Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Databases and Information Systems

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 364

Full-Text Articles in Physical Sciences and Mathematics

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan Dec 2018

Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan

LSU Master's Theses

The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen Dec 2018

Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen

Master's Projects

Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …


Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK …


Phr: Patient Health Record, Quinn Nelson Dec 2018

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …


Eye Pressure Monitior, Andrea Nella Levy Dec 2018

Eye Pressure Monitior, Andrea Nella Levy

Computer Engineering

The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …


Comparison Mining From Text, Maksim Tkachenko Dec 2018

Comparison Mining From Text, Maksim Tkachenko

Dissertations and Theses Collection (Open Access)

Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.

If …


The Rise Of Real-Time Retail Payments, Zhiling Guo Dec 2018

The Rise Of Real-Time Retail Payments, Zhiling Guo

MITB Thought Leadership Series

TRANSACTING for just about anything using our mobile phones has become commonplace, and so many consumers will be intrigued to discover that after making a purchase it can still take longer for payment to reach a vendor’s bank account than it does for the purchased goods to be delivered.


Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham Dec 2018

Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham

MITB Thought Leadership Series

BIKE-SHARING programmes face many of the issues encountered by their counterparts in the carsharing world. But in Singapore, there are a number of factors that have a unique impact on the industry. These include the regulatory structure and the significant fines for those companies who do not abide by these regulations. When this is combined with the competitive nature of the industry in one of the world's most dynamic cities, it becomes clear that first movers who leverage machine learning and prediction will come to dominate the industry


An Essential Applied Statistical Analysis Course Using Rstudio With Project-Based Learning For Data Science, Aldy Gunawan, Michelle L. F. Cheong, Johnson Poh Dec 2018

An Essential Applied Statistical Analysis Course Using Rstudio With Project-Based Learning For Data Science, Aldy Gunawan, Michelle L. F. Cheong, Johnson Poh

Research Collection School Of Computing and Information Systems

This paper presents a newpostgraduate level course, named Applied Statistical Analysis with R. Wepresent the course structure, teaching methodology including the assessmentframework and student feedback. The course covers the basic concepts ofstatistics, the knowledge of applying statistical theory in analyzing real dataand the skill of developing statistical applications with R programminglanguage. The first half of each lesson is dedicated to teaching students thestatistical concepts while the second half focuses on the practical aspects ofimplementing the concepts within the RStudio console. The Project-BasedLearning (PBL) approach is adopted to encourage students to apply the knowledgegained to solve real world problems, answer complex …


Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim Dec 2018

Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In recent years, the use of digital tools and technologies in educational institutions are continuing to generate large amounts of digital traces of student learning behavior. This study presents a proof-of-concept analytics system that can detect at-risk students along their learning journey. Educators can benefit from the early detection of at-risk students by understanding factors which may lead to failure or drop-out. Further, educators can devise appropriate intervention measures before the students drop out of the course. Our system was built using SAS ® Enterprise Miner (EM) and SAS ® JMP Pro.


Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim Dec 2018

Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In this research, we focus on the social phenomenon of suicide. Specifically, we perform social sensing on digital traces obtained from Reddit. We analyze the posts and comments in that are related to depression and suicide. We perform natural language processing to better understand different aspects of human life that relate to suicide.


A Simple Proximal Stochastic Gradient Method For Nonsmooth Nonconvex Optimization, Zhize Li, Jian Li Dec 2018

A Simple Proximal Stochastic Gradient Method For Nonsmooth Nonconvex Optimization, Zhize Li, Jian Li

Research Collection School Of Computing and Information Systems

We analyze stochastic gradient algorithms for optimizing nonconvex, nonsmooth finite-sum problems. In particular, the objective function is given by the summation of a differentiable (possibly nonconvex) component, together with a possibly non-differentiable but convex component. We propose a proximal stochastic gradient algorithm based on variance reduction, called ProxSVRG+. Our main contribution lies in the analysis of ProxSVRG+. It recovers several existing convergence results and improves/generalizes them (in terms of the number of stochastic gradient oracle calls and proximal oracle calls). In particular, ProxSVRG+ generalizes the best results given by the SCSG algorithm, recently proposed by [Lei et al., NIPS'17] for …


Cross Euclidean-To-Riemannian Metric Learning With Application To Face Recognition From Video, Zhiwu Huang, R. Wang, S. Shan, Gool L Van Dec 2018

Cross Euclidean-To-Riemannian Metric Learning With Application To Face Recognition From Video, Zhiwu Huang, R. Wang, S. Shan, Gool L Van

Research Collection School Of Computing and Information Systems

Riemannian manifolds have been widely employed for video representations in visual classification tasks including video-based face recognition. The success mainly derives from learning a discriminant Riemannian metric which encodes the non-linear geometry of the underlying Riemannian manifolds. In this paper, we propose a novel metric learning framework to learn a distance metric across a Euclidean space and a Riemannian manifold to fuse average appearance and pattern variation of faces within one video. The proposed metric learning framework can handle three typical tasks of video-based face recognition: Video-to-Still, Still-to-Video and Video-to-Video settings. To accomplish this new framework, by exploiting typical Riemannian …


Active Matting, Xin Yang, Ke Xu, Shaozhe Chen, Shengfeng He, Baocai Yin, Rynson Lau Dec 2018

Active Matting, Xin Yang, Ke Xu, Shaozhe Chen, Shengfeng He, Baocai Yin, Rynson Lau

Research Collection School Of Computing and Information Systems

Image matting is an ill-posed problem. It requires a user input trimap or some strokes to obtain an alpha matte of the foreground object. A fine user input is essential to obtain a good result, which is either time consuming or suitable for experienced users who know where to place the strokes. In this paper, we explore the intrinsic relationship between the user input and the matting algorithm to address the problem of where and when the user should provide the input. Our aim is to discover the most informative sequence of regions for user input in order to produce …


On Learning Psycholinguistics Tools For English-Based Creole Languages Using Social Media Data, Pei-Chi Lo, Ee-Peng Lim Dec 2018

On Learning Psycholinguistics Tools For English-Based Creole Languages Using Social Media Data, Pei-Chi Lo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

The Linguistic Inquiry and Word Count (LIWC) tool is a psycholinguistics tool that has been widely used in both psychology and sociology research, and the LIWC scores derived from user-generated content are known to be good features for personality prediction [1], [2]. LIWC, however, is language specific as it relies on counting the percentage of predefined dictionary words occurring in the content. For content written in English Creoles which are languages based on English, the original English LIWC may not perform optimally due to its lack of words which are only used in the English Creoles. In this paper, we …


Deep Unsupervised Pixelization, Chu Han, Qiang Wen, Shengfeng He, Qianshu Zhu, Yinjie Tan, Guoqiang Han, Tien-Tsin Wong Dec 2018

Deep Unsupervised Pixelization, Chu Han, Qiang Wen, Shengfeng He, Qianshu Zhu, Yinjie Tan, Guoqiang Han, Tien-Tsin Wong

Research Collection School Of Computing and Information Systems

In this paper, we present a novel unsupervised learning method for pixelization. Due to the difficulty in creating pixel art, preparing the paired training data for supervised learning is impractical. Instead, we propose an unsupervised learning framework to circumvent such difficulty. We leverage the dual nature of the pixelization and depixelization, and model these two tasks in the same network in a bi-directional manner with the input itself as training supervision. These two tasks are modeled as a cascaded network which consists of three stages for different purposes. GridNet transfers the input image into multi-scale grid-structured images with different aliasing …


Using Smart Card Data To Model Commuters’ Responses Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng Dec 2018

Using Smart Card Data To Model Commuters’ Responses Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng

Research Collection School Of Computing and Information Systems

The mass rapid transit (MRT) network is playing an increasingly important role in Singapore's transit network, thanks to its advantages of higher capacity and faster speed. Unfortunately, due to aging infrastructure, increasing demand, and other reasons like adverse weather condition, commuters in Singapore recently have been facing increasing unexpected train delays (UTDs), which has become a source of frustration for both commuters and operators. Most, if not all, existing works on delay management do not consider commuters' behavior. We dedicate this paper to the study of commuters' behavior during UTDs. We adopt a data-driven approach to analyzing the six-month' real …


Integrating Node Embeddings And Biological Annotations For Genes To Predict Disease-Gene Associations, Sezin Kircali Ata, Le Ou-Yang, Yuan Fang, Chee-Keong Kwoh, Min Wu, Xiao-Li Li Dec 2018

Integrating Node Embeddings And Biological Annotations For Genes To Predict Disease-Gene Associations, Sezin Kircali Ata, Le Ou-Yang, Yuan Fang, Chee-Keong Kwoh, Min Wu, Xiao-Li Li

Research Collection School Of Computing and Information Systems

Background: Predicting disease causative genes (or simply, disease genes) has played critical roles in understandingthe genetic basis of human diseases and further providing disease treatment guidelines. While various computationalmethods have been proposed for disease gene prediction, with the recent increasing availability of biologicalinformation for genes, it is highly motivated to leverage these valuable data sources and extract useful information foraccurately predicting disease genes. Results: We present an integrative framework called N2VKO to predict disease genes. Firstly, we learn the nodeembeddings from protein-protein interaction (PPI) network for genes by adapting the well-known representationlearning method node2vec. Secondly, we combine the learned node …


Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li Dec 2018

Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li

Research Collection School Of Computing and Information Systems

Android is the most widely used mobile operating system with billions of users and devices. The popularity of Android apps have enticed malware writers to target them. Recently, Jamrozik et al. proposed an approach, named Boxmate, to mine sandboxes to protect Android users from malicious behaviors. In a nutshell, Boxmate analyzes the execution of an app, and collects a list of sensitive APIs that are invoked by that app in a monitoring phase. Then, it constructs a sandbox that can restrict accesses to sensitive APIs not called by the app. In such a way, malicious behaviors that are not observed …


An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang Dec 2018

An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang

Research Collection School Of Computing and Information Systems

It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer marketplace model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awareness. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its strategic …


Better Inpatient Health Quality At Lower Cost: Should I Participate In The Online Healthcare Community First?, Kai Luo, Qiu-Hong Wang, Hock Hai Teo, Xi Chen Dec 2018

Better Inpatient Health Quality At Lower Cost: Should I Participate In The Online Healthcare Community First?, Kai Luo, Qiu-Hong Wang, Hock Hai Teo, Xi Chen

Research Collection School Of Computing and Information Systems

As policy makers across the globe look to health information technology (HIT) as a meansof improving the efficiency of the healthcare systems, it has sparked significant interestin understanding how HIT might help achieve that. While researchers have examined anddocumented the efficiency-improving effect of various institution HITs (e.g., electronicclinic pathways and telemedicine), the impacts of consumer HITs such as onlinehealthcare communities have been generally overlooked. Utilizing two unique datasetsfrom both an online healthcare community and a general hospital, we study the impactof online healthcare community on offline inpatient care efficiency. Through rigorousanalysis, we find that communications between physicians and patients on …


A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim Dec 2018

A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

Demand forecasting has been a challenging problem especially for products with short life cycles such as electronic goods and fashion items. Additionally, in the presence of limited past or historical data as well as the need for fast turnaround for forecast, producing timely and accurate demand forecast can be extremely challenging. In this study, we describe a cloud-based data gathering and processing system for intelligent demand forecasting.


Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou Dec 2018

Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou

Research Collection School Of Computing and Information Systems

Uncertainty identification is an important semantic processing task, which is crucial to the quality of information in terms of factuality in many techniques, e.g. topic detection, question answering. Especially in social media, the texts are written informally which are widely used in many applications, so the factuality has become a premier concern. However, existing approaches that still rely on lexical cues suffer greatly from the casual or word-of-mouth peculiarity of social media, in which the cue phrases are often expressed in sub-standard form or even omitted from sentences. To tackle these problems, this paper proposes the attention-based LSTM-CNNs for the …


Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel Dec 2018

Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel

Research Collection School Of Computing and Information Systems

As countries turn into Smart Nations, Infocom Technology plays a key role in enhancing their competitiveness through high skilled workforces. Reaching to younger generations and attracting them to computing programs such as Information Systems (IS) and Computer Science (CS) is a key challenge faced by universities. Many high quality students from junior colleges either don’t choose IS programs or choose IS programs as their last option during the application process. A School of Information Systems (SIS) from a large metropolitan university decided to implement an innovative outreach program to attract high quality high school aka Junior College (JC) students. JC …


Utilizing Computational Trust To Identify Rumor Spreaders On Twitter, Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava Dec 2018

Utilizing Computational Trust To Identify Rumor Spreaders On Twitter, Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

Ubiquitous use of social media such as microblogging platforms opens unprecedented chances for false information to diffuse online. Facing the challenges in such a so-called “post-fact” era, it is very important for intelligent systems to not only check the veracity of information but also verify the authenticity of the users who spread the information, especially in time-critical situations such as real-world emergencies, where urgent measures have to be taken for stopping the spread of fake information. In this work, we propose a novel machine-learning-based approach for automatic identification of the users who spread rumorous information on Twitter by leveraging computational …