Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4081 - 4110 of 6727

Full-Text Articles in Physical Sciences and Mathematics

A Study On The Application Of Information System In Patrol Vessel Management, Lei Li Aug 2013

A Study On The Application Of Information System In Patrol Vessel Management, Lei Li

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu Aug 2013

Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Hierarchical Classification And Its Application In University Search, Xiao Li Aug 2013

Hierarchical Classification And Its Application In University Search, Xiao Li

Electronic Thesis and Dissertation Repository

Web search engines have been adopted by most universities for searching webpages in their own domains. Basically, a user sends keywords to the search engine and the search engine returns a flat ranked list of webpages. However, in university search, user queries are usually related to topics. Simple keyword queries are often insufficient to express topics as keywords. On the other hand, most E-commerce sites allow users to browse and search products in various hierarchies. It would be ideal if hierarchical browsing and keyword search can be seamlessly combined for university search engines. The main difficulty is to automatically classify …


Building An Access Database For Cookstove Research, Margaret L. Weddle Aug 2013

Building An Access Database For Cookstove Research, Margaret L. Weddle

Student Works

This paper takes the reader through the thought process and actual instructions to create your own Microsoft Access database, or how to use the one provided with this paper. Also, instructions to use the HBLL resources of Compendex and RefWorks are covered. While this work was built specifically for Cookstoves research, it could be adapted to any research where you would need to maintain a record of the journal articles that you are using. It has been discovered that building a database is a time consuming and difficult work, but once done, Access provides an easy way to work with …


Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis Aug 2013

Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis

Kyriakos MOURATIDIS

In this paper we identify a novel query type, the top-K assignment query (αTop-K). Consider a set of objects and a set of suppliers, where each object must be assigned to one supplier. Assume that there is a cost associated with every object-supplier pair. If we allocate each object to the server with the smallest cost (for the specific object), the derived overall assignment will have the minimum total cost. In many scenarios, however, runner-up assignments may be required too, like for example when a decision maker needs to make additional considerations, not captured by individual object-supplier costs. In this …


Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis Aug 2013

Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis

Kyriakos MOURATIDIS

In this paper, we consider a new problem in the context of road network databases, named Resource Constrained Best Upgrade Plan computation (BUP, for short). Consider a transportation network (weighted graph) G where a subset of the edges are upgradable, i.e., for each such edge there is a cost, which if spent, the weight of the edge can be reduced to a specific new value. Given a source and a destination in G, and a budget (resource constraint) B, the BUP problem is to identify which upgradable edges should be upgraded so that the shortest path distance between source and …


Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder Aug 2013

Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder

Articles

The primary objective of college education in applied disciplines is that it is relevant to the expectations for new professionals entering the labor market. Academic institutions should therefore pay close attention to the ever-changing skills and knowledge expectations in the labor market. These trends are not easy to track, however. Surveys of new professionals about their experiences in their first jobs or surveys of employers about their experiences with new hires suffer from low response rates, nonresponse bias, and the one-time nature of survey research. A better way to track labor market trends is to continually analyze human factors job …


Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain Aug 2013

Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain

UVM Libraries Conference Day

Come learn about a great new tool for easily creating effective and engaging online tutorials built around the theory of active learning. The Guide on the Side was created by librarians at the University of Arizona and released as an open source download in 2012. We hope to soon have it installed for all to use at the UVM Libraries!


An Empirical Study On Uncertainty Identification In Social Media Context, Zhongyu Wei, Junwen Chen, Wei Gao, Binyang Li, Lanjun Zhou, Yulan He, Kam-Fai Wong Aug 2013

An Empirical Study On Uncertainty Identification In Social Media Context, Zhongyu Wei, Junwen Chen, Wei Gao, Binyang Li, Lanjun Zhou, Yulan He, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Uncertainty text detection is important to many social-media-based applications since more and more users utilize social media platforms (e.g., Twitter, Facebook, etc.) as information source to produce or derive interpretations based on them. However, existing uncertainty cues are ineffective in social media context because of its specific characteristics. In this paper, we propose a variant of annotation scheme for uncertainty identification and construct the first uncertainty corpus based on tweets. We then conduct experiments on the generated tweets corpus to study the effectiveness of different types of features for uncertainty text identification.


Multi-View Discriminant Transfer Learning, Pei Yang Yang, Wei Gao Aug 2013

Multi-View Discriminant Transfer Learning, Pei Yang Yang, Wei Gao

Research Collection School Of Computing and Information Systems

We study to incorporate multiple views of data in a perceptive transfer learning framework and propose a Multi-view Discriminant Transfer (MDT) learning approach for domain adaptation. The main idea is to find the optimal discriminant weight vectors for each view such that the correlation between the two-view projected data is maximized, while both the domain discrepancy and the view disagreement are minimized simultaneously. Furthermore, we analyze MDT theoretically from discriminant analysis perspective to explain the condition and reason, under which the proposed method is not applicable. The analytical results allow us to investigate whether there exist within-view and/or betweenview conflicts, …


Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper Aug 2013

Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper

University of New Orleans Theses and Dissertations

A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …


Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward Aug 2013

Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward

University of New Orleans Theses and Dissertations

Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …


Semantic Assistance For Data Utilization And Curation, Brian J. Becker Aug 2013

Semantic Assistance For Data Utilization And Curation, Brian J. Becker

University of New Orleans Theses and Dissertations

We propose that most data stores for large organizations are ill-designed for the future, due to limited searchability of the databases. The study of the Semantic Web has been an emerging technology since first proposed by Berners-Lee. New vocabularies have emerged, such as FOAF, Dublin Core, and PROV-O ontologies. These vocabularies, combined, can relate people, places, things, and events. Technologies developed for the Semantic Web, namely the standardized vocabularies for expressing metadata, will make data easier to utilize. We gathered use cases for various data sources, from human resources to big enterprise. Most of our use cases reflect real-world data. …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly Aug 2013

Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly

Open Educational Resources

This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 1.8 "Lisboa", a cross-platform (Windows, Mac, Linux) desktop GIS software package.


Introduction To Management Information System, Umakant Mishra Aug 2013

Introduction To Management Information System, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.


Management Information Systems Vs. Other Information Systems, Umakant Mishra Aug 2013

Management Information Systems Vs. Other Information Systems, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.

MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …


How To Implement Access Rights In An Mis Project, Umakant Mishra Aug 2013

How To Implement Access Rights In An Mis Project, Umakant Mishra

Umakant Mishra

The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …


Flitecam Data Process Validation, Jesse K. Tsai, Sachindev S. Shenoy, Brent Cedric Nicklas, Zaheer Ali, William T. Reach Aug 2013

Flitecam Data Process Validation, Jesse K. Tsai, Sachindev S. Shenoy, Brent Cedric Nicklas, Zaheer Ali, William T. Reach

STAR Program Research Presentations

FLITECAM Data Processing Validation

Many of the challenges that come from working with astronomical imaging arise from the reduction of raw data into scientifically meaningful data. First Light Infrared Test CAMera (FLITECAM) is an infrared camera operating in the 1.0–5.5 μm waveband on board SOFIA (Stratospheric Observatory For Infrared Astronomy). Due to the significant noise from the atmosphere and the camera itself, astronomers have developed many methods to reduce the effects of atmospheric and instrumental emission. The FLITECAM Data Reduction Program (FDRP) is a program, developed at SOFIA Science Center, subtracts darks, removes flats, and dithers images.

This project contains …


Segmenting Tables Via Indexing Of Value Cells By Table Headers, Sharad C. Seth, George Nagy Aug 2013

Segmenting Tables Via Indexing Of Value Cells By Table Headers, Sharad C. Seth, George Nagy

CSE Conference and Workshop Papers

Correct segmentation of a web table into its component regions is the essential first step to understanding tabular data. Our algorithmic solution to the segmentation problem relies on the property that strings defining row and column header paths uniquely index each data cell in the table. We segment the table using only “logical layout analysis” without resorting to any appearance features or natural language understanding. We start with a CSV table that preserves the 2- dimensional structure and contents of the original source table (e.g., an HTML table) but not font size, font weight, and color. The indexing property of …


Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt Aug 2013

Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt

Theses and Dissertations

Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can be hosted by different organizations in different locations provided it can be accessed using the Internet. This dissertation is an attempt to uncover unique aspects of this phenomenon known as Software as a Service (SaaS).

The first essay examines design decision making by SaaS providers by analyzing effects of two …


An Empirical Analysis Of A Network Of Expertise, Le Truc Viet, Minh Thap Nguyen Aug 2013

An Empirical Analysis Of A Network Of Expertise, Le Truc Viet, Minh Thap Nguyen

Research Collection School Of Computing and Information Systems

In this paper, we analyze the network of expertise constructed from the interactions of users on the online questionanswering (QA) community of Stack Overflow. This community was built with the intention of helping users with their programming tasks and, thus, questions are expected to be highly factual. This also indicates that the answers one provides may be highly indicative of one's level of expertise on the subject matter. Therefore, our main concern is how to model and characterize the user's expertise based on the constructed network and its centrality measures. We used the user's reputation established on Stack Overflow as …


Adaptive Collective Routing Using Gaussian Process Dynamic Congestion Models, Siyuan Liu, Yisong Yue, Ramayya Krishnan Aug 2013

Adaptive Collective Routing Using Gaussian Process Dynamic Congestion Models, Siyuan Liu, Yisong Yue, Ramayya Krishnan

Research Collection School Of Computing and Information Systems

We consider the problem of adaptively routing a fleet of cooperative vehicles within a road network in the presence of uncertain and dynamic congestion conditions. To tackle this problem, we first propose a Gaussian Process Dynamic Congestion Model that can effectively characterize both the dynamics and the uncertainty of congestion conditions. Our model is efficient and thus facilitates real-time adaptive routing in the face of uncertainty. Using this congestion model, we develop an efficient algorithm for non-myopic adaptive routing to minimize the collective travel time of all vehicles in the system. A key property of our approach is the ability …


Delayflow Centrality For Identifying Critical Nodes In Transportation Networks, Yew-Yih Cheng, Roy Ka Wei Lee, Ee-Peng Lim, Feida Zhu Aug 2013

Delayflow Centrality For Identifying Critical Nodes In Transportation Networks, Yew-Yih Cheng, Roy Ka Wei Lee, Ee-Peng Lim, Feida Zhu

Research Collection School Of Computing and Information Systems

In an urban city, its transportation network supports efficient flow of people between different parts of the city. Failures in the network can cause major disruptions to commuter and business activities which can result in both significant economic and time losses. In this paper, we investigate the use of centrality measures to determine critical nodes in a transportation network so as to improve the design of the network as well as to devise plans for coping with network failures. Most centrality measures in social network analysis research unfortunately consider only topological structure of the network and are oblivious of transportation …


Self-Organizing Cognitive Models For Virtual Agents, Yilin Kang, Ah-Hwee Tan Aug 2013

Self-Organizing Cognitive Models For Virtual Agents, Yilin Kang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Three key requirements of realistic characters or agents in virtual world can be identified as autonomy, interactivity, and personification. Working towards these challenges, this paper proposes a brain inspired agent architecture that integrates goal-directed autonomy, natural language interaction and human-like personification. Based on self-organizing neural models, the agent architecture maintains explicit mental representation of desires, intention, personalities, self-awareness, situation awareness and user awareness. Autonomous behaviors are generated via evaluating the current situation with active goals and learning the most appropriate social or goal-directed rule from the available knowledge, in accordance with the personality of each individual agent. We have built …


Vigilance Adaptation In Adaptive Resonance Theory, Lei Meng, Ah-Hwee Tan, Donald C. Winsch Aug 2013

Vigilance Adaptation In Adaptive Resonance Theory, Lei Meng, Ah-Hwee Tan, Donald C. Winsch

Research Collection School Of Computing and Information Systems

Despite the advantages of fast and stable learning, Adaptive Resonance Theory (ART) still relies on an empirically fixed vigilance parameter value to determine the vigilance regions of all of the clusters in the category field (F 2 ), causing its performance to depend on the vigilance value. It would be desirable to use different values of vigilance for different category field nodes, in order to fit the data with a smaller number of categories. We therefore introduce two methods, the Activation Maximization Rule (AMR) and the Confliction Minimization Rule (CMR). Despite their differences, both ART with AMR (AM-ART) and with …


On Fuzzy Soft Matrix Based On Reference Function, Florentin Smarandache, Said Broumi, Mamoni Dhar Aug 2013

On Fuzzy Soft Matrix Based On Reference Function, Florentin Smarandache, Said Broumi, Mamoni Dhar

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper we study fuzzy soft matrix based on reference function. Firstly, we define some new operations such as fuzzy soft complement matrix and trace of fuzzy soft matrix based on reference function. Then, we introduced some related properties, and some examples are given. Lastly, we define a new fuzzy soft matrix decision method based on reference function.


Incremental And Accuracy-Aware Personalized Pagerank Through Scheduled Approximation, Fanwei Zhu, Yuan Fang, Kevin Chen-Chuan Chang, Jing Ying Aug 2013

Incremental And Accuracy-Aware Personalized Pagerank Through Scheduled Approximation, Fanwei Zhu, Yuan Fang, Kevin Chen-Chuan Chang, Jing Ying

Research Collection School Of Computing and Information Systems

As Personalized PageRank has been widely leveraged for ranking on a graph, the efficient computation of Personalized PageRank Vector (PPV) becomes a prominent issue. In this paper, we propose FastPPV, an approximate PPV computation algorithm that is incremental and accuracy-aware. Our approach hinges on a novel paradigm of scheduled approximation: the computation is partitioned and scheduled for processing in an "organized" way, such that we can gradually improve our PPV estimation in an incremental manner, and quantify the accuracy of our approximation at query time. Guided by this principle, we develop an efficient hub based realization, where we adopt the …


Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi Aug 2013

Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Malicious Uniform Resource Locator (URL) detection is an important problem in web search and mining, which plays a critical role in internet security. In literature, many existing studies have attempted to formulate the problem as a regular supervised binary classification task, which typically aims to optimize the prediction accuracy. However, in a real-world malicious URL detection task, the ratio between the number of malicious URLs and legitimate URLs is highly imbalanced, making it very inappropriate for simply optimizing the prediction accuracy. Besides, another key limitation of the existing work is to assume a large amount of training data is available, …


Robust Median Reversion Strategy For On-Line Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Steven Hoi, Shuigeng Zhou Aug 2013

Robust Median Reversion Strategy For On-Line Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Steven Hoi, Shuigeng Zhou

Research Collection School Of Computing and Information Systems

On-line portfolio selection has been attracting increasing interests from artificial intelligence community in recent decades. Mean reversion, as one most frequent pattern in financial markets, plays an important role in some state-of-the-art strategies. Though successful in certain datasets, existing mean reversion strategies do not fully consider noises and outliers in the data, leading to estimation error and thus non-optimal portfolios, which results in poor performance in practice. To overcome the limitation, we propose to exploit the reversion phenomenon by robust L1-median estimator, and design a novel on-line portfolio selection strategy named "Robust Median Reversion" (RMR), which makes optimal …