Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 5041 - 5070 of 6716

Full-Text Articles in Physical Sciences and Mathematics

Scale: A Scalable Framework For Efficiently Clustering Transactional Data, Hua Yan, Keke Chen, Ling Liu, Zhang Yi Jan 2010

Scale: A Scalable Framework For Efficiently Clustering Transactional Data, Hua Yan, Keke Chen, Ling Liu, Zhang Yi

Kno.e.sis Publications

This paper presents SCALE, a fully automated transactional clustering framework. The SCALE design highlights three unique features. First, we introduce the concept of Weighted Coverage Density as a categorical similarity measure for efficient clustering of transactional datasets. The concept of weighted coverage density is intuitive and it allows the weight of each item in a cluster to be changed dynamically according to the occurrences of items. Second, we develop the weighted coverage density measure based clustering algorithm, a fast, memory-efficient, and scalable clustering algorithm for analyzing transactional data. Third, we introduce two clustering validation metrics and show that these domain …


Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer Jan 2010

Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer

Kno.e.sis Publications

Genomic sequencing projects are an abundant source of information for biological studies ranging from the molecular to the ecological in scale; however, much of the information present may yet be hidden from casual analysis. One such information domain, trends in codon usage, can provide a wealth of information about an organism's genes and their expression. Degeneracy in the genetic code allows more than one triplet codon to code for the same amino acid, and usage of these codons is often biased such that one or more of these synonymous codons is preferred. Detection of this bias is an important tool …


Loqus: Linked Open Data Sparql Querying System, Prateek Jain, Kunal Verma, Peter Z. Yeh, Pascal Hitzler, Amit P. Sheth Jan 2010

Loqus: Linked Open Data Sparql Querying System, Prateek Jain, Kunal Verma, Peter Z. Yeh, Pascal Hitzler, Amit P. Sheth

Kno.e.sis Publications

The LOD cloud is gathering a lot of momentum, with the number of contributors growing manifold. Many prominent data providers have submitted and linked their data to other dataset with the help of manual mappings. The potential of the LOD cloud is enormous ranging from challenging AI issues such as open domain question answering to automated knowledge discovery. We believe that there is not enough technology support available to effectively query the LOD cloud. To this effect, we present a system called Linked Open Data SPARQL Querying System (LOQUS), which automatically maps users queries written in terms of a conceptual …


Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth Jan 2010

Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth

Kno.e.sis Publications

In this paper we discuss the collection, semantic annotation and analysis of real-time social signals from micro-blogging data. We focus on users interested in analyzing social signals collectively for sensemaking. Our proposal enables flexibility in selecting subsets for analysis, alleviating information overload. We define an architecture that is based on state-of-the-art Semantic Web technologies and a distributed publish subscribe protocol for real time communication. In addition, we discuss our method and application in a scenario related to the health care reform in the United States.


Getting Code Near The Data: A Study Of Generating Customized Data Intensive Scientific Workflows With Domain Specific Language, Ashwin Manjunatha, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth Jan 2010

Getting Code Near The Data: A Study Of Generating Customized Data Intensive Scientific Workflows With Domain Specific Language, Ashwin Manjunatha, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth

Kno.e.sis Publications

The amount of data produced in modern biological experiments such as Nuclear Magnetic Resonance (NMR) analysis far exceeds the processing capability of a single machine. The present state-of-the-art is taking the ”data to code”, the philosophy followed by many of the current service oriented workflow systems. However this is not feasible in some cases such as NMR data analysis, primarily due to the large scale of data.

The objective of this research is to bring ”code to data”, preferred in the cases when the data is extremely large. We present a DSL based approach to develop customized data intensive scientific …


Semantics Centric Solutions For Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu, Amit P. Sheth Jan 2010

Semantics Centric Solutions For Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu, Amit P. Sheth

Kno.e.sis Publications

Cloud computing has become one of the key considerations both in academia and industry. Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously and pay-as-you-go pricing schemes are some of the reasons for the success of Cloud computing. The Cloud computing landscape, however, is plagued by many issues hindering adoption. One such issue is vendor lock-in, forcing the Cloud users to adhere to one service provider in terms of data and application logic. Semantic Web has been an important research area that has seen significant attention from both academic and industrial researchers. One key property of Semantic Web …


Sensor Data And Perception: Can Sensors Play 20 Questions, Cory Andrew Henson Jan 2010

Sensor Data And Perception: Can Sensors Play 20 Questions, Cory Andrew Henson

Kno.e.sis Publications

Currently, there are many sensors collecting information about our environment, leading to an overwhelming number of observations that must be analyzed and explained in order to achieve situation awareness. As perceptual beings, we are also constantly inundated with sensory data, yet we are able to make sense of our environment with relative ease. Why is the task of perception so easy for us, and so hard for machines; and could this have anything to do with how we play the game 20 Questions?


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty Articles

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy Jan 2010

Integrating Environmental Science Into Information Technology Content To Generate Student Interest, Rondalynne Mcclintock '13, Yoonmi Lee '12, June Hilton '04, Brian Hilton, Gondy Leroy

CGU Faculty Publications and Research

In an effort to increase female student interest in computing we applied and evaluated an interdisciplinary approach at a suburban high school in eastern Los Angeles County, California. Three classes, an IB Environmental Science class, an AP Environmental Science class, and a Computer Science were surveyed to assess attitude changes toward information technology. Results indicated gender differences between the participating classes, and differences before and after the project. Although the project did not uniformly impact the attitude of female high school students, it impacted teachers who are adjusting their teaching methods, an outcome that has a long-term positive influence.


The Effects Of Linguistic Features And Evaluation Perspective On Perceived Difficulty Of Medical Text, Gondy Leroy, Stephen Helmreich, James Cowie Jan 2010

The Effects Of Linguistic Features And Evaluation Perspective On Perceived Difficulty Of Medical Text, Gondy Leroy, Stephen Helmreich, James Cowie

CGU Faculty Publications and Research

Millions of laypersons need more medical information than they are customarily provided during their doctor’s visit. Health websites can help fill this knowledge gap, but the text is believed to be too difficult to understand for many laypersons. To help write text that is not perceived as too difficult and leads to better comprehension (actual difficulty), we study how linguistic structures influence text difficulty. Since perceived difficulty has been shown to be a barrier to self-education, evaluating perceived difficulty is an essential first step to take. In this study, we evaluated the impact of noun phrase complexity and of function …


Provenance Aware Linked Sensor Data, Harshal Kamlesh Patni, Satya S. Sahoo, Cory Andrew Henson, Amit P. Sheth Jan 2010

Provenance Aware Linked Sensor Data, Harshal Kamlesh Patni, Satya S. Sahoo, Cory Andrew Henson, Amit P. Sheth

Kno.e.sis Publications

Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in the sensors domain to identify a sensor and analyze the observation data over time and geographical space. In this paper, we present a framework to model and query the provenance information associated with the sensor data exposed as part of the Web of Data using the Linked Open Data conventions. This is accomplished by developing an ontology-driven provenance management infrastructure that includes a representation model and query infrastructure. This provenance infrastructure, called Sensor Provenance Management System (PMS), is …


Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir Jan 2010

Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir

Walden Dissertations and Doctoral Studies

Culture tends to be misplaced as a secondary instructional goal in most foreign language classrooms. Although research has suggested that a strong link exists between language and culture, the problem resides in how best to teach culture in the classroom. While this problem impacts all learners, it may affect high school students more because they are entering a multilingual and multicultural world through higher education, study abroad, and employment. Based on Moran's conceptual framework of culture, this study addressed a gap in the literature by examining the effects of 2 innovative technologies, wikis and eBoards, and their potential to improve …


Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez Jan 2010

Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The majority of businesses in developing regions across the world are microenterprises. In recent years, this form of business has been particularly resilient to economic downturns. While microenterprises are the least likely to succeed, when they do, their growth increases by a factor of 3.4% when they adopt technology. However, the challenges faced by microenterprises make it very difficult for them to adopt technology successfully. Existing theoretical models of ICT adoption have centered on intent to adopt in large organizations, and thus lack applicability to microenterprises, wherein the intent to adopt is an individual decision. This paper builds on prior …


Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck Jan 2010

Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck

Georgia Library Quarterly

The article discusses the protocols used to establish remote computer connections from home. The Remote Desktop Protocol (RDP) used in Windows 7 connecting to a Windows 2008 server reportedly allows the playing of high-definition video using Media Player. It is stated that commercial product connections which may bypass security infrastructure are risky because of the home computer's possible insecurity and that home devices used for business purposes may be legally searched by the state.


Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini Jan 2010

Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini

Computer Science Faculty Publications

We present three fundamental, interrelated approaches to support multiple access paths to each terminal object in information hierarchies: faceted classification, faceted search, and web directories with embedded symbolic links. This survey aims to demonstrate how each approach supports users who seek information from multiple perspectives. We achieve this by exploring each approach, the relationships between these approaches, including tradeoffs, and how they can be used in concert, while focusing on a core set of hypermedia elements common to all. This approach provides a foundation from which to study, understand, and synthesize applications which employ these techniques. This survey does not …


Smart Media: Bridging Interactions And Services For The Smart Internet, Margaret-Anne Storey, Lars Grammel, Christoph Treude Jan 2010

Smart Media: Bridging Interactions And Services For The Smart Internet, Margaret-Anne Storey, Lars Grammel, Christoph Treude

Research Collection School Of Computing and Information Systems

This chapter describes a need for Smart Media to enhance the vision of the Smart Internet. Smart Media is introduced as a mechanism to bridge Smart Services and Smart Interactions. Smart Media extends the existing notions of Media in HCI such as Hypermedia, New Media, Adaptive Hypermedia, and Social Media. There are three main contributions from this paper: (1) A historical perspective of media in HCI and how media could benefit from smartness; (2) through some high level sample scenarios, a proposal for Smart Media to meet the vision of the Smart Internet; and (3) a detailed example of how …


Wikipedia2onto: Building Concept Ontology Automatically, Experimenting With Web Image Retrieval, Huan Wang, Xing Jiang, Liang-Tien Chia, Ah-Hwee Tan Jan 2010

Wikipedia2onto: Building Concept Ontology Automatically, Experimenting With Web Image Retrieval, Huan Wang, Xing Jiang, Liang-Tien Chia, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Given its effectiveness to better understand data, ontology has been used in various domains including artificial intelligence, biomedical informatics and library science. What we have tried to promote is the use of ontology to better understand media (in particular, images) on the World Wide Web. This paper describes our preliminary attempt to construct a large-scale multi-modality ontology, called AutoMMOnto, for web image classification. Particularly, to enable the automation of text ontology construction, we take advantage of both structural and content features of Wikipedia and formalize real world objects in terms of concepts and relationships. For visual part, we train classifiers …


Modeling Anticipatory Event Transitions, He Qi, Kuiyu Chang, Ee Peng Lim Jan 2010

Modeling Anticipatory Event Transitions, He Qi, Kuiyu Chang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Major world events such as terrorist attacks, natural disasters, wars, etc. typically progress through various representative stages/states in time. For example, a volcano eruption could lead to earthquakes, tsunamis, aftershocks, evacuation, rescue efforts, international relief support, rebuilding, and resettlement, etc. By analyzing various types of catastrophical and historical events, we can derive corresponding event transition models to embed useful information at each state. The knowledge embedded in these models can be extremely valuable. For instance, a transition model of the 1918-1920 flu pandemic could be used for the planning and allocation of resources to decisively respond to future occurrences of …


Dual Phase Learning For Large Scale Video Gait Recognition, Jialie Shen, Hwee Hwa Pang, Dacheng Tao, Xuelong Li Jan 2010

Dual Phase Learning For Large Scale Video Gait Recognition, Jialie Shen, Hwee Hwa Pang, Dacheng Tao, Xuelong Li

Research Collection School Of Computing and Information Systems

Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficient gait recognition and classification. Adopting a ”refinement-and-classification” principle, the framework comprises two components: 1) a classifier to generate advanced probabilistic features from low level gait parameters; and 2) a hidden classifier layer (based on multilayer perceptron neural network) to model the statistical properties of different subject classes. To validate our framework, we have conducted comprehensive experiments with a large test collection, and observed significant improvements in identification accuracy relative to …


Census 2010 And Human Services And Community Development, Mark Salling, Jenita Mcgowan Jan 2010

Census 2010 And Human Services And Community Development, Mark Salling, Jenita Mcgowan

All Maxine Goodman Levin School of Urban Affairs Publications

Census 2010 and Human Services and Community Development, Planning & Action, The Center for Community Solutions, Vol. 63, No. 2 (March), 2010, pp 1-4.


Genbank, Dennis A. Benson, Ilene Karasch-Mizrachi, David J. Lipman, James Ostell, Eric W. Sayers Jan 2010

Genbank, Dennis A. Benson, Ilene Karasch-Mizrachi, David J. Lipman, James Ostell, Eric W. Sayers

Harold W. Manter Laboratory: Library Materials

GenBank(R) is a comprehensive database that contains publicly available nucleotide sequences for more than 380,000 organisms named at the genus level or lower, obtained primarily through submissions from individual laboratories and batch submissions from large-scale sequencing projects, including whole genome shotgun (WGS) and environmental sampling projects. Most submissions are made using the web-based BankIt or standalone Sequin programs, and accession numbers are assigned by GenBank staff upon receipt. Daily data exchange with the European Nucleotide Archive (ENA) and the DNA Data Bank of Japan (DDBJ) ensures worldwide coverage. GenBank is accessible through the NCBI Entrez retrieval system that integrates data …


Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst Jan 2010

Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst

Research Collection School Of Computing and Information Systems

The number of channels available for companies and customers to communicate with one another has increased dramatically over the past several decades. Although some market segmentation efforts utilize high-level customer interaction statistics, in-depth information regarding customers’ use of different communication channels is often ignored. Detailed customer interaction information can help companies improve the way that they market to customers by taking into consideration customers’ behaviour patterns and preferences. However, a key challenge of interpreting customer contact information is that many channels have only been in existence for a relatively short period of time, and thus, there is limited understanding and …


Trust-Oriented Composite Service Selection With Qos Constraints, Lei Li, Yang Wang, Ee Peng Lim Jan 2010

Trust-Oriented Composite Service Selection With Qos Constraints, Lei Li, Yang Wang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust level of a service or a service provider is a critical factor to consider in service selection, particularlywhen a client is looking for a service from a large set of services or service providers. However, a invoked service may be composed of other services. The complex invocations in composite services greatly increase the complexity of trust-oriented service selection. In this paper, we propose novel approaches for composite service representation, trust evaluation and trust-oriented com-posite service selection (with QoS …


The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas Jan 2010

The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas

Theses: Doctorates and Masters

Information can be found in government departments in many forms. It exists, for example, as performance indicators, statistics, economic analysis, policy advice, political know-how or opinions. Using information is a daily and oft repeated activity in government departments. Information is central to the achievement of outcomes and the delivery of services. It is critical to the government’s success in the information economy. It is central to the development of products and services. It supports policy making and it underpins accountability. Government departments are built on the generation and use of information that is relevant to the largest of all customer …


Online Collaborative Whiteboard, Niranjana Kumari Subramanian Jan 2010

Online Collaborative Whiteboard, Niranjana Kumari Subramanian

Theses Digitization Project

The purpose of this project is to build a simple Online Collaborative Whiteboard (OCW) application to enable multiple users to brainstorm and share ideas interactively by using fun tools to start thinking together. Includes source code.


An Interactive Website For Disability Sports Festival Based On Asp.Net, Yuhe Li Jan 2010

An Interactive Website For Disability Sports Festival Based On Asp.Net, Yuhe Li

Theses Digitization Project

The Disability Sport Festival Website (DSFW) is a dynamic and extendable website used by the organizer of the Disability Sport Festival (DSF), sport participants and DSF supporters from the Inland Empire. DSFW provides sport participants and DSF supporters a user-friendly interface to view and register activites and programs or make donations to the organization throughout the year. The purpose of this project is to re-structure, redesign and rewrite the old website to serve the desired needs of DSF better. The DSF is an official site that represents California State University, San Bernardino. Therefore, it must comply with the CSUSB Web …


A Sketch-Based Language For Representing Uncertainty In The Locations Of Origin Of Herbarium Specimens, Barry J. Kronenfeld, Andrew Weeks Jan 2010

A Sketch-Based Language For Representing Uncertainty In The Locations Of Origin Of Herbarium Specimens, Barry J. Kronenfeld, Andrew Weeks

Barry J. Kronenfeld

Uncertainty fields have been suggested as an appropriate model for retrospective georeferencing of herbarium specimens. Previous work has focused only on automated data capture methods, but techniques for manual data specification may be able to harness human spatial cognition skills to quickly interpret complex spatial propositions. This paper develops a formal modeling language by which location uncertainty fields can be derived from manually sketched features. The language consists of low-level specification of critical probability isolines from which a surface can be uniquely derived, and high-level specification of features and predicates from which low-level isolines can be derived. In a case …


Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert Jan 2010

Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert

CCE Theses and Dissertations

Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback.

Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation. This …


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …