Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3571 - 3600 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Metalogic Notes, Saverio Perugini Jan 2015

Metalogic Notes, Saverio Perugini

Computer Science Working Papers

A collection of notes, formulas, theorems, postulates and terminology in symbolic logic, syntactic notions, semantic notions, linkages between syntax and semantics, soundness and completeness, quantified logic, first-order theories, Goedel's First Incompleteness Theorem and more.


Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan Jan 2015

Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan

CCE Theses and Dissertations

The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …


An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White Jan 2015

An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White

CCE Theses and Dissertations

Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …


Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang Jan 2015

Data Privacy Preservation In Collaborative Filtering Based Recommender Systems, Xiwei Wang

Theses and Dissertations--Computer Science

This dissertation studies data privacy preservation in collaborative filtering based recommender systems and proposes several collaborative filtering models that aim at preserving user privacy from different perspectives.

The empirical study on multiple classical recommendation algorithms presents the basic idea of the models and explores their performance on real world datasets. The algorithms that are investigated in this study include a popularity based model, an item similarity based model, a singular value decomposition based model, and a bipartite graph model. Top-N recommendations are evaluated to examine the prediction accuracy.

It is apparent that with more customers' preference data, recommender systems …


Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu Jan 2015

Privacy Preserving Data Mining For Numerical Matrices, Social Networks, And Big Data, Lian Liu

Theses and Dissertations--Computer Science

Motivated by increasing public awareness of possible abuse of confidential information, which is considered as a significant hindrance to the development of e-society, medical and financial markets, a privacy preserving data mining framework is presented so that data owners can carefully process data in order to preserve confidential information and guarantee information functionality within an acceptable boundary.

First, among many privacy-preserving methodologies, as a group of popular techniques for achieving a balance between data utility and information privacy, a class of data perturbation methods add a noise signal, following a statistical distribution, to an original numerical matrix. With the help …


Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles Jan 2015

Exploring Critical Success Factors For Managing Complex Information Technology Projects In Federal Agencies, Kyle Dean Boyles

Walden Dissertations and Doctoral Studies

The problem addressed in this study was the lack of understanding about failures of government leadership in accomplishing complex information technology (IT) projects and the ways such failures can negatively affect organizational performance. The purpose was to query subject matter experts and leaders with the intent to identify methods to reduce complex IT project failure rates in government organizations. This qualitative study drew on the technology acceptance model and the capability maturity model integration framework to evaluate organizations' abilities to manage complex IT projects. The research questions focused on exploring senior managers' experiences, the tacit knowledge of project management methodologies, …


The Role Of Information Technology Organizational Design In Firms' Ability To Innovate, Hassan S. Halimi Jan 2015

The Role Of Information Technology Organizational Design In Firms' Ability To Innovate, Hassan S. Halimi

Walden Dissertations and Doctoral Studies

Information technology (IT) organizations have become an integral part of many firms, with increasing strategic significance. Consequently, investments in IT represent a significant percentage of a firm's expenditure. Despite the investment, the business value of IT has been difficult to quantify, creating uncertainty about a firm's investments in IT innovation. The purpose of this nonexperimental study was to examine relationships between a firm's innovativeness and 3 IT organizational design factors: knowledge creation, dynamic capabilities, and communication structures. The research questions addressed the relationships between a firm's ability to innovate and specific design elements of the IT organization. The study was …


A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire Jan 2015

A Client-Vendor Relationship Perspective Of Cultural Differences On Cross-Border Information Technology Outsourcing, John Kennedy Bosire

Walden Dissertations and Doctoral Studies

Cross-border information technology (IT) outsourcing continues to rise due to the demand for business process outsourcing. Issues such as miscommunication and management problems have emerged because of cross-cultural disparities between clients and vendors across national borders. The theoretical framework of this study was based on the organizational culture model studies of Meek, Spradley, Smith, and Draft for examining and understanding complex organizational practices. The purpose of this mixed-methods explanatory sequential case study was to qualitatively identify and quantitatively determine the management approaches that are effective in managing cross-cultural differences and the constitution of the elements of global adjustment, motivation, mindset, …


An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns Jan 2015

An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns

Computational and Data Sciences Theses

In the age of online courses and digital textbooks, several areas of academia, such as special education, are far behind in the technological revolution. Some teachers use long unstructured digital documents, while others maintain large physical files for students containing every piece of information or coursework they have ever received. Could these extremely unstructured approaches to data collection and aggregation be streamlined with a software platform built specifically for this purpose? Could this platform also be built to accommodate multiple integrations and practical new features? Most importantly, in terms of usability, would this software be enjoyable to use? The Autism …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Faces: Diversity-Aware Entity Summarization Using Incremental Hierarchical Conceptual Clustering, Kalpa Gunaratna, Krishnaprasad Thirunarayan, Amit P. Sheth Jan 2015

Faces: Diversity-Aware Entity Summarization Using Incremental Hierarchical Conceptual Clustering, Kalpa Gunaratna, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

Semantic Web documents that encode facts about entities on the Web have been growing rapidly in size and evolving over time. Creating summaries on lengthy Semantic Web documents for quick identification of the corresponding entity has been of great contemporary interest. In this paper, we explore automatic summarization techniques that characterize and enable identification of an entity and create summaries that are human friendly. Specifically, we highlight the importance of diversified (faceted) summaries by combining three dimensions: diversity, uniqueness, and popularity. Our novel diversity-aware entity summarization approach mimics human conceptual clustering techniques to group facts, and picks representative facts from …


Extracting City Traffic Events From Social Streams, Pramod Anantharam, Payam Barnaghi, Krishnaprasad Thirunarayan, Amit P. Sheth Jan 2015

Extracting City Traffic Events From Social Streams, Pramod Anantharam, Payam Barnaghi, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

Cities are composed of complex systems with physical, cyber, and social components. Current works on extracting and understanding city events mainly rely on technology enabled infrastructure to observe and record events. In this work, we propose an approach to leverage citizen observations of various city systems and services such as traffic, public transport, water supply, weather, sewage, and public safety as a source of city events. We investigate the feasibility of using such textual streams for extracting city events from annotated text. We formalize the problem of annotating social streams such as microblogs as a sequence labeling problem. We present …


Understanding Social Effects In Online Networks, Huda Alhazmi, Swapna S. Gokhale, Derek Doran Jan 2015

Understanding Social Effects In Online Networks, Huda Alhazmi, Swapna S. Gokhale, Derek Doran

Kno.e.sis Publications

Understanding the motives behind people’s interactions online can offer sound bases to predict how a social network may evolve and also support a host of applications. We hypothesize that three offline social factors, namely, stature, relationship strength, and egocentricity may also play an important role in driving users’ interactions online. Therefore, we study the influence of these three social factors in online interactions by analyzing the transitivity in triads or three-way relationships among users. Analyzing transitivity through the lens of triad census for four popular social networks, namely, Facebook, Twitter, YouTube and Slashdot, we find that: (i) users’ interactions are …


Semantic Gateway As A Service Architecture For Iot Interoperability, Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam Jan 2015

Semantic Gateway As A Service Architecture For Iot Interoperability, Pratikkumar Desai, Amit P. Sheth, Pramod Anantharam

Kno.e.sis Publications

The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architecture is required to provide connectivity between these silos, enabling discovery of physical sensors and interpretation of messages between things. This paper proposes a …


Mining Behavior Of Citizen Sensor Communities To Improve Cooperation With Organizational Actors, Hemant Purohit Jan 2015

Mining Behavior Of Citizen Sensor Communities To Improve Cooperation With Organizational Actors, Hemant Purohit

Kno.e.sis Publications

Web 2.0 (social media) provides a natural platform for dynamic emergence of citizen (as) sensor communities, where the citizens generate content for sharing information and engaging in discussions. Such a citizen sensor community (CSC) has stated or implied goals that are helpful in the work of formal organizations, such as an emergency management unit, for prioritizing their response needs. This research addresses questions related to design of a cooperative system of organizations and citizens in CSC. Prior research by social scientists in a limited offline and online environment has provided a foundation for research on cooperative behavior challenges, including ‘ …


Using Ehrs For Heart Failure Therapy Recommendation Using Multidimensional Patient Similarity Analytics, Maryam Panahiazar, Vahid Taslimitehrani, Naveen L. Pereira, Jyotishman Pathak Jan 2015

Using Ehrs For Heart Failure Therapy Recommendation Using Multidimensional Patient Similarity Analytics, Maryam Panahiazar, Vahid Taslimitehrani, Naveen L. Pereira, Jyotishman Pathak

Kno.e.sis Publications

Electronic Health Records (EHRs) contain a wealth of information about an individual patient’s diagnosis, treatment and health outcomes. This information can be leveraged effectively to identify patients who are similar to each for disease diagnosis and prognosis. In recent years, several machine learning methods 1 have been proposed to assessing patient similarity, although the techniques have primarily focused on the use of patient diagnoses data from EHRs for the learning task. In this study, we develop a multidimensional patient similarity assessment technique that leverages multiple types of information from the EHR and predicts a medication plan for each new patient …


Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan Jan 2015

Value Oriented Big Data Processing With Applications, Krishnaprasad Thirunarayan

Kno.e.sis Publications

We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. To handle Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision- making. To handle Variety, we resort to semantic models and annotations of data so that intelligent processing can be done independent of heterogeneity of data formats and media. To handle Velocity, we seek to use continuous semantics capability to dynamically create event or situation specific models and recognize relevant new concepts, entities and …


Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger Jan 2015

Evaluation Of The Signature Molecular Descriptor With Blosum62 And An All-Atom Description For Use In Sequence Alignment Of Proteins, Lindsay M. Aichinger

Williams Honors College, Honors Research Projects

This Honors Project focused on a few aspects of this topic. The second is comparing the molecular signature kernels to three of the BLOSUM matrices (30, 62, and 90) to test the accuracy of the mathematical model. The kernel matrix was manipulated in order to improve the relationship by focusing on side groups and also by changing how the structure was represented in the matrix by increasing the initial height distance from the central atom (Height 1 and Height 2 included).

There were multiple design constraints for this project. The first was the comparison with the BLOSUM matrices (30, 62, …


Knowledge Enabled Approach To Predict The Location Of Twitter Users, Revathy Krishnamurthy, Pavan Kapanipathi, Amit P. Sheth, Krishnaprasad Thirunarayan Jan 2015

Knowledge Enabled Approach To Predict The Location Of Twitter Users, Revathy Krishnamurthy, Pavan Kapanipathi, Amit P. Sheth, Krishnaprasad Thirunarayan

Kno.e.sis Publications

Knowledge bases have been used to improve performance in applications ranging from web search and event detection to entity recognition and disambiguation. More recently, knowledge bases have been used to analyze social data. A key challenge in social data analysis has been the identification of the geographic location of online users in a social network such as Twitter. Existing approaches to predict the location of users, based on their tweets, rely solely on social media features or probabilistic language models. These approaches are supervised and require large training dataset of geo-tagged tweets to build their models. As most Twitter users …


Knowledge-Driven Personalized Contextual Mhealth Service For Asthma Management In Children, Pramod Anantharam, Tanvi Banerjee, Amit P. Sheth, Krishnaprasad Thirunarayan, Surendra Marupudi, Vaikunth Sridharan Jan 2015

Knowledge-Driven Personalized Contextual Mhealth Service For Asthma Management In Children, Pramod Anantharam, Tanvi Banerjee, Amit P. Sheth, Krishnaprasad Thirunarayan, Surendra Marupudi, Vaikunth Sridharan

Kno.e.sis Publications

Wide adoption of smartphones and availability of low-cost sensors has resulted in seamless and continuous monitoring of physiology, environment, and public health notifications. However, personalized digital health and patient empowerment can become a reality only if the complex multisensory and multimodal data is processed within the patient context. Contextual processing of patient data along with personalized medical knowledge can lead to actionable information for better and timely decisions. We present a system called kHealth capable of aggregating multisensory and multimodal data from sensors (passive sensing) and answers to questionnaire (active sensing) from patients with asthma. We present our preliminary data …


Gender-Based Violence In 140 Characters Or Fewer: A #Bigdata Case Study Of Twitter, Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Valerie L. Shalin, Nayanesh Bhandutia, Amit P. Sheth Jan 2015

Gender-Based Violence In 140 Characters Or Fewer: A #Bigdata Case Study Of Twitter, Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Valerie L. Shalin, Nayanesh Bhandutia, Amit P. Sheth

Kno.e.sis Publications

Public institutions are increasingly reliant on data from social media sites to measure public attitude and provide timely public engagement. Such reliance includes the exploration of public views on important social issues such as gender-based violence (GBV). In this study, we examine big (social) data consisting of nearly fourteen million tweets collected from Twitter over a period of ten months to analyze public opinion regarding GBV, highlighting the nature of tweeting practices by geographical location and gender. We demonstrate the utility of Computational Social Science to mine insight from the corpus while accounting for the influence of both transient events …


Archive - A Data Management Program, James H. Devilbiss, C. Steven Whisnant, Yasmeen Shorish Jan 2015

Archive - A Data Management Program, James H. Devilbiss, C. Steven Whisnant, Yasmeen Shorish

Department of Physics and Astronomy - Faculty Scholarship

To meet funding agency requirements, a portable data management solution is presented for small research groups. The database created is simple, searchable, robust, and can reside across multiple hard drives. Employing a standard metadata schema for all data, the database ensures a high level of standardization, findability, and organization. The software is written in Perl, runs on UNIX, and presents a web-based user interface. It uses a fast, portable log-in scheme, making it easy to export to other locations. As research continues to move towards more open data sharing and reproducibility, this database solution is agile enough to accommodate external …


