Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (7)
- Engineering (6)
- Business (4)
- Graphics and Human Computer Interfaces (4)
- Computer Engineering (3)
-
- Theory and Algorithms (3)
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Hospitality Administration and Management (2)
- Other Computer Sciences (2)
- Applied Mathematics (1)
- Design of Experiments and Sample Surveys (1)
- E-Commerce (1)
- Environmental Monitoring (1)
- Environmental Sciences (1)
- Finance and Financial Management (1)
- Information Security (1)
- Law (1)
- Management Information Systems (1)
- Medical Biomathematics and Biometrics (1)
- Medical Sciences (1)
- Medicine and Health Sciences (1)
- Numerical Analysis and Scientific Computing (1)
- Other Applied Mathematics (1)
- Other Computer Engineering (1)
- Other Statistics and Probability (1)
- Secured Transactions (1)
- Keyword
-
- Computing (2)
- IT (2)
- Machine learning (2)
- Natural language processing (2)
- Visualisation (2)
-
- 3D building models (1)
- Active learning (1)
- Activity discovery (1)
- Activity recognition (1)
- Agent-based simulation (1)
- Analytics (1)
- Application Scoring (1)
- Applied intelligence (1)
- Archetypes (1)
- Artificial Data (1)
- Artificial intelligence (1)
- Auditory user interface (1)
- Authentication (1)
- Automation (1)
- Bioinformatics (1)
- Biometrics (1)
- Business data (1)
- Case based reasoning (1)
- Chirp coding (1)
- Cloud Computing (1)
- Computing for the Hotel and Catering Industry (1)
- Content (1)
- Content delivery (1)
- Covert Encryption (1)
- Cryptography (1)
Articles 1 - 28 of 28
Full-Text Articles in Databases and Information Systems
Content-Based Music Retrieval Of Irish Traditional Music Via A Virtual Tin Whistle, Pierre Beauguitte, Hung-Chuan Huang
Content-Based Music Retrieval Of Irish Traditional Music Via A Virtual Tin Whistle, Pierre Beauguitte, Hung-Chuan Huang
Conference papers
We present a mobilephon eapplication associating a virtual musical instrument (emulating a tin whistle) to a content based music retrieval system for Irish Traditional Music (ITM). It performs tune recognition, following the architecture of the existing query-by-playing software Tunepal (Duggan & O’Shea, 2011). After explaining the motivation for this project in Section 2 and presenting some relatedworkinSection3,wedescribeourproposedapplicationinSection4. Section5discussescurrentshortcomings of our project and potential future directions.
Agent-Based Iot Coordination For Smart Cities Considering Security And Privacy, Iván García-Magariño, Geraldine Gray, Rajarajan Muttukrishnan, Waqar Asif
Agent-Based Iot Coordination For Smart Cities Considering Security And Privacy, Iván García-Magariño, Geraldine Gray, Rajarajan Muttukrishnan, Waqar Asif
Conference papers
The interest in Internet of Things (IoT) is increasing steeply, and the use of their smart objects and their composite services may become widespread in the next few years increasing the number of smart cities. This technology can benefit from scalable solutions that integrate composite services of multiple-purpose smart objects for the upcoming large-scale use of integrated services in IoT. This work proposes an agent-based approach for supporting large-scale use of IoT for providing complex integrated services. Its novelty relies in the use of distributed blackboards for implicit communications, decentralizing the storage and management of the blackboard information in the …
Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher
Evaluating Sequence Discovery Systems In An Abstraction-Aware Manner, Eoin Rogers, Robert J. Ross, John D. Kelleher
Conference papers
Activity discovery is a challenging machine learning problem where we seek to uncover new or altered behavioural patterns in sensor data. In this paper we motivate and introduce a novel approach to evaluating activity discovery systems. Pre-annotated ground truths, often used to evaluate the performance of such systems on existing datasets, may exist at different levels of abstraction to the output of the output produced by the system. We propose a method for detecting and dealing with this situation, allowing for useful ground truth comparisons. This work has applications for activity discovery, and also for related fields. For example, it …
Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry
Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry
Conference papers
This paper presents a use-case based evaluation of the impact of two-level modeling on the automatic federation of ocean observational data. The goal of the work is to increase the interoperability and data quality of aggregated ocean observations to support convenient discovery and consumption by applications. An assessment of the interoperability of served data flows from publicly available ocean observing spatial data infrastructures was performed. Barriers to consumption of existing standards-compliant ocean-observing data streams were examined, including the impact of adherence to agreed data standards. Historical data flows were mapped to a set of archetypes and a backward integration experiment …
Validation Of Tagging Suggestion Models For A Hotel Ticketing Corpus, Bojan Bozic, Andre Rios, Sarah Jane Delany
Validation Of Tagging Suggestion Models For A Hotel Ticketing Corpus, Bojan Bozic, Andre Rios, Sarah Jane Delany
Conference papers
This paper investigates methods for the prediction of tags on a textual corpus that describes hotel staff inputs in a ticketing system. The aim is to improve the tagging process and find the most suitable method for suggesting tags for a new text entry. The paper consists of two parts: (i) exploration of existing sample data, which includes statistical analysis and visualisation of the data to provide an overview, and (ii) evaluation of tag prediction approaches. We have included different approaches from different research fields in order to cover a broad spectrum of possible solutions. As a result, we have …
Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany
Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany
Conference papers
Abstract The issues of cyberbullying and online harassment have gained considerable coverage in the last number of years. Social media providers need to be able to detect abusive content both accurately and efficiently in order to protect their users. Our aim is to investigate the application of core text mining techniques for the automatic detection of abusive content across a range of social media sources include blogs, forums, media-sharing, Q&A and chat - using datasets from Twitter, YouTube, MySpace, Kongregate, Formspring and Slashdot. Using supervised machine learning, we compare alternative text representations and dimension reduction approaches, including feature selection and …
Mobisurround: An Auditory User Interface For Geo-Service Delivery, Keith Gardiner, Charlie Cullen, James Carswell
Mobisurround: An Auditory User Interface For Geo-Service Delivery, Keith Gardiner, Charlie Cullen, James Carswell
Conference papers
This paper describes original research carried out in the area of Location-Based Services (LBS) with an emphasis on Auditory User Interfaces (AUI) for content delivery. Previous work in this area has focused on accurately determining spatial interactions and informing the user mainly by means of the visual modality. mobiSurround is new research that builds upon these principles with a focus on multimodal content delivery and navigation and in particular the development of an AUI. This AUI enables the delivery of rich media content and natural directions using audio. This novel approach provides a hands free method for navigating a space …
Exploring Customer Specific Kpi Selection Strategies For An Adaptive Time Critical User Interface, Ingo Keck, Robert J. Ross
Exploring Customer Specific Kpi Selection Strategies For An Adaptive Time Critical User Interface, Ingo Keck, Robert J. Ross
Conference papers
Rapid growth in the number of measures available to describe customer-organization relationships has presented a serious challenge for Business Intelligence (BI) interface developers as they attempt to provide business users with key customer information without requiring users to painstakingly sift through many interface windows and layers. In this paper we introduce a prototype Intelligent User Interface that we have deployed to partially address this issue. The interface builds on machine learning techniques to construct a ranking model of Key Performance Indicators (KPIs) that are used to select and present the most important customer metrics that can be made available to …
Preparing Detailed 3d Building Models For Google Earth Integration, Linh Truong-Hong, Thanh Thoa Pham Thi, Junjun Yin, James Carswell
Preparing Detailed 3d Building Models For Google Earth Integration, Linh Truong-Hong, Thanh Thoa Pham Thi, Junjun Yin, James Carswell
Conference papers
Today's spatially aware users are becoming more interested in retrieving personalised and task relevant information, requiring detailed 3D city models linked to non-spatial attribute data. However, current implementations of 3D city models are typically LoD2 that don't include geometric or attribute details about many visible features (e.g. rooms) of a building. As such, valueadded applications developed for web-based and wireless platforms are limited to querying for available non-spatial business data at the building level only. To overcome this, geometrically accurate 3D building models are necessary to enable users to visualize, interact, and query for task specific non-spatial business data. This …
Stock Market Prediction Without Sentiment Analysis: Using A Web-Traffic Based Classifier And User-Level Analysis, Pierpaolo Dondio
Stock Market Prediction Without Sentiment Analysis: Using A Web-Traffic Based Classifier And User-Level Analysis, Pierpaolo Dondio
Conference papers
This paper provides further evidence on the predictive power of online community traffic with regard to stock prices. Using the largest dataset to date, spanning 8 years and almost the complete set of SP500 stocks, we train a classifier using a set of features entirely extracted from web-traffic data of financial online communities. The classifier is shown to outperform the predictive power of a baseline classifier solely based on price time-series, and to have similar performances as the classifier built considering price and traffic features together. The best predictive performances are achieved when information about stock capitalization is coupled with …
A Service Oriented Architecture For Spatial And Business Data Applications: An Ecampus Case Study, James Carswell, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin
A Service Oriented Architecture For Spatial And Business Data Applications: An Ecampus Case Study, James Carswell, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin
Conference papers
Location-dependent queries of geospatial data are indispensable for users in today's era of "Smart" environments. At general scales, Google Maps and Google Earth with satellite and street views have provided some utilities for users to query specific locations. However, at local scales, where detailed 3D geometries and linked business data are needed, there is a general lack of related information for in depth exploration of an area. For instance, the following kinds of questions cannot be answered when interacting with Google Maps/Earth on a typical university campus: what classes are scheduled in that room over there? Whose office window is …
Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin
Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin
Conference papers
Research and development of mobile information systems in the Future Internet of Things is about delivering technologies built around management and access to real-time heterogeneous datasets. Analyzing these enormous volumes of disparate data on mobile devices requires context-aware smart applications and services. 3DQ (Three Dimensional Query) is our novel mobile spatial interaction (MSI) prototype for data mining and analysis on today’s location and orientation aware “smartphones” within such 3D sensor web environments. Our application tailors a military style threat dome query calculation using MSI with “hidden query removal” functionality to reduce information overload and heighten situation awareness on these commercial …
Effects Of Variations In 3d Spatial Search Techniques On Mobile Query Speed Vs Accuracy, Junjun Yin, James Carswell
Effects Of Variations In 3d Spatial Search Techniques On Mobile Query Speed Vs Accuracy, Junjun Yin, James Carswell
Conference papers
This paper presents three Spatial Search Algorithms for determiningthe three dimensional visibility shape (threat dome) at a user’s current locationin a built environment. Users then utilize this 3D shape as their query“window” to retrieve information on only those objects visible within a spatialdatabase. Visibility shape searching addresses the information overloadproblem by providing “Hidden Query Removal” functionality for mobile LBS.This functionality will be especially useful in the Web 4.0 era when trillions ofmicro-sensors become available for query through standard IP access.
Asynchronous Ultrasonic Trilateration For Indoor Positioning Of Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell
Asynchronous Ultrasonic Trilateration For Indoor Positioning Of Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell
Conference papers
In this paper we discuss how the innate ability of mobile phone speakers to produce ultrasound can be used for accurate indoor positioning. The frequencies in question are in a range between 20 and 22 KHz, which is high enough to be inaudible by humans but still low enough to be generated by today’s mobile phone sound hardware. Our tests indicate that it is possible to generate the given range of frequencies without significant distortions, provided the signal volume is not turned excessively high. In this paper we present and evaluate the accuracy of our asynchronous trilateration method (Lok8) for …
A Framework For Generating Data To Simulate Application Scoring, Kenneth Kennedy, Sarah Jane Delany, Brian Mac Namee
A Framework For Generating Data To Simulate Application Scoring, Kenneth Kennedy, Sarah Jane Delany, Brian Mac Namee
Conference papers
In this paper we propose a framework to generate artificial data that can be used to simulate credit risk scenarios. Artificial data is useful in the credit scoring domain for two reasons. Firstly, the use of artificial data allows for the introduction and control of variability that can realistically be expected to occur, but has yet to materialise in practice. The ability to control parameters allows for a thorough exploration of the performance of classification models under different conditions. Secondly, due to non-disclosure agreements and commercial sensitivities, obtaining real credit scoring data is a problematic and time consuming task. By …
Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor
Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor
Conference papers
This paper outlines the research and development of a complete open source geographic information system (GIS) that offers real-time geoprocessing over the Internet. The premise of the geoprocessing is to locate mineral exploration targets that have high potential for success based on parameters chosen by the end-user of the system.
Components integrated in the system include a spatial database PostGIS, a GIS processing engine GRASS, a GIS server GeoServer, a web server Apache, and front-end technologies OpenLayers and GeoExt. Appropriate data was sourced from the Geological Survey of Ireland to be used for the geoprocessing.
With all the components of …
An Online Framework For Supporting The Evaluation Of Personalised Information Retrieval Systems, Catherine Mulwa, Luca Longo, Seamus Lawless, Mary Sharpe, Vincent Wade
An Online Framework For Supporting The Evaluation Of Personalised Information Retrieval Systems, Catherine Mulwa, Luca Longo, Seamus Lawless, Mary Sharpe, Vincent Wade
Conference papers
Scope - Personalised Information Retrieval (PIR) has been gaining attention because it investigates intelligent ways for enhancing content delivery. Web users can have personalised services and more accurate information. Problem - Several PIR systems have been proposed in the literature; however, they have not been properly tested or evaluated. Proposal – The authors propose a generally applicable web-based interface, which provides PIR developers and evaluators with: i) implicit recommendations on how to evaluate a specific PIR system; ii) a repository containing studies on user-centred and layered evaluation studies; iii) recommendations on how to best combine different evaluation methods, metrics and …
Investigating Ultrasonic Positioning On Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell
Investigating Ultrasonic Positioning On Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell
Conference papers
In this paper we evaluate the innate ability of mobile phone speakers to produce ultrasound and the possible uses of this ability for accurate indoor positioning. The frequencies in question are a range between 20 and 22 KHz, which is high enough to be inaudible but low enough to be generated by standard sound hardware. A range of tones is generated at different volume settings on several popular modern mobile phones with the aim of finding points of failure. Our results indicate that it is possible to generate the given range of frequencies without significant distortions, provided the signal volume …
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Conference papers
A principal weakness of all encryption systems is that the output data can be `seen' to be encrypted. In other words, encrypted data provides a 'flag' on the potential value of the information that has been encrypted. In this paper, we provide a novel approach to `hiding' encrypted data in a digital image. We consider an approach in which a plaintext image is encrypted with a cipher using the processes of `stochastic diffusion' and the output quantized into a 1-bit array generating a binary image cipher-text. This output is then `embedded' in a host image which is undertaken either in …
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Conference papers
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany
Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany
Conference papers
In CBR the design and selection of similarity measures is paramount. Selection can benefit from the use of exploratory visualisation- based techniques in parallel with techniques such as cross-validation ac- curacy comparison. In this paper we present the Case Base Topology Viewer (CBTV) which allows the application of different similarity mea- sures to a case base to be visualised so that system designers can explore the case base and the associated decision boundary space. We show, using a range of datasets and similarity measure types, how the idiosyncrasies of particular similarity measures can be illustrated and compared in CBTV allowing …
Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany
Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany
Conference papers
Visualisations can be used to provide developers with insights into the inner workings of interactive machine learning techniques. In active learning, an inherently interactive machine learning technique, the design of selection strategies is the key research question and this paper demonstrates how spring model based visualisations can be used to provide insight into the precise operation of various selection strategies. Using sample datasets, this paper provides detailed examples of the differences between a range of selection strategies.
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Conference papers
This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …
Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany
Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany
Conference papers
This paper describes the approach of the DIT AIGroup to the i2b2 Obesity Challenge to build a system to diagnose obesity and related co-morbidities from narrative, unstructured patient records. Based on experimental results a system was developed which used knowledge-light text classification using decision trees, and negation labelling.
Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell
Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell
Conference papers
Writing research papers presents numerous different challenges, which vary from how to layout the various pages and format the text to what to include in the different sections that make up the paper. In order to clarify these issues this paper sets out guidelines and best practice approaches and demonstrates their use in the style of this paper.
Some Developments In Information Technology In The Irish Hotel And Catering Industry, Sean Connell, Elaine Sunderland, Ciaran Mcdonnell
Some Developments In Information Technology In The Irish Hotel And Catering Industry, Sean Connell, Elaine Sunderland, Ciaran Mcdonnell
Conference papers
This paper describes the current and potential future use of computers in the Hospitality Industry in Ireland. It briefly outlines two research projects which are being carried out in the Dublin College of Catering in the application of computers to the Industry.
A Case For The Use Of Application Generators In The Creation Of Software For The Hotel Industry, Peter O'Connor, Ciaran Mcdonnell
A Case For The Use Of Application Generators In The Creation Of Software For The Hotel Industry, Peter O'Connor, Ciaran Mcdonnell
Conference papers
The article makes the case for the use of Program Generators in producing software for the Hotel and Catering Industry