Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 4794

Full-Text Articles in Physical Sciences and Mathematics

A Near-Optimal Change-Detection Based Algorithm For Piecewise-Stationary Combinatorial Semi-Bandits, Huozhi Zhou, Lingda Wang, Lav N. Varshney, Ee Peng Lim Dec 2020

A Near-Optimal Change-Detection Based Algorithm For Piecewise-Stationary Combinatorial Semi-Bandits, Huozhi Zhou, Lingda Wang, Lav N. Varshney, Ee Peng Lim

Research Collection School Of Information Systems

We investigate the piecewise-stationary combinatorial semi-bandit problem. Compared to the original combinatorial semi-bandit problem, our setting assumes the reward distributions of base arms may change in a piecewise-stationary manner at unknown time steps. We propose an algorithm, GLR-CUCB, which incorporates an efficient combinatorial semi-bandit algorithm, CUCB, with an almost parameter-free change-point detector, the Generalized Likelihood Ratio Test (GLRT). Our analysis shows that the regret of GLR-CUCB is upper bounded by O(√NKT logT), where N is the number of piecewise-stationary segments, K is the number of base arms, and T is the number of time steps. As a complement, we ...


Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun May 2020

Improved Chinese Language Processing For An Open Source Search Engine, Xianghong Sun

Master's Projects

Natural Language Processing (NLP) is the process of computers analyzing on human languages. There are also many areas in NLP. Some of the areas include speech recognition, natural language understanding, and natural language generation.

Information retrieval and natural language processing for Asians languages has its own unique set of challenges not present for Indo-European languages. Some of these are text segmentation, named entity recognition in unsegmented text, and part of speech tagging. In this report, we describe our implementation of and experiments with improving the Chinese language processing sub-component of an open source search engine, Yioop. In particular, we rewrote ...


Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya May 2020

Benchmarking Mongodb Multi-Document Transactions In A Sharded Cluster, Tushar Panpaliya

Master's Projects

Relational databases like Oracle, MySQL, and Microsoft SQL Server offer trans- action processing as an integral part of their design. These databases have been a primary choice among developers for business-critical workloads that need the highest form of consistency. On the other hand, the distributed nature of NoSQL databases makes them suitable for scenarios needing scalability, faster data access, and flexible schema design. Recent developments in the NoSQL database community show that NoSQL databases have started to incorporate transactions in their drivers to let users work on business-critical scenarios without compromising the power of distributed NoSQL features [1].

MongoDB is ...


Server Score, Zachary Buresh May 2020

Server Score, Zachary Buresh

Student Academic Conference

This presentation is in regards to the Android mobile application that I developed in the Kotlin programming language named "Server Score". The app helps waiters/waitresses calculate, track, and predict performance related statistics on the job.


Improved User News Feed Customization For An Open Source Search Engine, Timothy Chow May 2020

Improved User News Feed Customization For An Open Source Search Engine, Timothy Chow

Master's Projects

Yioop is an open source search engine project hosted on the site of the same name.It offers several features outside of searching, with one such feature being a news feed. The current news feed system aggregates articles from a curated list of news sites determined by the owner. However in its current state, the feed list is limited in size, constrained by the hardware that the aggregator is run on. The goal of my project was to overcome this limit by improving the current storage method used. The solution was derived by making use of IndexArchiveBundles and IndexShards, both ...


The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman May 2020

The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman

Seattle Journal of Technology, Environmental & Innovation Law

In 1998, Congress passed the Digital Millennium Copyright Act. This law provided new methods of protecting copyright in online media. These protections shift the normal judicial process that would stop the publication of infringing materials to private actors: the online platforms. As a result, online platforms receive notices of infringement and issue takedowns of allegedly copyrighted works without the judicial process which normally considers the purpose of the original notice of infringement. In at least one case, discussed in detail below, this has resulted in a notice and takedown against an individual for reasons not related to the purpose of ...


