Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 511 - 540 of 6717

Full-Text Articles in Physical Sciences and Mathematics

El-Vit: Probing Vision Transformer With Interactive Visualization, Hong Zhou, Rui Zhang, Peifeng Lai, Chaoran Guo, Yong Wang, Zhida Sun, Junjie Li Jan 2023

El-Vit: Probing Vision Transformer With Interactive Visualization, Hong Zhou, Rui Zhang, Peifeng Lai, Chaoran Guo, Yong Wang, Zhida Sun, Junjie Li

Research Collection School Of Computing and Information Systems

Nowadays, Vision Transformer (ViT) is widely utilized in various computer vision tasks, owing to its unique self-attention mechanism. However, the model architecture of ViT is complex and often challenging to comprehend, leading to a steep learning curve. ViT developers and users frequently encounter difficulties in interpreting its inner workings. Therefore, a visualization system is needed to assist ViT users in understanding its functionality. This paper introduces EL-VIT, an interactive visual analytics system designed to probe the Vision Transformer and facilitate a better understanding of its operations. The system consists of four layers of visualization views. The first three layers include …


An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney Jan 2023

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney

CCE Theses and Dissertations

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks, and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. The increased use of IS as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as ‘password workarounds’ …


Design And Implementation Of A Graphql Mesh Gateway: Federating Api Endpoints Based On A Defined Data Model, Marcus D. Scese Jan 2023

Design And Implementation Of A Graphql Mesh Gateway: Federating Api Endpoints Based On A Defined Data Model, Marcus D. Scese

Dissertations, Master's Theses and Master's Reports

This paper introduces the GraphQL Mesh federated API (Application Programming Interface) gateway project, a comprehensive initiative implemented using GraphQL Mesh to solve data related issues within the USW-DSS (Undersea Warfare - Decision Support System). The project contributes to the evolving discourse on the pivotal role of Data Fabrics and Data Meshes in dismantling the barriers imposed by digital data silos. The project is a collaboration between researchers at Michigan Technological University, and engineers at ARiA (Applied Research in Acoustics LLC). The aim of the project is to resolve difficulties in understanding a large collection of API endpoints. By navigating the …


Robust Cache System For Web Search Engine Yioop, Rushikesh Padia Jan 2023

Robust Cache System For Web Search Engine Yioop, Rushikesh Padia

Master's Projects

Caches are the most effective mechanism utilized by web search engines to optimize the performance of search queries. Search engines employ caching at multiple levels to improve its performance, for example, caching posting list and caching result set. Caching query results reduces overhead of processing frequent queries and thus saves a lot of time and computing power. Yioop is an open-source web search engine which utilizes result cache to optimize searches. The current implementation utilizes a single dynamic cache based on Marker’s algorithm. The goal of the project is to improve the performance of cache in Yioop. To choose a …


Nosql Databases In Kubernetes, Parth Sandip Mehta Jan 2023

Nosql Databases In Kubernetes, Parth Sandip Mehta

Master's Projects

With the increasing popularity of deploying applications in containers, Kubernetes (K8s) has become one of the most accepted container orchestration systems. Kubernetes helps maintain containers smoothly and simplifies DevOps with powerful automations. It was originally developed as a tool to manage stateless microservices that run seamlessly in containers. The ephemeral nature of pods, the smallest deployable unit, in Kubernetes was well-aligned with stateless applications since destroying and recreating pods didn’t impact applications. There was a need to provision solutions around stateful workloads like databases so as to take advantage of K8s. This project explores this need, the challenges associated and …


High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru Jan 2023

High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru

Master's Projects

Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …


Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir Jan 2023

Wikipedia Web Table Interpretation, Keyword-Based Search, And Ranking, Kartikee Dabir

Master's Projects

Information retrieval and data interpretation on the web, for the purpose of gaining knowledgeable insights, has been a widely researched topic from the onset of the world wide web or what is today popularly known as the internet. Web tables are structured tabular data present amidst unstructured, heterogenous data on the web. This makes web tables a rich source of information for a variety of tasks like data analysis, data interpretation, and information retrieval pertaining to extracting knowledge from information present on the web. Wikipedia tables which are a subset of web tables hold a huge amount of useful data, …


Is A Pretrained Model The Answer To Situational Awareness Detection On Social Media?, Siaw Ling Lo, Kahhe Lee, Yuhao Zhang Jan 2023

Is A Pretrained Model The Answer To Situational Awareness Detection On Social Media?, Siaw Ling Lo, Kahhe Lee, Yuhao Zhang

Research Collection School Of Computing and Information Systems

Social media can be valuable for extracting information about an event or incident on the ground. However, the vast amount of content shared, and the linguistic variants of languages used on social media make it challenging to identify important situational awareness content to aid in decision-making for first responders. In this study, we assess whether pretrained models can be used to address the aforementioned challenges on social media. Various pretrained models, including static word embedding (such as Word2Vec and GloVe) and contextualized word embedding (such as DistilBERT) are studied in detail. According to our findings, a vanilla DistilBERT pretrained language …


Contextual Path Retrieval: A Contextual Entity Relation Embedding-Based Approach, Pei-Chi Lo, Ee-Peng Lim Jan 2023

Contextual Path Retrieval: A Contextual Entity Relation Embedding-Based Approach, Pei-Chi Lo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Contextual path retrieval (CPR) refers to the task of finding contextual path(s) between a pair of entities in a knowledge graph that explains the connection between them in a given context. For this novel retrieval task, we propose the Embedding-based Contextual Path Retrieval (ECPR) framework. ECPR is based on a three-component structure that includes a context encoder and path encoder that encode query context and path, respectively, and a path ranker that assigns a ranking score to each candidate path to determine the one that should be the contextual path. For context encoding, we propose two novel context encoding methods, …


Graphsearchnet: Enhancing Gnns Via Capturing Global Dependencies For Semantic Code Search, Shangqing Liu, Xiaofei Xie, Jjingkai Siow, Lei Ma, Guozhu Meng, Yang Liu Jan 2023

Graphsearchnet: Enhancing Gnns Via Capturing Global Dependencies For Semantic Code Search, Shangqing Liu, Xiaofei Xie, Jjingkai Siow, Lei Ma, Guozhu Meng, Yang Liu

Research Collection School Of Computing and Information Systems

Code search aims to retrieve accurate code snippets based on a natural language query to improve software productivity and quality. With the massive amount of available programs such as (on GitHub or Stack Overflow), identifying and localizing the precise code is critical for the software developers. In addition, Deep learning has recently been widely applied to different code-related scenarios, ., vulnerability detection, source code summarization. However, automated deep code search is still challenging since it requires a high-level semantic mapping between code and natural language queries. Most existing deep learning-based approaches for code search rely on the sequential text ., …


Vacsen: A Visualization Approach For Noise Awareness In Quantum Computing, Shaolun Ruan, Yong Wang, Weiwen Jiang, Ying Mao, Qiang Guan Jan 2023

Vacsen: A Visualization Approach For Noise Awareness In Quantum Computing, Shaolun Ruan, Yong Wang, Weiwen Jiang, Ying Mao, Qiang Guan

Research Collection School Of Computing and Information Systems

Quantum computing has attracted considerable public attention due to its exponential speedup over classical computing. Despite its advantages, today's quantum computers intrinsically suffer from noise and are error-prone. To guarantee the high fidelity of the execution result of a quantum algorithm, it is crucial to inform users of the noises of the used quantum computer and the compiled physical circuits. However, an intuitive and systematic way to make users aware of the quantum computing noise is still missing. In this paper, we fill the gap by proposing a novel visualization approach to achieve noise-aware quantum computing. It provides a holistic …


Neighbor-Anchoring Adversarial Graph Neural Networks, Zemin Liu, Yuan Fang, Yong Liu, Vincent W. Zheng Jan 2023

Neighbor-Anchoring Adversarial Graph Neural Networks, Zemin Liu, Yuan Fang, Yong Liu, Vincent W. Zheng

Research Collection School Of Computing and Information Systems

Graph neural networks (GNNs) have witnessed widespread adoption due to their ability to learn superior representations for graph data. While GNNs exhibit strong discriminative power, they often fall short of learning the underlying node distribution for increased robustness. To deal with this, inspired by generative adversarial networks (GANs), we investigate the problem of adversarial learning on graph neural networks, and propose a novel framework named NAGNN (i.e., Neighbor-anchoring Adversarial Graph Neural Networks) for graph representation learning, which trains not only a discriminator but also a generator that compete with each other. In particular, we propose a novel neighbor-anchoring strategy, where …


Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen Jan 2023

Champions For Social Good: How Can We Discover Social Sentiment And Attitude-Driven Patterns In Prosocial Communication?, Raghava Rao Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen

Research Collection School Of Computing and Information Systems

The UN High Commissioner on Refugees (UNHCR) is pursuing a social media strategy to inform people about displaced populations and refugee emergencies. It is actively engaging public figures to increase awareness through its prosocial communications and improve social informedness and support for policy changes in its services. We studied the Twitter communications of UNHCR social media champions and investigated their role as high-profile influencers. In this study, we offer a design science research and data analytics framework and propositions based on the social informedness theory we propose in this paper to assess communication about UNHCR’s mission. Two variables—refugee-emergency and champion …


Efficient Approximate Range Aggregation Over Large-Scale Spatial Data Federation, Yexuan Shi, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Bolin Ding, Lei Chen Jan 2023

Efficient Approximate Range Aggregation Over Large-Scale Spatial Data Federation, Yexuan Shi, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Bolin Ding, Lei Chen

Research Collection School Of Computing and Information Systems

Range aggregation is a primitive operation in spatial data applications and there is a growing demand to support such operations over a data federation, where the entire spatial data are separately held by multiple data providers (a.k.a., data silos). Data federations notably increase the amount of data available for data-intensive applications such as smart mobility planning and public health emergency responses. Yet they also challenge the conventional implementation of range aggregation queries because the raw data cannot be shared within the federation and the data partition at each data silo is fixed during query processing. These constraints limit the design …


Progenitor Cell Isolation From Mouse Epididymal Adipose Tissue And Sequencing Library Construction, Qianglin Liu, Chaoyang Li, Yuxia Li, Leshan Wang, Xujia Zhang, Buhao Deng, Peidong Gao, Mohammad Shiri, Fozi Alkaifi, Junxing Zhao, Jacqueline M. Stephens, Constantine A. Simintiras, Joseph Francis, Jiangwen Sun, Xing Fu Jan 2023

Progenitor Cell Isolation From Mouse Epididymal Adipose Tissue And Sequencing Library Construction, Qianglin Liu, Chaoyang Li, Yuxia Li, Leshan Wang, Xujia Zhang, Buhao Deng, Peidong Gao, Mohammad Shiri, Fozi Alkaifi, Junxing Zhao, Jacqueline M. Stephens, Constantine A. Simintiras, Joseph Francis, Jiangwen Sun, Xing Fu

Computer Science Faculty Publications

Here, we present a protocol to isolate progenitor cells from mouse epididymal visceral adipose tissue and construct bulk RNA and assay for transposase-accessible chromatin with sequencing (ATAC-seq) libraries. We describe steps for adipose tissue collection, cell isolation, and cell staining and sorting. We then detail procedures for both ATAC-seq and RNA sequencing library construction. This protocol can also be applied to other tissues and cell types directly or with minor modifications.

For complete details on the use and execution of this protocol, please refer to Liu et al. (2023).1

*1 Liu, Q., Li, C., Deng, B., Gao, P., …


Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni Jan 2023

Graph Deep Learning Based Hashtag Recommender For Reels On Social Media, Sriya Balineni

Master's Projects

Many businesses, including Facebook, Netflix, and YouTube, rely heavily on a recommendation system. Recommendation systems are algorithms that attempt to provide consumers with relevant suggestions for items such as movies, videos, or reels (microvideos) to watch, hashtags for their posts, songs to listen to, and products to purchase. In many businesses, recommender systems are essential because they can generate enormous amounts of revenue and make the platform stand out when compared to others. Reels are a feature of the social media platforms that enable users to create and share videos of up to sixty seconds in length. Individuals, businesses, and …


Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif Jan 2023

Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif

Graduate Theses, Dissertations, and Problem Reports

Biometric technology is a rapidly evolving field with applications that range from access to devices to border crossing and entry/exit processes. Large-scale applications to collect biometric data, such as border crossings result in multimodal biometric databases containing thousands of identities. However, due to human operator error, these databases often contain many instances of image labeling and classification; this is due to the lack of training and throughput pressure that comes with human error. Multiple entries from the same individual may be assigned to a different identity. Rolled fingerprints may be labeled as flat images, a face image entered into a …


Knowledge Discovery On The Integrative Analysis Of Electrical And Mechanical Dyssynchrony To Improve Cardiac Resynchronization Therapy, Zhuo He Jan 2023

Knowledge Discovery On The Integrative Analysis Of Electrical And Mechanical Dyssynchrony To Improve Cardiac Resynchronization Therapy, Zhuo He

Dissertations, Master's Theses and Master's Reports

Cardiac resynchronization therapy (CRT) is a standard method of treating heart failure by coordinating the function of the left and right ventricles. However, up to 40% of CRT recipients do not experience clinical symptoms or cardiac function improvements. The main reasons for CRT non-response include: (1) suboptimal patient selection based on electrical dyssynchrony measured by electrocardiogram (ECG) in current guidelines; (2) mechanical dyssynchrony has been shown to be effective but has not been fully explored; and (3) inappropriate placement of the CRT left ventricular (LV) lead in a significant number of patients.

In terms of mechanical dyssynchrony, we utilize an …


A New Credit Scoring Model To Reduce Potential Predatory Lending: A Design Science Approach, Anna Zakowska Jan 2023

A New Credit Scoring Model To Reduce Potential Predatory Lending: A Design Science Approach, Anna Zakowska

CGU Theses & Dissertations

This research examines the potential impact of implementing a novel credit scoring model that integrates attributes beyond the traditional FICO model. It aims to address issues related to predatory lending and the financial exclusion affecting individuals often categorized as 'credit invisible,' 'credit unscorable,' 'unbanked,' and 'underbanked.' These individuals typically face difficulties in establishing or repairing a credit history, which poses a challenge for financial institutions in accurately evaluating their creditworthiness. This gap in the credit assessment process often opens doors to unfair lending practices. To tackle this problem, a systematically designed, built, tested, and evaluated innovative credit scoring model was …


Using Materialized Views For Answering Graph Pattern Queries, Michael Lan Dec 2022

Using Materialized Views For Answering Graph Pattern Queries, Michael Lan

Dissertations

Discovering patterns in graphs by evaluating graph pattern queries involving direct (edge-to-edge mapping) and reachability (edge-to-path mapping) relationships under homomorphisms on data graphs has been extensively studied. Previous studies have aimed to reduce the evaluation time of graph pattern queries due to the potentially numerous matches on large data graphs.

In this work, the concept of the summary graph is developed to improve the evaluation of tree pattern queries and graph pattern queries. The summary graph first filters out candidate matches which violate certain reachability constraints, and then finds local matches of query edges. This reduces redundancy in the representation …


Android Security: Analysis And Applications, Raina Samuel Dec 2022

Android Security: Analysis And Applications, Raina Samuel

Dissertations

The Android mobile system is home to millions of apps that offer a wide range of functionalities. Users rely on Android apps in various facets of daily life, including critical, e.g., medical, settings. Generally, users trust that apps perform their stated purpose safely and accurately. However, despite the platform’s efforts to maintain a safe environment, apps routinely manage to evade scrutiny. This dissertation analyzes Android app behavior and has revealed several weakness: lapses in device authentication schemes, deceptive practices such as apps covering their traces, as well as behavioral and descriptive inaccuracies in medical apps. Examining a large corpus of …


Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah Dec 2022

Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah

Dissertations

This dissertation addresses multiple crucial problems in space weather and climate, presenting new machine learning-based data analytics algorithms and models for tackling the problems.

First, the dissertation presents two new approaches to predicting solar flares. One approach, called DeepSun, predicts solar flares by utilizing a machine-learning-as-a-service (MLaaS) platform. The DeepSun system provides a friendly interface for Web users and an application programming interface (API) for remote programming users. It adopts an ensemble learning method that employs several machine learning algorithms to perform multiclass flare prediction. The other approach, named SolarFlareNet, forecasts the occurrence of solar flares within the next 24 …


Implementation Of Ahp And Black Box Testing To The Development Of An Information System For Assessing The Feasibility Of Bumdes Submissions, Hari Toha Hidayat, Husaini Husaini, Nanang Prihatin, Radhiyatammardhiyyah Radhiyatammardhiyyah Dec 2022

Implementation Of Ahp And Black Box Testing To The Development Of An Information System For Assessing The Feasibility Of Bumdes Submissions, Hari Toha Hidayat, Husaini Husaini, Nanang Prihatin, Radhiyatammardhiyyah Radhiyatammardhiyyah

Elinvo (Electronics, Informatics, and Vocational Education)

The existence of institutional village enterprises (BUMDES) has never been adequately monitored in terms of the growth of village-owned businesses in each village. According to the data, there are 17 BUMDES in the Muara District that have been inactive for the most part. Due to the difficulty of monitoring the progress of BUMDES, a significant number of them have become stalled or even inactive. In addition, many BUMDES managers are frequently unprepared to operate the newly opened business. Readiness in terms of the quality of human resources also affects the formation of BUMDES. Consequently, the objective of this study is …


Comparison Of Web 2.0 Use On State University Websites In Indonesia And Top World Universities Related To Webometric Ranking, Handaru Jati Dec 2022

Comparison Of Web 2.0 Use On State University Websites In Indonesia And Top World Universities Related To Webometric Ranking, Handaru Jati

Elinvo (Electronics, Informatics, and Vocational Education)

The present work determines the presence in the web 2.0 that twenty universities had through their educational portals. The universities are selected according to the Webometrics ranking (the ten best located in Indonesia and the best located worldwide) to identify what Web 2.0 tools they use. This study explores the educational portals of the twenty selected universities to determine which Web 2.0 tools they use and variables of the tools found will be assessed. The study only considers those Web 2.0 tools which are linked to the websites of universities. Of the two most used tools, the relevant indicators are …


Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li Dec 2022

Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander Dec 2022

Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander

School of Business: Faculty Publications and Other Works

Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Travel Dashboard, Naveen Kumar Lalam Dec 2022

Travel Dashboard, Naveen Kumar Lalam

Culminating Experience Projects

Travel Dashboard is a one stop solution for all the travel needs of travelers and tourists visiting a new place. In today’s world travel has become a part of everyone’s life and we love to travel whenever there is a holiday or long a weekend. Earlier, the travel industry was mostly dictated by tour operators who used to plan and organize tours with standard itinerary, while tourists had very limited choices and needed to pick one of the itineraries given by operator as there was no other option left for them. Time have changed now as travelers love to plan …


Malware Detection And Analysis, Namratha Suraneni Dec 2022

Malware Detection And Analysis, Namratha Suraneni

Culminating Experience Projects

Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a global pandemic in the form of computer viruses, Trojan horses, and Internet worms. Studies imply that the effects of malware are deteriorating. The main defense against malware is malware detectors. The methods that such a detector employ define its level of quality. Therefore, it is crucial that we research malware detection methods and comprehend their advantages and disadvantages. Attackers are creating malware that is polymorphic and metamorphic and has the capacity to modify their source code as they spread. Furthermore, existing defenses, which often utilize …