Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

PDF

Databases and Information Systems

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 403

Full-Text Articles in Physical Sciences and Mathematics

Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar Dec 2015

Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This source code deals with the development of web based attendance management system using PHP and MYSQL. It is developed by one my BSCS student, namely sahar hassan under my supervision.


Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo Dec 2015

Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo

Faculty and Research Publications

New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …


Spatial 2015, Werner Kuhn, Matt Duckham, Marcia Castro Dec 2015

Spatial 2015, Werner Kuhn, Matt Duckham, Marcia Castro

Journal of Spatial Information Science

This report summarizes the first in a new series of interdisciplinary unconferences, called SPATIAL. SPATIAL 2015 was focused on applying spatial information to human health, and was held at the Center for Spatial Studies at the University of California, Santa Barbara, 9-11 December 2015.


Spatial Refinement As Collection Order Relations, Zhong Zhao Dec 2015

Spatial Refinement As Collection Order Relations, Zhong Zhao

Journal of Spatial Information Science

An abstract examination of refinement (and conversely, coarsening) with respect to the involved spatial relations gives rise to formulated order relations between spatial coverings, which are defined as complete-coverage representations composed of regional granules. Coverings, which generalize partitions by allowing granules to overlap, enhance hierarchical geocomputations in several ways. Refinement between spatial coverings has underlying patterns with respect to inclusion—formalized as binary topological relations—between their granules. The patterns are captured by collection relations of inclusion, which are obtained by constraining relevant topological relations with cardinality properties such as uniqueness and totality. Conjoining relevant collection relations of equality and proper inclusion …


Routes Visualization: Automated Placement Of Multiple Route Symbols Along A Physical Network Infrastructure, Jules Teulade-Denantes, Adrien Maudet, Cécile Duchêne Dec 2015

Routes Visualization: Automated Placement Of Multiple Route Symbols Along A Physical Network Infrastructure, Jules Teulade-Denantes, Adrien Maudet, Cécile Duchêne

Journal of Spatial Information Science

This paper tackles the representation of routes carried by a physical network infrastructure on a map. In particular, the paper examines the case where each route is represented by a separate colored linear symbol offset from the physical network segments and from other routes---as on public transit maps with bus routes offset from roads. In this study, the objective is to automate the placement of such route symbols while maximizing their legibility, especially at junctions. The problem is modeled as a constraint optimization problem. Legibility criteria are identified and formalized as constraints to optimize, while focusing on the case of …


Invariant Spatial Information In Sketch Maps — A Study Of Survey Sketch Maps Of Urban Areas, Jia Wang, Angela Schwering Dec 2015

Invariant Spatial Information In Sketch Maps — A Study Of Survey Sketch Maps Of Urban Areas, Jia Wang, Angela Schwering

Journal of Spatial Information Science

It is commonly recognized that free-hand sketch maps are influenced by cognitive impacts and therefore sketch maps are incomplete, distorted, and schematized. This makes it difficult to achieve a one-to-one alignment between a sketch map and its corresponding geo-referenced metric map. Nevertheless, sketch maps are still useful to communicate spatial knowledge, indicating that sketch maps contain certain spatial information that is robust to cognitive impacts. In existing studies, sketch maps are used frequently to measure cognitive maps. However, little work has been done on invariant spatial information in sketch maps, which is the information of spatial configurations representing correctly the …


Development And Evaluation Of A Geographic Information Retrieval System Using Fine Grained Toponyms, Damien Palacio, Curdin Derungs, Ross S. Purves Dec 2015

Development And Evaluation Of A Geographic Information Retrieval System Using Fine Grained Toponyms, Damien Palacio, Curdin Derungs, Ross S. Purves

Journal of Spatial Information Science

Geographic information retrieval (GIR) is concerned with returning information in response to an information need, typically expressed in terms of a thematic and spatial component linked by a spatial relationship. However, evaluation initiatives have often failed to show significant differences between simple text baselines and more complex spatially enabled GIR approaches. We explore the effectiveness of three systems (a text baseline, spatial query expansion, and a full GIR system utilizing both text and spatial indexes) at retrieving documents from a corpus describing mountaineering expeditions, centred around fine grained toponyms. To allow evaluation, we use user generated content (UGC) in the …


Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller Dec 2015

Email Similarity Matching And Automatic Reply Generation Using Statistical Topic Modeling And Machine Learning, Zachery L. Schiller

Electronic Theses and Dissertations

Responding to email is a time-consuming task that is a requirement for most professions. Many people find themselves answering the same questions over and over, repeatedly replying with answers they have written previously either in whole or in part. In this thesis, the Automatic Mail Reply (AMR) system is implemented to help with repeated email response creation. The system uses past email interactions and, through unsupervised statistical learning, attempts to recover relevant information to give to the user to assist in writing their reply.

Three statistical learning models, term frequency-inverse document frequency (tf-idf), Latent Semantic Analysis (LSA), and Latent Dirichlet …


Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Is It The Typeset Or The Type Of Statistics? Disfluent Font And Self-Disclosure, Rebecca Balebako, Eyal Peer, Laura Brandimarte, Lorrie Faith Cranor, Alessandro Acquisti Dec 2015

Is It The Typeset Or The Type Of Statistics? Disfluent Font And Self-Disclosure, Rebecca Balebako, Eyal Peer, Laura Brandimarte, Lorrie Faith Cranor, Alessandro Acquisti

Lorrie F Cranor

Background. The security and privacy communities have become increasingly interested in results from behavioral economics and psychology to help frame decisions so that users can make better privacy and security choices. One such result in the literature suggests that cognitive disfluency (presenting questions in a hard-to-read font) reduces self-disclosure. (A. L. Alter and D. M. Oppenheimer. Suppressing secrecy through metacognitive ease cognitive fluency encourages self-disclosure. Psychological science, 20(11):1414-1420, 2009) Aim. To examine the replicability and reliability of the effect of disfluency on self-disclosure, in order to test whether such approaches might be used to promote safer security and privacy behaviors. …


A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh Dec 2015

A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh

Lorrie F Cranor

Anecdotal evidence and scholarly research have shown that Internet users may regret some of their online disclosures. To help individuals avoid such regrets, we designed two modifications to the Facebook web interface that nudge users to consider the content and audience of their online disclosures more carefully. We implemented and evaluated these two nudges in a 6-week field trial with 28 Facebook users. We analyzed participants' interactions with the nudges, the content of their posts, and opinions collected through surveys. We found that reminders about the audience of posts can prevent unintended disclosures without major burden; however, introducing a time …


From Facebook Regrets To Facebook Privacy Nudges, Yang Wang, Pedro Giovanni Leon, Xiaoxuan Chen, Saranga Komanduri, Gregory Norcie, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh Dec 2015

From Facebook Regrets To Facebook Privacy Nudges, Yang Wang, Pedro Giovanni Leon, Xiaoxuan Chen, Saranga Komanduri, Gregory Norcie, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh

Lorrie F Cranor

As social networking sites (SNSs) gain in popularity, instances of regrets following online (over)sharing continue to be reported. In June 2010, a pierogi mascot for the Pittsburgh Pirates was fired because he posted disparaging comments about the team on his Facebook page. More recently, a high school teacher was forced to resign because she posted a picture on Facebook in which she was holding a glass of wine and a mug of beer. These incidents illustrate how, in addition to fostering socialization and interaction between friends and strangers, the ease and immediacy of communication that SNSs make possible can sometimes …


When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot Dec 2015

When Disclosure Is Involuntary: Empowering Users With Control To Reduce Concerns, David W. Wilson, Ryan M. Schuetzler, Bradley Dorn, Jeffrey Gainer Proudfoot

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Modern organizations must carefully balance the practice of gathering large amounts of valuable data from individuals with the associated ethical considerations and potential negative public image inherent in breaches of privacy. As it becomes increasingly commonplace for many types of information to be collected without individuals' knowledge or consent, managers and researchers alike can benefit from understanding how individuals react to such involuntary disclosures, and how these reactions can impact evaluations of the data-collecting organizations. This research develops and empirically tests a theoretical model that shows how empowering individuals with a sense of control over their personal information can help …


Information Technology For Development In Small And Medium-Sized Enterprises, Jie Xiong, Sajda Qureshi Dec 2015

Information Technology For Development In Small And Medium-Sized Enterprises, Jie Xiong, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Development is a concept that is often used to describe growth in organizations and the regions in which they reside. While research in Information Systems (IS) recognizes the importance of Information Technology (IT) in improving the organizational performance, a great deal of emphasis is given towards understanding large organizations. While social-economic development and transformation relies on new technological infrastructures and organizational changes, there is still a weak link between the organization studies with Information Technology (IT) as it relates to the growth of organizations. It appears that a greater research focus is needed in understanding the use of IT in …


Mobilerp, Anthony Fata Dec 2015

Mobilerp, Anthony Fata

Computer Engineering

MobilERP is a system that increases traceability of parts in a manufacturing process in a simple paperless way. The system contains three components, a desktop application, a mobile app, and a database. The mobile application allows employees to scan (using a bar code scanner) parts that they are working/finishing on during the manufacturing process. As the part goes down the assembly line, individuals will barcode scan using the app to track the progress. These changes would get updated to the database, where then the designated person can track the progress of the part as well as any problems or concerns …


Dental Hygienists' Cognitive Process In Periodontal Soft Tissue Charting, Kelsey M. Schwei Dec 2015

Dental Hygienists' Cognitive Process In Periodontal Soft Tissue Charting, Kelsey M. Schwei

Theses and Dissertations

Introduction: Dental hygienists have not had the opportunity to be involved in the design and development of the periodontal soft tissue charts and the surrounding interface features that are used while examining dental patients in daily practice. In some cases, dentists are able to give their opinions, wants, and needs into the development of the health information systems that they use on a daily basis, but too often, the dental hygienist is forgotten about and no input is ever given to the developers from the dental hygienists. This project considers the impact of well-designed interfaces on effectiveness and workflow particularly …


Supercnn: A Superpixelwise Convolutional Neural Network For Salient Object Detection, Shengfeng He, Rynson W.H. Lau, Wenxi Liu, Zhe Huang, Qingxiong Yang Dec 2015

Supercnn: A Superpixelwise Convolutional Neural Network For Salient Object Detection, Shengfeng He, Rynson W.H. Lau, Wenxi Liu, Zhe Huang, Qingxiong Yang

Research Collection School Of Computing and Information Systems

Existing computational models for salient object detection primarily rely on hand-crafted features, which are only able to capture low-level contrast information. In this paper, we learn the hierarchical contrast features by formulating salient object detection as a binary labeling problem using deep learning techniques. A novel superpixelwise convolutional neural network approach, called SuperCNN, is proposed to learn the internal representations of saliency in an efficient manner. In contrast to the classical convolutional networks, SuperCNN has four main properties. First, the proposed method is able to learn the hierarchical contrast features, as it is fed by two meaningful superpixel sequences, which …


Aesthetic Experience And Acceptance Of Human Computation Games, Xiaohui Wang, Dion Hoe-Lian Goh, Ee-Peng Lim, Adrian Wei Liang Vu Dec 2015

Aesthetic Experience And Acceptance Of Human Computation Games, Xiaohui Wang, Dion Hoe-Lian Goh, Ee-Peng Lim, Adrian Wei Liang Vu

Research Collection School Of Computing and Information Systems

Human computation games (HCGs) are applications that leverage games to solve computational problems that are out reach of the capacity of computers. Game aesthetics are critical for HCG acceptance, and the game elements should motivate users to contribute time and effort. In this paper, we examine the effect of aesthetic experience on intention to use HCGs. A between-subjects experiment was conducted to compare a HCG and a human computation system (HCS). Results demonstrated that HCGs provided a greater sense of aesthetic experience and attracted more intentional usage than HCSs. Implications of this study are discussed.


Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig Dec 2015

Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig

Research Collection School Of Computing and Information Systems

Distributed constraint optimization (DCOP) problems are well-suited for modeling multi-agent coordination problems. However, it only models static problems, which do not change over time. Consequently, researchers have introduced the Dynamic DCOP (DDCOP) model to model dynamic problems. In this paper, we make two key contributions: (a) a procedure to reason with the incremental changes in DDCOPs and (b) an incremental pseudo-tree construction algorithm that can be used by DCOP algorithms such as any-space ADOPT and any-space BnB-ADOPT to solve DDCOPs. Due to the incremental reasoning employed, our experimental results show that any-space ADOPT and any-space BnB-ADOPT are up to 42% …


On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim Dec 2015

On Neighborhood Effects In Location-Based Social Networks, Thanh-Nam Doan, Freddy Chong-Tat Chua, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we analyze factors that determine the check-in decisions of users on venues using a location-based social network dataset. Based on a Foursquare dataset constructed from Singapore-based users, we devise a stringent criteria to identify the actual home locations of a subset of users. Using these users' check-ins, we aim to ascertain the neighborhood effect on the venues visited, compared with the activity level of users. We further formulate the check-in count prediction and check-in prediction tasks. A comprehensive set of features have been defined and they encompass information from users, venues, their neighbors, and friendship networks. We …


A Bayesian Recommender Model For User Rating And Review Profiling, Mingming Jiang, Dandan Song, Lejian Liao, Feida Zhu Dec 2015

A Bayesian Recommender Model For User Rating And Review Profiling, Mingming Jiang, Dandan Song, Lejian Liao, Feida Zhu

Research Collection School Of Computing and Information Systems

Intuitively, not only do ratings include abundant information for learning user preferences, but also reviews accompanied by ratings. However, most existing recommender systems take rating scores for granted and discard the wealth of information in accompanying reviews. In this paper, in order to exploit user profiles' information embedded in both ratings and reviews exhaustively, we propose a Bayesian model that links a traditional Collaborative Filtering (CF) technique with a topic model seamlessly. By employing a topic model with the review text and aligning user review topics with "user attitudes" (i.e., abstract rating patterns) over the same distribution, our method achieves …


Fast Reinforcement Learning Under Uncertainties With Self-Organizing Neural Networks, Teck-Hou Teng, Ah-Hwee Tan Dec 2015

Fast Reinforcement Learning Under Uncertainties With Self-Organizing Neural Networks, Teck-Hou Teng, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Using feedback signals from the environment, a reinforcement learning (RL) system typically discovers action policies that recommend actions effective to the states based on a Q-value function. However, uncertainties over the estimation of the Q-values can delay the convergence of RL. For fast RL convergence by accounting for such uncertainties, this paper proposes several enhancements to the estimation and learning of the Q-value using a self-organizing neural network. Specifically, a temporal difference method known as Q-learning is complemented by a Q-value Polarization procedure, which contrasts the Q-values using feedback signals on the effect of the recommended actions. The polarized Q-values …


Coordinated Persuasion With Dynamic Group Formation For Collaborative Elderly Care, Budhitama Subagdja, Ah-Hwee Tan Dec 2015

Coordinated Persuasion With Dynamic Group Formation For Collaborative Elderly Care, Budhitama Subagdja, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Ageing in place demands a new paradigm of inhouse caregiving allowing many aspects of daily lives to be tackled by smart appliances and technologies. The important challenges include the effective provision of recommendations by multiple parties of caregiver constituting changes of the user’s behavior. In this multiagent environment, interdependencies between agents become major issues to tackle. This paper presents an approach of dynamic group formation for autonomous caregiving agents to collaborate in recommending different aspects of well-being. The approach supports the agents to regulate the timing of their recommendations, prevent conflicting messages, and cooperate to make more effective persuasions. A …


Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch Dec 2015

Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch

Research Collection School Of Computing and Information Systems

The large scale and complex nature of social media data raises the need to scale clustering techniques to big data and make them capable of automatically identifying data clusters with few empirical settings. In this paper, we present our investigation and three algorithms based on the fuzzy adaptive resonance theory (Fuzzy ART) that have linear computational complexity, use a single parameter, i.e., the vigilance parameter to identify data clusters, and are robust to modest parameter settings. The contribution of this paper lies in two aspects. First, we theoretically demonstrate how complement coding, commonly known as a normalization method, changes the …


Mylife: An Online Personal Memory Album, Di Wang, Ah-Hwee Tan Dec 2015

Mylife: An Online Personal Memory Album, Di Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

In this demo, we illustrate the formation, retrieval, and playback of autobiographical memory in an online personal memory album named MyLife. The memory in MyLife consists of pictorial snapshots of one's life together with the associated context, namely time, location, people, activity, imagery, and emotion. MyLife allows direct import of memories from other online personal photo repositories. For memory retrieval, users can use not only exact cues, but also partial, vague, inaccurate, and random ones. The retrieved memories are then played back as a movie-like slide show with various visual effects and background music. MyLife holds high potential in both …


Preface: Wi 2015, Ah-Hwee Tan, Yuefeng Li, Ee-Peng Lim, Jie Zhang, Dell Zhang, Julita Vassileva Dec 2015

Preface: Wi 2015, Ah-Hwee Tan, Yuefeng Li, Ee-Peng Lim, Jie Zhang, Dell Zhang, Julita Vassileva

Research Collection School Of Computing and Information Systems

This volume contains the papers selected for presentation at the 2015 IEEE/WIC/ACM International Conference on Web Intelligence (WI’15), which was held from 6 to 9 December 2015 in Singapore, a city which welcomes people from different parts of the world to work and play. Following the tradition of WI conference in previous years, WI’15 was collocated with 2015 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT’15). Both WI’15 and IAT’15 were sponsored by the IEEE Computer Society, Web Intelligence Consortium (WIC), Association for Computing Machinery (ACM), and the Memetic Computing Society. The two collocated conferences were hosted by the Joint …


Preface To Wi-Iat 2015 Workshops And Demo/Posters, Ah-Hwee Tan, Yuefeng Li Dec 2015

Preface To Wi-Iat 2015 Workshops And Demo/Posters, Ah-Hwee Tan, Yuefeng Li

Research Collection School Of Computing and Information Systems

This volume contains the papers selected for presentation at the workshops and demonstration/poster track as part of the 2015 IEEE/WIC/ACM International Conference on Web Intelligence (WI’15) and 2015 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT’15) held from 6 to 9 December 2015 in Singapore.


Silver Assistants For Aging-In-Place, Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan Dec 2015

Silver Assistants For Aging-In-Place, Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

In this demo, we present an assembly of silver assistants for supporting Aging-In-Place (AIP). The virtual agents are designed to serve around the clock to complement human care within the intelligent home environment. Residing in different platforms with ubiquitous access, the agents collaboratively provide holistic care to the elderly users. The demonstration is shown in a 3-D virtual home replicating a typical 5-room apartment in Singapore. Sensory inputs are stored in a knowledge base named Situation Awareness Model (SAM). Therefore, the capabilities of the agents can always be extended by expanding the knowledge defined in SAM. Using the simulation system, …


Non-Intrusive Robust Human Activity Recognition For Diverse Age Groups, Di Wang, Ah-Hwee Tan, Daqing Zhang Dec 2015

Non-Intrusive Robust Human Activity Recognition For Diverse Age Groups, Di Wang, Ah-Hwee Tan, Daqing Zhang

Research Collection School Of Computing and Information Systems

—Many elderly prefer to live independently at their own homes. However, how to use modern technologies to ensure their safety presents vast challenges and opportunities. Being able to non-intrusively sense the activities performed by the elderly definitely has great advantages in various circumstances. Non-intrusive activity recognition can be performed using the embedded sensors in modern smartphones. However, not many activity recognition models are robust enough that allow the subjects to carry the smartphones in different pockets with unrestricted orientations and varying deviations. Moreover, to the best of our knowledge, no existing literature studied the difference between the youth and the …


Intent Classification Of Short-Text On Social Media, Hemant Purohit, Guozhu Dong, Valerie L. Shalin, Krishnaprasad Thirunarayan, Amit P. Sheth Dec 2015

Intent Classification Of Short-Text On Social Media, Hemant Purohit, Guozhu Dong, Valerie L. Shalin, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

Social media platforms facilitate the emergence of citizen communities that discuss real-world events. Their content reflects a variety of intent ranging from social good (e.g., volunteering to help) to commercial interest (e.g., criticizing product features). Hence, mining intent from social data can aid in filtering social media to support organizations, such as an emergency management unit for resource planning. However, effective intent mining is inherently challenging due to ambiguity in interpretation, and sparsity of relevant behaviors in social data. In this paper, we address the problem of multiclass classification of intent with a use-case of social data generated during crisis …