Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2019

Discipline
Institution
Keyword
Publication

Articles 1 - 19 of 19

Full-Text Articles in Databases and Information Systems

Sistem Informasi Geografi (Sig) Pencarian Lokasi Tambal Ban Dengan Pemanfaatan Teknologi Gps, Desy Ika Puspitasari, Zaenuddin Zaenuddin, Fitrah Yuridka Dec 2019

Sistem Informasi Geografi (Sig) Pencarian Lokasi Tambal Ban Dengan Pemanfaatan Teknologi Gps, Desy Ika Puspitasari, Zaenuddin Zaenuddin, Fitrah Yuridka

Elinvo (Electronics, Informatics, and Vocational Education)

The occurrence of a tire leak in the middle of a trip can often be caused by many things, such as being hit by a sharp object, the age of the tire is too old, leaking in the former patches, or it can be caused by others. These factors make vehicle users panic and think to immediately find the nearest tire repair location. Almost everyone has a smartphone where there is a Google Map application by utilizing GPS technology so as not to get lost when driving, with GPS technology can be estimated the distance between one location and another. …


Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan Dec 2019

Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan

Elinvo (Electronics, Informatics, and Vocational Education)

Kemacetan sering terjadi di banyak persimpangan jalan kota-kota besar di Indonesia. Sesuatu yang penting seperti kendaraan prioritas sering pula berada pada kemaccetan tersebut. Untuk mengatasi permasalahan tersebut terdapat inovasi baru yaitu Intelligent Traffic Light yang dibekali dengan Aplikasi "Bang Jopin". Namun terdapat permasalahan baru ketika ada kendaraan prioritas melakukan request emergency secara bersamaan pada traffic light yang sama. Penentuan prioritas tidak dapat dilakukan dengan pengurutan saja karena ketika memprioritaskan kendaraan pada traffic light harus mempertimbangkan karakteristik traffic light dan kebiasaan pengendara. Oleh kerena itu, Metode Analitical Hierarchy Process (AHP) merupakan solusi yang tepat dalam menentukan kendaraan prioritas yang didahulukan ketika …


Analisis Dan Desain Sistem Informasi Penelitian Dan Pengabdian Masyarakat (Simpenmas) Politeknik Negeri Lhokseumawe, Hari Toha Hidayat Dec 2019

Analisis Dan Desain Sistem Informasi Penelitian Dan Pengabdian Masyarakat (Simpenmas) Politeknik Negeri Lhokseumawe, Hari Toha Hidayat

Elinvo (Electronics, Informatics, and Vocational Education)

Information systems of research and community service need to be developed to improve the management of research outputs and community service outcomes by lecturers while making it easier to evaluate tertiary accreditation. This system was developed using the waterfall model. This article aims to describe the stages of system development consisting of: (1) investigating user needs; (2) data and needs analysis in the process of making a system; (3) design; and (4) implementation. The result is the need for a system that specifically can provide facilities for uploading research outputs and community service such as journal publications, textbooks / texts, …


Evaluating Data Quality Of Newborn Hearing Screening, Maria C. Sanchez Gomez, Kelly Dundon, Xidong Deng Dec 2019

Evaluating Data Quality Of Newborn Hearing Screening, Maria C. Sanchez Gomez, Kelly Dundon, Xidong Deng

Journal of Early Hearing Detection and Intervention

Scope

Jurisdictional-based Early Hearing Detection and Intervention Information Systems (EHDI-IS) collect data on the hearing screening and follow-up status of infants across the United States. These systems serve as tools that assist EHDI programs’ staff and partners in their tracking activities and provide a variety of data reports to help ensure that all children who are deaf/hard of hearing (D/HH) are identified early and receive recommended intervention services. The quality and timeliness of the data collected with these systems are crucial to effectively meeting these goals.

Methodology

Forty-eight EHDI programs, funded by the Centers for Disease Control and Prevention (CDC), …


Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta Oct 2019

Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta

The African Journal of Information Systems

Knowledge transfer in onshore information systems (IS) outsourcing projects in Africa is an important but under-researched phenomenon. This study focuses on the client-vendor perspective and examines the factors that influence knowledge transfer in onshore information systems outsourcing in Ethiopia. Conceptually, knowledge-based perspectives of IS outsourcing is used to identify an initial set of factors to frame the empirical study. This is followed by semi-structured interviews with ten project managers. The findings indicate that five key factors, namely mutual absorptive capacity, mutual learning intent, mutual trust, mutual disseminative capacity and project staff turnover influence knowledge transfer in outsourced IS projects. The …


Model Of The State Of Threats To The Access Control System, ‪Durdona Irgasheva Aug 2019

Model Of The State Of Threats To The Access Control System, ‪Durdona Irgasheva

Bulletin of TUIT: Management and Communication Technologies

This article is devoted to the presentation of the threat state model of access control, which allows calculating the probabilities of the impact of threats on the access control system and the probability of opening this system based on taking into account the generalized algorithm for the implementation of external threats, and determines the need to develop additional components of the access control system designed to identify and classify attacks.


Designing The Arriving Refugee Informatics Surveillance And Epidemiology (Arive) System: A Web-Based Electronic Database For Epidemiological Surveillance, William A. Mattingly, Ruth M. Carrico, Timothy L. Wiemken, Robert R. Kelley, Rebecca A. Ford, Rahel Bosson, Kimberley A. Buckner, Julio A. Ramirez Jul 2019

Designing The Arriving Refugee Informatics Surveillance And Epidemiology (Arive) System: A Web-Based Electronic Database For Epidemiological Surveillance, William A. Mattingly, Ruth M. Carrico, Timothy L. Wiemken, Robert R. Kelley, Rebecca A. Ford, Rahel Bosson, Kimberley A. Buckner, Julio A. Ramirez

Journal of Refugee & Global Health

Objectives: We design and implement the Arriving Refugee Informatics surVeillance and Epidemiology (ARIVE) system to improve the health of refugees undergoing resettlement and enhance existing health surveillance networks.

Materials and Methods: Using the REDCap electronic data capture software as a basis we create a refugee health database incorporating data from the Center for Disease Control and Prevention’s Electronic Disease Notification (EDN) system and domestic screening data from refugee health care providers.

Results: Domestic screening and EDN refugee health data have been integrated for 13,824 refugees resettled from 35 different countries into the state of Kentucky from the years 2013-2016.

Discussion: …


Mathematical And Computer Simulation Of The Processes Of Two-Phase Joint Gas Filtration And Water In A Porous Environment, Elmira Nazirova Jul 2019

Mathematical And Computer Simulation Of The Processes Of Two-Phase Joint Gas Filtration And Water In A Porous Environment, Elmira Nazirova

Bulletin of TUIT: Management and Communication Technologies

A mathematical model, methods and algorithms for the numerical solution of problems of joint gas-water filtration in porous media are considered. The mathematical model of the process of non-stationary joint gas-water filtration in a porous medium is described by a system of nonlinear differential equations of parabolic type. In the numerical solution of the boundary value problem of gas displacement by water in a porous medium, the differential sweeping method is used for systems of differential-difference equations. The system of differential-difference equations with respect to the gas pressure function is nonlinear, therefore, an iterative method is used for it, based …


A Hidden Markov Model For Matching Spatial Networks, Benoit Costes, Julien Perret Jun 2019

A Hidden Markov Model For Matching Spatial Networks, Benoit Costes, Julien Perret

Journal of Spatial Information Science

Datasets of the same geographic space at different scales and temporalities are increasingly abundant, paving the way for new scientific research. These datasets require data integration, which implies linking homologous entities in a process called data matching that remains a challenging task, despite a quite substantial literature, because of data imperfections and heterogeneities. In this paper, we present an approach for matching spatial networks based on a hidden Markov model (HMM) that takes full benefit of the underlying topology of networks. The approach is assessed using four heterogeneous datasets (streets, roads, railway, and hydrographic networks), showing that the HMM algorithm …


Evaluating Existing Manually Constructed Natural Landscape Classification With A Machine Learning-Based Approach, Rok Ciglic, Erik Strumbelj, Rok Cesnovar, Mauro Hrvatin, Drago Perko Jun 2019

Evaluating Existing Manually Constructed Natural Landscape Classification With A Machine Learning-Based Approach, Rok Ciglic, Erik Strumbelj, Rok Cesnovar, Mauro Hrvatin, Drago Perko

Journal of Spatial Information Science

Some landscape classifications officially determine financial obligations; thus, they must be objective and precise. We presume it is possible to quantitatively evaluate existing manually constructed classifications and correct them if necessary. One option for achieving this goal is a machine learning method. With (re)modeling of the landscape classification and an explanation of its structure, we can add quantitative proof to its original (qualitative) description. The main objectives of the paper are to evaluate the consistency of the existing manually constructed natural landscape classification with a machine learning-based approach and to test the newly developed general black-box explanation method in order …


Discovery Of Topological Constraints On Spatial Object Classes Using A Refined Topological Model, Ivan Majic, Elham Naghizade, Stephan Winter, Martin Tomko Jun 2019

Discovery Of Topological Constraints On Spatial Object Classes Using A Refined Topological Model, Ivan Majic, Elham Naghizade, Stephan Winter, Martin Tomko

Journal of Spatial Information Science

In a typical data collection process, a surveyed spatial object is annotated upon creation, and is classified based on its attributes. This annotation can also be guided by textual definitions of objects. However, interpretations of such definitions may differ among people, and thus result in subjective and inconsistent classification of objects. This problem becomes even more pronounced if the cultural and linguistic differences are considered. As a solution, this paper investigates the role of topology as the defining characteristic of a class of spatial objects. We propose a data mining approach based on frequent itemset mining to learn patterns in …


Data Mining And Machine Learning To Improve Northern Florida’S Foster Care System, Daniel Oldham, Nathan Foster, Mihhail Berezovski Jun 2019

Data Mining And Machine Learning To Improve Northern Florida’S Foster Care System, Daniel Oldham, Nathan Foster, Mihhail Berezovski

Beyond: Undergraduate Research Journal

The purpose of this research project is to use statistical analysis, data mining, and machine learning techniques to determine identifiable factors in child welfare service records that could lead to a child entering the foster care system multiple times. This would allow us the capability of accurately predicting a case’s outcome based on these factors. We were provided with eight years of data in the form of multiple spreadsheets from Partnership for Strong Families (PSF), a child welfare services organization based in Gainesville, Florida, who is contracted by the Florida Department for Children and Families (DCF). This data contained a …


Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza Iii, Jose Quinonez, Misael Santana, Nibhrat Lohia May 2019

Visualization And Machine Learning Techniques For Nasa’S Em-1 Big Data Problem, Antonio P. Garza Iii, Jose Quinonez, Misael Santana, Nibhrat Lohia

SMU Data Science Review

In this paper, we help NASA solve three Exploration Mission-1 (EM-1) challenges: data storage, computation time, and visualization of complex data. NASA is studying one year of trajectory data to determine available launch opportunities (about 90TBs of data). We improve data storage by introducing a cloud-based solution that provides elasticity and server upgrades. This migration will save $120k in infrastructure costs every four years, and potentially avoid schedule slips. Additionally, it increases computational efficiency by 125%. We further enhance computation via machine learning techniques that use the classic orbital elements to predict valid trajectories. Our machine learning model decreases trajectory …


Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter Feb 2019

Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter

International Journal of Business and Technology

Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious …


Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal Feb 2019

Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal

International Journal of Business and Technology

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data protection rules) …


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Feb 2019

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

International Journal of Business and Technology

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …


Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith Feb 2019

Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith

International Journal of Business and Technology

The testing of simulation models has much in common with testing processes in other types of application involving software development. However, there are also important differences associated with the fact that simulation model testing involves two distinct aspects, which are known as verification and validation. Model validation is concerned with investigation of modelling errors and model limitations while verification involves checking that the simulation program is an accurate representation of the mathematical and logical structure of the underlying model. Success in model validation depends upon the availability of detailed information about all aspects of the system being modelled. It also …


Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf Feb 2019

Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf

The Kabod

The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and any …


Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater Jan 2019

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide best …