Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Library and Information Science

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak Nov 2020

Multimodal Data Fusion And Attack Detection In Recommender Systems, Mehmet Aktukmak

USF Tampa Graduate Theses and Dissertations

The commercial platforms that use recommender systems can collect relevant information to produce useful recommendations to the platform users. However, these sources usually contain missing values, imbalanced and heterogeneous data, and noisy observations. Such characteristics render the process of exploiting the information nontrivial, as one should carefully address them during the data fusion process. In addition to the degenerative characteristics, some entries can be fake, i.e., they can be the outcomes of malicious intents to manipulate the system. These entries should be eliminated before incorporation to any recommendation task. Detecting such malicious attacks quickly and accurately and then mitigating them …


Simulating And Modelling Opinion Dynamics, Jennifer Heermance Jan 2019

Simulating And Modelling Opinion Dynamics, Jennifer Heermance

Graduate Research Theses & Dissertations

The foundation of social media is conversation. Social media allows people to share ideas and opinions, as well as discuss those opinions. A point of intrigue for many social scientists is how those opinions change through interaction with others. What influences someone’s opinion? When is a person willing to adapt their opinion, and when does it remain the same? Is it possible to measure these opinion dynamics? Our overall goal is to develop a more comprehensive model for opinion dynamics. The first step of this process is to simulate data that can then be analyzed and used to develop a …


Social Network Analysis On Wisconsin Archival Facebook Community, Jennifer Stevenson Aug 2017

Social Network Analysis On Wisconsin Archival Facebook Community, Jennifer Stevenson

Theses and Dissertations

The purpose of this study was to understand how Wisconsin archives are using Facebook (Wisconson archives Facebook community, WAFC). Few archive studies use quantitative measurements to draw conclusions from social media application use. Quantitative data is needed in order to identify the various ways that social media is being used in an archive. Without the data behind the assumptions, it is impossible to improve service and outreach to the archive users. This study proposed a mixed methods approach to aid in the process, using social network analysis, inferential statistics and thematic analysis. This study measured the effects of implementation of …


Statistics-Bierce Library Study, Tyler J. Hushour Jan 2017

Statistics-Bierce Library Study, Tyler J. Hushour

Williams Honors College, Honors Research Projects

This is a report from two surveys that I created and administered to students and faculty at Bierce library who came to the Circulation Desk or the Tech Desk, as well as some of my other findings when periodically looking around the library to see where students like to study or hang-out. There was a written survey given at the Circulation Desk, and a different survey given at the Tech Check-Out Desk. The project is for Melanie Smith-Farrell, the head of Access Services, and is based on a similar study Ian McCullough did in the science library. While this is …


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …