Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

6,060 Full-Text Articles 7,926 Authors 2,964,781 Downloads 198 Institutions

All Articles in Databases and Information Systems

Faceted Search

6,060 full-text articles. Page 1 of 225.

Robust And Parallel Segmentation Model (Rpsm) For Early Detection Of Skin Cancer Disease Using Heterogeneous Distributions, Nancy Zreika, Ali El-Zaart, Abdallah El Chakik 2023 Department of Computer Sciences, Faculty of Science, Beirut Arab University, Lebanon

Robust And Parallel Segmentation Model (Rpsm) For Early Detection Of Skin Cancer Disease Using Heterogeneous Distributions, Nancy Zreika, Ali El-Zaart, Abdallah El Chakik

BAU Journal - Science and Technology

Melanoma is the most common dangerous type of skin cancer; however, it is preventable if it is diagnosed early. Diagnosis of Melanoma would be improved if an accurate skin image segmentation model is available. Many computer vision methods have been investigated, yet the problem of finding a consistent and robust model that extracts the best threshold value, persists. This paper suggests a novel image segmentation approach using a multilevel cross entropy thresholding algorithm based on heterogeneous distributions. The proposed strategy searches the problem space by segmenting the image into several levels, and applying for each level one of the three …


Trend Observation: Analysis On Development Trend Of Precision Medicine, 2023 Chinese Academy of Sciences

Trend Observation: Analysis On Development Trend Of Precision Medicine

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Development And Issues Of Biotech Seed Industry In China, Peijuan CHI, Hualing XIE, Ping ZHAO, Fang CHEN, Ning WU, Zhixi TIAN, Weicai YANG, Yanping YANG 2023 National Science Library, Chinese Academy of Sciences, Beijing 100190, China

Development And Issues Of Biotech Seed Industry In China, