Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 4741 - 4770 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Trends In Phishing Attacks: Suggestions For Future Research, Ryan M. Schuetzler
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
Deception in computer-mediated communication is a widespread phenomenon. Cyber criminals are exploiting technological mediums to communicate with potential targets as these channels reduce both the deception cues and the risk of detection itself. A prevalent deception-based attack in computer-mediated communication is phishing. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing emails and websites, and the development of technologies that can aid users in identifying and rejecting these attacks. Despite the extant research on this topic, phishing attacks continue to be successful as …
Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal
Role Of Cloud Computing Interventions For Micro-Enterprise Growth: Implications For Global Development, Sajda Qureshi, Mehruz Kamal
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
While the majority of businesses around the world are micro-enterprises, they are the most vulnerable and are often run by people with limited resources, and skills to be able to avail the benefits of Information and Communication Technologies (ICTs). These are a form of small business which employs between 1-5 people and face challenges of limited resources, skills and ability to grow. When they do adopt IT their potential to survive and grow increases as they are then able to participate in the global economy. The challenge for global development lies in enabling these micro-enterprises to adopt the appropriate IT …
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Kno.e.sis Publications
Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …
A Unified Framework Fro Managing Provenance Information In Translational Research, Satya S. Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, Amit P. Sheth
A Unified Framework Fro Managing Provenance Information In Translational Research, Satya S. Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, Amit P. Sheth
Kno.e.sis Publications
Background
A critical aspect of the NIH Translational Research roadmap, which seeks to accelerate the delivery of "bench-side" discoveries to patient's "bedside," is the management of the provenance metadata that keeps track of the origin and history of data resources as they traverse the path from the bench to the bedside and back. A comprehensive provenance framework is essential for researchers to verify the quality of data, reproduce scientific results published in peer-reviewed literature, validate scientific process, and associate trust value with data and results. Traditional approaches to provenance management have focused on only partial sections of the translational research …
Introduction To Gis Using Open Source Software, 1st Ed, Frank Donnelly
Introduction To Gis Using Open Source Software, 1st Ed, Frank Donnelly
Open Educational Resources
This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 1.5 "Tethys", a cross-platform (Windows, Mac, Linux) desktop GIS software package.
Folksonomy-Based User-Centric Information Organization Systems, Devendra Potnis
Folksonomy-Based User-Centric Information Organization Systems, Devendra Potnis
School of Information Sciences -- Faculty Publications and Other Works
After the rise of Web 2.0 technologies, Folksonomy emerged as one of the most popular user-centric information organization techniques in the newly reforming digital world. ln the context of the rising popularity of folksonomies, this paper conceptually investigates -- how can folksonomies be integrated with other ways of organizing information for building systems that could serve information users better in the future? A set of experimentation ideas of integrating folksonomy with controlled vocabularies, bibliometric maps, thesaurus-based systems, ontologies, and semantic web could inform and catalyze the design and development of folksonomy-based user-centric information organization systems in the future.
Towards Evaluating The Quality Of A Spreadsheet: The Case Of The Analytical Spreadsheet Model, Thomas A. Grossman Jr., Vijay Mehrotra, J Sander
Towards Evaluating The Quality Of A Spreadsheet: The Case Of The Analytical Spreadsheet Model, Thomas A. Grossman Jr., Vijay Mehrotra, J Sander
Business Analytics and Information Systems
We consider the challenge of creating guidelines to evaluate the quality of a spreadsheet model. We suggest four principles. First, state the domain—the spreadsheets to which the guidelines apply. Second, distinguish between the process by which a spreadsheet is constructed from the resulting spreadsheet artifact. Third, guidelines should be written in terms of the artifact, independent of the process. Fourth, the meaning of “quality” must be defined. We illustrate these principles with an example. We define the domain of “analytical spreadsheet models”, which are used in business, finance, engineering, and science. We propose for discussion a framework and terminology for …
Identifying Students’ Summary Writing Strategies Using Summary Sentence Decomposition Algorithm, Rukaini Abdullah
Identifying Students’ Summary Writing Strategies Using Summary Sentence Decomposition Algorithm, Rukaini Abdullah
Rukaini Abdullah
Summary writing is one of the important skills taught in schools. A summary is a condensed version of an existing text. Its production differs from other types of writing where it requires the use of specific strategies. Most research on summary assessments focused on the end product of summary writing instead of its process. Research has shown that lack of strategic skills is a cause of students’ difficulties in writing good summaries. There are a few systems available to assist teachers in assessing students summaries based on content and style. But virtually none have been developed to assess the process …
Identifying How Novice Researchers Search, Locate, Choose And Use Web Resources At The Early Stage Of Research, Maizatul Akmar Ismail
Identifying How Novice Researchers Search, Locate, Choose And Use Web Resources At The Early Stage Of Research, Maizatul Akmar Ismail
Maizatul Akmar Ismail
This paper describes the process of identifying novice researchers' information needs. The study sampled postgraduate students at the Faculty of Computer Science and Information Technology, University of Malaya, Malaysia. The study utilized three types of data gathering techniques: (a) observations to gauge further understanding the novice researchers' information seeking behaviour while searching for research related sources on the Web; (b) a questionnaire-based survey to identify the artifact or the resources they use for the research activities; and (c) interviews with expert researchers to gauge further information needs of novice researchers. Results indicate that novice researchers rely on thesis, e-book, journals …
Information Evaluation: How One Group Of Intelligence Analysts Go About The Task, John Joseph, Jeff Corkill
Information Evaluation: How One Group Of Intelligence Analysts Go About The Task, John Joseph, Jeff Corkill
Australian Security and Intelligence Conference
Source and information evaluation is identified as being a critical element of the analytical process and production of intelligence products. However there is concern that in reality evaluation is being carried out in a cursory fashion involving limited intellectual rigour. Poor evaluation is also thought to be a causal factor in the failure of intelligence. This study examined the process of information and source evaluation as understood and practiced by, six West Australian Police Force, (WAPOL) intelligence analysts. Data was gathered by use of a focus group with that data being compared against the current literature. It was discovered that …
Gis Will Affect The Political Landscape For The Next Decade And Beyond, Mark Salling
Gis Will Affect The Political Landscape For The Next Decade And Beyond, Mark Salling
All Maxine Goodman Levin School of Urban Affairs Publications
No abstract provided.
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
IT Research
The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.
Linux 101: Ci-Trainseminar, Edward Aractingi
Linux 101: Ci-Trainseminar, Edward Aractingi
IT Research
An overview of how the Linux operating system.
Automated Case Review System For Transitional Assistance, Don Minh Le
Automated Case Review System For Transitional Assistance, Don Minh Le
Theses Digitization Project
The purpose of this project was to create an automated Case Review System. The current Case Review System is a manual process that is being performed by Eligibility Lead Workers and Eligibility Worker Supervisors. The reviewers utilize an Excel sheet to record every individual reviewers results and print out many copies for the appropriate parties. The automated system is designed to track, and catch mistakes in determining eligibility of the welfare applicants. Moreover, Case Review System provides the Transitional Assistance Department (TAD) the ability to report error trends as a training tool to reduce future case errors. This system shall …
Review Of Educating Educators With Social Media, Margie Ruppel
Review Of Educating Educators With Social Media, Margie Ruppel
Collaborative Librarianship
No abstract provided.
Trigeiawriter: A Content Management System, Mohan Prabhakara Ram
Trigeiawriter: A Content Management System, Mohan Prabhakara Ram
Theses Digitization Project
The purpose of this project was to design and implement a Content Management System (CSM). TrigeiaWriter is a Content Management System for Trigeia.com, a web based magazine site. Since TrigeiaWriter is used for a web based magazine, it incorperates different roles for the users and these roles are authors, editors, and administrators.
Doctor Patient Module, Harpreet Singh Ujjal
Doctor Patient Module, Harpreet Singh Ujjal
Theses Digitization Project
The aim of this project is to design an efficient and reliable web application which would allow patients to make appointments with doctors in a certain hospital which would include online scheduling, via text messages and via phone calls. The user friendly interface is designed suing XHTML, CSS and JAVA script. The Business Logic layer uses open source PHP technology. The Database layer is MySql.
My Clinic Web Application, Rohan Thomas Dmello
My Clinic Web Application, Rohan Thomas Dmello
Theses Digitization Project
The purpose of this web application is to provide doctors and patients with one location where their data is stored and they can access through a secured environment. It will allow doctors to send perscriptions electronically to the pharmacy and allow their patients to view and edit medical appointments and their medical information online as well.
In-Degree Dynamics Of Large-Scale P2p Systems, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
In-Degree Dynamics Of Large-Scale P2p Systems, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
Computer Science Faculty Publications
This paper builds a complete modeling framework for understanding user churn and in-degree dynamics in unstructured P2P systems in which each user can be viewed as a stationary alternating renewal process. While the classical Poisson result on the superposition of n stationary renewal processes for n→∞ requires that each point process become sparser as n increases, it is often difficult to rigorously show this condition in practice. In this paper, we first prove that despite user heterogeneity and non-Poisson arrival dynamics, a superposition of edge-arrival processes to a live user under uniform selection converges to a Poisson process when …
An Effective Approach To Pose Invariant 3d Face Recognition, Dayong Wang, Steven C. H. Hoi, Ying He
An Effective Approach To Pose Invariant 3d Face Recognition, Dayong Wang, Steven C. H. Hoi, Ying He
Research Collection School Of Computing and Information Systems
One critical challenge encountered by existing face recognition techniques lies in the difficulties of handling varying poses. In this paper, we propose a novel pose invariant 3D face recognition scheme to improve regular face recognition from two aspects. Firstly, we propose an effective geometry based alignment approach, which transforms a 3D face mesh model to a well-aligned 2D image. Secondly, we propose to represent the facial images by a Locality Preserving Sparse Coding (LPSC) algorithm, which is more effective than the regular sparse coding algorithm for face representation. We conducted a set of extensive experiments on both 2D and 3D …
Making Memory: Techne, Technology, And The Refashioning Of Contemporary Memory, Kimberly Lacey
Making Memory: Techne, Technology, And The Refashioning Of Contemporary Memory, Kimberly Lacey
Wayne State University Dissertations
My dissertation answers two questions: Does the tension between interactive technologies and rhetoric re-shape the nature and relevance of the canon of memory? Do interactive technologies affect the ways we remember and persuade? I argue that my interpretation of techne suggests possibilities for the creation and production of new types of memory in combination with digital media. To interrogate this connection, I suggest three interpretations of the Greek concept, techne: as a process that is inherently productive; as a force that renegotiates contemporary sources of social power; and as a skill that balances expert knowledge with instrumentality. I explore …
Enterprise Management Studio, Himabindu Miriyala
Enterprise Management Studio, Himabindu Miriyala
Theses Digitization Project
The purpose of this project was to develop a web application (Enterprise Management Studio) or EMS that will publish information about all projects of a company under development in one single place. The system will provide instant information regarding the work in progress within the company. In addition to this, the system has an interactive interface through which a user can easily interact with different areas of the application. EMS is written in C Sharp, uses the Asp.net framework and Ajax techniques for web implementation, and employs the Ado framework for database communication.
Usage Of And Satisfaction With Online Help Vs. Search Engines For Aid In Software Use, Charles J. Welty Ph.D.
Usage Of And Satisfaction With Online Help Vs. Search Engines For Aid In Software Use, Charles J. Welty Ph.D.
Faculty Publications
Computer users have long been frustrated by software problems. It is unusual that the Help menu actually helps with the software problems they have. At the same time, computer science students and professionals have been using search engines to get help with the complex software they use. The use of search engines to get help with software by both computer scientists and students in other disciplines is investigated. Students from all disciplines tested were found to use and be more satisfied by search engines than Help. Further investigation showed that, generally, students went to other people more than Help or …
Semi-Automatic Management Of Knowledge Bases Using Formal Ontologies, Andreas Textor
Semi-Automatic Management Of Knowledge Bases Using Formal Ontologies, Andreas Textor
Theses
This thesis presents an approach that deals with the ever-growing amount of data in knowledge bases, especially concerning knowledge interoperability and formal representation of domain knowledge. There arc multiple issues that must be addressed with current systems. A multitude of different formats, sources and tools exist in a domain, and it is desirable to develop their use further towards a standardised environment. Such an environment should support both the representation and processing of data from this domain, and the connection to other domains, where necessary. In order to manage large amounts of data, it should be possible to perform whatever …
An Online Framework For Supporting The Evaluation Of Personalised Information Retrieval Systems, Catherine Mulwa, Luca Longo, Seamus Lawless, Mary Sharpe, Vincent Wade
An Online Framework For Supporting The Evaluation Of Personalised Information Retrieval Systems, Catherine Mulwa, Luca Longo, Seamus Lawless, Mary Sharpe, Vincent Wade
Conference papers
Scope - Personalised Information Retrieval (PIR) has been gaining attention because it investigates intelligent ways for enhancing content delivery. Web users can have personalised services and more accurate information. Problem - Several PIR systems have been proposed in the literature; however, they have not been properly tested or evaluated. Proposal – The authors propose a generally applicable web-based interface, which provides PIR developers and evaluators with: i) implicit recommendations on how to evaluate a specific PIR system; ii) a repository containing studies on user-centred and layered evaluation studies; iii) recommendations on how to best combine different evaluation methods, metrics and …
Analysis On Partial Relationship In Lod, Kalpa Gunaratna, Sarasi Lalithsena, Cory Andrew Henson, Prateek Jain
Analysis On Partial Relationship In Lod, Kalpa Gunaratna, Sarasi Lalithsena, Cory Andrew Henson, Prateek Jain
Kno.e.sis Publications
Relationships play a key role in Semantic Web to connect the dots between entities (concepts or instances) in a way that enables to absorb the real sense of the entities. Some interesting relationships would give proof for the existence of subject and object in triples which in tern can be defined as evidential relationships. Identifying evidential relationships will yield solutions to some existing inference problems and open doors for new applications and research. Part_of relationships are identified as a special kind of an evidential relationship out of membership, causality and etc. Linked Open data as a global data space would …
A Genetic Optimization Approach For Isolating Translational Efficiency Bias, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer
A Genetic Optimization Approach For Isolating Translational Efficiency Bias, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer
Kno.e.sis Publications
The study of codon usage bias is an important research area that contributes to our understanding of molecular evolution, phylogenetic relationships, respiratory lifestyle, and other characteristics. Translational efficiency bias is perhaps the most well studied codon usage bias, as it is frequently utilized to predict relative protein expression levels. We present a novel approach to isolating translational efficiency bias in microbial genomes. There are several existent methods for isolating translational efficiency bias. Previous approaches are susceptible to the confounding influences of other potentially dominant biases. Additionally, existing approaches to identifying translational efficiency bias generally require both genomic sequence information and …
A Systematic Property Mapping Using Category Hierarchy And Data, Kalpa Gunaratna, Sarasi Lalithsena, Prateek Jain, Cory Andrew Henson, Amit P. Sheth
A Systematic Property Mapping Using Category Hierarchy And Data, Kalpa Gunaratna, Sarasi Lalithsena, Prateek Jain, Cory Andrew Henson, Amit P. Sheth
Kno.e.sis Publications
Relationships play a key role in Semantic Web to connect the dots between entities (concepts or instances in a way that enables to absorb the real sense of the entities. Even though relationships are important, it is difficult to categorize or identify them because they consist of complex knowledge in the schema. Therefore systematically identifying relationships yield many advantages and open doors for new research avenues. In this work, we try to identify a specific type of relationship (part of) in a multi-domain dataset and devised an algorithm using Wikipedia to identify patterns of part of relationships in the dataset. …
Reconciling Owl And Rules, David Carral Martinez, Adila A. Krisnadhi, Frederick Maier, Kunal Sengupta, Pascal Hitzler
Reconciling Owl And Rules, David Carral Martinez, Adila A. Krisnadhi, Frederick Maier, Kunal Sengupta, Pascal Hitzler
Computer Science and Engineering Faculty Publications
We report on a recent advance in integrating Rules and OWL. We discuss a recent proposal, known as nominal schemas, which realizes a seamless integration of Datalog rules into the description logic SROIQ which underlies OWL 2 DL. We present extensions of the standardized OWL syntaxes to incorporate nominal schemas, reasoning algorithms, and a first naive implementation. And we argue why this approach goes a long way towards overcoming the present paradigm split.
Contextual Ontology Alignment Of Lod With An Upper Ontology: A Case Study With Proton, Prateek Jain, Peter Z. Yeh, Kunal Verma, Reymonrod G. Vasquez, Mariana Darnorva, Pascal Hitzler, Amit P. Sheth
Contextual Ontology Alignment Of Lod With An Upper Ontology: A Case Study With Proton, Prateek Jain, Peter Z. Yeh, Kunal Verma, Reymonrod G. Vasquez, Mariana Darnorva, Pascal Hitzler, Amit P. Sheth
Kno.e.sis Publications
The Linked Open Data (LOD) is a major milestone towards realizing the Semantic Web vision, and can enable applications such as robust Question Answering (QA) systems that can answer queries requiring multiple, disparate information sources. However, realizing these applications requires relationships at both the schema and instance level, but currently the LOD only provides relationships for the latter. To address this limitation, we present a solution for automatically finding schema-level links between two LOD ontologies – in the sense of ontology alignment. Our solution, called BLOOMS+, extends our previous solution (i.e. BLOOMS) in two significant ways. BLOOMS+ 1) uses a …