Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3811 - 3840 of 6727
Full-Text Articles in Physical Sciences and Mathematics
A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran
A Retail Bank's Bpm Experience, Shankararaman, Venky, Gottipati Swapna, Randall E. Duran
Research Collection School Of Computing and Information Systems
This real-life case study, which was undertaken by a leading financial services group in the Asia-Pacific region, is used to demonstrate the innovative use of BPM (Business Process Management) technology in a competitive business area. It describes how a BPM project, within the Application Verification and Capture (AVC), was conceived, designed and implemented in order to deliver strategic value to the organization. Hereafter, the financial services group will be referred to as “the bank”. The AVC project was targeted at one of the bank's processes called the Application Verification and Capture (AVC) process for unit trust products. This process involved …
Integrating Self-Organizing Neural Network And Motivated Learning For Coordinated Multi-Agent Reinforcement Learning In Multi-Stage Stochastic Game, Teck-Hou Teng, Ah-Hwee Tan, Janusz A. Starzyk, Yuan-Sin Tan, Loo-Nin Teow
Integrating Self-Organizing Neural Network And Motivated Learning For Coordinated Multi-Agent Reinforcement Learning In Multi-Stage Stochastic Game, Teck-Hou Teng, Ah-Hwee Tan, Janusz A. Starzyk, Yuan-Sin Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Most non-trivial problems require the coordinated performance of multiple goal-oriented and time-critical tasks. Coordinating the performance of the tasks is required due to the dependencies among the tasks and the sharing of resources. In this work, an agent learns to perform a task using reinforcement learning with a self-organizing neural network as the function approximator. We propose a novel coordination strategy integrating Motivated Learning (ML) and a self-organizing neural network for multi-agent reinforcement learning (MARL). Specifically, we adapt the ML idea of using pain signal to overcome the resource competition issue. Dependency among the agents is resolved using domain knowledge …
Fsph: Fitted Spectral Hashing For Efficient Similarity Search, Yong-Dong Zhang, Yu Wang, Sheng Tang, Steven C. H. Hoi, Jin-Tao Li
Fsph: Fitted Spectral Hashing For Efficient Similarity Search, Yong-Dong Zhang, Yu Wang, Sheng Tang, Steven C. H. Hoi, Jin-Tao Li
Research Collection School Of Computing and Information Systems
Spectral hashing (SpH) is an efficient and simple binary hashing method, which assumes that data are sampled from a multidimensional uniform distribution. However, this assumption is too restrictive in practice. In this paper we propose an improved method, fitted spectral hashing (FSpH), to relax this distribution assumption. Our work is based on the fact that one-dimensional data of any distribution could be mapped to a uniform distribution without changing the local neighbor relations among data items. We have found that this mapping on each PCA direction has certain regular pattern, and could be fitted well by S-curve function (Sigmoid function). …
Yar Consulting Marketing Website And Extranet Site, John Suarez
Yar Consulting Marketing Website And Extranet Site, John Suarez
Masters Theses & Doctoral Dissertations
This is a hybrid project. As a new Information Systems consultancy the need for a website to market to potential clients was evident. The decision to add an extranet site was made after specific needs for Ace Hardware were made evident to Yar’s founders. Ace Hardware Corporation is a cooperative with over 4,400 members in over 100 nations worldwide. Ace corporate rolled out a B2B pilot program in the fall of 2013 to help Ace independently owned retail stores learn how to sell to other businesses. One of YAR’s founders is currently working with Ace corporate as a program consultant …
Board Interlock Networks And The Use Of Relative Performance Evaluation, Qian Hao, Nan Hu, Ling Liu, Lee J. Yao
Board Interlock Networks And The Use Of Relative Performance Evaluation, Qian Hao, Nan Hu, Ling Liu, Lee J. Yao
Research Collection School Of Computing and Information Systems
Purpose - The purpose of this paper is to explore how networks of boards of directors affect relative performance evaluation (RPE) in chief executive officer (CEO) compensation. Design/methodology/approach - In this study, the authors propose that an interlocking network is an important inter-corporate setting, which has a bearing on whether boards decide to use RPE in CEO compensation. They adopt four typical graph measures to depict the centrality/position of each board in the interlock network: degree, betweenness, eigenvector and closeness, and study their impacts on RPE use. Findings - The authors find that firms that have more connected board members …
Mobile Humanoid Agent With Mood Awareness For Elderly Care, Di Wang, Ah-Hwee Tan
Mobile Humanoid Agent With Mood Awareness For Elderly Care, Di Wang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Human, especially elderly, require frequent attention, continuous companionship, and deep understanding from the others. To provide more specific and appropriate tender care to the elderly, knowing their affective states is a great advantage. Recent work on human emotion recognition shows promising results that the expressive emotion can be successfully captured through visual, audio, and keyboard or touchpad stroke pattern signals. Furthermore, human activities are shown to be accurately recognizable with context by nonintrusive sensors within or connected to the smartphones. In this paper, we propose a computational model to characterize the affective states of the elderly based on the recognizable …
Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin
Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin
Dissertations and Theses Collection (Open Access)
In this dissertation, we first consider data processing problems in multi-cost networks and in upgradable networks. These network types are motivated by real-life situations, which do not fall under the standard spatial network formulation and have not received much attention from database researchers. In a multi-cost network (MCN), each edge is associated with more than one weight type that may affect the user-specific perception of distance. We study two query types on MCNs, namely, the MCN skyline and the MCN top-k query. In an upgradable network, a subset of the edges are amenable to weight reduction, at a cost (e.g., …
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Health Services Research Dissertations
States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …
On Predicting Religion Labels In Microblogging Networks, Minh Thap Nguyen, Ee Peng Lim
On Predicting Religion Labels In Microblogging Networks, Minh Thap Nguyen, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Religious belief plays an important role in how people behave, influencing how they form preferences, interpret events around them, and develop relationships with others. Traditionally, the religion labels of user population are obtained by conducting a large scale census study. Such an approach is both high cost and time consuming. In this paper, we study the problem of predicting users' religion labels using their microblogging data. We formulate religion label prediction as a classification task, and identify content, structure and aggregate features considering their self and social variants for representing a user. We introduce the notion of representative user to …
Lifetime Lexical Variation In Social Media, Lizi Liao, Jing Jiang, Ying Ding, Heyan Huang, Ee Peng Lim
Lifetime Lexical Variation In Social Media, Lizi Liao, Jing Jiang, Ying Ding, Heyan Huang, Ee Peng Lim
Research Collection School Of Computing and Information Systems
As the rapid growth of online social media attracts a large number of Internet users, the large volume of content generated by these users also provides us with an opportunity to study the lexical variation of people of different ages. In this paper, we present a latent variable model that jointly models the lexical content of tweets and Twitter users’ ages. Our model inherently assumes that a topic has not only a word distribution but also an age distribution. We propose a Gibbs-EM algorithm to perform inference on our model. Empirical evaluation shows that our model can learn meaningful age-specific …
Learning Relative Similarity By Stochastic Dual Coordinate Ascent, Pengcheng Wu, Ding Yi, Peilin Zhao, Chunyan Miao, Steven C. H. Hoi
Learning Relative Similarity By Stochastic Dual Coordinate Ascent, Pengcheng Wu, Ding Yi, Peilin Zhao, Chunyan Miao, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Learning relative similarity from pairwise instances is an important problem in machine learning and has a wide range of applications. Despite being studied for years, some existing methods solved by Stochastic Gradient Descent (SGD) techniques generally suffer from slow convergence. In this paper, we investigate the application of Stochastic Dual Coordinate Ascent (SDCA) technique to tackle the optimization task of relative similarity learning by extending from vector to matrix parameters. Theoretically, we prove the optimal linear convergence rate for the proposed SDCA algorithm, beating the well-known sublinear convergence rate by the previous best metric learning algorithms. Empirically, we conduct extensive …
Soml: Sparse Online Metric Learning With Application To Image Retrieval, Xingyu Gao, Steven C. H. Hoi, Yongdong Zhang, Ji Wan, Jintao Li
Soml: Sparse Online Metric Learning With Application To Image Retrieval, Xingyu Gao, Steven C. H. Hoi, Yongdong Zhang, Ji Wan, Jintao Li
Research Collection School Of Computing and Information Systems
Image similarity search plays a key role in many multimedia applications, where multimedia data (such as images and videos) are usually represented in high-dimensional feature space. In this paper, we propose a novel Sparse Online Metric Learning (SOML) scheme for learning sparse distance functions from large-scale high-dimensional data and explore its application to image retrieval. In contrast to many existing distance metric learning algorithms that are often designed for low-dimensional data, the proposed algorithms are able to learn sparse distance metrics from high-dimensional data in an efficient and scalable manner. Our experimental results show that the proposed method achieves better …
Determination Of Optimal Spatial Databases For The Area Of Poland To The Calculation Of Air Pollutant Dispersion Using The Calmet/Calpuff Model, Robert Oleniacz, Mateusz Rzeszutek
Determination Of Optimal Spatial Databases For The Area Of Poland To The Calculation Of Air Pollutant Dispersion Using The Calmet/Calpuff Model, Robert Oleniacz, Mateusz Rzeszutek
Robert Oleniacz
The paper presents a methodology for the preparation of three-dimensional spatial data and land use data for the purpose of modeling pollutant dispersion in the ambient air using a group of geophysical preprocessors of the CALMET/CALPUFF modeling system and the GIS software. Some space information data sources available to Poland were specified and their characteristics and availability were discussed. Particular attention was turned to the SRTM3 and GTOPO30 elevation data as well as the CLC2006 and GLCC land use data, for the preparation of computational grids of different resolutions. Groups of programs which can be used in order to form …
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade
Sherri Shade
Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Sherri Shade
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
From Media Reporting To International Relations: A Case Study Of Asia-Pacific Economic Cooperation (Apec), Chun-Hua Tsai, Yu-Ru Lin
From Media Reporting To International Relations: A Case Study Of Asia-Pacific Economic Cooperation (Apec), Chun-Hua Tsai, Yu-Ru Lin
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
This paper reviews logical approaches and challenges raised for explaining AI. We discuss the issues of presenting explanations as accurate computational models that users cannot understand or use. Then, we introduce pragmatic approaches that consider explanation a sort of speech act that commits to felicity conditions, including intelligibility, trustworthiness, and usefulness to the users. We argue Explainable AI (XAI) is more than a matter of accurate and complete computational explanation, that it requires pragmatics to address the issues it seeks to address. At the end of this paper, we draw a historical analogy to usability. This term was understood logically …
Assisting Coordination During Crisis: A Domain Ontology Based Approach To Infer Resource Needs From Tweets, Shreyansh Bhatt, Hemant Purohit, Andrew J. Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach
Assisting Coordination During Crisis: A Domain Ontology Based Approach To Infer Resource Needs From Tweets, Shreyansh Bhatt, Hemant Purohit, Andrew J. Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach
Kno.e.sis Publications
Ubiquitous social media during crises provides citizen reports on the situation, needs and supplies. Previous research extracts resource needs directly from the text (e.g. "Power cut to Coney Island and Brighton beach" indicates a power need). This approach assumes that citizens derive and write about specific needs from their observations, properly specified for the emergency response system, an assumption that is not consistent with general conversational behavior. In our study, Twitter messages (tweets) from Hurricane Sandy in 2012 clearly indicate power blackouts, but not their probable implications (e.g. loss of power to hospital life support systems). We use a domain …
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
The Use And Effectiveness Of Online Social Media In Volunteer Organizations, Amy J. Connolly
USF Tampa Graduate Theses and Dissertations
Volunteer organizations face two challenges not found in non-volunteer organizations: recruiting and retaining volunteers. While social media use is increasing amongst individuals, its use and effectiveness for volunteer recruitment and retention by volunteer organizations is unknown. The dissertation reports the results of three studies to investigate this important question. Using a mixed-methods approach, it addressed the dual nature of social media and its effectiveness by including volunteer organizations and social media users.
This dissertation found that although volunteer organizations are not using social media effectively, they could virtualize requirements of the recruitment process by focusing on relatable events instead of …
Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard
Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard
C. Jason Woodard
Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …
Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Kyriakos MOURATIDIS
In this paper we study a novel query type, called direct neighbor query. Two objects in a dataset are direct neighbors (DNs) if a window selection may exclusively retrieve these two objects. Given a source object, a DN search computes all of its direct neighbors in the dataset. The DNs define a new type of affinity that differs from existing formulations (e.g., nearest neighbors, nearest surrounders, reverse nearest neighbors, etc.) and finds application in domains where user interests are expressed in the form of windows, i.e., multi-attribute range selections. Drawing on key properties of the DN relationship, we develop an …
Sewordsim: Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall
Sewordsim: Software-Specific Word Similarity Database, Yuan Tian, David Lo, Julia Lawall
David LO
Measuring the similarity of words is important in accurately representing and comparing documents, and thus improves the results of many natural language processing (NLP) tasks. The NLP community has proposed various measurements based on WordNet, a lexical database that contains relationships between many pairs of words. Recently, a number of techniques have been proposed to address software engineering issues such as code search and fault localization that require understanding natural language documents, and a measure of word similarity could improve their results. However, WordNet only contains information about words senses in general-purpose conversation, which often differ from word senses in …
Predicting Response In Mobile Advertising With Hierarchical Importance-Aware Factorization Machine, Richard Jayadi Oentaryo, Ee Peng Lim, Jia Wei Low, David Lo, Michael Finegold
Predicting Response In Mobile Advertising With Hierarchical Importance-Aware Factorization Machine, Richard Jayadi Oentaryo, Ee Peng Lim, Jia Wei Low, David Lo, Michael Finegold
David LO
Mobile advertising has recently seen dramatic growth, fueled by the global proliferation of mobile phones and devices. The task of predicting ad response is thus crucial for maximizing business revenue. However, ad response data change dynamically over time, and are subject to cold-start situations in which limited history hinders reliable prediction. There is also a need for a robust regression estimation for high prediction accuracy, and good ranking to distinguish the impacts of different ads. To this end, we develop a Hierarchical Importance-aware Factorization Machine (HIFM), which provides an effective generic latent factor framework that incorporates importance weights and hierarchical …
Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo
Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo
David LO
Community Question Answering (CQA) sites are becoming increasingly important source of information where users can share knowledge on various topics. Although these platforms bring new opportunities for users to seek help or provide solutions, they also pose many challenges with the ever growing size of the community. The sheer number of questions posted everyday motivates the problem of routing questions to the appropriate users who can answer them. In this paper, we propose an approach to predict the best answerer for a new question on CQA site. Our approach considers both user interest and user expertise relevant to the topics …
On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo
On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo
David LO
Gaming expertise is usually accumulated through playing or watching many game instances, and identifying critical moments in these game instances called turning points. Turning point rules (shorten as TPRs) are game patterns that almost always lead to some irreversible outcomes. In this paper, we formulate the notion of irreversible outcome property which can be combined with pattern mining so as to automatically extract TPRs from any given game datasets. We specifically extend the well-known PrefixSpan sequence mining algorithm by incorporating the irreversible outcome property. To show the usefulness of TPRs, we apply them to Tetris, a popular game. We mine …
R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo
R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo
David LO
The robustness of a network is determined by how well its vertices are connected to one another so as to keep the network strong and sustainable. As the network evolves its robustness changes and may reveal events as well as periodic trend patterns that affect the interactions among users in the network. In this paper, we develop R-energy as a new measure of network robustness based on the spectral analysis of normalized Laplacian matrix. R-energy can cope with disconnected networks, and is efficient to compute with a time complexity of O (jV j + jEj) where V and E are …
Extended Comprehensive Study Of Association Measures For Fault Localization, Lucia Lucia, David Lo, Lingxiao Jiang, Ferdian Thung, Aditya Budi
Extended Comprehensive Study Of Association Measures For Fault Localization, Lucia Lucia, David Lo, Lingxiao Jiang, Ferdian Thung, Aditya Budi
David LO
Spectrum-based fault localization is a promising approach to automatically locate root causes of failures quickly. Two well-known spectrum-based fault localization techniques, Tarantula and Ochiai, measure how likely a program element is a root cause of failures based on profiles of correct and failed program executions. These techniques are conceptually similar to association measures that have been proposed in statistics, data mining, and have been utilized to quantify the relationship strength between two variables of interest (e.g., the use of a medicine and the cure rate of a disease). In this paper, we view fault localization as a measurement of the …
Detection And Scoring Of Internet Slangs For Sentiment Analysis Using Sentiwordnet, Dr. Muhammad Zubair Asghar
Detection And Scoring Of Internet Slangs For Sentiment Analysis Using Sentiwordnet, Dr. Muhammad Zubair Asghar
Dr. Muhammad Zubair Asghar
The online information explosion has created great challenges and opportunities for both information producers and consumers. Understanding customer’s feelings, perceptions and satisfaction is a key performance indicator for running successful business. Sentiment analysis is the digital recognition of public opinions, feelings, emotions and attitudes. People express their views about products, events or services using social networking services. These reviewers excessively use Slangs and acronyms to express their views. Therefore, Slang's analysis is essential for sentiment recognition. This paper presents a framework for detection and scoring of Internet Slangs (DSIS) using SentiWordNet in conjunction with other lexical resources. The comparative results …
Sentiment Classification Through Semantic Orientation Using Sentiwordnet, Dr. Muhammad Zubair Asghar, Dr, Auranzeb Khan
Sentiment Classification Through Semantic Orientation Using Sentiwordnet, Dr. Muhammad Zubair Asghar, Dr, Auranzeb Khan
Dr. Muhammad Zubair Asghar
Sentiment analysis is the procedure by which information is extracted from the opinions, appraisals and emotions of people in regards to entities, events and their attributes. In decision making, the opinions of others have a significant effect on customers ease in making choices regards to online shopping, choosing events, products, entities. In this paper, a rule based domain independent sentiment analysis method is proposed. The proposed method classifies subjective and objective sentences from reviews and blog comments. The semantic score of subjective sentences is extracted from SentiWordNet to calculate their polarity as positive, negative or neutral based on the contextual …
The Lived Experience Of Young Adult Burn Survivors' Use Of Social Media, Marie S. Giordano
The Lived Experience Of Young Adult Burn Survivors' Use Of Social Media, Marie S. Giordano
Dissertations, Theses, and Capstone Projects
The purpose of this phenomenological study was to illuminate the meaning of social media use by young adult burn survivors. Five females and four males, aged 20-25, who sustained burns > 25%, were interviewed. Van Manen's (1999) phenomenological methodology provided the framework for this study. The meaning of the context of the lived experience is described in the five essential themes of identity, connectivity, social support, making meaning, and privacy. These young adult burn survivors, having experienced the traumatic effects of a burn during adolescence, use social media as a way of expressing their identity, while being cautious about privacy. Part …
Bass In Your Face: A Case-Study Exploration Of Networked Culture, Samantha Phyllis Kretmar
Bass In Your Face: A Case-Study Exploration Of Networked Culture, Samantha Phyllis Kretmar
Dissertations, Theses, and Capstone Projects
Using dubstep DJ Bassnectar as a case-study example, this thesis explores the impact of social networks and mobile connectivity. As evidenced by Bassnectar's digitally based approach to experiencing, distributing, and consuming music, these developments have contributed to the shift to a new model I describe as Networked Culture.
Figure 1 is a video highlighting the Bassnectar concert experience. Figure 2 is an audio clip illustrating the "drop" in dubstep. Figure 3 is another audio clip demonstrating the dubstep sound. Figure 4 is an image of an Ableton Live sound library. Figure 5 is an image of Ableton Live's functionality. Figure …