Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2020

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 152

Full-Text Articles in Databases and Information Systems

Drone-Assisted Emergency Communications, Di Wu Dec 2020

Drone-Assisted Emergency Communications, Di Wu

Dissertations

Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …


Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu Dec 2020

Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu

Dissertations

The combination of online shopping and social media allow people with similar shopping interests and experiences to share, comment, and discuss about shopping from anywhere and at any time, which also leads to the emergence of online shopping communities. Today, more people turn to online platforms to share their opinions about products, solicit various opinions from their friends, family members, and other customers, and have fun through interactions with others with similar interests. This dissertation explores how collaborative online shopping presents itself as a context and platform for users' interpersonal interactions and social relationship formation through a series of studies. …


Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho Dec 2020

Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho

Master's Projects

Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …


Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji Dec 2020

Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji

Electronic Thesis and Dissertation Repository

Regional initiatives in the health care context in Canada are typically organized and administered along geographic boundaries or operational units. Regional integration of Electronic Medical Records (EMR) has been continuing across Canadian provinces in recent years, yet the use and impact of regionally integrated EMRs are not routinely assessed and questions remain about their impact on and use in physicians’ practices. Are stated goals of simplifying connections and sharing of electronic health information collected and managed by many health services providers being met? What are physicians’ perspectives on the use and impact of regionally integrated EMR? In this thesis, I …


Stem Teacher Database, Veronica Buss Dec 2020

Stem Teacher Database, Veronica Buss

Honors Theses

The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …


School District Boundaries Map, Nick Huffman Dec 2020

School District Boundaries Map, Nick Huffman

Honors Theses

The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …


Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott Dec 2020

Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott

Master's Theses

The endemic eelgrass (Zostera marina) community of Morro Bay Estuary, located on the central coast of California, has experienced an estimated decline of 95% in occupied area (reduction of 344 acres to 20 acres) from 2008 to 2017 for reasons that are not yet definitively clear. One possible driver of degradation that has yet to be investigated is the role of herbicides from agricultural fields in the watershed that feeds into the estuary. Thus, the primary research goal of this project was to better understand temporal and spatial trends of herbicide use within the context of San Luis …


Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah Dec 2020

Cross Dataset Evaluation For Iot Network Intrusion Detection, Anjum Farah

Theses and Dissertations

With the advent of Internet of Things (IOT) technology, the need to ensure the security of an IOT network has become important. There are several intrusion detection systems (IDS) that are available for analyzing and predicting network anomalies and threats. However, it is challenging to evaluate them to realistically estimate their performance when deployed. A lot of research has been conducted where the training and testing is done using the same simulated dataset. However, realistically, a network on which an intrusion detection model is deployed will be very different from the network on which it was trained. The aim of …


Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma Dec 2020

Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma

Dissertations and Theses Collection (Open Access)

Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …


Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet Dec 2020

Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet

Graduate Theses and Dissertations

In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …


Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad Dec 2020

Empowering People With Cognitive Disabilities To Live Independently By Supporting Their Self-Management Of Food And Related Expenses, Apoorv Prasad

Theses and Dissertations

People with ADHD (attention deficit hyperactivity disorder) often have difficulty in planning and organization that can impact their eating habits and lifestyle. We have created a novel mobile software application to support choosing meals and making healthy food purchases that meet dietary preferences within a specified budget. The core functions allow 1) Managing user profiles to support personalization 2) Obtaining recipe recommendations to fit profile, budget, and foods-on-hand 3) Planning food purchases, and 4) Reviewing foods-on-hand, budget and the nutritional balance of recent meals and food purchases.The application supports self-introspection to help people with ADHD review their history of food …


Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov Nov 2020

Making Sense Of Online Public Health Debates With Visual Analytics Systems, Anton Ninkov

Electronic Thesis and Dissertation Repository

Online debates occur frequently and on a wide variety of topics. Particularly, online debates about various public health topics (e.g., vaccines, statins, cannabis, dieting plans) are prevalent in today’s society. These debates are important because of the real-world implications they can have on public health. Therefore, it is important for public health stakeholders (i.e., those with a vested interest in public health) and the general public to have the ability to make sense of these debates quickly and effectively. This dissertation investigates ways of enabling sense-making of these debates with the use of visual analytics systems (VASes). VASes are computational …


Barriers And Drivers Influencing The Growth Of E-Commerce In Uzbekistan, Madinakhon Tursunboeva Nov 2020

Barriers And Drivers Influencing The Growth Of E-Commerce In Uzbekistan, Madinakhon Tursunboeva

Theses and Dissertations

Electronic commerce (e-commerce) has become a major retail channel for businesses in developed countries. However, it is still considered an innovation in developing countries. Specifically, e-commerce in Uzbekistan is in the early stages of emergence despite its advance in recent years in terms of Internet penetration, a strong retail sector, new national regulations, and a young population. The study aimed to identify barriers and drivers influencing e-commerce growth in Uzbekistan. A Delphi research design was utilized to answer the research questions of the study, which categorized and ranked factors that Uzbekistani entrepreneurs are facing when engaging in e-commerce processes. A …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm Nov 2020

A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm

Masters Theses & Doctoral Dissertations

The dark web is the hidden part of the internet that is not indexed by search engines and is only accessible with a specific browser like The Onion Router (Tor). Tor was originally developed as a means of secure communications and is still used worldwide for individuals seeking privacy or those wanting to circumvent restrictive regimes. The dark web has become synonymous with nefarious and illicit content which manifests itself in underground marketplaces containing illegal goods such as drugs, stolen credit cards, stolen user credentials, child pornography, and more (Kohen, 2017). Dark web marketplaces contribute both to illegal drug usage …


The Role Of Information And Knowledge Of Weather Warnings In Marine Access Behavior : A Field Experiment In Coastal Area Of Bangladesh, Khan Mehedi Hasan Oct 2020

The Role Of Information And Knowledge Of Weather Warnings In Marine Access Behavior : A Field Experiment In Coastal Area Of Bangladesh, Khan Mehedi Hasan

Lingnan Theses and Dissertations (MPhil & PhD)

The world’s largest mangrove forest named Sundarban is located in the Bay of Bengal. Due to richness of aqua and forest resources, the coastal community of Khulna district of Bangladesh immensely depends on the forest for income and livelihoods, all the year round. For extracting resources, thousands of people enter into the forest by crossing river, generally with small boats. The region faces various natural disasters repeatedly. Each year about 13-14 cyclones are formed in the Bay of Bengal, which are threats for coastal households. Those hazards bear more risk for marine entrants. Analyzing coastal households’ marine access for two …


Privacy And The Digital Divide: Investigating Strategies For Digital Safety By People Of Color, Denavious Hoover Oct 2020

Privacy And The Digital Divide: Investigating Strategies For Digital Safety By People Of Color, Denavious Hoover

Theses and Dissertations

People of color are becoming increasingly concerned with digital privacy. They are concerned about the obfuscated data collection and sharing practices of major social media plat- forms and the strong entitlement of other users in the online space to their content. This study examines how people of color conceptualize and behave to produce safety in the online space, or, in other words, digital privacy. This study challenges notions that people are not purposeful about privacy in the online space and highlights the voices of people of color, whom are not of- ten included in theorizing or decision making about the …


Valid Time Rdf, Hsien-Tseng Wang Sep 2020

Valid Time Rdf, Hsien-Tseng Wang

Dissertations, Theses, and Capstone Projects

The Semantic Web aims at building a foundation of semantic-based data models and languages for not only manipulating data and knowledge, but also supporting decision making by machines. Naturally, time-varying data and knowledge are required in Semantic Web applications to incorporate time and further reason about it. However, the original specifications of Resource Description Framework (RDF) and Web Ontology Language (OWL) do not include constructs for handling time-varying data and knowledge. For simplicity, RDF model is confined to binary predicates, hence some form of reification is needed to represent higher-arity predicates. To this date, there are many proposals extending RDF …


A Methodology To Identify Alternative Suitable Nosql Data Models Via Observation Of Relational Database Interactions, Paul M. Beach Sep 2020

A Methodology To Identify Alternative Suitable Nosql Data Models Via Observation Of Relational Database Interactions, Paul M. Beach

Theses and Dissertations

The effectiveness and performance of data-intensive applications are influenced by the suitability of the data models upon which they are built. The relational data model has been the de facto data model underlying most database systems since the 1970’s. However, the recent emergence of NoSQL data models have provided users with alternative ways of storing and manipulating data. Previous research has demonstrated the potential value in applying NoSQL data models in non-distributed environments. However, knowing when to apply these data models has generally required inputs from system subject matter experts to make this determination. This research, sponsored by the Air …


Machine Learning Applications For Drug Repurposing, Hansaim Lim Sep 2020

Machine Learning Applications For Drug Repurposing, Hansaim Lim

Dissertations, Theses, and Capstone Projects

The cost of bringing a drug to market is astounding and the failure rate is intimidating. Drug discovery has been of limited success under the conventional reductionist model of one-drug-one-gene-one-disease paradigm, where a single disease-associated gene is identified and a molecular binder to the specific target is subsequently designed. Under the simplistic paradigm of drug discovery, a drug molecule is assumed to interact only with the intended on-target. However, small molecular drugs often interact with multiple targets, and those off-target interactions are not considered under the conventional paradigm. As a result, drug-induced side effects and adverse reactions are often neglected …


Global Optimization Algorithms For Image Registration And Clustering, Cuicui Zheng Aug 2020

Global Optimization Algorithms For Image Registration And Clustering, Cuicui Zheng

Dissertations

Global optimization is a classical problem of finding the minimum or maximum value of an objective function. It has applications in many areas, such as biological image analysis, chemistry, mechanical engineering, financial analysis, deep learning and image processing. For practical applications, it is important to understand the efficiency of global optimization algorithms. This dissertation develops and analyzes some new global optimization algorithms and applies them to practical problems, mainly for image registration and data clustering.

First, the dissertation presents a new global optimization algorithm which approximates the optimum using only function values. The basic idea is to use the points …


Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari Aug 2020

Changing The Focus: Worker-Centric Optimization In Human-In-The-Loop Computations, Mohammadreza Esfandiari

Dissertations

A myriad of emerging applications from simple to complex ones involve human cognizance in the computation loop. Using the wisdom of human workers, researchers have solved a variety of problems, termed as “micro-tasks” such as, captcha recognition, sentiment analysis, image categorization, query processing, as well as “complex tasks” that are often collaborative, such as, classifying craters on planetary surfaces, discovering new galaxies (Galaxyzoo), performing text translation. The current view of “humans-in-the-loop” tends to see humans as machines, robots, or low-level agents used or exploited in the service of broader computation goals. This dissertation is developed to shift the focus back …


An Automated Feedback System To Support Student Learning Of Conceptual Knowledge In Writing-To-Learn Activities, Ye Xiong Aug 2020

An Automated Feedback System To Support Student Learning Of Conceptual Knowledge In Writing-To-Learn Activities, Ye Xiong

Dissertations

As a pedagogical strategy, Writing-to-Learn (WTL) intends to use writing to improve students’ understanding of course content. However, most of the existing feedback systems for writing are mainly focused on improving students’ writing skills rather than their conceptual development. In this dissertation, an automatic approach is proposed to generate timely, actionable, and individualized feedback based on comparing knowledge representations extracted from lecture slides and individual students’ writing assignments. The novelty of the proposed approach lies in the feedback generation: to help students assimilate new knowledge into their existing knowledge better, their current knowledge is modeled as a set of matching …


Blockchain Technology And Freight Forwarder Exploration Of Implications Focused On Practitioners In Shanghai, Johannes Van Bohemen Aug 2020

Blockchain Technology And Freight Forwarder Exploration Of Implications Focused On Practitioners In Shanghai, Johannes Van Bohemen

World Maritime University Dissertations

No abstract provided.


Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus Aug 2020

Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus

Theses and Dissertations

This paper investigates how the snow-albedo feedback mechanism of the arctic is changing in response to rising climate temperatures. Specifically, the interplay of vegetation and snowmelt, and how these two variables can be correlated. This has the potential to refine climate modelling of the spring transition season. Research was conducted at the ecoregion scale in northern Alaska from 2000 to 2020. Each ecoregion is defined by distinct topographic and ecological conditions, allowing for meaningful contrast between the patterns of spring albedo transition across surface conditions and vegetation types. The five most northerly ecoregions of Alaska are chosen as they encompass …


Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms, Costain Nachuma Aug 2020

Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms, Costain Nachuma

University of New Orleans Theses and Dissertations

An algorithm designer working with parallel computing systems should know how the characteristics of their implemented algorithm affects various performance aspects of their parallel program. It would be beneficial to these designers if each algorithm came with a specific set of standards that identified which algorithms worked better for a specified system. Therefore, the goal of this paper is to take implementations of four graphing algorithms, extract their features such as memory consumption, scalability using profilers (Vtunes /Tau) to determine which algorithms work to their fullest potential in one of the three systems: GPU, shared memory system, or distributed memory …


Colleague To Banner Migration: Data Conversion Guide For Institutional Research, Laura Osborn Aug 2020

Colleague To Banner Migration: Data Conversion Guide For Institutional Research, Laura Osborn

Masters Theses & Doctoral Dissertations

When the SDBOR decided to migrate their current student information system into a shared system with HR and Finance, adjustments needed to be made to accommodate for current Banner settings and work around tables that were already populated with HRFIS data. The change in data type of the student identifier from that of a 7-digit numeric field to a 9- digit alpha-numeric field poses problems for running aggregate data calculations. Additional complications include having some information such as first-generation status that was not migrated between the systems, and cases such as college coding where tables that were designed for student …


Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee Aug 2020

Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee

Dissertations

The expansion of attacks against information systems of companies that operate nuclear power stations and other energy facilities in the United States and other countries, are noticeable with potential catastrophic real-world implications. Data integrity is a fundamental component of information security. It refers to the accuracy and the trustworthiness of data or resources. Data integrity within information systems becomes an important factor of security protection as the data becomes more integrated and crucial to decision-making. The security threats brought by human errors whether, malicious or unintentional, such as viruses, hacking, and many other cybersecurity threats, are dangerous and require mandatory …


A Gis-Based Method For Archival And Visualization Of Microstructural Data From Drill Core Samples., Elliott Holmes Aug 2020

A Gis-Based Method For Archival And Visualization Of Microstructural Data From Drill Core Samples., Elliott Holmes

Electronic Theses and Dissertations

Core samples obtained from scientific drilling could provide large volumes of direct microstructural and compositional data, but generating results via the traditional treatment of such data is often time-consuming and inefficient. Unifying microstructural data within a spatially referenced Geographic Information System (GIS) environment provides an opportunity to readily locate, visualize, correlate, and explore the available microstructural data. Using 26 core billet samples from the San Andreas Fault Observatory at Depth (SAFOD), this study developed procedures for: 1. A GIS-based approach for spatially referenced visualization and storage of microstructural data from drill core billet samples; and 2. Producing 3D models of …


Diffusion Of Falsehoods On Social Media, Kelvin Kizito King Aug 2020

Diffusion Of Falsehoods On Social Media, Kelvin Kizito King

Theses and Dissertations

Misinformation has captured the interest of academia in recent years with several studies looking at the topic broadly. However, these studies mostly focused on rumors which are social in nature and can be either classified as false or real. In this research, we attempt to bridge the gap in the literature by examining the impacts of user characteristics and feature contents on the diffusion of (mis)information using verified true and false information. We apply a topic allocation model augmented by both supervised and unsupervised machine learning algorithms to identify tweets on novel topics. We find that retweet count is higher …