Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3,903 Full-Text Articles 4,229 Authors 796,854 Downloads 149 Institutions

All Articles in Databases and Information Systems

Faceted Search

3,903 full-text articles. Page 1 of 135.

Phr: Patient Health Record, Quinn Nelson 2018 University of Nebraska at Omaha

Phr: Patient Health Record, Quinn Nelson

Theses/Capstones/Creative Projects

The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research group ...


Programming For The Web: From Soup To Nuts: Implementing A Complete Gis Web Page Using Html5, Css, Javascript, Node.Js, Mongodb, And Open Layers., Charles W. Kann III 2018 None

Programming For The Web: From Soup To Nuts: Implementing A Complete Gis Web Page Using Html5, Css, Javascript, Node.Js, Mongodb, And Open Layers., Charles W. Kann Iii

Gettysburg College Open Educational Resources

This book is designed to be used as a class text but should be easily accessible to programmers interested in Web Programming. It should even be accessible to an advanced hobbyist.

The original goal behind this text was to help students doing research with me in Web based mapping applications, generally using Open Layers. The idea was to provide persistent storage using REST and simple http request from JavaScript to store the data on a server.

When teaching this class, I became painfully aware of just how little students know about Web Programming. They did not know how to format ...


The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr. 2018 University of Nebraska at Omaha

The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of ...


A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes 2018 Akademie der Wissenschaften zu Göttingen

A Linked Coptic Dictionary Online, Frank Feder, Maxim Kupreyev, Emma Manning, Caroline T. Schroeder, Amir Zeldes

College of the Pacific Faculty Presentations

We describe a new project publishing a freely available online dictionary for Coptic. The dictionary encompasses comprehensive cross-referencing mechanisms, including linking entries to an online scanned edition of Crum’s Coptic Dictionary, internal cross-references and etymological information, translated searchable definitions in English, French and German, and linked corpus data which provides frequencies and corpus look-up for headwords and multiword expressions. Headwords are available for linking in external projects using a REST API. We describe the challenges in encoding our dictionary using TEI XML and implementing linking mechanisms to construct a Web interface querying frequency information, which draw on NLP tools ...


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller 2018 School of Agricultural & Biological Engineering, Purdue University

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of ...


Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji 2018 PurdueUniversity

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji

The Summer Undergraduate Research Fellowship (SURF) Symposium

Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.

The linear hash function used to calculate hash value is defined ...


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin 2018 Purdue University

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join ...


A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper 2018 University of Nebraska Medical Center

A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper

Service Learning/Capstone Experience

This research study was completed at Legal Aid of Nebraska’s Health, Education, and Law Project through the partnership it has formed working with Nebraska Medicine and Iowa Legal Aid. Traditionally, health and disease have always been viewed exclusively as "healthcare" issues. But with healthcare consistently growing towards holistic approaches to help patients, we now know there are deeper, structural conditions of society that can act as strong driving forces of a person's poor daily living conditions that can negatively impact health. The importance of a Medical-Legal Partnership is that it considers a patient's social determinants of health ...


Chaff From The Wheat: Characterizing And Determining Valid Bug Reports, Yuanrui FAN, Xin XIA, David LO, Ahmed E. HASSAN 2018 Singapore Management University

Chaff From The Wheat: Characterizing And Determining Valid Bug Reports, Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan

Research Collection School Of Information Systems

Developers use bug reports to triage and fix bugs. When triaging a bug report, developers must decide whether the bug report is valid (i.e., a real bug). A large amount of bug reports are submitted every day, with many of them end up being invalid reports. Manually determining valid bug report is a difficult and tedious task. Thus, an approach that can automatically analyze the validity of a bug report and determine whether a report is valid can help developers prioritize their triaging tasks and avoid wasting time and effort on invalid bug reports.


A Fine-Grained Attribute Based Data Retrieval With Proxy Re-Encryption Scheme For Data Outsourcing Systems, Hanshu HONG, Ximeng LIU, Zhixin SUN 2018 Singapore Management University

A Fine-Grained Attribute Based Data Retrieval With Proxy Re-Encryption Scheme For Data Outsourcing Systems, Hanshu Hong, Ximeng Liu, Zhixin Sun

Research Collection School Of Information Systems

Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval. This paper presents an attribute based date retrieval with proxy re-encryption (ABDR-PRE) to provide both fine-grained access control and retrieval over the ciphertexts. The proposed scheme achieves fine-grained data access management by adopting KP-ABE mechanism, a delegator can generate the re-encryption key and search indexes for the ciphertexts to be shared over the target delegatee’s attributes. Throughout the process of data ...


International Data Sources & Data Literacy, Lisa DeLuca 2018 Seton Hall University

International Data Sources & Data Literacy, Lisa Deluca

Lisa DeLuca, MLIS, MPA

No abstract provided.


Cryptovisor: A Cryptocurrency Advisor Tool, matthew baldree, paul widhalm, brandon hill, matteo ortisi 2018 Southern Methodist University

Cryptovisor: A Cryptocurrency Advisor Tool, Matthew Baldree, Paul Widhalm, Brandon Hill, Matteo Ortisi

SMU Data Science Review

In this paper, we present a tool that provides trading recommendations for cryptocurrency using a stochastic gradient boost classifier trained from a model labeled by technical indicators. The cryptocurrency market is volatile due to its infancy and limited size making it difficult for investors to know when to enter, exit, or stay in the market. Therefore, a tool is needed to provide investment recommendations for investors. We developed such a tool to support one cryptocurrency, Bitcoin, based on its historical price and volume data to recommend a trading decision for today or past days. This tool is 95.50% accurate ...


Machine Learning To Predict College Course Success, Anthony R.Y. Dalton, Justin Beer, Sriharshasai Kommanapalli, James S. Lanich Ph.D. 2018 Southern Methodist University

Machine Learning To Predict College Course Success, Anthony R.Y. Dalton, Justin Beer, Sriharshasai Kommanapalli, James S. Lanich Ph.D.

SMU Data Science Review

In this paper, we present an analysis of the predictive ability of machine learning on the success of students in college courses in a California Community College. The California Legislature passed assembly bill 705 in order to place students in non-remedial coursework, based on high school transcripts, to increase college completion. We utilize machine learning methods on de-identified student high school transcript data to create predictive algorithms on whether or not the student will be successful in college-level English and Mathematics coursework. To satisfy the bill’s requirements, we first use exploratory data analysis on applicable transcript variables. Then we ...


Modeling Contemporaneous Basket Sequences With Twin Networks For Next-Item Recommendation, Duc Trong LE, Hady Wirawan LAUW, Yuan FANG 2018 Singapore Management University

Modeling Contemporaneous Basket Sequences With Twin Networks For Next-Item Recommendation, Duc Trong Le, Hady Wirawan Lauw, Yuan Fang

Research Collection School Of Information Systems

Our interactions with an application frequently leave a heterogeneous and contemporaneous trail of actions and adoptions (e.g., clicks, bookmarks, purchases). Given a sequence of a particular type (e.g., purchases)-- referred to as the target sequence, we seek to predict the next item expected to appear beyond this sequence. This task is known as next-item recommendation. We hypothesize two means for improvement. First, within each time step, a user may interact with multiple items (a basket), with potential latent associations among them. Second, predicting the next item in the target sequence may be helped by also learning from another ...


Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi 2018 University of New Mexico

Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi

Computer Science ETDs

Social media provide communication networks for their users to easily create and share content. Automated accounts, called bots, abuse these platforms by engaging in suspicious and/or illegal activities. Bots push spam content and participate in sponsored activities to expand their audience. The prevalence of bot accounts in social media can harm the usability of these platforms, and decrease the level of trustworthiness in them. The main goal of this dissertation is to show that temporal analysis facilitates detecting bots in social media. I introduce new bot detection techniques which exploit temporal information. Since automated accounts are controlled by computer ...


Distributed K-Nearest Neighbor Queries In Metric Spaces, Xin DING, Yuanliang ZHANG, Lu CHEN, Yunjun GAO, Baihua ZHENG 2018 Singapore Management University

Distributed K-Nearest Neighbor Queries In Metric Spaces, Xin Ding, Yuanliang Zhang, Lu Chen, Yunjun Gao, Baihua Zheng

Research Collection School Of Information Systems

Metric k nearest neighbor (MkNN) queries have applications in many areas such as multimedia retrieval, computational biology, and location-based services. With the growing volumes of data, a distributed method is required. In this paper, we propose an Asynchronous Metric Distributed System (AMDS), which uniformly partitions the data with the pivot-mapping technique to ensure the load balancing, and employs publish/subscribe communication model to asynchronously process large scale of queries. The employment of asynchronous processing model also improves robustness and efficiency of AMDS. In addition, we develop an efficient estimation based MkNN method using AMDS to improve the query efficiency. Extensive ...


Efficient Representative Subset Selection Over Sliding Windows, Yanhao WANG, Yuchen LI, Kianlee TAN 2018 Singapore Management University

Efficient Representative Subset Selection Over Sliding Windows, Yanhao Wang, Yuchen Li, Kianlee Tan

Research Collection School Of Information Systems

Representative subset selection (RSS) is an important tool for users to draw insights from massive datasets. Existing literature models RSS as submodular maximization to capture the "diminishing returns" property of representativeness, but often only has a single constraint, which limits its applications to many real-world problems.


Pacela: A Neural Framework For User Visitation In Location-Based Social Networks, Thanh-Nam DOAN, Ee-peng LIM 2018 Singapore Management University

Pacela: A Neural Framework For User Visitation In Location-Based Social Networks, Thanh-Nam Doan, Ee-Peng Lim

Research Collection School Of Information Systems

Check-in prediction using location-based social network data is an important research problem for both academia and industry since an accurate check-in predictive model is useful to many applications, e.g. urban planning, venue recommendation, route suggestion, and context-aware advertising. Intuitively, when considering venues to visit, users may rely on their past observed visit histories as well as some latent attributes associated with the venues. In this paper, we therefore propose a check-in prediction model based on a neural framework called Preference and Context Embeddings with Latent Attributes (PACELA). PACELA learns the embeddings space for the user and venue data as ...


Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng ZHU, Shichao ZHANG, Yonggang LI, Jilian ZHANG, Lifeng YANG, Yue FANG 2018 Singapore Management University

Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng Zhu, Shichao Zhang, Yonggang Li, Jilian Zhang, Lifeng Yang, Yue Fang

Research Collection School Of Information Systems

The current two-step clustering methods separately learn the similarity matrix and conduct k means clustering. Moreover, the similarity matrix is learnt from the original data, which usually contain noise. As a consequence, these clustering methods cannot achieve good clustering results. To address these issues, this paper proposes a new graph clustering methods (namely Low-rank Sparse Subspace clustering (LSS)) to simultaneously learn the similarity matrix and conduct the clustering from the low-dimensional feature space of the original data. Specifically, the proposed LSS integrates the learning of similarity matrix of the original feature space, the learning of similarity matrix of the low-dimensional ...


A Driver Guidance System For Taxis In Singapore, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Nicholas WONG, Rishikeshan RAJENDRAM, Pradeep VARAKANTHAM, Nghia Troung TROUNG, Firmansyah BIN ABD RAHMAN 2018 Singapore Management University

A Driver Guidance System For Taxis In Singapore, Shashi Shekhar Jha, Shih-Fen Cheng, Meghna Lowalekar, Nicholas Wong, Rishikeshan Rajendram, Pradeep Varakantham, Nghia Troung Troung, Firmansyah Bin Abd Rahman

Research Collection School Of Information Systems

Traditional taxi fleet operators world-over have been facingintense competitions from various ride-hailing services such as Uber and Grab.Based on our studies on the taxi industry in Singapore, we see that theemergence of Uber and Grab in the ride-hailing market has greatly impacted thetaxi industry: the average daily taxi ridership for the past two years has beenfalling continuously, by close to 20% in total. In this work, we discuss howefficient real-time data analytics and large-scale multiagent optimizationtechnology could help taxi drivers compete against more technologicallyadvanced service platforms. Our system has been in field trial with close to400 drivers, and our ...


Digital Commons powered by bepress