Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 284

Full-Text Articles in Databases and Information Systems

Semantic Services For Enterprise Data Exchange, James A. Sauvinet Dec 2013

Semantic Services For Enterprise Data Exchange, James A. Sauvinet

University of New Orleans Theses and Dissertations

Data exchange between different information systems is a complex issue. Each system, designed for a specific purpose, is defined using a vocabulary of the specific business. While Web services allow interoperations and data communications between multiple systems, the clients of the services must understand the vocabulary of the targeting data resources to select services or to construct queries. In this thesis we explore an ontology-based approach to facilitate clients’ queries in the vocabulary of the clients’ own domain, and to automate the query processing. A governmental inter-department data query process has been used to illustrate the capability of the semantic …


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz Dec 2013

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Electrical and Computer Engineering Publications

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …


Efficiency And Reliability Of The Transit Data Lifecycle: A Study Of Multimodal Migration, Storage, And Retrieval Techniques For Public Transit Data, Matthew Ahrens Dec 2013

Efficiency And Reliability Of The Transit Data Lifecycle: A Study Of Multimodal Migration, Storage, And Retrieval Techniques For Public Transit Data, Matthew Ahrens

Honors Program Theses and Projects

No abstract provided.


Disaster Data Management In Cloud Environments, Katarina Grolinger Dec 2013

Disaster Data Management In Cloud Environments, Katarina Grolinger

Electronic Thesis and Dissertation Repository

Facilitating decision-making in a vital discipline such as disaster management requires information gathering, sharing, and integration on a global scale and across governments, industries, communities, and academia. A large quantity of immensely heterogeneous disaster-related data is available; however, current data management solutions offer few or no integration capabilities and limited potential for collaboration. Moreover, recent advances in cloud computing, Big Data, and NoSQL have opened the door for new solutions in disaster data management.

In this thesis, a Knowledge as a Service (KaaS) framework is proposed for disaster cloud data management (Disaster-CDM) with the objectives of 1) facilitating information gathering …


An Access Control Model For Nosql Databases, Motahera Shermin Dec 2013

An Access Control Model For Nosql Databases, Motahera Shermin

Electronic Thesis and Dissertation Repository

Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has created the need for data storage as agile and scalable as the applications they support. Relational databases with their joins and locks influence performance in web scale systems negatively. Thus, various types of non-relational databases have emerged in recent years, commonly referred to as NoSQL databases. To fulfill the gaps created by their relational counter-part, they trade consistency and security for performance and scalability. With NoSQL databases being adopted by an increasing number of organizations, …


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins Dec 2013

A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasures in an automated deception detection screening context. The effectiveness of traditional countermeasure types (mental and physical) are examined, as well as an exploratory approach of trying several countermeasures at once. The exploratory approach was tested to investigate a proposed novel systems-inspired solution to countermeasures—triangulating on deception …


Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel Dec 2013

Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel

Dissertations

Providing an efficient Quality-of-Service (QoS) measurement model is a challenging problem in today’s mobile computing and telecommunications networks. Currently, most of QoS techniques utilize service measurements that are collected by the network elements (i.e., network-side monitoring) to evaluate the network performance. However, this process does not take into account the service performance from the clients' perspective and might contradict with the Service Level Agreement (SLA). In order to overcome the limitations of service-side QoS monitoring, a number of research studies have been conducted to present alternative architectures and algorithms for client-side QoS service assessment in computer networks. The client-side QoS …


Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi Dec 2013

Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi

Graduate Theses and Dissertations

Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.

The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …


Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez Dec 2013

Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez

Masters Theses

Thematic maps derived from remote sensing imagery is increasingly being used in environmental and ecological modeling. Spatial information in these maps however is not free of error. Different methodologies such as error matrices are used to assess the accuracy of the spatial information. However, most of the methods commonly used for describing the accuracy assessment of thematic data fail to describe spatial differences of the accuracy across an area of interest. This thesis describes the use of indicator kriging as a geostatistical method for mapping the spatial accuracy of thematic maps. The method is illustrated by constructing accuracy maps for …


Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow Dec 2013

Workforce Preparedness Of Information Systems Students: Perceptions Of Students, Alumni, And Employers, Susan Bristow

Graduate Theses and Dissertations

Employers of newly hired higher education graduates report their new workforce is not prepared. Further research was required to discover insights to the workforce readiness gap. This concurrent mixed methods study explored what competencies influenced employer's perceptions of the work-readiness of Information Systems (ISYS) undergraduate students and discovered ISYS graduates' and current ISYS students' perceptions of their work-readiness. Participants consisted of a convenience sample including 69 ISYS program upperclassmen, 20 ISYS program alumni, and 8 employers of the ISYS program graduates. ISYS program alumni completed an online Qualtrics survey to measure the participants' perception of their workforce preparedness. ISYS program …


Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang Dec 2013

Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang

Research Collection School Of Computing and Information Systems

In recent years, multimodal fusion has emerged as a promising technology for effective multimedia retrieval. Developing the optimal fusion strategy for different modality (e.g. content, metadata) has been the subject of intensive research. Given a query, existing methods derive a unified fusion strategy for all documents with the underlying assumption that the relative significance of a modality remains the same across all documents. However, this assumption is often invalid. We thus propose a general multimodal fusion framework, query-document-dependent fusion (QDDF), which derives the optimal fusion strategy for each query-document pair via intelligent content analysis of both queries and documents. By …


Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen Dec 2013

Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen

Research Collection School Of Computing and Information Systems

In this paper, we propose a method for video-based human emotion recognition. For each video clip, all frames are represented as an image set, which can be modeled as a linear subspace to be embedded in Grassmannian manifold. After feature extraction, Class-specific One-to-Rest Partial Least Squares (PLS) is learned on video and audio data respectively to distinguish each class from the other confusing ones. Finally, an optimal fusion of classifiers learned from both modalities (video and audio) is conducted at decision level. Our method is evaluated on the Emotion Recognition In The Wild Challenge (EmotiW 2013). The experimental results on …


Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston Dec 2013

Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper examines social learning and network effects that are particularly important for online videos, considering the limited marketing campaigns of user-generated content. Rather than combining both social learning and network effects under the umbrella of social contagion or peer influence, we develop a theoretical model and empirically identify social learning and network effects separately. Using a unique data set from YouTube, we find that both mechanisms have statistically and economically significant effects on video views, and which mechanism dominates depends on the specific video type.


Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim Dec 2013

Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The problem of recommending items to users is relevant to many applications and the problem has often been solved using methods developed from Collaborative Filtering (CF). Collaborative Filtering model-based methods such as Matrix Factorization have been shown to produce good results for static rating-type data, but have not been applied to time-stamped item adoption data. In this paper, we adopted a Dynamic Matrix Factorization (DMF) technique to derive different temporal factorization models that can predict missing adoptions at different time steps in the users' adoption history. This DMF technique is an extension of the Non-negative Matrix Factorization (NMF) based on …


Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong Dec 2013

Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Social media data are produced continuously by a large and uncontrolled number of users. The dynamic nature of such data requires the sentiment and topic analysis model to be also dynamically updated, capturing the most recent language use of sentiments and topics in text. We propose a dynamic Joint Sentiment-Topic model (dJST) which allows the detection and tracking of views of current and recurrent interests and shifts in topic and sentiment. Both topic and sentiment dynamics are captured by assuming that the current sentiment-topic-specific word distributions are generated according to the word distributions at previous epochs. We study three different …


A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen Dec 2013

A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen

Research Collection School Of Computing and Information Systems

Identifying potential customers among a huge number of users in microblogging is a fundamental problem for microblog marketing. One challenge in potential customer detection in microblogging is how to generate an accurate characteristic description for users, i.e., user profile generation. Intuitively, the preference of a user’s friends (i.e., the person followed by the user in microblogging) is of great importance to capture the characteristic of the user. Also, a user’s self-defined tags are often concise and accurate carriers for the user’s interests. In this paper, for identifying potential customers in microblogging, we propose a method to generate user profiles via …


Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow Dec 2013

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw Dec 2013

Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw

Research Collection School Of Computing and Information Systems

User preferences are commonly learned from historical data whereby users express preferences for items, e.g., through consumption of products or services. Most work assumes that a user is not constrained in their selection of items. This assumption does not take into account the availability constraint, whereby users could only access some items, but not others. For example, in subscription-based systems, we can observe only those historical preferences on subscribed (available) items. However, the objective is to predict preferences on unsubscribed (unavailable) items, which do not appear in the historical observations due to their (lack of) availability. To model preferences in …


Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang Dec 2013

Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of the largest platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short time, which often reflects important events of mass interest. How to leverage Twitter for early detection of bursty topics has therefore become an important research problem with immense practical value. Despite the wealth of research work on topic modeling and analysis in Twitter, it remains a huge challenge to detect bursty topics in real-time. As existing methods can hardly scale …


On Local Fractional Continuous Wavelet Transform, Yang Xiaojun Nov 2013

On Local Fractional Continuous Wavelet Transform, Yang Xiaojun

Xiao-Jun Yang

We introduce a new wavelet transform within the framework of the local fractional calculus. An illustrative example of local fractional wavelet transform is also presented.


Automatic Domain Identification For Linked Open Data, Sarasi Lalithsena, Pascal Hitzler, Amit P. Sheth, Prateek Jain Nov 2013

Automatic Domain Identification For Linked Open Data, Sarasi Lalithsena, Pascal Hitzler, Amit P. Sheth, Prateek Jain

Kno.e.sis Publications

Linked Open Data (LOD) has emerged as one of the largest collections of interlinked structured datasets on the Web. Although the adoption of such datasets for applications is increasing, identifying relevant datasets for a specific task or topic is still challenging. As an initial step to make such identification easier, we provide an approach to automatically identify the topic domains of given datasets. Our method utilizes existing knowledge sources, more specifically Freebase, and we present an evaluation which validates the topic domains we can identify with our system. Furthermore, we evaluate the effectiveness of identified topic domains for the purpose …


Social Listening For Customer Acquisition, Juan Du, Biying Tan, Feida Zhu, Ee-Peng Lim Nov 2013

Social Listening For Customer Acquisition, Juan Du, Biying Tan, Feida Zhu, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Social network analysis has received much attention from corporations recently. Corporations are trying to utilize social media platforms such as Twitter, Facebook and Sina Weibo to expand their own markets. Our system is an online tool to assist these corporations to 1) find potential customers, and 2) track a list of users by specific events from social networks. We employ both textual and network information, and thus produce a keyword-based relevance score for each user in pre-defined dimensions, which indicates the probability of the adoption of a product. Based on the score and its trend, out tool is able to …


Vireo/Ecnu @ Trecvid 2013: A Video Dance Of Detection, Recounting And Search With Motion Relativity And Concept Learning From Wild, Chong-Wah Ngo, Feng Wang, Wei Zhang, Chun-Chet Tan, Zhanhu Sun, Shi-Ai Zhu, Ting Yao Nov 2013

Vireo/Ecnu @ Trecvid 2013: A Video Dance Of Detection, Recounting And Search With Motion Relativity And Concept Learning From Wild, Chong-Wah Ngo, Feng Wang, Wei Zhang, Chun-Chet Tan, Zhanhu Sun, Shi-Ai Zhu, Ting Yao

Research Collection School Of Computing and Information Systems

The VIREO group participated in four tasks: instance search, multimedia event recounting, multimedia event detection, and semantic indexing. In this paper, we will present our approaches and discuss the evaluation results


Multimedia Modeling, Chong-Wah Ngo, Klaus Schoeffmann, Yiannis Andreopoulos, Christian Breiteneder Nov 2013

Multimedia Modeling, Chong-Wah Ngo, Klaus Schoeffmann, Yiannis Andreopoulos, Christian Breiteneder

Research Collection School Of Computing and Information Systems

Multimedia modeling aims to study computational models for addressing real-world multimedia problems from various perspectives, including information fusion, perceptual understanding, performance evaluation and social media. The topic becomes increasingly important with the massive amount of data available over the Internet, representing different pieces of information in heterogeneous forms that need to be consolidated before being used for multimedia problems. On the other hand, the advancement in technologies such as mobile and sensing devices drive the needs for revisiting the existing models for not only dealing with audio-visual cues but also incorporating various sensory modalities that have potential in providing cheaper …


Semantics-Empowered Big Data Processing With Applications, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2013

Semantics-Empowered Big Data Processing With Applications, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. We organize our research around the Five Vs of Big Data, where four of the Vs are harnessed to produce the fifth V - value. To handle the challenge of Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision-making. To handle the challenge of Variety, we resort to the use of semantic models and annotations of data so that much of the intelligent processing …


A Social Network-Empowered Research Analytics Framework For Project Selection, Thushari Silva, Zhiling Guo, Jian Ma, Hongbing Jiang, Huaping Chen Nov 2013

A Social Network-Empowered Research Analytics Framework For Project Selection, Thushari Silva, Zhiling Guo, Jian Ma, Hongbing Jiang, Huaping Chen

Research Collection School Of Computing and Information Systems

Traditional approaches for research project selection by government funding agencies mainly focus on the matching of research relevance by keywords or disciplines. Other research relevant information such as social connections (e.g., collaboration and co-authorship) and productivity (e.g., quality, quantity, and citations of published journal articles) of researchers is largely ignored. To overcome these limitations, this paper proposes a social network-empowered research analytics framework (RAF) for research project selections. Scholarmate.com, a professional research social network with easy access to research relevant information, serves as a platform to build researcher profiles from three dimensions, i.e., relevance, productivity and connectivity. Building upon profiles …


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Nov 2013

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Research Collection School Of Computing and Information Systems

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


Social Informatics, Adam Jatowt, Ee-Peng Lim, Ying Ding, Asako Miura, Taro Tezuka, Gael Dias, Katsumi Tanaka, Andrew J. Flanagin, Bing Tian Dai Nov 2013

Social Informatics, Adam Jatowt, Ee-Peng Lim, Ying Ding, Asako Miura, Taro Tezuka, Gael Dias, Katsumi Tanaka, Andrew J. Flanagin, Bing Tian Dai

Research Collection School Of Computing and Information Systems

This book constitutes the proceedings of the 5th International Conference on Social Informatics, SocInfo 2013, held in Kyoto, Japan, in November 2013. The 23 full papers, 15 short papers, and three poster papers included in this volume were carefully reviewed and selected from 103 submissions. The papers present original research work on studying the interplay between socially-centric platforms and social phenomena.