Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Selected Works

Keyword
Publication Year
Publication
File Type

Articles 271 - 287 of 287

Full-Text Articles in Physical Sciences and Mathematics

A Threshold-Based Algorithm For Continuous Monitoring Of K Nearest Neighbors, Kyriakos Mouratidis, Dimitris Papadias, Spiridon Bakiras, Yufei Tao Dec 2010

A Threshold-Based Algorithm For Continuous Monitoring Of K Nearest Neighbors, Kyriakos Mouratidis, Dimitris Papadias, Spiridon Bakiras, Yufei Tao

Kyriakos MOURATIDIS

Assume a set of moving objects and a central server that monitors their positions over time, while processing continuous nearest neighbor queries from geographically distributed clients. In order to always report up-to-date results, the server could constantly obtain the most recent position of all objects. However, this naïve solution requires the transmission of a large number of rapid data streams corresponding to location updates. Intuitively, current information is necessary only for objects that may influence some query result (i.e., they may be included in the nearest neighbor set of some client). Motivated by this observation, we present a threshold-based algorithm …


Preference Queries In Large Multi-Cost Transportation Networks, Kyriakos Mouratidis, Yimin Lin, Man Lung Yiu Dec 2010

Preference Queries In Large Multi-Cost Transportation Networks, Kyriakos Mouratidis, Yimin Lin, Man Lung Yiu

Kyriakos MOURATIDIS

Research on spatial network databases has so far considered that there is a single cost value associated with each road segment of the network. In most real-world situations, however, there may exist multiple cost types involved in transportation decision making. For example, the different costs of a road segment could be its Euclidean length, the driving time, the walking time, possible toll fee, etc. The relative significance of these cost types may vary from user to user. In this paper we consider such multi-cost transportation networks (MCN), where each edge (road segment) is associated with multiple cost values. We formulate …


Virtualisation: A Case Study In Database Administration Laboratory Work, Greg Cranitch, Michael J. Rees Aug 2010

Virtualisation: A Case Study In Database Administration Laboratory Work, Greg Cranitch, Michael J. Rees

Greg Cranitch

This paper discusses the issues involved in using virtual machines to teach database administration concepts and the associated issues in a university student environment. Previous work on using virtual machines in system/network administration university labs is reviewed as well as the use of virtual machines in a database development environment. A virtual machine project for a Virtual Information Technology Teaching Laboratory (VITTL) using central servers offering a potential solution is described. This solution provides a secure environment with each student isolated from others with their own virtual machines.


Expert System For Online Diagnosis Of Red-Eye Diseases, Dr. Muhammad Zubair Asghar, Muhammad Junaid Asghar Aug 2010

Expert System For Online Diagnosis Of Red-Eye Diseases, Dr. Muhammad Zubair Asghar, Muhammad Junaid Asghar

Dr. Muhammad Zubair Asghar

This paper describes Expert System (ES) for online diagnosis and prescription of red-eye diseases. The types of eye diseases that can be diagnosed with this system are called Red-eye diseases i.e. disease in which red-eye is the common symptom. It is rule based web-supported expert system, assisting ophthalmologists, medical students doing specialization in ophthalmology, researchers as well as eye patients having computer know-how. System was designed and programmed with Java Technology. The expert rules were developed on the symptoms of each type of Red-eye disease, and they were presented using tree-graph and inferred using forward-chaining with depth-first search method. User …


Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens Jul 2010

Trust Perceptions Of Online Travel Information By Different Content Creators: Some Social And Legal Implications., Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens

Carmen Cox

Consumers are increasingly turning to the online environment to provide information to assist them in making purchase decisions related to travel products. They often rely on travel recommendations from different sources, such as sellers, independent experts and, increasingly, other consumers. A new type of online content, user-generated content (UGC), provides a number of legal and social challenges to providers and users of that content, especially in relation to areas such as defamation, misrepresentation and social embarrassment. This paper reports research that examined the level of trustworthiness of online travel information from these different sources. The study used a survey of …


Active Collaboration Learning Environments: The Class Of Web 2.0, Dirk Hovorka, Michael J. Rees Jun 2010

Active Collaboration Learning Environments: The Class Of Web 2.0, Dirk Hovorka, Michael J. Rees

Michael J Rees

The maturity and increased integration of online collaboration, networking, and research tools offer Information Systems faculty opportunities to provide unique learning environments at multiple levels. A growing ensemble of Web 2.0 technologies provide the background to introduce and explore fundamental aspects of information system development, design, application, and use, while simultaneously providing a functional suite of tools which will aid students in other aspects of their university learning. A selection of these technologies and case studies of their classroom usage is discussed. In addition, an agenda for research in both pedagogy and in information systems phenomena is outlined.


Iris : Digital Scholarship, Publishing, And Preservation At Northeastern University, Hillary Corbett May 2010

Iris : Digital Scholarship, Publishing, And Preservation At Northeastern University, Hillary Corbett

Hillary Corbett

No abstract provided.


Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah Dec 2009

Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah

Rukaini Abdullah

In science education, it is believed that students should understand the qualitative principles that govern the subject including the cause-effect relationships in processes before they are immersed in complex problem solving. Traditional educational programs for teaching organic chemistry do not usually explain or justify an observed chemical phenomenon. These programs do not “explain” simply because the results are obtained through chaining the rules or by searching the reaction routes that have been pre-coded in software. This paper discusses the development techniques, simulation results, and student evaluation of a software tool that aimed to help chemistry students learn organic processes through …


Open & Mobile Equipment, Timothy J. Rowley Sep 2009

Open & Mobile Equipment, Timothy J. Rowley

Timothy J Rowley

This was a "Lightning Presentation" about making cutting edge technology available to university students.


Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar Aug 2009

Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This paper introduces an expert System (ES) named as “CADRE-Computer Assisted Diagnoses for Red Eye. Mostly the remote areas of the population are deprived of the facilities of having experts in eye disease. So it is the need of the day to store the expertise of Eye specialists in computers through using ES technology. This ES is a rule-based Expert System that assists in red-eye diagnosis and treatment. The knowledge acquired from literature review and human experts of the specific domain was used as a base for analysis, diagnosis and recommendations. CADRE evaluates the risk factors of 20 eye diseases …


Wwi Postcard Collection: A Community-Based Model For Digital Libraries, Marc D. Bayer Dec 2008

Wwi Postcard Collection: A Community-Based Model For Digital Libraries, Marc D. Bayer

Marc D Bayer

The paradigm shift of academic libraries from information purveyors to places of learning and communicating must occur virtually as well as physically. By creating informal virtual communities around digital collections , librarians can participate in the academic discussion and make more formal collections better known.


The Plant Ontology Database: A Community Resource For Plant Structure And Developmental Stages Controlled Vocabulary And Annotations, Shulamit Avraham, Chih-Wei Tung, Katica Ilic, Pankaj Jaiswal, Elizabeth A. Kellogg, Susan Mccouch, Anuradha Pujar, Leonore Reiser, Seung Yon Rhee, Martin M. Sachs, Mary L. Schaeffer, Lincoln Stein, Peter Stevens, Leszek Vincent, Felipe Zapata, Doreen Ware Dec 2007

The Plant Ontology Database: A Community Resource For Plant Structure And Developmental Stages Controlled Vocabulary And Annotations, Shulamit Avraham, Chih-Wei Tung, Katica Ilic, Pankaj Jaiswal, Elizabeth A. Kellogg, Susan Mccouch, Anuradha Pujar, Leonore Reiser, Seung Yon Rhee, Martin M. Sachs, Mary L. Schaeffer, Lincoln Stein, Peter Stevens, Leszek Vincent, Felipe Zapata, Doreen Ware

Peter Stevens

The Plant Ontology Consortium (POC, http://www.plantontology.org ) is a collaborative effort among model plant genome databases and plant researchers that aims to create, maintain and facilitate the use of a controlled vocabulary (ontology) for plants. The ontology allows users to ascribe attributes of plant structure (anatomy and morphology) and developmental stages to data types, such as genes and phenotypes, to provide a semantic framework to make meaningful cross-species and database comparisons. The POC builds upon groundbreaking work by the Gene Ontology Consortium (GOC) by adopting and extending the GOC's principles, existing software and database structure. Over the past year, POC …


Creating Database-Backed Library Web Pages Using Open Source Tools (Review), Frank J. Bove Jun 2007

Creating Database-Backed Library Web Pages Using Open Source Tools (Review), Frank J. Bove

Frank J. Bove

No abstract provided.


Clustering-Based High Trend Identification In Dataset, Dr. Muhammad Zubair Asghar, Dr. Auranzeb Khan, Fazal Masud Kundi, Nafees Ur Rehman Jun 2007

Clustering-Based High Trend Identification In Dataset, Dr. Muhammad Zubair Asghar, Dr. Auranzeb Khan, Fazal Masud Kundi, Nafees Ur Rehman

Dr. Muhammad Zubair Asghar

Clustering data into meaningful groups has a vast scope of research in several fields, like: statistics, information theory, machine learning, databases, and bioinformatics. This paper presents the modified form of K-means clustering algorithm called T-means. This algorithm creates, sorted clusters and labels as "high trend" and "low trend". Then M cases are selected from the high trend cluster (HTC) to construct the final HTC. The algorithm was tested on real univariate data of student's marks. Experimental results show that T-means can be efficiently used to construct the sorted cluster of significant cases in data set. T-means will help to identify …


Inheritance Evaluation System Using Islamic Law, Dr. Muhammad Zubair Asghar, Fazal Masud Kundi, Abdur Rashid Khan Nov 2004

Inheritance Evaluation System Using Islamic Law, Dr. Muhammad Zubair Asghar, Fazal Masud Kundi, Abdur Rashid Khan

Dr. Muhammad Zubair Asghar

The research work about the Inheritance Evaluation System using Islamic law is valuable for automatic calculation of share out of total inheritance of a deceased to his/her legal heir(s). First version of the software named as Islamic Inheritance Evaluation System (IIES) deals with Hanfi School of thought. IIES may solve the heritage problem of heirs in text as well as in graphical form at home without establishing a suit in any court. This also leads to further research of who is how much related to whom?


Using Dynamic Information In The Supply Network, Jeffrey Barker Dec 2003

Using Dynamic Information In The Supply Network, Jeffrey Barker

Jeffrey Barker

No abstract provided.


Covert Shells, John Christian Smith Nov 2000

Covert Shells, John Christian Smith

John Christian Smith

The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.

We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …