Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 6331 - 6360 of 6717

Full-Text Articles in Physical Sciences and Mathematics

Study Of Fermion Pair Production In E+E- Collisions At 130-183 Gev, R. Barate, M. Thulasidas Jan 2000

Study Of Fermion Pair Production In E+E- Collisions At 130-183 Gev, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

The cross sections and forward-backward asymmetries of hadronic and leptonic events produced in e+e−e+e− collisions at centre-of-mass energies from 130 to 183 GeV are presented. Results for e+e−e+e−, μ+μ−μ+μ−, τ+τ−τ+τ−, qq¯qq¯, bb¯bb¯ and cc¯cc¯ production show no significant deviation from the Standard Model predictions. This enables constraints to be set upon physics beyond the Standard Model such as four-fermion contact interactions, leptoquarks, Z′Z′ bosons and R-parity violating squarks and sneutrinos. Limits on the energy scale ΛΛ of e+e−ff¯e+e−ff¯ contact interactions are typically in the range from 2 to 10 TeV. Limits on R-parity violating sneutrinos reach masses of a few …


An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim Jan 2000

An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Many data analysts require tools which can integrate their database management packages (e.g. Microsoft Access) with their data analysis ones (e.g. SAS, SPSS), and provide guidance for the selection of appropriate mining algorithms. In addition, the analysts need to extract and validate statistical results to facilitate data mining. In this paper, we describe an integrated data mining system called the Linear Correlation Discovery System (LCDS) that meets the above requirement. LCDS consists of four major sub-components, two of which, the selection assistant and the statistics coupler, are discussed in this paper. The former examines the schema and instances to determine …


Designing Electronic Casebooks That Talk Back: The Cato Program, Kevin D. Ashley Jan 2000

Designing Electronic Casebooks That Talk Back: The Cato Program, Kevin D. Ashley

Articles

Electronic casebooks offer important benefits of flexibility in control of presentation, connectivity, and interactivity. These additional degrees of freedom, however, also threaten to overwhelm students. If casebook authors and instructors are to achieve their pedagogical goals, they will need new methods for guiding students. This paper presents three such methods developed in an intelligent tutoring environment for engaging students in legal role-playing, making abstract concepts explicit and manipulable, and supporting pedagogical dialogues. This environment is built around a program known as CATO, which employs artificial intelligence techniques to teach first-year law students how to make basic legal arguments with cases. …


Inclusive Production Of Π0, Η, Η′ (958), Kg0s And Λ In Two- And Three-Jet Events From Hadronic Z Decays, R. Barate, M. Thulasidas Jan 2000

Inclusive Production Of Π0, Η, Η′ (958), Kg0s And Λ In Two- And Three-Jet Events From Hadronic Z Decays, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

The production rates and the inclusive cross sections of the isovector meson π0π0, the isoscalar mesons ηη and η′(958)η′(958), the strange meson K0SKS0 and the ΛΛ baryon have been measured as functions of scaled energy in hadronic events, two-jet events and each jet of three-jet events from hadronic Z decays and compared to Monte Carlo models. The analysis is based on 3.7 million hadronic events collected with the ALEPH detector at LEP at a centre-of-mass energy of s√=91.2s=91.2 GeV. The JETSET modelling of the gluon fragmentation into isoscalar mesons is found to be in agreement with the experimental results. HERWIG …


Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan Jan 2000

Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Supervised Adaptive Resonance Theory is a family of neural networks that performs incremental supervised learning of recognition categories (pattern classes) and multidimensional maps of both binary and analog patterns. This chapter highlights that the supervised ART architecture is compatible with IF-THEN rule-based symbolic representation. Specifi­cally, the knowledge learned by a supervised ART system can be readily translated into rules for interpretation. Similarly, a priori domain knowl­edge in the form of IF-THEN rules can be converted into a supervised ART architecture. Not only does initializing networks with prior knowl­edge improve predictive accuracy and learning efficiency, the inserted symbolic knowledge can also …


Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas Jan 2000

Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

The properties of the Z resonance are measured from the analysis of 4.5 million Z decays into fermion pairs collected with the ALEPH detector at LEP. The data are consistent with lepton universality. The resonance parameters are measured to be MZ=(91.1885±0.0031)GeV/c2MZ=(91.1885±0.0031)GeV/c2, ΓZ=(2.4951±0.0043)ΓZ=(2.4951±0.0043) GeV, σ0had=(41.559±0.058)σhad0=(41.559±0.058) nb and, combining the three lepton flavours, Rℓ=20.725±0.039Rℓ=20.725±0.039. The corresponding number of light neutrino species is Nν=2.983±0.013Nν=2.983±0.013 and the strong coupling constant is αs(MZ)=0.114±0.004±0.002QCD+0.005log10[MH150GeV/c2]αs(MZ)=0.114±0.004±0.002QCD+0.005log10⁡[MH150GeV/c2]. The lepton pair forward-backward asymmetry is measured to be A0,ℓFB=0.0173±0.0016AFB0,ℓ=0.0173±0.0016 from which the effective weak mixing angle is derived: sin2θlepteff=0.23089±0.00089sin2⁡θefflept=0.23089±0.00089. The measurement of the leptonic width Γℓℓ=84.02±0.15Γℓℓ=84.02±0.15 MeV leads to a determination …


Measurements Of The Structure Of Quark And Gluon Jets In Hadronic Z Decays, R. Barate, M. Thulasidas Jan 2000

Measurements Of The Structure Of Quark And Gluon Jets In Hadronic Z Decays, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

An experimental investigation of the structure of identified quark and gluon jets is presented. Observables related to both the global and internal structure of jets are measured; this allows for tests of QCD over a wide range of transverse momentum scales. The observables include distributions of jet-shape variables, the mean and standard deviation of the subjet multiplicity distribution and the fragmentation function for charged particles. The data are compared with predictions of perturbative QCD as well as QCD-based Monte Carlo models. In certain kinematic regions the measurements are sensitive mainly to perturbatively calculable effects, allowing for a test of QCD. …


The Ups Prototype: An Experimental End-User Service Across E-Print Archives, Herbert Van De Sompel, Thomas Krichel, Michael L. Nelson, Patrick Hochstenbach, Victor Lyapunov, Kurt Maly, Mohammad Zubair, Mohamed Kholief, Xiaoming Liu, Heath O'Connell Jan 2000

The Ups Prototype: An Experimental End-User Service Across E-Print Archives, Herbert Van De Sompel, Thomas Krichel, Michael L. Nelson, Patrick Hochstenbach, Victor Lyapunov, Kurt Maly, Mohammad Zubair, Mohamed Kholief, Xiaoming Liu, Heath O'Connell

Computer Science Faculty Publications

A meeting was held in Santa Fe, New Mexico, October 21-22, 1999, to generate discussion and consensus about interoperability of publicly available scholarly information archives. The invitees represented several well known e-print and report archive initiatives, as well as organizations with interests in digital libraries and the transformation of scholarly communication. The central goal of the meeting was to agree on recommendations that would make the creation of end-user services -- such as scientific search engines and linking systems -- for data originating from distributed and dissimilar archives easier. The Universal Preprint Service (UPS) Prototype was developed in preparation for …


An International Cross-Cultural Study Of The Role Of Chief Informational Officers In Healthcare, Wallace Saunders Jan 2000

An International Cross-Cultural Study Of The Role Of Chief Informational Officers In Healthcare, Wallace Saunders

Faculty Dissertations

The introduction and utilization of Information Systems (IS) in the hospital environment has had a significant and lasting impact on the practice of medicine. The development of this dissertation will attempt to explore a widely overlooked area: The comparison of Chief Information Officers (CIOs) in the United States and the United Kingdom.

