Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

PDF

Theses/Dissertations

2014

Institution
Keyword
Publication

Articles 1 - 30 of 73

Full-Text Articles in Physical Sciences and Mathematics

Optimizing Data Movement In Hybrid Analytic Systems, Patrick Michael Leyshock Dec 2014

Optimizing Data Movement In Hybrid Analytic Systems, Patrick Michael Leyshock

Dissertations and Theses

Hybrid systems for analyzing big data integrate an analytic tool and a dedicated data-management platform, storing data and operating on the data at both components. While hybrid systems have benefits over alternative architectures, in order to be effective, data movement between the two hybrid components must be minimized. Extant hybrid systems either fail to address performance problems stemming from inter-component data movement, or else require the user to explicitly reason about and manage data movement. My work presents the design, implementation, and evaluation of a hybrid analytic system for array-structured data that automatically minimizes data movement between the hybrid components. …


A Gis-Centric Approach For Modeling Vessel Management Behavior System Data To Determine Oyster Vessel Behavior On Public Oyster Grounds In Louisiana, David X. Gallegos Dec 2014

A Gis-Centric Approach For Modeling Vessel Management Behavior System Data To Determine Oyster Vessel Behavior On Public Oyster Grounds In Louisiana, David X. Gallegos

University of New Orleans Theses and Dissertations

The satellite communications system called the Vessel Management System was used to provide geospatial data on oyster fishing over the nearly 1.7 million acres of the public water bottoms in Louisiana. An algorithm to analyze the data was developed in order to model vessel behaviors including docked, gearing, fishing and traveling. Vessel speeds were calculated via the Haversine formula at small and large intervals and compared to derive a measure of linearity. The algorithm was implemented into software using Python and inserted into a PostgreSQL database supporting geospatial information. Queries were developed to obtain reports on vessel activities and daily …


A Content-Sensitive Wiki Help System, Eswara Satya Pavan Rajesh Pinapala Dec 2014

A Content-Sensitive Wiki Help System, Eswara Satya Pavan Rajesh Pinapala

Master's Projects

Context-sensitive help is a software application component that enables users to open help pertaining to their state, location, or the action they are performing within the software. Context-sensitive “wiki” help, on the other hand, is help powered by a wiki system with all the features of context-sensitive help. A context-sensitive wiki help system aims to make the context-sensitive help collaborative; in addition to seeking help, users can directly contribute to the help system. I have implemented a context-sensitive wiki help system into Yioop, an open source search engine and software portal created by Dr. Chris Pollett, in order to measure …


Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman Dec 2014

Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman

Theses and Dissertations

ABSTRACT

USE OF SECURE MESSAGING BY UNITED STATES VETERANS AND SIGNIFICANT OTHERS

By

Claudia S. Derman

The University of Wisconsin-Milwaukee, 2014

Under the Supervision of Professor Karen H. Morin, PhD, RN, ANEF, FAAN

The purpose of this study was to describe the topics discussed using secure messaging (SM), the pattern of use of SM, and whether the themes discussed and/or the pattern of use varied based on gender and age of the SM user. Secure messaging is an example of a technology that focuses on patient-centered communication. Secure messaging allows patients to communicate with their clinicians using the Internet and …


A Smart Web Crawler For A Concept Based Semantic Search Engine, Vinay Kancherla Dec 2014

A Smart Web Crawler For A Concept Based Semantic Search Engine, Vinay Kancherla

Master's Projects

The internet is a vast collection of billions of web pages containing terabytes of information arranged in thousands of servers using HTML. The size of this collection itself is a formidable obstacle in retrieving information necessary and relevant. This made search engines an important part of our lives. Search engines strive to retrieve information as relevant as possible to the user. One of the building blocks of search engines is the Web Crawler. A web crawler is a bot that goes around the internet collecting and storing it in a database for further analysis and arrangement of the data.

The …


Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng Dec 2014

Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng

Theses and Dissertations

This dissertation research is a collection of three essays on opinion mining of social media texts. I explore different theoretical and methodological perspectives in this inquiry. The first essay focuses on improving lexicon-based sentiment classification. I propose a method to automatically generate a sentiment lexicon that incorporates knowledge from both the language domain and the content domain. This method learns word associations from a large unannotated corpus. These associations are used to identify new sentiment words. Using a Twitter data set containing 743,069 tweets related to the stock market, I show that the sentiment lexicons generated using the proposed method …


A Deep Search Architecture For Capturing Product Ontologies, Tejeshwar Sangameswaran Dec 2014

A Deep Search Architecture For Capturing Product Ontologies, Tejeshwar Sangameswaran

Graduate Theses and Dissertations

This thesis describes a method to populate very large product ontologies quickly. We discuss a deep search architecture to text-mine online e-commerce market places and build a taxonomy of products and their corresponding descriptions and parent categories. The goal is to automatically construct an open database of products, which are aggregated from different online retailers. The database contains extensive metadata on each object, which can be queried and analyzed. Such a public database currently does not exist; instead the information currently resides siloed within various organizations. In this thesis, we describe the tools, data structures and software architectures that allowed …


Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton Dec 2014

Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton

Theses and Dissertations

The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …


Data Preparation For Social Network Mining And Analysis, Yazhe Wang Dec 2014

Data Preparation For Social Network Mining And Analysis, Yazhe Wang

Dissertations and Theses Collection (Open Access)

This dissertation studies the problem of preparing good-quality social network data for data analysis and mining. Modern online social networks such as Twitter, Facebook, and LinkedIn have rapidly grown in popularity. The consequent availability of a wealth of social network data provides an unprecedented opportunity for data analysis and mining researchers to determine useful and actionable information in a wide variety of fields such as social sciences, marketing, management, and security. However, raw social network data are vast, noisy, distributed, and sensitive in nature, which challenge data mining and analysis tasks in storage, efficiency, accuracy, etc. Many mining algorithms cannot …


Factors Impacting Information Security Noncompliance When Completing Job Tasks, Martha Nanette Harrell Nov 2014

Factors Impacting Information Security Noncompliance When Completing Job Tasks, Martha Nanette Harrell

CCE Theses and Dissertations

Work systems are comprised of the technical and social systems that should harmoniously work together to ensure a successful attainment of organizational goals and objectives. Information security controls are often designed to protect the information system and seldom consider the work system design. Using a positivist case study, this research examines the user's perception of having to choose between completing job tasks or remaining compliant with information security controls. An understanding of this phenomenon can help mitigate the risk associated with an information system security user's choice. Most previous research fails to consider the work system perspective on this issue. …


Privacy-Preserving Sanitization In Data Sharing, Wentian Lu Nov 2014

Privacy-Preserving Sanitization In Data Sharing, Wentian Lu

Doctoral Dissertations

In the era of big data, the prospect of analyzing, monitoring and investigating all sources of data starts to stand out in every aspect of our life. The benefit of such practices becomes concrete only when analysts or investigators have the information shared from data owners. However, privacy is one of the main barriers that disrupt the sharing behavior, due to the fear of disclosing sensitive information. This dissertation describes data sanitization methods that disguise the sensitive information before sharing a dataset and our criteria are always protecting privacy while preserving utility as much as possible. In particular, we provide …


Client/Server Data Synchronization In Ios Development, Dmitry Tumanov Nov 2014

Client/Server Data Synchronization In Ios Development, Dmitry Tumanov

Undergraduate Honors Theses

Electronic gadgets such as touchpads and smartphones are becoming more popular in business and everyday life. The main advantage of mobile devices over personal computers is their portability. Cellular data plans allow Internet access without having permanent access point. There is a number of web-based applications available for gadgets. The primary goal of these apps is to provide their services through constant Internet access. However, it may affect the operation of both devices and applications. The objective of this thesis is to find a better way of client/server data synchronization in iOS development that can reduce the negative consequences of …


Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe Oct 2014

Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe

Open Access Theses

Computer simulations have been extensively used with educational purposes. However, the successful implementation in order to improve learning has been a matter of debate in research in education. The purpose of this case study is to analyze how a set of computer simulations can improve student understanding of thermoelectric devices. The study was developed in a learning context characterized by the advanced degree of difficulty of the topics treated, the high academic level of education of the students, and the online nature of the learning environment. As part of the course, students were provided with instructional materials that guided the …


The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva Oct 2014

The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva

Open Access Theses

The aim of this thesis is to determine if there are greater benefits than costs associated in the participation of public K-12 school corporations in the Indiana Cybersecurity Services Center (INCSC). This thesis is an ex-antecost-benefit analysis policy assessment of the INCSC. The study consisted of a sample of 6 school corporations from which 5 were classified as small and 1 was large. Three methods were considered for data collection; however conducting interviews was the most effective method due to the interaction with IT personnel from each organization in order to analyze current costs related to 4 areas of …


Payroll Management System, Jhansi Bharathi Madavarapu Oct 2014

Payroll Management System, Jhansi Bharathi Madavarapu

All Capstone Projects

(from the introduction) Payroll Application has been designed to for the purpose of maintaining details of various allowances and deductions that need to be given to the employees of the organization. Also, it generates the salary Sheet of the employees of the organization that assists the accounts department in many ways. Payroll is a window Application which is used to maintain the Employee details of the organization or concern in different places; this provides each employee details with unique information. Admin plays the main roll to maintain the activities of the employees, client part takes lesser activities, and this system …


Administrative System For A Speech Pathology Office, Devin Raymond Peterman Oct 2014

Administrative System For A Speech Pathology Office, Devin Raymond Peterman

All Capstone Projects

The office that this application was designed for is a Speech Pathology office. Therapists are sent to the houses of patients to treat them. After each visit, the speech pathologists record the data collected from the treatment. This data is then collected and type manually into an excel sheet by the office administrator.

The way the office is currently run is inefficient and outdated. Because all the information from the visits has to be typed manually into the excel sheets there is a back log of information that has to be entered. This leads to disorganization and possible loss of …


Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning Oct 2014

Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning

CCE Theses and Dissertations

Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …


International Student Portal, Radha Krishna Yalamanchili Oct 2014

International Student Portal, Radha Krishna Yalamanchili

All Capstone Projects

(from the Introduction)

This is an web based application which provides information to International students about GSU university. GSU International student portal is an internet based application that can be accessed throughout world .Students can also know updates of university like cultural events, news ,weather reports etc. Students can fill the contact details so that school can contact him. The proposed system is completely integrated online system. Students can fill form to get airport pick from international office.


Understanding Usability-Related Information Security Failures In A Healthcare Context, Edward D. Boyer Sep 2014

Understanding Usability-Related Information Security Failures In A Healthcare Context, Edward D. Boyer

CCE Theses and Dissertations

This research study explores how the nature and type of usability failures impact task performance in a healthcare organization. Healthcare organizations are composed of heterogeneous and disparate information systems intertwined with complex business processes that create many challenges for the users of the system. The manner in which Information Technology systems and products are implemented along with the overlapping intricate tasks the users have pose problems in the area of usability. Usability research primarily focuses on the user interface; therefore, designing a better interface often leaves security in question. When usability failures arise from the incongruence between healthcare task and …


Intent-Based User Segmentation With Query Enhancement, Wei Xiong Aug 2014

Intent-Based User Segmentation With Query Enhancement, Wei Xiong

Dissertations

With the rapid advancement of the internet, accurate prediction of user's online intent underlying their search queries has received increasing attention from the online advertising community. As a rich source of information on web user's behavior, query logs have been leveraged by advertising companies to deliver personalized advertisements. However, a typical query usually contains very few terms, which only carry a small amount of information about a user's interest. The tendency of users to use short and ambiguous queries makes it difficult to fully describe and distinguish a user's intent. In addition, the query feature space is sparse, as only …


Entity-Based Enrichment For Information Extraction And Retrieval, Jeffrey Dalton Aug 2014

Entity-Based Enrichment For Information Extraction And Retrieval, Jeffrey Dalton

Doctoral Dissertations

The goal of this work is to leverage cross-document entity relationships for improved understanding of queries and documents. We define an entity to be a thing or concept that exists in the world, such as a politician, a battle, a film, or a color. Entity-based enrichment (EBE) is a new expansion model for both queries and documents using features from similar entitymentions in the document collection and external knowledge resources. It uses task-specific features from entities beyond words that include: name aliases, fine-grained entity types, categories, and relationships to other entities. EBE addresses the problem of sparse or noisy local …


Application Of Risk Metrics For Role Mining, Sharmin Ahmed Aug 2014

Application Of Risk Metrics For Role Mining, Sharmin Ahmed

Electronic Thesis and Dissertation Repository

Incorporating risk consideration in access control systems has recently become a popular research topic. Related to this is risk awareness which is needed to enable access control in an agile and dynamic way. While risk awareness is probably known for an established access control system, being aware of risk even before the access control system is defined can mean identification of users and permissions that are most likely to lead to dangerous or error-prone situations from an administration point of view. Having this information available during the role engineering phase allows data analysts and role engineers to highlight potentially risky …


