Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 4081 - 4110 of 6727
Full-Text Articles in Physical Sciences and Mathematics
A Study On The Application Of Information System In Patrol Vessel Management, Lei Li
A Study On The Application Of Information System In Patrol Vessel Management, Lei Li
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu
Research On The Establishment Of Promulgation System Of Maritime Safety Information In Chengshan Jiao Vts Center, Yunjiang Liu
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Hierarchical Classification And Its Application In University Search, Xiao Li
Hierarchical Classification And Its Application In University Search, Xiao Li
Electronic Thesis and Dissertation Repository
Web search engines have been adopted by most universities for searching webpages in their own domains. Basically, a user sends keywords to the search engine and the search engine returns a flat ranked list of webpages. However, in university search, user queries are usually related to topics. Simple keyword queries are often insufficient to express topics as keywords. On the other hand, most E-commerce sites allow users to browse and search products in various hierarchies. It would be ideal if hierarchical browsing and keyword search can be seamlessly combined for university search engines. The main difficulty is to automatically classify …
Building An Access Database For Cookstove Research, Margaret L. Weddle
Building An Access Database For Cookstove Research, Margaret L. Weddle
Student Works
This paper takes the reader through the thought process and actual instructions to create your own Microsoft Access database, or how to use the one provided with this paper. Also, instructions to use the HBLL resources of Compendex and RefWorks are covered. While this work was built specifically for Cookstoves research, it could be adapted to any research where you would need to maintain a record of the journal articles that you are using. It has been discovered that building a database is a time consuming and difficult work, but once done, Access provides an easy way to work with …
Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis
Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis
Kyriakos MOURATIDIS
In this paper we identify a novel query type, the top-K assignment query (αTop-K). Consider a set of objects and a set of suppliers, where each object must be assigned to one supplier. Assume that there is a cost associated with every object-supplier pair. If we allocate each object to the server with the smallest cost (for the specific object), the derived overall assignment will have the minimum total cost. In many scenarios, however, runner-up assignments may be required too, like for example when a decision maker needs to make additional considerations, not captured by individual object-supplier costs. In this …
Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis
Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis
Kyriakos MOURATIDIS
In this paper, we consider a new problem in the context of road network databases, named Resource Constrained Best Upgrade Plan computation (BUP, for short). Consider a transportation network (weighted graph) G where a subset of the edges are upgradable, i.e., for each such edge there is a cost, which if spent, the weight of the edge can be reduced to a specific new value. Given a source and a destination in G, and a budget (resource constraint) B, the BUP problem is to identify which upgradable edges should be upgraded so that the shortest path distance between source and …
Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder
Development Of A Jobs Database For Tracking Knowledge And Skills Expectations In The Workplace, Esa M. Rantanen, Christopher Claeys, Daniel Roder
Articles
The primary objective of college education in applied disciplines is that it is relevant to the expectations for new professionals entering the labor market. Academic institutions should therefore pay close attention to the ever-changing skills and knowledge expectations in the labor market. These trends are not easy to track, however. Surveys of new professionals about their experiences in their first jobs or surveys of employers about their experiences with new hires suffer from low response rates, nonresponse bias, and the one-time nature of survey research. A better way to track labor market trends is to continually analyze human factors job …
Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain
Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain
UVM Libraries Conference Day
Come learn about a great new tool for easily creating effective and engaging online tutorials built around the theory of active learning. The Guide on the Side was created by librarians at the University of Arizona and released as an open source download in 2012. We hope to soon have it installed for all to use at the UVM Libraries!
An Empirical Study On Uncertainty Identification In Social Media Context, Zhongyu Wei, Junwen Chen, Wei Gao, Binyang Li, Lanjun Zhou, Yulan He, Kam-Fai Wong
An Empirical Study On Uncertainty Identification In Social Media Context, Zhongyu Wei, Junwen Chen, Wei Gao, Binyang Li, Lanjun Zhou, Yulan He, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
Uncertainty text detection is important to many social-media-based applications since more and more users utilize social media platforms (e.g., Twitter, Facebook, etc.) as information source to produce or derive interpretations based on them. However, existing uncertainty cues are ineffective in social media context because of its specific characteristics. In this paper, we propose a variant of annotation scheme for uncertainty identification and construct the first uncertainty corpus based on tweets. We then conduct experiments on the generated tweets corpus to study the effectiveness of different types of features for uncertainty text identification.
Multi-View Discriminant Transfer Learning, Pei Yang Yang, Wei Gao
Multi-View Discriminant Transfer Learning, Pei Yang Yang, Wei Gao
Research Collection School Of Computing and Information Systems
We study to incorporate multiple views of data in a perceptive transfer learning framework and propose a Multi-view Discriminant Transfer (MDT) learning approach for domain adaptation. The main idea is to find the optimal discriminant weight vectors for each view such that the correlation between the two-view projected data is maximized, while both the domain discrepancy and the view disagreement are minimized simultaneously. Furthermore, we analyze MDT theoretically from discriminant analysis perspective to explain the condition and reason, under which the proposed method is not applicable. The analytical results allow us to investigate whether there exist within-view and/or betweenview conflicts, …
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper
University of New Orleans Theses and Dissertations
A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
University of New Orleans Theses and Dissertations
Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …
Semantic Assistance For Data Utilization And Curation, Brian J. Becker
Semantic Assistance For Data Utilization And Curation, Brian J. Becker
University of New Orleans Theses and Dissertations
We propose that most data stores for large organizations are ill-designed for the future, due to limited searchability of the databases. The study of the Semantic Web has been an emerging technology since first proposed by Berners-Lee. New vocabularies have emerged, such as FOAF, Dublin Core, and PROV-O ontologies. These vocabularies, combined, can relate people, places, things, and events. Technologies developed for the Semantic Web, namely the standardized vocabularies for expressing metadata, will make data easier to utilize. We gathered use cases for various data sources, from human resources to big enterprise. Most of our use cases reflect real-world data. …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly
Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly
Open Educational Resources
This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 1.8 "Lisboa", a cross-platform (Windows, Mac, Linux) desktop GIS software package.
Introduction To Management Information System, Umakant Mishra
Introduction To Management Information System, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.
MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
Flitecam Data Process Validation, Jesse K. Tsai, Sachindev S. Shenoy, Brent Cedric Nicklas, Zaheer Ali, William T. Reach
Flitecam Data Process Validation, Jesse K. Tsai, Sachindev S. Shenoy, Brent Cedric Nicklas, Zaheer Ali, William T. Reach
STAR Program Research Presentations
FLITECAM Data Processing Validation
Many of the challenges that come from working with astronomical imaging arise from the reduction of raw data into scientifically meaningful data. First Light Infrared Test CAMera (FLITECAM) is an infrared camera operating in the 1.0–5.5 μm waveband on board SOFIA (Stratospheric Observatory For Infrared Astronomy). Due to the significant noise from the atmosphere and the camera itself, astronomers have developed many methods to reduce the effects of atmospheric and instrumental emission. The FLITECAM Data Reduction Program (FDRP) is a program, developed at SOFIA Science Center, subtracts darks, removes flats, and dithers images.
This project contains …
Segmenting Tables Via Indexing Of Value Cells By Table Headers, Sharad C. Seth, George Nagy
Segmenting Tables Via Indexing Of Value Cells By Table Headers, Sharad C. Seth, George Nagy
CSE Conference and Workshop Papers
Correct segmentation of a web table into its component regions is the essential first step to understanding tabular data. Our algorithmic solution to the segmentation problem relies on the property that strings defining row and column header paths uniquely index each data cell in the table. We segment the table using only “logical layout analysis” without resorting to any appearance features or natural language understanding. We start with a CSV table that preserves the 2- dimensional structure and contents of the original source table (e.g., an HTML table) but not font size, font weight, and color. The indexing property of …
Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt
Economic Perspective On Cloud Computing: Three Essays, Abhijit Dutt
Theses and Dissertations
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can be hosted by different organizations in different locations provided it can be accessed using the Internet. This dissertation is an attempt to uncover unique aspects of this phenomenon known as Software as a Service (SaaS).
The first essay examines design decision making by SaaS providers by analyzing effects of two …
An Empirical Analysis Of A Network Of Expertise, Le Truc Viet, Minh Thap Nguyen
An Empirical Analysis Of A Network Of Expertise, Le Truc Viet, Minh Thap Nguyen
Research Collection School Of Computing and Information Systems
In this paper, we analyze the network of expertise constructed from the interactions of users on the online questionanswering (QA) community of Stack Overflow. This community was built with the intention of helping users with their programming tasks and, thus, questions are expected to be highly factual. This also indicates that the answers one provides may be highly indicative of one's level of expertise on the subject matter. Therefore, our main concern is how to model and characterize the user's expertise based on the constructed network and its centrality measures. We used the user's reputation established on Stack Overflow as …
Adaptive Collective Routing Using Gaussian Process Dynamic Congestion Models, Siyuan Liu, Yisong Yue, Ramayya Krishnan
Adaptive Collective Routing Using Gaussian Process Dynamic Congestion Models, Siyuan Liu, Yisong Yue, Ramayya Krishnan
Research Collection School Of Computing and Information Systems
We consider the problem of adaptively routing a fleet of cooperative vehicles within a road network in the presence of uncertain and dynamic congestion conditions. To tackle this problem, we first propose a Gaussian Process Dynamic Congestion Model that can effectively characterize both the dynamics and the uncertainty of congestion conditions. Our model is efficient and thus facilitates real-time adaptive routing in the face of uncertainty. Using this congestion model, we develop an efficient algorithm for non-myopic adaptive routing to minimize the collective travel time of all vehicles in the system. A key property of our approach is the ability …