Mg2vec: Learning Relationship-Preserving Heterogeneous Graph Representations Via Metagraph Embedding, Wentao Zhang, Yuan Fang, Zemin Liu, Min Wu, Xinming Zhang May 2020

Mg2vec: Learning Relationship-Preserving Heterogeneous Graph Representations Via Metagraph Embedding, Wentao Zhang, Yuan Fang, Zemin Liu, Min Wu, Xinming Zhang

Research Collection School Of Information Systems

Given that heterogeneous information networks (HIN) encompass nodes and edges belonging to different semantic types, they can model complex data in real-world scenarios. Thus, HIN embedding has received increasing attention, which aims to learn node representations in a low-dimensional space, in order to preserve the structural and semantic information on the HIN. In this regard, metagraphs, which model common and recurring patterns on HINs, emerge as a powerful tool to capture semantic-rich and often latent relationships on HINs. Although metagraphs have been employed to address several specific data mining tasks, they have not been thoroughly explored for the more general ...


Using Alteryx Designer In Audit, Nolan Asiala Apr 2020

Using Alteryx Designer In Audit, Nolan Asiala

Honors Projects

My senior project was built around data analysis and how it relates to the auditing profession. Initially, I was planning on attending a data analytics competition, but that was canceled due to the events of COVID-19. This project utilized the Alteryx Designer program to demonstrate how it can be used during an audit engagement. By creating a workflow in Alteryx Designer, a report from a client can be cleaned and reformatted into a working dataset. My project includes two Excel files, a Microsoft Word document that serves as a brief introduction to the program, and a video describing the workflow ...


A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang Apr 2020

A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang

Research Collection School Of Information Systems

In open-domain dialogue systems, dialogue cues such as emotion, persona, and emoji can be incorporated into conversation models for strengthening the semantic relevance of generated responses. Existing neural response generation models either incorporate dialogue cue into decoder’s initial state or embed the cue indiscriminately into the state of every generated word, which may cause the gradients of the embedded cue to vanish or disturb the semantic relevance of generated words during back propagation. In this paper, we propose a Cue Adaptive Decoder (CueAD) that aims to dynamically determine the involvement of a cue at each generation step in the ...


Cartographic Vandalism In The Era Of Location-Based Games—The Case Of Openstreetmap And Pokémon Go, Levente Juhasz, Tessio Novack, Hartwig H. Hochmair, Sen Qiao Mar 2020

Cartographic Vandalism In The Era Of Location-Based Games—The Case Of Openstreetmap And Pokémon Go, Levente Juhasz, Tessio Novack, Hartwig H. Hochmair, Sen Qiao

GIS Center

No abstract provided.


Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki Mar 2020

Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki

Theses and Dissertations

Performing flight tests is a natural part of researching cutting edge sensors and filters for sensor integration. Unfortunately, tests are expensive, and typically take many months of planning. A sensible goal would be to make previously collected data readily available to researchers for future development. The Air Force Institute of Technology (AFIT) has hundreds of data logs potentially available to aid in facilitating further research in the area of navigation. A database would provide a common location where older and newer data sets are available. Such a database must be able to store the sensor data, metadata about the sensors ...


A 12-Lead Ecg Database To Identify Origins Of Idiopathic Ventricular Arrhythmia Containing 334 Patients, Jianwei Zhang, Guohua Fu, Kyle Anderson, Huimin Chu, Cyril Rakovski Mar 2020

A 12-Lead Ecg Database To Identify Origins Of Idiopathic Ventricular Arrhythmia Containing 334 Patients, Jianwei Zhang, Guohua Fu, Kyle Anderson, Huimin Chu, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Cardiac catheter ablation has shown the effectiveness of treating the idiopathic premature ventricular complex and ventricular tachycardia. As the most important prerequisite for successful therapy, criteria based on analysis of 12-lead ECGs are employed to reliably speculate the locations of idiopathic ventricular arrhythmia before a subsequent catheter ablation procedure. Among these possible locations, right ventricular outflow tract and left outflow tract are the major ones. We created a new 12-lead ECG database under the auspices of Chapman University and Ningbo First Hospital of Zhejiang University that aims to provide high quality data enabling detection of the distinctions between idiopathic ventricular ...


Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos Mar 2020

Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos

Electronic Thesis and Dissertation Repository

Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large-scale adoption is still in its infancy. The relatively recent popularity of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, etc. have been largely ignored or left to future work. This thesis seeks to aid in the adoption of ABAC by filling ...


A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser Mar 2020

A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser

Psychology Faculty Articles and Research

A challenge for data sharing in systems neuroscience is the multitude of different data formats used. Neurodata Without Borders: Neurophysiology 2.0 (NWB:N) has emerged as a standardized data format for the storage of cellular-level data together with meta-data, stimulus information, and behavior. A key next step to facilitate NWB:N adoption is to provide easy to use processing pipelines to import/export data from/to NWB:N. Here, we present a NWB-formatted dataset of 1863 single neurons recorded from the medial temporal lobes of 59 human subjects undergoing intracranial monitoring while they performed a recognition memory task. We ...


