient, and timesaving tool that may promote patient wellness and disease prevention (Kumar, 2013; mHealth Bible, 2013). Although mobile technology is a natural fit to the field of occupational therapy, research demonstrates that few resources …


Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes May 2015

Informational Power On Twitter: A Mixed-Methods Exploration Of User Knowledge And Technological Discourse About Information Flows, Nicholas John Proferes

Theses and Dissertations

Following a number of recent examples where social media users have been confronted by information flows that did not match their understandings of the platforms, there is a pressing need to examine public knowledge of information flows on these systems, to map how this knowledge lines up against the extant flows of these systems, and to explore the factors that contribute to the construction of knowledge about these systems. There is an immediacy to this issue because as social media sites become further entrenched as dominant vehicles for communication, knowledge about these technologies will play an ever increasing role in …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Breaking The News: First Impressions Matter On Online News, Julio Reis, Fabr´Icio Benevenuto, Pedro Olmo, Raquel Prates, Haewoon Kwak, Jisun An May 2015

Breaking The News: First Impressions Matter On Online News, Julio Reis, Fabr´Icio Benevenuto, Pedro Olmo, Raquel Prates, Haewoon Kwak, Jisun An

Research Collection School Of Computing and Information Systems

A growing number of people are changing the way they consume news, replacing the traditional physical newspapers and magazines by their virtual online versions or/and weblogs. The interactivity and immediacy present in online news are changing the way news are being produced and exposed by media corporations. News websites have to create effective strategies to catch people’s attention and attract their clicks. In this paper we investigate possible strategies used by online news corporations in the design of their news headlines. We analyze the content of 69,907 headlines produced by four major global media corporations during a minimum of eight …


Efficient Reverse Top-K Boolean Spatial Keyword Queries On Road Networks, Yunjun Gao, Xu Qin, Baihua Zheng, Gang Chen May 2015

Efficient Reverse Top-K Boolean Spatial Keyword Queries On Road Networks, Yunjun Gao, Xu Qin, Baihua Zheng, Gang Chen

Research Collection School Of Computing and Information Systems

Reverse k nearest neighbor (RkNN) queries have a broad application base such as decision support, profile-based marketing, and resource allocation. Previous work on RkNN search does not take textual information into consideration or limits to the Euclidean space. In the real world, however, most spatial objects are associated with textual information and lie on road networks. In this paper, we introduce a new type of queries, namely, reverse top-k Boolean spatial keyword (RkBSK) retrieval, which assumes objects are on the road network and considers both spatial and textual information. Given a data set P on a road network and a …


An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley May 2015

An Empirical Development Of Critical Value Factors For System Quality And Information Quality In Business Intelligence Systems Implementations, Paul Dooley

CCE Theses and Dissertations

Business intelligence (BI) systems have been widely recognized as a leading technology for many years. However, despite the high priority and importance placed on BI, there has been a significant lack of BI system implementation (BISI) success. BI systems are not considered to be conventional information systems (IS) and often rely on the integration of a complex information infrastructure. Consequently, the degree of information quality (IQ) and system quality (SQ) have not met expectations for BISI success.

This study was designed to determine how an organization may gain benefits in the context of BISI by uncovering the antecedents and critical …


Advances In Knowledge Discovery And Data Mining Part Ii, Tru Cao, Ee Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda May 2015

Advances In Knowledge Discovery And Data Mining Part Ii, Tru Cao, Ee Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda

Research Collection School Of Computing and Information Systems

No abstract provided.


Beyond Traits: Social Context Based Personality Model, Jaroslaw Kochanowicz, Ah-Hwee Tan, Daniel Thalmann May 2015

Beyond Traits: Social Context Based Personality Model, Jaroslaw Kochanowicz, Ah-Hwee Tan, Daniel Thalmann

Research Collection School Of Computing and Information Systems

The relation between individual’s personality and environmental context is a key issue in psychology, recently also in character simulations. This paper contributes to both domains by proposing a socio-cognitive, contextual personality model - a new voice in a century old problem of personality, but also an approach to simulating groups of more humanlike agents. After analyzing the influence of popularity of ‘trait personality models’ on psychology and computer simulation, we propose Social Context based Personality model - a continuation and specification of the Cognitive-Affective Personality System theory. The discussion, model and implementation are provided, followed by an example application in …


Cpas - Campus Parking Availability System, Jacob Lambert May 2015

Cpas - Campus Parking Availability System, Jacob Lambert

Chancellor’s Honors Program Projects

No abstract provided.


Campus Parking Availability System, David Lu May 2015

Campus Parking Availability System, David Lu

Chancellor’s Honors Program Projects

No abstract provided.


A Nested Recursive Logit Model For Route Choice Analysis, Tien Mai, Mogens Fosgerau, Emma Frejinger May 2015

A Nested Recursive Logit Model For Route Choice Analysis, Tien Mai, Mogens Fosgerau, Emma Frejinger

Research Collection School Of Computing and Information Systems

We propose a route choice model that relaxes the independence from irrelevant alternatives property of the logit model by allowing scale parameters to be link specific. Similar to the recursive logit (RL) model proposed by Fosgerau et al. (2013), the choice of path is modeled as a sequence of link choices and the model does not require any sampling of choice sets. Furthermore, the model can be consistently estimated and efficiently used for prediction.A key challenge lies in the computation of the value functions, i.e. the expected maximum utility from any position in the network to a destination. The value …


Self-Organizing Neural Networks Integrating Domain Knowledge And Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Jacek M. Zurada May 2015

Self-Organizing Neural Networks Integrating Domain Knowledge And Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Jacek M. Zurada

Research Collection School Of Computing and Information Systems

The use of domain knowledge in learning systems is expected to improve learning efficiency and reduce model complexity. However, due to the incompatibility with knowledge structure of the learning systems and real-time exploratory nature of reinforcement learning (RL), domain knowledge cannot be inserted directly. In this paper, we show how self-organizing neural networks designed for online and incremental adaptation can integrate domain knowledge and RL. Specifically, symbol-based domain knowledge is translated into numeric patterns before inserting into the self-organizing neural networks. To ensure effective use of domain knowledge, we present an analysis of how the inserted knowledge is used by …


Report On The Fg 2015 Video Person Recognition Evaluation, J.R. Beveridge, H. Zhang, B.A. Draper, P.J. Flynn, Z. Feng, P. Huber, J. Kittler, Zhiwu Huang, Li S., Li Y., M. Kan, R. Wang, S. Shan, X. Chen, Li H., G. Hua, V. Struc, J. Krizaj, C. Ding, D. Tao May 2015

Report On The Fg 2015 Video Person Recognition Evaluation, J.R. Beveridge, H. Zhang, B.A. Draper, P.J. Flynn, Z. Feng, P. Huber, J. Kittler, Zhiwu Huang, Li S., Li Y., M. Kan, R. Wang, S. Shan, X. Chen, Li H., G. Hua, V. Struc, J. Krizaj, C. Ding, D. Tao

Research Collection School Of Computing and Information Systems

This report presents results from the Video Person Recognition Evaluation held in conjunction with the 11th IEEE International Conference on Automatic Face and Gesture Recognition. Two experiments required algorithms to recognize people in videos from the Point-and-Shoot Face Recognition Challenge Problem (PaSC). The first consisted of videos from a tripod mounted high quality video camera. The second contained videos acquired from 5 different handheld video cameras. There were 1401 videos in each experiment of 265 subjects. The subjects, the scenes, and the actions carried out by the people are the same in both experiments. Five groups from around the world …


Characterizing Silent Users In Social Media Communities, Wei Gong, Ee-Peng Lim, Feida Zhu May 2015

Characterizing Silent Users In Social Media Communities, Wei Gong, Ee-Peng Lim, Feida Zhu

Research Collection School Of Computing and Information Systems

Silent users often constitute a significant proportion of an online user-generated content system. In the context of social media such as Twitter, users can opt to be silent all or most of the time. They are often called the invisible participants or lurkers. As lurkers contribute little to the online content, existing analysis often overlooks their presence and voices. However, we argue that understanding lurkers is important in many applications such as recommender systems, targeted advertising, and social sensing. This research therefore seeks to characterize lurkers in social media and propose methods to profile them. We examine 18 weeks of …


Advances In Knowledge Discovery And Data Mining: 19th Pacific-Asia Conference, Pakdd 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part I, Tru Cao, Ee-Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda May 2015

Advances In Knowledge Discovery And Data Mining: 19th Pacific-Asia Conference, Pakdd 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part I, Tru Cao, Ee-Peng Lim, Zhi-Hua Zhou, Tu-Bao Ho, David Wai-Lok Cheung, Hiroshi Motoda

Research Collection School Of Computing and Information Systems

No abstract provided.


Mining Patterns Of Unsatisfiable Constraints To Detect Infeasible Paths, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar May 2015

Mining Patterns Of Unsatisfiable Constraints To Detect Infeasible Paths, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar

Research Collection School Of Computing and Information Systems

Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to these approaches but with a different objective. It is to analyze code of real systems to build patterns of unsatisfiable constraints in infeasible paths. The resulting patterns can be used to detect infeasible paths without the use of constraint solver and evaluation of function calls involved, thus improving scalability. The patterns can be built gradually. Evaluation of the proposed approach shows …


Map: A Computational Model For Adaptive Persuasion, Yilin Kang, Ah-Hwee Tan May 2015

Map: A Computational Model For Adaptive Persuasion, Yilin Kang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

While a variety of persuasion agents have been created and applied in different domains such as marketing, military training and health industry, there is a lack of a model which provides a unified framework for different persuasion strategies. Specifically, persuasion is not adaptable to the individuals’ personal states in different situations. Grounded in the Elaboration Likelihood Model (ELM), this paper presents a computational model called Model for Adaptive Persuasion (MAP) for virtual agents. MAP is a semi-connected network model which enables an agent to adapt its persuasion strategies through feedback. We have implemented and evaluated a MAP-based virtual nurse agent …


Discovering The Rise And Fall Of Software Engineering Ideas From Scholarly Publication Data, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar May 2015

Discovering The Rise And Fall Of Software Engineering Ideas From Scholarly Publication Data, Subhajit Datta, Santonu Sarkar, Sajeev A. S. M., Nishant Kumar

Research Collection School Of Computing and Information Systems

For researchers and practitioners of a relatively young discipline like software engineering, an enduring concern is to identify the acorns that will grow into oaks -- ideas remaining most current in the long run. Additionally, it is interesting to know how the ideas have risen in importance, and fallen, perhaps to rise again. We analyzed a corpus of 19,000+ papers written by 21,000+ authors across 16 software engineering publication venues from 1975 to 2010, to empirically determine the half-life of software engineering research topics. We adapted existing measures of half-life as well as defined a specific measure based on publication …


Big Data And Smart Cities, Amit P. Sheth Apr 2015

Big Data And Smart Cities, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


Trade-In Vehicle Value Optimizing Systems And Methods For Sellers, Buyers, And Dealerships, Lloyd D. Snell, Brad M. Rosenhamer Apr 2015

Trade-In Vehicle Value Optimizing Systems And Methods For Sellers, Buyers, And Dealerships, Lloyd D. Snell, Brad M. Rosenhamer

Lloyd D Snell

Computer-implemented methods and computer systems for offering vehicles, which are subject to sale agreements between sellers and buyers, on online markets and soliciting additional offers for these vehicles by third parties. This additional offering may generate additional revenues, above the agreed upon prices between the initial seller and buyer, and these revenues can be shared by sellers, buyers, and service providers. For example, a seller may contract with a dealer to sell a used car for a certain price, which may be a part of a trade-in transaction. Information about the car, including a price, is then posted on a …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim Apr 2015

A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim

Jeremy Straub

Pokémon is an entertainment franchise with a large fan base. This project uses well-known Pokémon characters to demonstrate the operations of a question selection system. Presented in the form of a game where the computer attempts to guess the user-selected character, the system attempts to minimize the number of questions required for this purpose by identifying questions that most constrain the decision space. The decision making process is refined based on actual user behavior.


Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin Apr 2015

Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.