Delayflow Centrality For Identifying Critical Nodes In Transportation Networks, Yew-Yih Cheng, Roy Ka Wei Lee, Ee-Peng Lim, Feida Zhu
Delayflow Centrality For Identifying Critical Nodes In Transportation Networks, Yew-Yih Cheng, Roy Ka Wei Lee, Ee-Peng Lim, Feida Zhu
Research Collection School Of Computing and Information Systems
In an urban city, its transportation network supports efficient flow of people between different parts of the city. Failures in the network can cause major disruptions to commuter and business activities which can result in both significant economic and time losses. In this paper, we investigate the use of centrality measures to determine critical nodes in a transportation network so as to improve the design of the network as well as to devise plans for coping with network failures. Most centrality measures in social network analysis research unfortunately consider only topological structure of the network and are oblivious of transportation …
Self-Organizing Cognitive Models For Virtual Agents, Yilin Kang, Ah-Hwee Tan
Self-Organizing Cognitive Models For Virtual Agents, Yilin Kang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Three key requirements of realistic characters or agents in virtual world can be identified as autonomy, interactivity, and personification. Working towards these challenges, this paper proposes a brain inspired agent architecture that integrates goal-directed autonomy, natural language interaction and human-like personification. Based on self-organizing neural models, the agent architecture maintains explicit mental representation of desires, intention, personalities, self-awareness, situation awareness and user awareness. Autonomous behaviors are generated via evaluating the current situation with active goals and learning the most appropriate social or goal-directed rule from the available knowledge, in accordance with the personality of each individual agent. We have built …
Vigilance Adaptation In Adaptive Resonance Theory, Lei Meng, Ah-Hwee Tan, Donald C. Winsch
Vigilance Adaptation In Adaptive Resonance Theory, Lei Meng, Ah-Hwee Tan, Donald C. Winsch
Research Collection School Of Computing and Information Systems
Despite the advantages of fast and stable learning, Adaptive Resonance Theory (ART) still relies on an empirically fixed vigilance parameter value to determine the vigilance regions of all of the clusters in the category field (F 2 ), causing its performance to depend on the vigilance value. It would be desirable to use different values of vigilance for different category field nodes, in order to fit the data with a smaller number of categories. We therefore introduce two methods, the Activation Maximization Rule (AMR) and the Confliction Minimization Rule (CMR). Despite their differences, both ART with AMR (AM-ART) and with …
On Fuzzy Soft Matrix Based On Reference Function, Florentin Smarandache, Said Broumi, Mamoni Dhar
On Fuzzy Soft Matrix Based On Reference Function, Florentin Smarandache, Said Broumi, Mamoni Dhar
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper we study fuzzy soft matrix based on reference function. Firstly, we define some new operations such as fuzzy soft complement matrix and trace of fuzzy soft matrix based on reference function. Then, we introduced some related properties, and some examples are given. Lastly, we define a new fuzzy soft matrix decision method based on reference function.
Incremental And Accuracy-Aware Personalized Pagerank Through Scheduled Approximation, Fanwei Zhu, Yuan Fang, Kevin Chen-Chuan Chang, Jing Ying
Incremental And Accuracy-Aware Personalized Pagerank Through Scheduled Approximation, Fanwei Zhu, Yuan Fang, Kevin Chen-Chuan Chang, Jing Ying
Research Collection School Of Computing and Information Systems
As Personalized PageRank has been widely leveraged for ranking on a graph, the efficient computation of Personalized PageRank Vector (PPV) becomes a prominent issue. In this paper, we propose FastPPV, an approximate PPV computation algorithm that is incremental and accuracy-aware. Our approach hinges on a novel paradigm of scheduled approximation: the computation is partitioned and scheduled for processing in an "organized" way, such that we can gradually improve our PPV estimation in an incremental manner, and quantify the accuracy of our approximation at query time. Guided by this principle, we develop an efficient hub based realization, where we adopt the …
Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi
Cost-Sensitive Online Active Learning With Application To Malicious Url Detection, Peilin Zhao, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Malicious Uniform Resource Locator (URL) detection is an important problem in web search and mining, which plays a critical role in internet security. In literature, many existing studies have attempted to formulate the problem as a regular supervised binary classification task, which typically aims to optimize the prediction accuracy. However, in a real-world malicious URL detection task, the ratio between the number of malicious URLs and legitimate URLs is highly imbalanced, making it very inappropriate for simply optimizing the prediction accuracy. Besides, another key limitation of the existing work is to assume a large amount of training data is available, …
Robust Median Reversion Strategy For On-Line Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Steven Hoi, Shuigeng Zhou
Robust Median Reversion Strategy For On-Line Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Steven Hoi, Shuigeng Zhou
Research Collection School Of Computing and Information Systems
On-line portfolio selection has been attracting increasing interests from artificial intelligence community in recent decades. Mean reversion, as one most frequent pattern in financial markets, plays an important role in some state-of-the-art strategies. Though successful in certain datasets, existing mean reversion strategies do not fully consider noises and outliers in the data, leading to estimation error and thus non-optimal portfolios, which results in poor performance in practice. To overcome the limitation, we propose to exploit the reversion phenomenon by robust L1-median estimator, and design a novel on-line portfolio selection strategy named "Robust Median Reversion" (RMR), which makes optimal …