Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4441 - 4470 of 6727

Full-Text Articles in Physical Sciences and Mathematics

A Software Framework For Augmentative And Alternative Communication, Adam Loup May 2012

A Software Framework For Augmentative And Alternative Communication, Adam Loup

University of New Orleans Theses and Dissertations

By combining context awareness and analytical based relevance computing software, the proposed Augmentative and Alternative Communication (AAC) framework aims provide a foundation to create communication systems to dramatically increase the words available to AAC users. The framework will allow the lexicon available to the user to be dynamically updated by varying sources and to promote words based on contextual relevance. This level of customization enables the development of highly customizable AAC devices that evolve with use to become more personal while also broadening the expressiveness of the user. In order to maximize the efficient creation of conversation for AAC users, …


Discontinuities And Best Practices In Virtual Research Collaboration, Vipin Arora, Deepak Khazanchi, Bjørn Erik Munkvold, Dawn Owens, Karen Stendal, Alvin Tarrell, Adeola Wale-Kolade, Sofi Westin, Ilze Zigurs May 2012

Discontinuities And Best Practices In Virtual Research Collaboration, Vipin Arora, Deepak Khazanchi, Bjørn Erik Munkvold, Dawn Owens, Karen Stendal, Alvin Tarrell, Adeola Wale-Kolade, Sofi Westin, Ilze Zigurs

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Research collaboration has become increasingly global, as collaboration technologies continue to advance and as research problems become more interdisciplinary and global. Virtual research teams have processes and challenges that are unique from a typical virtual team, and we need a better understanding of how such teams can utilize virtual research environments to their advantage. We examine this question from a review of the relevant literature and an analysis of experiences and reflections from a doctoral seminar that studied and experienced the process of virtual research collaboration.


Extending Description Logic Rules, David Carral Martinez, Pascal Hitzler May 2012

Extending Description Logic Rules, David Carral Martinez, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Description Logics – the logics underpinning the Web Ontology Language OWL – and rules are currently the most prominent paradigms used for modeling knowledge for the Semantic Web. While both of these approaches are based on classical logic, the paradigms also differ significantly, so that naive combinations result in undesirable properties such as undecidability. Recent work has shown that many rules can in fact be expressed in OWL. In this paper we extend this work to include some types of rules previously excluded. We formally define a set of first order logic rules, C-Rules, which can be expressed within OWL …


Method And Apparatus For Rapid Identification Of Column Heterogeneity, Bing Tian Dai, Nikolaos Koudas, Beng Chin Ooi, Divesh Srivastava, Suresh Venkatasubranmanian May 2012

Method And Apparatus For Rapid Identification Of Column Heterogeneity, Bing Tian Dai, Nikolaos Koudas, Beng Chin Ooi, Divesh Srivastava, Suresh Venkatasubranmanian

Research Collection School Of Computing and Information Systems

A method and apparatus for rapid identification of column heterogeneity in databases are disclosed. For example, the method receives data associated with a column in a database. The method computes a cluster entropy for the data as a measure of data heterogeneity and then determines whether said data is heterogeneous in accordance with the cluster entropy.


Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss May 2012

Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss

The African Journal of Information Systems

In this paper, the author contends that if the outsider-researcher involved in Information and Communication Technology for Development really wants to make a difference and honestly address the emancipatory interests of the developing community, social transformation will have to occur on both sides of the “development divide.” This statement implies both an understanding of the researcher’s own ethnocentrism, prejudice, assumptions and inabilities as well as local concerns, needs, expectations and realities. Using critical social theory as a position of inquiry and learning from the enculturation phases of critical ethnographic fieldwork in a deep rural part of South Africa, the paper …


Pamr: Passive-Aggressive Mean Reversion Strategy For Portfolio Selection, Bin Li, Peilin Zhao, Steven C. H. Hoi, Vivekanand Gopalkrishnan May 2012

Pamr: Passive-Aggressive Mean Reversion Strategy For Portfolio Selection, Bin Li, Peilin Zhao, Steven C. H. Hoi, Vivekanand Gopalkrishnan

Research Collection School Of Computing and Information Systems

This project proposes a novel online portfolio selection strategy named ``Passive Aggressive Mean Reversion" (PAMR). Unlike traditional trend following approaches, the proposed approach relies upon the mean reversion relation of financial markets. Equipped with online passive aggressive learning technique from machine learning, the proposed portfolio selection strategy can effectively exploit the mean reversion property of markets. By analyzing PAMR's update scheme, we find that it nicely trades off between portfolio return and volatility risk and reflects the mean reversion trading principle. We also present several variants of PAMR algorithm, including a mixture algorithm which mixes PAMR and other strategies. We …


Organizing User Search Histories, Heasoo Hwang, Hady W. Lauw, Lise Getoor, Alexandros Ntoulas May 2012

Organizing User Search Histories, Heasoo Hwang, Hady W. Lauw, Lise Getoor, Alexandros Ntoulas

Research Collection School Of Computing and Information Systems

Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases. To this end, they usually break down the tasks into a few codependent steps and issue multiple queries around these steps repeatedly over long periods of time. To better support users in their long-term information quests on the web, search engines keep track of their queries and clicks while searching online. In this paper, we study the problem of organizing a user's historical queries into groups in a dynamic and automated fashion. Automatically identifying query groups is helpful for a …


Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan May 2012

Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan

Graduate Theses and Dissertations

Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention mechanisms, sophisticated insiders still continue to attack a database with new techniques. One such technique which remains an advantage for insiders to attack databases is the dependency relationship among data items. This thesis investigates the ways by which an authorized insider detects dependencies in order to perform malicious write operations. The goal is to monitor malicious write operations performed by an insider by taking advantage of dependencies. A term called `threshold' is associated with every data …


Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis May 2012

Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

Wireless data broadcasting is a promising technique for information dissemination that exploits the computational capabilities of mobile devices, in order to enhance the scalability of the system. Under this environment, the data are continuously broadcast by the server, interleaved with some indexing information for query processing. Clients may tune in the broadcast channel and process their queries locally without contacting the server. In this paper we focus on spatial queries in particular. First, we review existing methods on this topic. Next, taking shortest path computation as an example, we showcase technical challenges arising in this processing model and describe techniques …


Organizational Search In Email Systems, Sruthi Bhushan Pitla May 2012

Organizational Search In Email Systems, Sruthi Bhushan Pitla

Masters Theses & Specialist Projects

The storage space for emails has been increasing at a rapid pace day by day. Email systems still serve as very important data repositories for many users to store different kinds of information which they use in their daily activities. Due to the rapidly increasing volume of email data, there is a need to maintain the data in a most efficient way. It is also very important to provide intuitive and flexible search utilities to provide better access to the information in the email repositories, especially in an enterprise or organizational setting. In order to implement the functionality, we are …


Ensemble Of Feature Selection Techniques For High Dimensional Data, Sri Harsha Vege May 2012

Ensemble Of Feature Selection Techniques For High Dimensional Data, Sri Harsha Vege

Masters Theses & Specialist Projects

Data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships from large amounts of data stored in databases, data warehouses, or other information repositories. Feature selection is an important preprocessing step of data mining that helps increase the predictive performance of a model. The main aim of feature selection is to choose a subset of features with high predictive information and eliminate irrelevant features with little or no predictive information. Using a single feature selection technique may generate local optima.

In this thesis we propose an ensemble approach for feature selection, where multiple …


Dynamic Data Extraction And Data Visualization With Application To The Kentucky Mesonet, Anoop Rao Paidipally May 2012

Dynamic Data Extraction And Data Visualization With Application To The Kentucky Mesonet, Anoop Rao Paidipally

Masters Theses & Specialist Projects

There is a need to integrate large-scale database, high-performance computing engines and geographical information system technologies into a user-friendly web interface as a platform for data visualization and customized statistical analysis. We present some concepts and design ideas regarding dynamic data storage and extraction by making use of open-source computing and mapping technologies. We implemented our methods to the Kentucky Mesonet automated weather mapping workflow. The main components of the work flow includes a web based interface, a robust database and computing infrastructure designed for both general users and power users such as modelers and researchers.


Hearts And Minds: Examining The Evolution Of The Egyptian Excerebration And Evisceration Traditions Through The Impact Mummy Database, Andrew D. Wade Apr 2012

Hearts And Minds: Examining The Evolution Of The Egyptian Excerebration And Evisceration Traditions Through The Impact Mummy Database, Andrew D. Wade

Electronic Thesis and Dissertation Repository

Egyptian mummification and funerary rituals were a transformative process, making the deceased a pure being; free of disease, injury, and disfigurements, as well as ethical and moral impurities. Consequently, the features of mummification available to specific categories of individuals hold social and ideological significance. This study refutes long-held classical stereotypes, particularly dogmatic class associations; demonstrates the apocryphal nature of universal heart retention; and expands on the purposes of excerebration and evisceration implied by synthetic and radiological analyses.

Features of the embalming traditions, specifically the variable excerebration and evisceration traditions, represented the Egyptian view of death. Fine-grain analyses, through primary imaging …


User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria Apr 2012

User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria

DLPS Faculty Publications

An analysis and comparison of two genealogical databases: Ancestry.com and Heritagequest.com.


Asynchronous Ultrasonic Trilateration For Indoor Positioning Of Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell Apr 2012

Asynchronous Ultrasonic Trilateration For Indoor Positioning Of Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell

Conference papers

In this paper we discuss how the innate ability of mobile phone speakers to produce ultrasound can be used for accurate indoor positioning. The frequencies in question are in a range between 20 and 22 KHz, which is high enough to be inaudible by humans but still low enough to be generated by today’s mobile phone sound hardware. Our tests indicate that it is possible to generate the given range of frequencies without significant distortions, provided the signal volume is not turned excessively high. In this paper we present and evaluate the accuracy of our asynchronous trilateration method (Lok8) for …


Effects Of Variations In 3d Spatial Search Techniques On Mobile Query Speed Vs Accuracy, Junjun Yin, James Carswell Apr 2012

Effects Of Variations In 3d Spatial Search Techniques On Mobile Query Speed Vs Accuracy, Junjun Yin, James Carswell

Conference papers

This paper presents three Spatial Search Algorithms for determiningthe three dimensional visibility shape (threat dome) at a user’s current locationin a built environment. Users then utilize this 3D shape as their query“window” to retrieve information on only those objects visible within a spatialdatabase. Visibility shape searching addresses the information overloadproblem by providing “Hidden Query Removal” functionality for mobile LBS.This functionality will be especially useful in the Web 4.0 era when trillions ofmicro-sensors become available for query through standard IP access.


Mining Social Dependencies In Dynamic Interaction Networks, Freddy Chong-Tat Chua, Hady W. Lauw, Ee Peng Lim Apr 2012

Mining Social Dependencies In Dynamic Interaction Networks, Freddy Chong-Tat Chua, Hady W. Lauw, Ee Peng Lim

Research Collection School Of Computing and Information Systems

User-to-user interactions have become ubiquitous in Web 2.0. Users exchange emails, post on newsgroups, tag web pages, co-author papers, etc. Through these interactions, users co-produce or co-adopt content items (e.g., words in emails, tags in social bookmarking sites). We model such dynamic interactions as a user interaction network, which relates users, interactions, and content items over time. After some interactions, a user may produce content that is more similar to those produced by other users previously. We term this effect social dependency, and we seek to mine from such networks the degree to which a user may be socially dependent …


Structural Analysis In Multi-Relational Social Networks, Bing Tian Dai, Freddy Chong Tat Chua, Ee-Peng Lim Apr 2012

Structural Analysis In Multi-Relational Social Networks, Bing Tian Dai, Freddy Chong Tat Chua, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Modern social networks often consist of multiple relationsamong individuals. Understanding the structureof such multi-relational network is essential. In sociology,one way of structural analysis is to identify differentpositions and roles using blockmodels. In thispaper, we generalize stochastic blockmodels to GeneralizedStochastic Blockmodels (GSBM) for performing positionaland role analysis on multi-relational networks.Our GSBM generalizes many different kinds of MultivariateProbability Distribution Function (MVPDF) tomodel different kinds of multi-relational networks. Inparticular, we propose to use multivariate Poisson distributionfor multi-relational social networks. Our experimentsshow that GSBM is able to identify the structuresfor both synthetic and real world network data.These structures can further be used for predicting …


Motivated Learning For The Development Of Autonomous Agents, Janusz A. Starzyk, James T. Graham, Pawel Raif, Ah-Hwee Tan Apr 2012

Motivated Learning For The Development Of Autonomous Agents, Janusz A. Starzyk, James T. Graham, Pawel Raif, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

A new machine learning approach known as motivated learning (ML) is presented in this work. Motivated learning drives a machine to develop abstract motivations and choose its own goals. ML also provides a self-organizing system that controls a machine’s behavior based on competition between dynamically-changing pain signals. This provides an interplay of externally driven and internally generated control signals. It is demonstrated that ML not only yields a more sophisticated learning mechanism and system of values than reinforcement learning (RL), but is also more efficient in learning complex relations and delivers better performance than RL in dynamically changing environments. In …


Obfuscating The Topical Intention In Enterprise Text Search, Hwee Hwa Pang, Xiaokui Xiao, Jialie Shen Apr 2012

Obfuscating The Topical Intention In Enterprise Text Search, Hwee Hwa Pang, Xiaokui Xiao, Jialie Shen

Research Collection School Of Computing and Information Systems

The text search queries in an enterprise can reveal the users' topic of interest, and in turn confidential staff or business information. To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered. In this paper, we advocate a unique approach to profile the topics that are relevant to the user intention. Based on this approach, we introduce an (ε 1, ε 2)-privacy model that allows a user to stipulate that topics relevant to her intention …


Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris Apr 2012

Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris

Doctoral Dissertations and Master's Theses

This study was conducted to investigate the effect of smart parking systems (SPS) on parking search times (PST) in large parking lots. SPSs are systems that disseminate real-time parking spot availability to drivers searching for parking. The literature review revealed discrete event simulation (DES) to be a suitable tool for studying the dynamic behavior in parking lots. The parking lot selected for data collection was a university parking lot with 234 spaces. The data collected included arrival rates, departure rates, the geometric properties of the parking lot, preferred parking search strategies, and driving speeds. Arena 13.9, by Rockwell Automation, Inc, …


Commodity Tracker: A Mobile Tool To Collect Regional Food Prices Across Haiti, Christopher D. Nobile Apr 2012

Commodity Tracker: A Mobile Tool To Collect Regional Food Prices Across Haiti, Christopher D. Nobile

Senior Theses and Projects

The Commodity Tracker is an Android Application developed on Trinity’s Portable Open Search and Identification Tool (POSIT). It is designed for users to collect pricing information primarily on food prices in field conditions in Haiti. The ACDI/VOCA organization sends field agents into the rural areas of Haiti regularly to collect data on the prices of local food items. This data is used to determine the distribution of food items through the USAID organization, using price to measure scarcity. Infrastructural issues make this a time consuming process, especially with regards to sending data from the field to the central servers in …


Detecting Extreme Rank Anomalous Collections, Hanbo Dai, Feida Zhu, Ee-Peng Lim, Hwee Hwa Pang Apr 2012

Detecting Extreme Rank Anomalous Collections, Hanbo Dai, Feida Zhu, Ee-Peng Lim, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Anomaly or outlier detection has a wide range of applications, including fraud and spam detection. Most existing studies focus on detecting point anomalies, i.e., individual, isolated entities. However, there is an increasing number of applications in which anomalies do not occur individually, but in small collections. Unlike the majority, entities in an anomalous collection tend to share certain extreme behavioral traits. The knowledge essential in understanding why and how the set of entities becomes outliers would only be revealed by examining at the collection level. A good example is web spammers adopting common spamming techniques. To discover this kind of …


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …


The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson Mar 2012

The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson

Jason A Bengtson

Mobile technology has exploded, with many libraries experiencing a surge in access to their resources through mobile devices. In response, many institutions have created or are creating mobile sites designed to accommodate themselves to the unique strictures of these devices. One hurdle faced by these organizations, however, is getting mobile users to those sites. One solution is mobile redirect scripts, which automatically redirect mobile users from a regular page to a mobile page. These scripts come in various forms and present unique challenges to libraries. How are these scripts created? What triggers can or should be used to activate them? …


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …


Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig Mar 2012

Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig

Dr Xiaoxun Sun

Distributed constraint optimization problems (DCOPs) are well-suited for modeling multi-agent coordination problems. However, most research has focused on developing algorithms for solving static DCOPs. In this paper, we model dynamic DCOPs as sequences of (static) DCOPs with changes from one DCOP to the next one in the sequence. We introduce the ReuseBounds procedure, which can be used by any-space ADOPT and any-space BnB-ADOPT to find cost-minimal solutions for all DCOPs in the sequence faster than by solving each DCOP individually. This procedure allows those agents that are guaranteed to remain unaffected by a change to reuse their lower and upper …


Mixing Them Up: Group Work With Nesb Students, Mark Freeman Mar 2012

Mixing Them Up: Group Work With Nesb Students, Mark Freeman

Dr Mark Freeman

This paper describes the implementation of a Problem-Based Learning assessment in a postgraduate ICT fundamentals subject. With an entirely international student cohort drawn from 14 countries, many students had never participated in group work. To facilitate student adjustment into the Australian educational environment, and develop understanding of the role and importance of group work, students were educated in group work theory prior to engaging in the group work process. The experiences of both teaching staff and students identified a number of positive outcomes resulting from this approach.


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …