Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 151

Full-Text Articles in Databases and Information Systems

Exploring Ai And Multiplayer In Java, Ronni Kurtzhals Apr 2021

Exploring Ai And Multiplayer In Java, Ronni Kurtzhals

Student Academic Conference

I conducted research into three topics: artificial intelligence, package deployment, and multiplayer servers in Java. This research came together to form my project presentation on the implementation of these topics, which I felt accurately demonstrated the various things I have learned from my courses at Moorhead State University. Several resources were consulted throughout the project, including the work of W3Schools and StackOverflow as well as relevant assignments and textbooks from previous classes. I found this project relevant to computer science and information systems for several reasons, such as the AI component and use of SQL data tables; but it was …


Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson Apr 2021

Sql Injection & Web Application Security: A Python-Based Network Traffic Detection Model, Nyki Anderson

Cybersecurity Undergraduate Research Showcase

The Internet of Things (IoT) presents a great many challenges in cybersecurity as the world grows more and more digitally dependent. Personally identifiable information (PII) (i,e., names, addresses, emails, credit card numbers) is stored in databases across websites the world over. The greatest threat to privacy, according to the Open Worldwide Application Security Project (OWASP) is SQL injection attacks (SQLIA) [1]. In these sorts of attacks, hackers use malicious statements entered into forms, search bars, and other browser input mediums to trick the web application server into divulging database assets. A proposed technique against such exploitation is convolution neural network …


The Introduction Of Big Data In Cloud Computing, Austin Gruenberg Jan 2021

The Introduction Of Big Data In Cloud Computing, Austin Gruenberg

Student Academic Conference

One of the fastest-growing technologies that many people are unaware of is the world of cloud computing. Having started in 2006, it is a relatively new technological advancement in the computer industry. The major branch of cloud computing that I decided to focus on was big data. I decided to research this topic to better understand what its current uses are, to see what the future holds for Big Data and cloud computing and because it is a growing, significant piece of technology being used in our society today. Big data and cloud computing are very important industries and have …


Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka Jul 2020

Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka

Electronic Literature Organization Conference 2020

Through a poetic narrative, “Lulling Waters” tells the story of a whale overcoming the loss of his mother, who passed away from ingesting plastic, as he attempts to escape from the polluted oceanic world. The live performance of this poem utilizes a software system called Soundwriter, which was developed with the goal of enriching the oral storytelling experience through music. This video demonstrates how Soundwriter’s real-time hybrid system was able to analyze “Lulling Waters” through its lexical and auditory features. Emotionally salient words were given ratings based on arousal, valence, and dominance while the emotionally charged prosodic features of the …


Server Score, Zachary Buresh May 2020

Server Score, Zachary Buresh

Student Academic Conference

This presentation is in regards to the Android mobile application that I developed in the Kotlin programming language named "Server Score". The app helps waiters/waitresses calculate, track, and predict performance related statistics on the job.


Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons Jan 2020

Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons

International Crisis and Risk Communication Conference

Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …


Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing Oct 2019

Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing

Charleston Library Conference

The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …


Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona Aug 2019

Social Inclusion In The Digital Era: Rethinking Debates And Narratives In The World Bank Report., Calisto Kondowe, Wallace Chigona

African Conference on Information Systems and Technology

The 2019 (5th) proceedings of ACIST focuses on how African societies are leveraging and can leverage the smart capabilities in digital technologies to address organizational and societal challenges. Technology-enabled solutions offer solutions to many of these challenges. Digital technologies are increasingly becoming integral to and interdependent with the African society.


An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu Aug 2019

An Electronic Framework To Shepherd The Pastoral Livestock (Resolve Conflicts In Pastoral Communities), Frezewd Lemma, Anteneh Alemu, Desta Zerihun, Endale Aregu

African Conference on Information Systems and Technology

This paper proposes a tracking framework based on GPS enabled location sensors, the GSM/WCDMA wireless network, and algorithms running in an edge clouds to resolve deadly conflicts that arise in the Africans pastorals community. The paper also proposes an automatic digital identification mechanism that helps resolve conflicts during animals mixup. This algorithmic based solution would totally relief the community from using the traditional identification mechanisms such as hot branding which are known to be cruel to animals. To communicate with the pastorals, the framework takes into consideration the low level literacy of the community as well as their use of …


Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali Aug 2019

Factors Influencing Customers’ Attitude For Using M-Birr Adoption In Ethiopia, Gebremedhin Gebreyohans, Abdurehman Ali

African Conference on Information Systems and Technology

Diffusion of Innovations (DOI) is a theory to explain how and over time new philosophies and then technology diffuse into different contexts. This research tested the attributes of DOI and other variables empirically,usingM-Birr system as the goal of the innovation. The research was conducted among customers of M-Birr service in Addis Ababa, Ethiopia. The data collection instrument was a closed-ended questionnaire administered to 360 respondents of which 211 were returned giving 58.6% return rate. The demographic make-up of the respondents showed that most of them were between the age of 30 to 50 and degree holders. From the factor analysis …


Yelp Improved : Aggregating Restaurant Reviews, Kunal Sonar Apr 2019

Yelp Improved : Aggregating Restaurant Reviews, Kunal Sonar

Creative Activity and Research Day - CARD

In the near future, online food delivery service companies would occupy a big market share in the food industry. This project aims to provide factual information from customer reviews as part of the numerous innovations in place to drive business and demands. Natural Language Processing is used to provide a comprehensive view of individual restaurants using technologies like NLTK, SpaCy, Gensim and Sklearn. Data of one million Las Vegas restaurant customer reviews is curated from the Yelp Dataset Challenge. Reviews are pre-processed, split into chunks of phrases and mapped to attributes like food, budget, service etc. These attributes are derived …


Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose Mar 2019

Evaluating An Electronic Protocol In A Pediatric Intensive Care Unit, Jeanette Rose

UNO Student Research and Creative Activity Fair

A team of clinicians at Children’s Hospital and Medical Center (CHMC) developed a standardized protocol in 2018 for the care of patients needing sedation. This protocol is ordered through the EPIC electronic health record system for patients in the pediatric intensive care unit (PICU). When used, electronic protocols reduce the variation in clinical decision making which can ultimately improve patient outcomes. The goal of this project is to evaluate this technology, how the protocol is being used, and how it may be improved. Actual users of the EPIC sedation protocol were the subjects of this study, including PICU physicians, physician …


Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst Mar 2019

Forensics Analysis For Bone Pair Matching Using Bipartite Graphs In Commingled Remains, Ryan Ernst

UNO Student Research and Creative Activity Fair

Identification of missing prisoners of war is a complex and time consuming task. There are many missing soldiers whose remains have yet to be returned to their families and loved ones. This nation has a solemn obligation to its soldiers and their families who have made the ultimate sacrifice for their country. There are currently over 82,000 unidentified prisoners of war which are identified at a rate of 100+ per year. At this rate it would take 300+ years to complete the identification process. Previously, anthropologists used excel spreadsheets to sort through skeletal data. This project aims to streamline the …


Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah Feb 2019

Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah

Space Traffic Management Conference

The necessity for standards-based ontologies for long-term sustainability of space operations and safety of increasing space flights has been well-established [6, 7]. Current ontologies, such as DARPA’s OrbitOutlook [5], are not publicly available, complicating efforts for their broad adoption. Most sensor data is siloed in proprietary databases [2] and provided only to authorized users, further complicating efforts to create a holistic view of resident space objects (RSOs) in order to enhance space situational awareness (SSA).

The ASTRIA project is developing an open data model with the goal of aggregating data about RSOs, parts, space weather, and governing policies in order …


Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu Oct 2018

Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu

UBT International Conference

Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action …


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller Aug 2018

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of …


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin Aug 2018

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join …


Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji Aug 2018

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji

The Summer Undergraduate Research Fellowship (SURF) Symposium

Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.

The linear hash function used to calculate hash value is defined …


Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh Apr 2018

Creating A Reproducible Metadata Transformation Pipeline Using Technology Best Practices, Cara Key, Mike Waugh

Digital Initiatives Symposium

Over the course of two years, a team of librarians and programmers from LSU Libraries migrated the 186 collections of the Louisiana Digital Library from OCLC's CONTENTdm platform over to the open-source Islandora platform.

Early in the process, the team understood the value of creating a reproducible metadata transformation pipeline, because there were so many unknowns at the beginning of the process along with the certainty that mistakes would be made. This presentation will describe how the team used innovative and collaborative tools, such as Trello, Ansible, Vagrant, VirtualBox, git and GitHub to accomplish the task.