Feature Agglomeration Networks For Single Stage Face Detection, Jialiang Zhang, Xiongwei Wu, Steven C. H. Hoi, Jianke Zhu Mar 2020

Feature Agglomeration Networks For Single Stage Face Detection, Jialiang Zhang, Xiongwei Wu, Steven C. H. Hoi, Jianke Zhu

Research Collection School Of Information Systems

Recent years have witnessed promising results of exploring deep convolutional neural network for face detection. Despite making remarkable progress, face detection in the wild remains challenging especially when detecting faces at vastly different scales and characteristics. In this paper, we propose a novel simple yet effective framework of “Feature Agglomeration Networks” (FANet) to build a new single-stage face detector, which not only achieves state-of-the-art performance but also runs efficiently. As inspired by Feature Pyramid Networks (FPN) (Lin et al., 2017), the key idea of our framework is to exploit inherent multi-scale features of a single convolutional neural network by aggregating ...


The Spatial Optimization And Evaluation Of The Economic, Ecological, And Social Value Of Urban Green Space In Shenzhen, Yuhan Yu, Wenting Zhang, Peihong Fu, Wei Huang, Keke Li, Kai Cao Mar 2020

The Spatial Optimization And Evaluation Of The Economic, Ecological, And Social Value Of Urban Green Space In Shenzhen, Yuhan Yu, Wenting Zhang, Peihong Fu, Wei Huang, Keke Li, Kai Cao

Research Collection School Of Information Systems

Urban green space (UGS) is important in urban systems, as it benefits economic development, ecological conservation, and living conditions. Many studies have evaluated the economic, ecological, and social value of UGS worldwide, and spatial optimization for UGS has been carried out to maximize its value. However, few studies have simultaneously examined these three values of UGS in one optimization system. To fill this gap, this study evaluated the economic value of UGS in terms of promoting housing prices, its ecological value through the relief of high land surface temperature (LST), and its social value through the provision of recreation spaces ...


Detecting Fake News In Social Media: An Asia-Pacific Perspective, Meeyoung Cha, Wei Gao, Cheng-Te Li Mar 2020

Detecting Fake News In Social Media: An Asia-Pacific Perspective, Meeyoung Cha, Wei Gao, Cheng-Te Li

Research Collection School Of Information Systems

In March 2011, the catastrophic accident known as "The Fukushima Daiichi nuclear disaster" took place, initiated by the Tohoku earthquake and tsunami in Japan. The only nuclear accident to receive a Level-7 classification on the International Nuclear Event Scale since the Chernobyl nuclear power plant disaster in 1986, the Fukushima event triggered global concerns and rumors regarding radiation leaks. Among the false rumors was an image, which had been described as a map of radioactive discharge emanating into the Pacific Ocean, as illustrated in the accompanying figure. In fact, this figure, depicting the wave height of the tsunami that followed ...


Space Efficient Revocable Ibe For Mobile Devices In Cloud Computing, Baodong Qin, Ximeng Liu, Zhuo Wei, Dong Zheng Mar 2020

Space Efficient Revocable Ibe For Mobile Devices In Cloud Computing, Baodong Qin, Ximeng Liu, Zhuo Wei, Dong Zheng

Research Collection School Of Information Systems

No abstract provided.


Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao Mar 2020

Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao

Research Collection School Of Information Systems

Motivation: Synthetic lethality (SL) is a promising form of gene interaction for cancer therapy, as it isable to identify specific genes to target at cancer cells without disrupting normal cells. As high-throughputwet-lab settings are often costly and face various challenges, computational approaches have become apractical complement. In particular, predicting SLs can be formulated as a link prediction task on a graphof interacting genes. Although matrix factorization techniques have been widely adopted in link prediction,they focus on mapping genes to latent representations in isolation, without aggregating information fromneighboring genes. Graph convolutional networks (GCN) can capture such neighborhood dependency ina graph ...


Establishing An Information System For Documenting Valuable Buildings By Using Gis In Egypt, Mona Mahrous Abdel Wahed Feb 2020

Establishing An Information System For Documenting Valuable Buildings By Using Gis In Egypt, Mona Mahrous Abdel Wahed

Emirates Journal for Engineering Research

Valuable heritage buildings are the history of nations, and history forms the identities of these nations. Many of these buildings are exposed to deterioration, destruction and distortion. Therefore, it is essential to protect and maintain these buildings to protect history. Effective documentation of valuable buildings is necessary to guide and assist stakeholders in making decisions regarding valuable buildings. Documentation requires robust and scientific methods. Therefore, it is important to utilize new technology in general and geographic information system GIS in particular in documenting valuable buildings. GIS has the potential to contribute and deal with valuable buildings at various stages and ...


Stochastically Robust Personalized Ranking For Lsh Recommendation Retrieval, Hady W. Lauw Feb 2020

Stochastically Robust Personalized Ranking For Lsh Recommendation Retrieval, Hady W. Lauw

Research Collection School Of Information Systems

Locality Sensitive Hashing (LSH) has become one of the most commonly used approximate nearest neighbor search techniques to avoid the prohibitive cost of scanning through all data points. For recommender systems, LSH achieves efficient recommendation retrieval by encoding user and item vectors into binary hash codes, reducing the cost of exhaustively examining all the item vectors to identify the topk items. However, conventional matrix factorization models may suffer from performance degeneration caused by randomly-drawn LSH hash functions, directly affecting the ultimate quality of the recommendations. In this paper, we propose a framework named SRPR, which factors in the stochasticity of ...


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki Jan 2020

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...


Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker Jan 2020

Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker

Research Collection School Of Information Systems

As more organizations are placing cloud computing at the heart of their digital transformation strategy, it is important that they adopt appropriate architectures and development methodologies to leverage the full benefits of the cloud. A mere “lift and move” approach, where traditional monolith applications are moved to the cloud will not support the demands of digital services. While, monolithic applications may be easier to develop and control, they are inflexible to change and lack the scalability needed for cloud environments. Microservices architecture, which adopts some of the concepts and principles from service-oriented architecture, provides a number of benefits when developing ...


The Future Of Work Now: Medical Coding With Ai, Thomas H. Davenport, Steven M. Miller Jan 2020

The Future Of Work Now: Medical Coding With Ai, Thomas H. Davenport, Steven M. Miller

Research Collection School Of Information Systems

The coding of medical diagnosis and treatment has always been a challenging issue. Translating a patient’s complex symptoms, and a clinician’s efforts to address them, into a clear and unambiguous classification code was difficult even in simpler times. Now, however, hospitals and health insurance companies want very detailed information on what was wrong with a patient and the steps taken to treat them— for clinical record-keeping, for hospital operations review and planning, and perhaps most importantly, for financial reimbursement purposes.


Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu Jan 2020

Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu

Electrical & Computer Engineering Faculty Publications

This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only ...


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have ...


Telecommunications Database, Tristan Hess Jan 2020

Telecommunications Database, Tristan Hess

Williams Honors College, Honors Research Projects

The final goal of this project was to create a web application that is specifically tailored to make management of data for the Telecommunications department easier. The software that the department uses for phone service generates monthly reports that cannot be stored into their current database system. The Telecommunications Database project is a four-tier web application that was developed to store the monthly report information and alleviate the burden of manually searching through the reports for information. The web application implements basic database functionality for searching, inserting, updating, and deleting data contained in the monthly reports. Advanced searching functionality and ...


Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley Jan 2020

Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley

All Regis University Theses

This thesis argues that the current food system is untenable in the long term due to its significant negative impacts on the global ecosystem and society.


Word Embedding Driven Concept Detection In Philosophical Corpora, Dylan Hayton-Ruffner Jan 2020

Word Embedding Driven Concept Detection In Philosophical Corpora, Dylan Hayton-Ruffner

Honors Projects

During the course of research, scholars often explore large textual databases for segments of text relevant to their conceptual analyses. This study proposes, develops and evaluates two algorithms for automated concept detection in theoretical corpora: ACS and WMD retrieval. Both novel algorithms are compared to key word retrieval, using a test set from the Digital Ricoeur corpus tagged by scholarly experts. WMD retrieval outperforms key word search on the concept detection task. Thus, WMD retrieval is a promising tool for concept detection and information retrieval systems focused on theoretical corpora.


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a ...