Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4261 - 4290 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Accelerated Data Delivery Architecture, Michael L. Grecol Jan 2013

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …


Biodiversity Heritage Library, Smithsonian Institution Libraries, Deanna Marcum Jan 2013

Biodiversity Heritage Library, Smithsonian Institution Libraries, Deanna Marcum

Copyright, Fair Use, Scholarly Communication, etc.

The Biodiversity Heritage Library (BHL), created in 2006, is the result of a collaboration of ten natural history museum and botanical garden libraries seeking to digitize core taxonomic literature and to make it free and openly available throughout the world. Today, the BHL includes fifteen member institutions whose efforts have shaped a collection of over 60,000 titles. It is supported through a combination of membership dues, in-kind support from member institutions, contributions from the user community, and direct support from the Smithsonian Institution Libraries, and it reaches tens of thousands of users each year. While managing the complex partnership has …


Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Am Capretz, Ernesto Exposito Jan 2013

Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Am Capretz, Ernesto Exposito

Electrical and Computer Engineering Publications

Each year, a number of natural disasters strike across the globe, killing hundreds and causing billions of dollars in property and infrastructure damage. Minimizing the impact of disasters is imperative in today’s society. As the capabilities of software and hardware evolve, so does the role of information and communication technology in disaster mitigation, preparation, response, and recovery. A large quantity of disaster-related data is available, including response plans, records of previous incidents, simulation data, social media data, and Web sites. However, current data management solutions offer few or no integration capabilities. Moreover, recent advances in cloud computing, big data, and …


Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh Jan 2013

Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh

USF Tampa Graduate Theses and Dissertations

Regardless all the advantages of MPs, it has not reach the sizable customer base. In this paper, we examined the core drivers of using mobile payments (MPs) in restaurant industry from the consumers' perspective. Based on the Technology Acceptance Model (TAM), we developed a six factor model to reveal the determinants of consumers' intention to use MPs in restaurant. Security, subjective norm, compatibility with lifestyle, and previous experience with MPs were added to the traditional two factor TAM model (usefulness and ease of use). 300 respondents were recruited from an online survey agency and 258 valid responses were included in …


Online Examination System, Yuvesh Kumar Singh Jan 2013

Online Examination System, Yuvesh Kumar Singh

Theses Digitization Project

The purpose of this project focused on how to implement a secure environment for online-examination in an academic and business environment without the need of any special network topologies and hardware devices. It will not only reduce the instructor's load, but will also enhance the system flexibility to fit every instructor's needs and from the examinees point of view. Contains source code.


Ticketing And Event Management Web Service, Nikolay Figurin Jan 2013

Ticketing And Event Management Web Service, Nikolay Figurin

Theses Digitization Project

The purpose of this project was creating a web based application that included: user account creation, event creation per user, tiered ticket sales per event, search capabilities, a focus on scalability and data redundancy, a focus on verification of event creator identities and administration features, a focus on account expandability, an ability to easily expand functionality, ease of migration and stability, low and inexpensive maintenance, as well as an optimal framework relying on a platform as a service content delivery network with the option of database abstraction.


Online Graduate Application System, You Li Jan 2013

Online Graduate Application System, You Li

Theses Digitization Project

The purpose of Online Graduate Application System (OGAS) is to allow potential Computer Science and Engineering graduate students to submit and track their online applications. In addition, applicants can change and modify their references via OGAS. As part of the application requirements, the system will allow recommenders to submit and /or upload their recommendations online.


Seller Diversity On A Technology-Based Platform, Ruhai Wu, Mei Lin Jan 2013

Seller Diversity On A Technology-Based Platform, Ruhai Wu, Mei Lin

Research Collection School Of Computing and Information Systems

Managing a technology portfolio is one of the great challenges for sustained success, especially in high-technology industrieswhere technologies can be a major selling point. For engineers, this portfolio is more of a toolbox for solving design problems,but in large organizations there can be so many technologies used in different business areas that even the engineers may not beaware of all of them. When the same technologies are used in different types of products, knowledge about them can also begenerated by various groups within an organization. To improve the usefulness of a company's technology base, this paperproposes the use of a …


Multimedia Recommendation: Technology And Techniques, Jialie Shen, Meng Wang, Shuicheng Yan, Peng Cui Jan 2013

Multimedia Recommendation: Technology And Techniques, Jialie Shen, Meng Wang, Shuicheng Yan, Peng Cui

Research Collection School Of Computing and Information Systems

In recent years, we have witnessed a rapid growth in the availability of digital multimedia on various application platforms and domains. Consequently, the problem of information overload has become more and more serious. In order to tackle the challenge, various multimedia recommendation technologies have been developed by different research communities (e.g., multimedia systems, information retrieval, machine learning and computer version). Meanwhile, many commercial web systems (e.g., Flick, YouTube, and Last.fm) have successfully applied recommendation techniques to provide users personalized content and services in a convenient and flexible way. When looking back, the information retrieval (IR) community has a long history …


Hypergraph Index: An Index For Context-Aware Nearest Neighbor Query On Social Networks, Yazhe Wang, Baihua Zheng Jan 2013

Hypergraph Index: An Index For Context-Aware Nearest Neighbor Query On Social Networks, Yazhe Wang, Baihua Zheng

Research Collection School Of Computing and Information Systems

Social network has been touted as the No. 2 innovation in a recent IEEE Spectrum Special Report on “Top 11 Technologies of the Decade”, and it has cemented its status as a bona fide Internet phenomenon. With more and more people starting using social networks to share ideas, activities, events, and interests with other members within the network, social networks contain a huge amount of content. However, it might not be easy to navigate social networks to find specific information. In this paper, we define a new type of queries, namely context-aware nearest neighbor (CANN) search over social network to …


Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh Jan 2013

Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh

USF Tampa Graduate Theses and Dissertations

The goal of this dissertation is to investigate the enabling role that agent based simulation plays in business and policy. The aforementioned issue has been addressed in this dissertation through three distinct, but related essays. The first essay is a literature review of different research applications of agent based simulation in various business disciplines, such as finance, economics, information systems, management, marketing and accounting. Various agent based simulation tools to develop computational models are discussed. The second essay uses an agent-based simulation approach to study important properties of the widely used most popular news recommender systems (NRS). This essay highlights …


Multiple Bounding Boxes Algorithm In Collision Detection And Its Performances In Sequential Vs Cuda Parallel Processing, Min Qi Jan 2013

Multiple Bounding Boxes Algorithm In Collision Detection And Its Performances In Sequential Vs Cuda Parallel Processing, Min Qi

Electronic Theses and Dissertations

The traditional method for detecting collisions in a 2D computer game uses a axisaligned bounding box around each sprite, and checks to determine if the bounding boxes overlap periodically. Using this single bounding box method may result in a large amount of pixel intersection tests, since a sprite may be composed of areas where the pixels are empty and the intersecting bounding box test results in false positives.

Our algorithm analysis shows that the optimal two or three bounding boxes is the best partition we can get for a reasonable time complexity. The results further show significantly diminishing returns for …


Do Personality Tests Have A Place In Academic Preparation Of Undergradute Hospitality Students, Gunce Malan Jan 2013

Do Personality Tests Have A Place In Academic Preparation Of Undergradute Hospitality Students, Gunce Malan

USF Tampa Graduate Theses and Dissertations

This is a descriptive study that poses the questions and discussion regarding use of personality tests in prediction of future job performance of the current undergraduate hospitality students. A gap exists between the perception of the skills and competencies of high performers and the perception of hospitality students (Berezina et al., 2011; Malan, Berezina & Cobanoglu, 2012). The purpose of this study is to investigate if personality tests will help in predicting the success of students in their preferred job setting as compared to current high performers (managers).

The use of personality tests increased substantially after 1988, when the government …


Effects Of Virtual Reality On The Cognitive Memory And Handgun Accuracy Development Of Law Enforcement Neophytes, Richard A. Wright Jan 2013

Effects Of Virtual Reality On The Cognitive Memory And Handgun Accuracy Development Of Law Enforcement Neophytes, Richard A. Wright

USF Tampa Graduate Theses and Dissertations

Abstract

The purpose of this research was to investigate the effects of virtual reality training on the development of cognitive memory and handgun accuracy by law enforcement neophytes. One hundred and six academy students from 6 different academy classes were divided into two groups, experimental and control. The experimental group was exposed to virtual reality training for a period of 8 hours. The control group was exposed to the traditional, non-interactive training that occurred on a gun range, also for a period of 8 hours. After exposing the groups to their respective training, a counter-balance technique was utilized to expose …


Dynamic Processes In Network Goods: Modeling, Analysis And Applications, Arnut Paothong Jan 2013

Dynamic Processes In Network Goods: Modeling, Analysis And Applications, Arnut Paothong

USF Tampa Graduate Theses and Dissertations

The network externality function plays a very important role in the study of economic network industries. Moreover, the consumer group dynamic interactions coupled with network externality concept is going to play a dominant role in the network goods in the 21st century. The existing literature is stemmed on a choice of externality function with certain quantitative properties. The utility function coupled with the network externality function is used to investigate static properties of rational equilibrium. The aim of this work is to systematically initiate a development of quantitative effects of the concept of network externality and its influence on the …


The Problem Of Semantics In The Metadata Mess, Veronika Margaret Megler, David Maier Jan 2013

The Problem Of Semantics In The Metadata Mess, Veronika Margaret Megler, David Maier

Computer Science Faculty Publications and Presentations

This presentation addresses problems related to the volume of available scientific data, and its accessibility or inaccessibility to researchers who seek it. Topics addressed include metadata and reducing semantic diversity, especially as they refer to geospatial and other architectures


Taming The Metadata Mess, Veronika Margaret Megler Jan 2013

Taming The Metadata Mess, Veronika Margaret Megler

Computer Science Faculty Publications and Presentations

The rapid growth of scientific data shows no sign of abating. This growth has led to a new problem: with so much scientific data at hand, stored in thousands of datasets, how can scientists find the datasets most relevant to their research interests? We have addressed this problem by adapting Information Retrieval techniques, developed for searching text documents, into the world of (primarily numeric) scientific data. We propose an approach that uses a blend of automated and “semi-curated” methods to extract metadata from large archives of scientific data, then evaluates ranked searches over this metadata. We describe a challenge identified …


Engagingness And Responsiveness Behavior Models On The Enron Email Network And Its Application To Email Reply Order Prediction, Byung-Won On, Ee Peng Lim, Jing Jiang, Loo Nin Teow Jan 2013

Engagingness And Responsiveness Behavior Models On The Enron Email Network And Its Application To Email Reply Order Prediction, Byung-Won On, Ee Peng Lim, Jing Jiang, Loo Nin Teow

Research Collection School Of Computing and Information Systems

In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users are those who can effectively solicit responses from other users. Responsive users are those who are willing to respond to other users. By modeling such behaviors, we are able to mine them and to identify engaging or responsive …


Cqarank: Jointly Model Topics And Expertise In Community Question Answering, Liu Yang, Minghui Qiu, Swapna Gottopati, Feida Zhu, Jing Jiang, Huiping Sun, Zhong Chen Jan 2013

Cqarank: Jointly Model Topics And Expertise In Community Question Answering, Liu Yang, Minghui Qiu, Swapna Gottopati, Feida Zhu, Jing Jiang, Huiping Sun, Zhong Chen

Research Collection School Of Computing and Information Systems

Community Question Answering (CQA) websites, where people share expertise on open platforms, have become large repositories of valuable knowledge. To bring the best value out of these knowledge repositories, it is critically important for CQA services to know how to find the right experts, retrieve archived similar questions and recommend best answers to new questions. To tackle this cluster of closely related problems in a principled approach, we proposed Topic Expertise Model (TEM), a novel probabilistic generative model with GMM hybrid, to jointly model topics and expertise by integrating textual content model and link structure analysis. Based on TEM results, …


Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle Jan 2013

Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First slide]

The Problem

Institutional Tools, Personal Archivists

  • ON YOUR MACHINE

-Complex to Operate

-Require Infrastructure

  • DELEGATED TO INSTITUTIONS

-$$$

-Lose original perspective

  • Locale content tailoring (DC vs. San Francisco)
  • Observation Medium (PC web browser vs. Crawler)


A Technical Framework For Resource Synchronization, Martin Klein, Robert Sanderson, Herbert Van De Sompel, Simeon Warner, Bernhard Haslhofer, Carl Lagoze, Michael L. Nelson Jan 2013

A Technical Framework For Resource Synchronization, Martin Klein, Robert Sanderson, Herbert Van De Sompel, Simeon Warner, Bernhard Haslhofer, Carl Lagoze, Michael L. Nelson

Computer Science Faculty Publications

This is the second paper in D-Lib Magazine about the ResourceSync effort conducted by the National Information Standards Organization (NISO) and the Open Archives Initiative (OAI). The first part provided a perspective on the resource synchronization problem and introduced a template that organized possible components of a resource synchronization framework in a modular manner. This paper details a technical framework devised using that template.


Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen Jan 2013

Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen

Dissertations and Theses Collection (Open Access)

With rapid growth of transportation demands in urban cities, one major challenge is to provide efficient and effective door-to-door service to passengers using the public transportation system. This is commonly known as the Last Mile problem. In this thesis, we consider a dynamic and demand responsive mechanism for Ridesharing on a non-dedicated commercial fleet (such as taxis). This problem is addressed as two sub-problems, the first of which is a special type of vehicle routing problems (VRP). The second sub-problem, which is more challenging, is to allocate the cost (i.e. total fare) fairly among passengers. We propose auction mechanisms where …


Impact Of Multimedia In Sina Weibo, Xun Zhao Jan 2013

Impact Of Multimedia In Sina Weibo, Xun Zhao

Dissertations and Theses Collection (Open Access)

Multimedia contents such as images and videos are widely used in social network sites nowadays. Sina Weibo, a Chinese microblogging service, is one of the first microblog platforms to incorporate multimedia content sharing features. This thesis provides statistical analysis on how multimedia contents are produced, consumed, and propagated in Sina Weibo. Based on 230 million tweets and 1.8 million user profiles in Sina Weibo, we study the impact of multimedia contents on the popularity of both users and tweets as well as tweet life span. In addition to consider the multimedia impact on popularity, we also compare the user influence …


Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa Jan 2013

Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa

Theses and Dissertations--Computer Science

Data are valuable assets to any organizations or individuals. Data are sources of useful information which is a big part of decision making. All sectors have potential to benefit from having information. Commerce, health, and research are some of the fields that have benefited from data. On the other hand, the availability of the data makes it easy for anyone to exploit the data, which in many cases are private confidential data. It is necessary to preserve the confidentiality of the data. We study two categories of privacy: Data Value Hiding and Data Pattern Hiding. Privacy is a huge concern …


Towards Efficient Sparse Coding For Scalable Image Annotation, Junshi Huang, Hairong Liu, Jialie Shen, Shuicheng Yan Jan 2013

Towards Efficient Sparse Coding For Scalable Image Annotation, Junshi Huang, Hairong Liu, Jialie Shen, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Nowadays, content-based retrieval methods are still the development trend of the traditional retrieval systems. Image labels, as one of the most popular approaches for the semantic representation of images, can fully capture the representative information of images. To achieve the high performance of retrieval systems, the precise annotation for images becomes inevitable. However, as the massive number of images in the Internet, one cannot annotate all the images without a scalable and flexible (i.e., training-free) annotation method. In this paper, we particularly investigate the problem of accelerating sparse coding based scalable image annotation, whose off-the-shelf solvers are generally inefficient on …


Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia, Yunous Vagh Jan 2013

Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia, Yunous Vagh

Theses: Doctorates and Masters

Climate change and the reduction of available agricultural land are two of the most important factors that affect global food production especially in terms of wheat stores. An ever increasing world population places a huge demand on these resources. Consequently, there is a dire need to optimise food production.

Estimations of crop yield for the South West agricultural region of Western Australia have usually been based on statistical analyses by the Department of Agriculture and Food in Western Australia. Their estimations involve a system of crop planting recommendations and yield prediction tools based on crop variety trials. However, many crop …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang Dec 2012

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …


Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win Dec 2012

Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win

Dr Khin Win

The ultimate objectives of this study are to describe teleconsultation activities and explore the benefits of teleconsultation technology in the context of public health care environment in Malaysia. The materials of this study were based on an exploratory mixed method studies involving semi-structured interviews with key informants and questionnaires survey of health care providers to obtain information about existing teleconsultation activities as well as to uncover the benefits of teleconsultation technology. The notable benefits from teleconsultation implementation were further discussed. The findings confirmed that teleconsultation service has improved health care delivery in the underserved areas to consult with specialist. One …


Application Of Web Mashup Technology To Oyster Information Services, Christian Chuindja Ngniah Dec 2012

Application Of Web Mashup Technology To Oyster Information Services, Christian Chuindja Ngniah

University of New Orleans Theses and Dissertations

Web mashup is a lightweight technology used to integrate data from remote sources without direct access to their databases. As a data consumer, a Web mashup application creates new contents by retrieving data through the Web application programming interface (API) provided by the external sources. As a data provider, the service program publishes its Web API and implements the specified functions.

In the project reported by this thesis, we have implemented two Web mashup applications to enhance the Web site oystersentinel.org: the Perkinsus marinus model and the Oil Spill model. Each model overlay geospatial data from a local database …