Exploring Knowledge Management Practices In Service-Based Small Business Enterprises, Orlando Skelton Jan 2015

Exploring Knowledge Management Practices In Service-Based Small Business Enterprises, Orlando Skelton

Walden Dissertations and Doctoral Studies

Small business enterprises (SBEs) are significant contributors to business growth and employment in the United States, but despite governmental support, the failure rate of SBEs is high. Some small business leaders lack the critical management skills to detect or discover when underperformance in revenue-generation is due to gaps in organizational knowledge or business practices associated with managing knowledge assets. Guided by the knowledge-based view of the firm, the purpose of this multiple case study was to address that gap by exploring the skills needed by leaders to understand how deficiencies in their knowledge management practices contribute to underperformance. Semistructured interview …


Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel Jan 2015

Exploring Government Contractor Experiences Assessing And Reporting Software Development Status, Putnam P. Texel

Walden Dissertations and Doctoral Studies

Reports from academic, commercial, and government organizations have documented software-intensive system cost and schedule overruns for decades. These reports have identified lack of management insight into the software development process as one of many contributing factors. Multiple management mechanisms exist. However, these mechanisms do not support the assessment, and subsequent reporting, of software completion status. Additionally, the conceptual framework, based on industry standards, is limited in its relevance to this study due to an emphasis on what is needed while deferring implementation details. The purpose of this phenomenological study was to explore U.S. government contractors' lived experiences of assessing and …


Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas Jan 2015

Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas

Walden Dissertations and Doctoral Studies

In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …


Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole Jan 2015

Distinguishing Leadership Of Information Assurance Teams, Bamidele Adetokunbo Bankole

Walden Dissertations and Doctoral Studies

Information assurance (IA) projects are essential components of the information technology industry and often fail due to budget overruns, missed deadlines, and lack of performance by the project teams. The purpose of this phenomenological study was to explore the strategies necessary to improve IA project team performance. Lewin's situational leadership theory was used as the conceptual framework for this study. Interviews were conducted with 20 IA professionals located in the Washington, DC Metropolitan area. The data were transcribed, coded, and clustered for the identification of common patterns based on the Moustakas' modified van Kaam analysis. The major themes that emerged …


Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan Jan 2015

Three Essays On Global Ict Phenomenon: Productivity Paradox, Organizational Ict Use, And Privacy In Social Networks, Faruk Arslan

Open Access Theses & Dissertations

This Dissertation aims to investigate the global diversity in information systems by studying three distinctive phenomena. The first essay investigates the existence of "IT Productivity Paradox" within firms operating in developing countries using an empirical approach. IT Productivity Paradox has been a widely investigated topic within the context of developed countries and primarily studied within the context of developing countries using a single country. Our research addresses a gap in the literature, which is the study of IT Productivity Paradox across several developing countries with diverse characteristics. The second essay studies the contextual factors (firm characteristics and perception of external …


Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin Jan 2015

Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin

Walden Dissertations and Doctoral Studies

The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …


Sustainability Of Enterprise Resource Planning (Erp) Benefits Postimplementation: An Individual User Perspective, Mohamed Abdalla Mohamed Badreldin Lotfy Jan 2015

Sustainability Of Enterprise Resource Planning (Erp) Benefits Postimplementation: An Individual User Perspective, Mohamed Abdalla Mohamed Badreldin Lotfy

Walden Dissertations and Doctoral Studies

Although there is research about the use of enterprise resource planning (ERP) from a management perspective, the research is not clear as to whether the ERP benefits justify the costs, not only in dollars, but also in effort, from the end user's perspective. Using the theory of diffusion of innovation (DOI), the purpose of this quantitative research was to identify the set of postimplementation sustainability factors that maximized ERP user value, which are major issues for management, and measured their relative significance. The study's structural model incorporated the technology-organization-environment (TOE) framework, which is a conceptualization of the theory of diffusion …


Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones Jan 2015

Impacts On Faculty Workload During A Learning Management System Transition, Karla Page Jones

Walden Dissertations and Doctoral Studies

Management professionals at many colleges are transitioning to new learning management systems (LMS), such as Moodle, for reasons such as lower costs, greater outreach, and student preference. Transitioning to a new LMS may result in faculty problems with learning a new technology platform in addition to teaching. The purpose of this study was to explore the impact that an LMS transition had on faculty attitudes, experiences, and workload. The conceptual framework of the study was the unified theory of acceptance and use of technology and the diffusion of innovation theory. A phenomenological design was employed with a purposeful sample of …