Aspects of CIO experiences relating to assumed roles, CIO challenges, skills, frustrations, success, failure, leadership, management, involvement and perceptions about the role of Information Technology (IT) in healthcare are discussed with a comparative global model. This study investigates the managerial roles of the Chief Information Officer based on …


Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler Dec 1999

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Several important classes of normal logic programs, including the classes of acyclic, acceptable, and locally hierarchical programs, have the property that every program in the class has a unique two-valued supported model. In this paper, we call such classes unique supported model classes. We analyse and characterize these classes by means of operators on three-valued logics. Our studies will motivate the definition of a larger unique supported model class which we call the class of Phi-accessible programs. Finally, we show that the class of Phi -accessible programs is computationally adequate in that every partial recursive function can be implemented by …


On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao Dec 1999

On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao

Kno.e.sis Publications

This paper presents a new recursive Bayesian learning approach for transformation parameter estimation in speaker adaptation. Our goal is to incrementally transform (or adapt) the entire set of HMM parameters for a new speaker or new acoustic enviroment from a small amount of adaptation data. By establishing a clustering tree of HMM Gaussian mixture components, the finest affine transformation parameters for individual HMM Gaussian mixture components can be dynamically searched. The on-line Bayesian learning technique proposed in our recent work is used for recursive maximum a posteriori estimation of affine transformation parameters. Speaker adaptation experiments using a 26-letter English alphabet …


Zbroker: A Query Routing Broker For Z39.50 Databases, Yong Lin, Jian Xu, Ee Peng Lim, Wee-Keong Ng Nov 1999

Zbroker: A Query Routing Broker For Z39.50 Databases, Yong Lin, Jian Xu, Ee Peng Lim, Wee-Keong Ng

Research Collection School Of Computing and Information Systems

A query routing broker is a software agent that determines from a large set of accessing information sources the ones most relevant to a user's information need. As the number of information sources on the Internet increases dramatically, future users will have to rely on query routing brokers to decide a small number of information sources to query without incurring too much query processing overheads. In this paper, we describe a query routing broker known as ZBroker developed for bibliographic database servers that support the Z39.50 protocol. ZBroker samples the content of each bibliographic database by using training queries and …


Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou Oct 1999

Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou

Kno.e.sis Publications

In the coming era of segment-of-one marketing, decisions about business transactions will be quite intricate, so that customer treatments can be highly individualized, reflecting customer preferences, targeted business objectives, etc. This paper describes a paradigm called “decision flows” for specifying a form of incremental decision-making that can combine a myriad of diverse business factors and be executed in near-realtime. Starting with initial input, a decision flow will iteratively gather and derive additional information until a conclusion is reached. Decision flows can be specified in a rules-based manner that generalizes so-called “business rules” but provides more structure than traditional expert systems. …


Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth Oct 1999

Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth

Kno.e.sis Publications

We share a widely-held vision that tomorrow's health care will be delivered by a distributed team using a knowledge based process that is focused on prevention and wellness. Caregivers will be able to treat and monitor patients where and when needed, capturing data as a natural byproduct of care delivery. Clinical teams with a wide range of skills and expertise will deliver consistent, quality care based on timely, situation-specific knowledge and guidance derived from outcomes evidence. That same knowledge will support advances in healthcare research and education. Home care and remote medicine will increase, reducing the need for high-cost hospitalization. …


Wedagen: A Synthetic Web Database Generator, Pallavi Priyardarshini, Fengqiong Qin, Ee Peng Lim, Wee-Keong Ng Sep 1999

Wedagen: A Synthetic Web Database Generator, Pallavi Priyardarshini, Fengqiong Qin, Ee Peng Lim, Wee-Keong Ng

Research Collection School Of Computing and Information Systems

At the Centre for Advanced Information Systems (CAIS), a Web warehousing system is being developed to store and manipulate Web information. The system named WHOWEDA (WareHouse Of WEb DAta) stores extracted Web information as Web tables and provides several Web operators, eg. Web join, Web select, global coupling, etc., to manipulate Web tables. During the implementation of WHOWEDA, it is necessary to perform systematic testing on the system and to evaluate its system performance. While it is possible for WHOWEDA to be tested or evaluated using actual Web pages downloaded from WWW, the amount of time required for such testing …


Research Issues In Web Data Mining, Sanjay Kumar Madria, Sourav S. Bhowmick, Wee-Keong Ng, Ee Peng Lim Sep 1999

Research Issues In Web Data Mining, Sanjay Kumar Madria, Sourav S. Bhowmick, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we discuss mining with respect to web data referred here as web data mining. In particular, our focus is on web data mining research in context of our web warehousing project called WHOWEDA (Warehouse of Web Data). We have categorized web data mining into threes areas; web content mining, web structure mining and web usage mining. We have highlighted and discussed various research issues involved in each of these web data mining category. We believe that web data mining will be the topic of exploratory research in near future.


Locating Web Information Using Web Checkpoints, Aik Kee Luah, Wee-Keong Ng, Ee Peng Lim, Wee Peng Lee, Yinyan Cao Sep 1999

Locating Web Information Using Web Checkpoints, Aik Kee Luah, Wee-Keong Ng, Ee Peng Lim, Wee Peng Lee, Yinyan Cao

Research Collection School Of Computing and Information Systems

Conventional search engines locate information by letting users establish a single web checkpoint1. By specifying one or more keywords, users direct search engines to return a set of documents that contain those keywords. From the documents (links) returned by search engines, user proceed to further probe the WWW from there. Hence, these initial set of documents (contingent upon the occurrence of keyword(s)) serve as a web checkpoint. Generally, these links are numerous and may not result in much fruitful searches. By establishing multiple web checkpoints, a richer and controllable search procedure can be constructed to obtain more relevant Web information. …


Non-Repudiation In An Agent-Based E-Commerce System, Chin Chuan Liew, Wee-Keong Ng, Ee Peng Lim, Beng Suang Tan, Kok-Leong Ong Sep 1999

Non-Repudiation In An Agent-Based E-Commerce System, Chin Chuan Liew, Wee-Keong Ng, Ee Peng Lim, Beng Suang Tan, Kok-Leong Ong

Research Collection School Of Computing and Information Systems

Abecos is an agent-based e-commerce system under development at the Nanyang Technological University. A key factor in making this system usable in practice is strict security controls. One aspect of security is the provision of non-repudiation services. As protocols for non-repudiation have focused on -message non-repudiation, its adaptation to afford non-repudiation in a communication session for two agents in Abecos is inefficient. In this work, we investigate and propose a protocol for enforcing non-repudiation in a session. The protocol is believed to be applicable in any e-commerce system; agent- or not agent-based.


Cluster-Based Database Selection Techniques For Routing Bibliographic Queries, Jian Xu, Ee Peng Lim, Wee-Keong Ng Aug 1999

Cluster-Based Database Selection Techniques For Routing Bibliographic Queries, Jian Xu, Ee Peng Lim, Wee-Keong Ng

Research Collection School Of Computing and Information Systems

In this paper, we focus on the database selection problem in the context of a global digital library consisting of a large number of online bibliographic servers. Each server hosts a bibliographic database that contains bibliographic records each of which consists of text values for a number of pre-defined bibliographic attributes such as title, author, call number, subject, etc.. Each bibliographic database supports user queries on the bibliographic attributes. Since bibliographic records are relatively small in size, we only consider bibliographic databases that support boolean queries on the bibliographic attributes, and the query results are not ranked. While focusing on …


Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente Jun 1999

Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente

Theses and Dissertations

N-tier architecture has been more commonly used as a methodology for developing large database applications. This work evaluates the use of this architecture instead of the classical Client/Server architecture in developing corporate applications based on distributed databases. The comparison between architectures is performed using applications that execute transactions similar to those defined in the Transaction Process Council Type C benchmark (TPC-C). The environment used for development and testing was the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs, running Microsoft Windows NT 4.0 OS. The comparative experimental analysis demonstrated that the N-tier architecture allows more efficient bandwidth utilization between …


A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller Jun 1999

A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller

Kno.e.sis Publications

The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals. An MLS workflow management system that allows a user to program multilevel mission logic, to securely coordinate widely distributed tasks, and to monitor the progress of the workflow across classification levels is required. In this paper, we present a roadmap for implementing MLS workflows and focus on a workflow builder that is a graphical design tool for specifying such workflows.


Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts Jun 1999

Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts

Faculty Articles

Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems.

This …


Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese Jun 1999

Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese

Theses and Dissertations

The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object oriented approach, the data and schema of the scenario databases, represented in an object oriented model, are integrated into a global database also represented …


Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen Jun 1999

Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen

Theses and Dissertations

This research organizes, presents, and analyzes contemporary Multiobjective Evolutionary Algorithm (MOEA) research and associated Multiobjective Optimization Problems (MOPs). Using a consistent MOEA terminology and notation, each cited MOEAs' key factors are presented in tabular form for ease of MOEA identification and selection. A detailed quantitative and qualitative MOEA analysis is presented, providing a basis for conclusions about various MOEA-related issues. The traditional notion of building blocks is extended to the MOP domain in an effort to develop more effective and efficient MOEAs. Additionally, the MOEA community's limited test suites contain various functions whose origins and rationale for use are often …


Porting The Sisal Functional Language To Distributed-Memory Multiprocessors, Jui-Yuan Ku May 1999

Porting The Sisal Functional Language To Distributed-Memory Multiprocessors, Jui-Yuan Ku

Dissertations

Parallel computing is becoming increasingly ubiquitous in recent years. The sizes of application problems continuously increase for solving real-world problems. Distributed-memory multiprocessors have been regarded as a viable architecture of scalable and economical design for building large scale parallel machines. While these parallel machines can provide computational capabilities, programming such large-scale machines is often very difficult due to many practical issues including parallelization, data distribution, workload distribution, and remote memory latency.

This thesis proposes to solve the programmability and performance issues of distributed-memory machines using the Sisal functional language. The programs written in Sisal will be automatically parallelized, scheduled and …


Automatic Document Classification And Extraction System (Adoces), Xuhong Li May 1999

Automatic Document Classification And Extraction System (Adoces), Xuhong Li

Dissertations

Document processing is a critical element of office automation. Document image processing begins from the Optical Character Recognition (OCR) phase with complex processing for document classification and extraction. Document classification is a process that classifies an incoming document into a particular predefined document type. Document extraction is a process that extracts information pertinent to the users from the content of a document and assigns the information as the values of the “logical structure” of the document type. Therefore, after document classification and extraction, a paper document will be represented in its digital form instead of its original image file format, …


A New-Generation Class Of Parallel Architectures And Their Performance Evaluation, Qian Wang May 1999

A New-Generation Class Of Parallel Architectures And Their Performance Evaluation, Qian Wang

Dissertations

The development of computers with hundreds or thousands of processors and capability for very high performance is absolutely essential for many computation problems, such as weather modeling, fluid dynamics, and aerodynamics. Several interconnection networks have been proposed for parallel computers. Nevertheless, the majority of them are plagued by rather poor topological properties that result in large memory latencies for DSM (Distributed Shared-Memory) computers. On the other hand, scalable networks with very good topological properties are often impossible to build because of their prohibitively high VLSI (e.g., wiring) complexity. Such a network is the generalized hypercube (GH). The GH supports full-connectivity …


Applying Neural Networks In Case-Based Reasoning Adaptation For Cost Assessment Of Steel Buldings, Essam Amin Mlotfy Abdrabou May 1999

Applying Neural Networks In Case-Based Reasoning Adaptation For Cost Assessment Of Steel Buldings, Essam Amin Mlotfy Abdrabou

Archived Theses and Dissertations

No abstract provided.


How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin Apr 1999

How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin

Kno.e.sis Publications

No abstract provided.


The Dynamics Of Cyberspace: Examining And Modelling Online Social Structure, Brian S. Butler '89 Apr 1999

The Dynamics Of Cyberspace: Examining And Modelling Online Social Structure, Brian S. Butler '89

Doctoral Dissertations

It has been proposed that online social structures represent new forms of organizing which are fundamentally different from traditional social structures. However, while there is a growing body of empirical research that considers behavioral aspects of online activity, research on online social structure structural remains largely anecdotal. This work consists of three papers that combine previous studies of traditional social structures, empirical analysis of longitudinal data from a sample of Internet listservs, and computational modeling to examine the dynamics of social structure development in networked environments.

The first paper (Title: When is a Group not a Group: An Empirical Examination …