Opinion Mining Of Sociopolitical Comments From Social Media, Swapna Gottipati Aug 2014

Opinion Mining Of Sociopolitical Comments From Social Media, Swapna Gottipati

Dissertations and Theses Collection (Open Access)

Opinions are central to almost all human activities by influencing greatly the decision making process. In this thesis, we present the problems of mining issues, extracting entities and suggestive opinions towards the entities, detecting thoughtful comments, and extracting stances and ideological expressions from online comments in the sociopolitical domain. This study is essential for opinion mining applications that are beneficial for policy makers, government sectors and social organizations. Much work has been done to try to uncover consumer sentiments from online comments to help businesses improve their products and services. However, sociopolitical opinion mining poses new challenges due to complex …


#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii Aug 2014

#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii

Theses and Dissertations

The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …


Yar Consulting Marketing Website And Extranet Site, John Suarez Jul 2014

Yar Consulting Marketing Website And Extranet Site, John Suarez

Masters Theses & Doctoral Dissertations

This is a hybrid project. As a new Information Systems consultancy the need for a website to market to potential clients was evident. The decision to add an extranet site was made after specific needs for Ace Hardware were made evident to Yar’s founders. Ace Hardware Corporation is a cooperative with over 4,400 members in over 100 nations worldwide. Ace corporate rolled out a B2B pilot program in the fall of 2013 to help Ace independently owned retail stores learn how to sell to other businesses. One of YAR’s founders is currently working with Ace corporate as a program consultant …


Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly Jul 2014

Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly

Open Access Theses

n the recent times, advances in scientific research related to electric vehicles led to generation of large amounts of data. This data is majorly logger data collected from various sensors in the vehicle. It is predominantly unstructured and non-relational in nature, also called Big Data. Analysis of such data needs a high performance information technology infrastructure that provides superior computational efficiency and storage capacity. It should be scalable to accommodate the growing data and ensure its security over a network. This research proposes an architecture built over Hadoop to effectively support distributed data management over a network for real-time data …


A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne Jul 2014

A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne

Open Access Theses

In the field of Systems Engineering, a movement is underway to capture the aspects of a system in a centralized model format instead of various documents. This is the basis of Model Based Systems Engineering (MBSE). In order to better formalize this change, the Systems Modeling Language (SysML) was developed to characterize an ontology for MBSE. Despite the growth of both MBSE practices and SysML tools, they have yet to be rigorously analyzed as to their applicability to the field of System-of-Systems (SoS). This thesis applies SysML to a methodology for System-of-Systems Engineering (SoSE) known as the Wave Model, which …


The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu Jul 2014

The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu

Open Access Theses

Who likes data? Businesses are always loyal data followers. Companies analyze various forms of data to maintain businesses and identify their current performance in different areas so they can find business opportunities to improve and obtain more market share in advance (Qrunfleh & Tarafdar, 2012). When Big Data comes to businesses, companies who can take advantage of data the best tend to regularly get more business and customers (Waller & Fawcett, 2013). Collecting, analyzing, and demonstrating data could be essential to a single business, a company's supply chain performance and its sustainability. As an intelligent data processing product in terms …


A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang Jul 2014

A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang

Open Access Theses

Every employee has different abilities as well as experience, leading to different results in terms of skills and job performance. In order to improve employee IT skills, organizations should evaluate their employees' skills to understand the current levels of skills and knowledge and to figure out areas where skills are currently lacking.

This study used a different approach than other existing methods to evaluate the IT skills of employees. The research used quantitative empirical data that represents the work experience of employees based on their task history and job positions. The suggested method defines the relationship between IT skills and …


Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin Jul 2014

Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin

Dissertations and Theses Collection (Open Access)

In this dissertation, we first consider data processing problems in multi-cost networks and in upgradable networks. These network types are motivated by real-life situations, which do not fall under the standard spatial network formulation and have not received much attention from database researchers. In a multi-cost network (MCN), each edge is associated with more than one weight type that may affect the user-specific perception of distance. We study two query types on MCNs, namely, the MCN skyline and the MCN top-k query. In an upgradable network, a subset of the edges are amenable to weight reduction, at a cost (e.g., …