Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 4141

Full-Text Articles in Physical Sciences and Mathematics

Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter Feb 2019

Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter

International Journal of Business and Technology

Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious ...


Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal Feb 2019

Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal

International Journal of Business and Technology

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data ...


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Feb 2019

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

International Journal of Business and Technology

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have ...


Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith Feb 2019

Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith

International Journal of Business and Technology

The testing of simulation models has much in common with testing processes in other types of application involving software development. However, there are also important differences associated with the fact that simulation model testing involves two distinct aspects, which are known as verification and validation. Model validation is concerned with investigation of modelling errors and model limitations while verification involves checking that the simulation program is an accurate representation of the mathematical and logical structure of the underlying model. Success in model validation depends upon the availability of detailed information about all aspects of the system being modelled. It also ...


Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali Feb 2019

Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali

UNLV Best Teaching Practices Expo

For computer science, and many technical fields, it is recognized that projects with real-world applicability play a significant roll in what students get out of the course. Creating applicable projects for upper division such as our data structures classes is very difficult and time consuming. We have utilized the Nifty assignments concept and applied it locally to an upper division data structures course. Our primary goal is to provide a forum for the sharing of data structure project ideas and materials (as applicable).


Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf Feb 2019

Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf

The Kabod

The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and ...


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater Jan 2019

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Development Of A Personal Logbook Android Application, John Byrnes Jan 2019

Development Of A Personal Logbook Android Application, John Byrnes

Economic Crime Forensics Capstones

Development of a mobile app to keep up with animal information.


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2019

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou Jan 2019

Automated Trading Systems Statistical And Machine Learning Methods And Hardware Implementation: A Survey, Boming Huang, Yuziang Huan, Li Da Xu, Lirong Zheng, Zhuo Zou

Information Technology & Decision Sciences Faculty Publications

Automated trading, which is also known as algorithmic trading, is a method of using a predesigned computer program to submit a large number of trading orders to an exchange. It is substantially a real-time decision-making system which is under the scope of Enterprise Information System (EIS). With the rapid development of telecommunication and computer technology, the mechanisms underlying automated trading systems have become increasingly diversified. Considerable effort has been exerted by both academia and trading firms towards mining potential factors that may generate significantly higher profits. In this paper, we review studies on trading systems built using various methods and ...


Utilization Of Various Methods And A Landsat Ndvi/Google Earth Engine Product For Classifying Irrigated Land Cover, Andrew Nemecek Jan 2019

Utilization Of Various Methods And A Landsat Ndvi/Google Earth Engine Product For Classifying Irrigated Land Cover, Andrew Nemecek

Graduate Student Theses, Dissertations, & Professional Papers

Methods for classifying irrigated land cover are often complex and not quickly reproducible. Further, moderate resolution time-series datasets have been consistently utilized to produce irrigated land cover products over the past decade, and the body of irrigation classification literature contains no examples of subclassification of irrigated land cover by irrigation method. Creation of geospatial irrigated land cover products with higher resolution datasets could improve reliability, and subclassification of irrigation by method could provide better information for hydrologists and climatologists attempting to model the role of irrigation in the surface-ground water cycle and the water-energy balance. This study summarizes a simple ...


Providers’ Perception Of Alert Fatigue After Implementation Of User-Filtered Warnings, Hina Afaq, Sahaana Mukundan, Sadaf Zia, Alisa K. Escano Dr., Rebecca Lear Dr., Casey Washington Dr. Jan 2019

Providers’ Perception Of Alert Fatigue After Implementation Of User-Filtered Warnings, Hina Afaq, Sahaana Mukundan, Sadaf Zia, Alisa K. Escano Dr., Rebecca Lear Dr., Casey Washington Dr.

Pharmacotherapy and Outcomes Science Publications

Alert fatigue is a complex problem that many health institutions face when using an electronic health record (EHR). The addition of user-filtered warnings (UFW) is a physicians’ proposed intervention at Inova Health System (IHS), a large 5-hospital health system in Northern Virginia, that allows prescribers to filter out specific drug-drug interactions and pregnancy and lactation medication alerts for a 30-day period. This study aims to determine the impact of UFW on physicians’ perception of alert fatigue and to calculate the reduction of medication alerts. It was hypothesized that the reduction in alerts will significantly impact physicians’ perception of alert fatigue ...


User-Centered Design Strategies For Clinical Brainâ??Computer Interface Assistive Technology Devices, Geraldine Light Jan 2019

User-Centered Design Strategies For Clinical Brainâ??Computer Interface Assistive Technology Devices, Geraldine Light

Walden Dissertations and Doctoral Studies

Although in the past 50 years significant advances based on research of brainâ??computer interface (BCI) technology have occurred, there is a scarcity of BCI assistive technology devices at the consumer level. This multiple case study explored user-centered clinical BCI device design strategies used by computer scientists designing BCI assistive technologies to meet patient-centered outcomes. The population for the study encompassed computer scientists experienced with clinical BCI assistive technology design located in the midwestern, northeastern, and southern regions of the United States, as well as western Europe. The multi-motive information systems continuance model was the conceptual framework for the study ...


Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver Jan 2019

Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver

Walden Dissertations and Doctoral Studies

Small business owners in a range of industries continually adapt to take advantage of technological developments in accounting, marketing, and communication. The purpose of this multiple case study was to explore strategies that small business owners operating in the central region of North Carolina used to implement information and communication technology (ICT). Roger's diffusion of innovation theory grounded the study. Data collection included face-to-face semistructured interviews with 6 owners of small businesses who successfully implemented ICT, field notes from site observations, and reviews of participant websites. Interviews were transcribed and participants were engaged in member checking. Data were analyzed ...


A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh Jan 2019

A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh

Walden Dissertations and Doctoral Studies

In small businesses in the United States, specifically those with fewer than 10 employees,

leaders may be skeptical of and resistant to the use of social media in their management

operations. Management literature does not indicate clear and effective guidelines and

policies detailing small marketing firms use of social media. The purpose of this

qualitative case study was to explore the perceptions of small marketing firm leaders

about the resources and knowledge needed for effective use of social media as a

management tool. Emerson's social exchange theory grounded the study. The study

targeted owners and managers of small marketing ...


Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez Jan 2019

Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez

Walden Dissertations and Doctoral Studies

The absence of legislation, the lack of a standard cybersecurity framework, and the failure to adopt a resilient cybersecurity posture can be detrimental to the availability, confidentiality, and integrity of municipal information systems. The purpose of this phenomenological study was to understand the cybersecurity posture of municipalities from the perception of public servants serving in information technology (IT) leadership roles in highly populated municipalities in the San Juan â?? Carolina â?? Caguas Metropolitan Statistical Area of Puerto Rico. The study was also used to address key factors influencing the cybersecurity posture of these municipalities. The theoretical framework was open system ...


Universally Decodable Matrices For Distributed Matrix-Vector Multiplication, Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel Jan 2019

Universally Decodable Matrices For Distributed Matrix-Vector Multiplication, Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel

Electrical and Computer Engineering Publications

Coded computation is an emerging research area that leverages concepts from erasure coding to mitigate the effect of stragglers (slow nodes) in distributed computation clusters, especially for matrix computation problems. In this work, we present a class of distributed matrix-vector multiplication schemes that are based on codes in the Rosenbloom-Tsfasman metric and universally decodable matrices. Our schemes take into account the inherent computation order within a worker node. In particular, they allow us to effectively leverage partial computations performed by stragglers (a feature that many prior works lack). An additional main contribution of our work is a companion matrix-based embedding ...


Toward Using High-Frequency Coastal Radars For Calibration Of S-Ais Based Ocean Vessel Tracking Models, Ben Freidrich Jan 2019

Toward Using High-Frequency Coastal Radars For Calibration Of S-Ais Based Ocean Vessel Tracking Models, Ben Freidrich

Theses and Dissertations (Comprehensive)

Most of the world relies on ships for transportation, shipping, and tourism. Automatic Identification System messages are transmitted from ships and provide a wealth of positional data on these open ocean vessels. This data is being utilized to determine the optimal path for ships, as well as predicting where a ship may be going in the near future. It has only been in the past decade that Automatic Identification Systems (AIS) signals have been easily received with satellites (S-AIS) so there have been few studies that look at using available information and pairing it with the new abundance of ship ...


Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach, Anindya B. Das, Aditya Ramamoorthy Jan 2019

Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach, Anindya B. Das, Aditya Ramamoorthy

Electrical and Computer Engineering Publications

Distributed computing systems are well-known to suffer from the problem of slow or failed nodes; these are referred to as stragglers. Straggler mitigation (for distributed matrix computations) has recently been investigated from the standpoint of erasure coding in several works. In this work we present a strategy for distributed matrix-vector multiplication based on convolutional coding. Our scheme can be decoded using a low-complexity peeling decoder. The recovery process enjoys excellent numerical stability as compared to Reed-Solomon coding based approaches (which exhibit significant problems owing their badly conditioned decoding matrices). Finally, our schemes are better matched to the practically important case ...


Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan Dec 2018

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan

LSU Master's Theses

The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen Dec 2018

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain ...


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK FOUND ...


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB ...


Deep Air Learning: Interpolation, Prediction, And Feature Analysis Of Fine-Grained Air Quality, Zhongang Qi, Tianchun Wang, Guojie Song, Weisong Hu, Xi Li, Zhongfei Mark Zhang Dec 2018

Deep Air Learning: Interpolation, Prediction, And Feature Analysis Of Fine-Grained Air Quality, Zhongang Qi, Tianchun Wang, Guojie Song, Weisong Hu, Xi Li, Zhongfei Mark Zhang

Research Collection School Of Information Systems

The interpolation, prediction, and feature analysis of fine-gained air quality are three important topics in the area of urban air computing. The solutions to these topics can provide extremely useful information to support air pollution control, and consequently generate great societal and technical impacts. Most of the existing work solves the three problems separately by different models. In this paper, we propose a general and effective approach to solve the three problems in one model called the Deep Air Learning (DAL). The main idea of DAL lies in embedding feature selection and semi-supervised learning in different layers of the deep ...


Using Smart Card Data To Model Commuters’ Response Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng Dec 2018

Using Smart Card Data To Model Commuters’ Response Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng

Research Collection School Of Information Systems

The mass rapid transit (MRT) network is playingan increasingly important role in Singapore’s transit network,thanks to its advantages of higher capacity and faster speed.Unfortunately, due to aging infrastructure, increasing demand,and other reasons like adverse weather condition, commuters inSingapore recently have been facing increasing unexpected traindelays (UTDs), which has become a source of frustration forboth commuters and operators. Most, if not all, existing workson delay management do not consider commuters’ behavior. Wededicate this paper to the study of commuters’ behavior duringUTDs. We adopt a data-driven approach to analyzing the sixmonth’ real data collected by automated fare collection ...


Mobility-Driven Ble Transmit-Power Adaptation For Participatory Data Muling, Chung-Kyun Han, Archan Misra, Shih-Fen Cheng Dec 2018

Mobility-Driven Ble Transmit-Power Adaptation For Participatory Data Muling, Chung-Kyun Han, Archan Misra, Shih-Fen Cheng

Research Collection School Of Information Systems

This paper analyzes a human-centric framework, called SmartABLE, for easy retrieval of the sensor values from pervasively deployed smart objects in a campus-like environment. In this framework, smartphones carried by campus occupants act as data mules, opportunistically retrieving data from nearby BLE (Bluetooth Low Energy) equipped smart object sensors and relaying them to a backend repository. We focus specifically on dynamically varying the transmission power of the deployed BLE beacons, so as to extend their operational lifetime without sacrificing the frequency of sensor data retrieval. We propose a memetic algorithm-based power adaptation strategy that can handle deployments of thousands of ...


Extraction Of Information Related To Adverse Drug Events From Electronic Health Record Notes: Design Of An End-To-End Model Based On Deep Learning, Fei Li, Weisong Liu, Hong Yu Nov 2018

Extraction Of Information Related To Adverse Drug Events From Electronic Health Record Notes: Design Of An End-To-End Model Based On Deep Learning, Fei Li, Weisong Liu, Hong Yu

Open Access Articles

BACKGROUND: Pharmacovigilance and drug-safety surveillance are crucial for monitoring adverse drug events (ADEs), but the main ADE-reporting systems such as Food and Drug Administration Adverse Event Reporting System face challenges such as underreporting. Therefore, as complementary surveillance, data on ADEs are extracted from electronic health record (EHR) notes via natural language processing (NLP). As NLP develops, many up-to-date machine-learning techniques are introduced in this field, such as deep learning and multi-task learning (MTL). However, only a few studies have focused on employing such techniques to extract ADEs.

OBJECTIVE: We aimed to design a deep learning model for extracting ADEs and ...


Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr. Nov 2018

Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr.

Statistics Preprints

Warranty return data from repairable systems, such as vehicles, usually result in recurrent event data. The non-homogeneous Poisson process (NHPP) model is used widely to describe such data. Seasonality in the repair frequencies and other variabilities, however, complicate the modeling of recurrent event data. Not much work has been done to address the seasonality, and this paper provides a general approach for the application of NHPP models with dynamic covariates to predict seasonal warranty returns. A hierarchical clustering method is used to stratify the population into groups that are more homogeneous than the than the overall population. The stratification facilitates ...