Text Mining In Chinese Ancient Attires, Lu Wang Mar 2018

Text Mining In Chinese Ancient Attires, Lu Wang

Western Research Forum

Starting from the Shang Dynasty (1600-1046 BCE) when writing system appeared in China, clothing was recorded as symbols to denote social statuses. The hierarchical signification of clothing remained in the following dynasties until the end of imperial China in 1911. The imperial period produced twenty-five official dynastic histories with rich corpuses on the subject of attire, documenting regulations and prohibitions of detailed dress code, a subject being scarcely studied and treated with assumptions today. This research will use text mining tools to identify descriptive words of clothing that reflect Chinese hierarchal ideology from the twenty-five histories. The method is to …


Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips Mar 2018

Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips

UNO Student Research and Creative Activity Fair

As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.


Collecting And Organizing Far-Left Extremist Data From Unstructured Internet Sources, Eric Perez Mar 2018

Collecting And Organizing Far-Left Extremist Data From Unstructured Internet Sources, Eric Perez

UNO Student Research and Creative Activity Fair

Far-left extremism refers to a network of groups who adhere to and take direct action in accordance with one or more of the following ideas: Support for bio-centric diversity, the belief that the earth and animals are in immediate danger, and the view that the government and other parts of society are responsible for this danger and incapable/unwilling to fix the crisis and preserve the American wilderness (Chermak, Freilich, Duran, & Parkin). Far-left extremism groups self-report activities using publicly accessible, online communiqués. These activities include arson, property damage, harassment, sabotage, and theft (Loadenthal). The communiqués are structured like blog posts …


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst Mar 2018

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

UNO Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers from commingled …


Self Service Business Intelligence: An Analysis Of Tourists Preferences In Kosovo, Ardian Hyseni Oct 2017

Self Service Business Intelligence: An Analysis Of Tourists Preferences In Kosovo, Ardian Hyseni

UBT International Conference

The purpose of this paper is to analyze the preferences of tourists in Kosovo through the data from TripAdvisor.com. Top things to do in Kosovo, will be analyzed through the comments of tourists in TripAdvisor.com. By analyzing the data with PowerBI, will be analyzed what are the most preferred things to do and what the tourists like the most in Kosovo. This paper will contribute on defining the preferences of tourists in Kosovo, it also can help tourism to invest and attract more tourists in specific areas or improve and invest in places less preferred by tourists.


Security Assessment Of Web Applications, Renelada Kushe Oct 2017

Security Assessment Of Web Applications, Renelada Kushe

UBT International Conference

A web application is an application that is accessed by users over a network such as the internet or intranet. The term also refers an application that is coded in a browser-supported programming language and reliant on a common web browser to render the application executable. Web applications are vulnerable to varies exploits from those which manipulate the application via its graphical web interface (HTTP exploits), to tampering the Uniform Resource Identifier (URI) or tampering HTTPS elements not contained in the URI. Getting started from the accessibility and the variety of exploits, the security assessment is a necessity for providing …


Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal Oct 2017

Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal

UBT International Conference

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data protection rules) …


Learning Management Systems In Higher Education, Romina Agaçi Oct 2017

Learning Management Systems In Higher Education, Romina Agaçi

UBT International Conference

Learning Management Systems (LMSs) are improving learning processes and are widely used in higher education institutions. There are available various types of LMSs used by pedagogues to manage eLearning and to deliver course materials to students. Nowadays, LMSs have become essential tools that affect the quality of learning and teaching in higher education. In this article, we introduce LMSs and we choose Moodle as a tool to presentaninformation system that is used in our university. Moodle is an online learning environment that supports classroom teaching. We will focus on the advantages of LMSs and why we choose Moodle as the …


Web Scrapping And Self Service Business Intelligence: Analysis Of Preferences Of Tourists In Albania, Ardian Hyseni Oct 2017

Web Scrapping And Self Service Business Intelligence: Analysis Of Preferences Of Tourists In Albania, Ardian Hyseni

UBT International Conference

The purpose of this paper is to analyze the preferences of tourists in Albania through the data web scrapped from TripAdvisor.com. Top things to do in Albania, will be analyzed through the comments of tourists in TripAdvisor.com. By using tools for web scrapping and analyzing of data with nVivo and PowerBI, will be analyzed what are the most preferred things to do and what the tourists like doing the most in Albania. This paper will contribute on defining the preferences of tourists in Albania, also can help tourism to invest and attract more tourists in specific areas or improve and …


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Oct 2017

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

UBT International Conference

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …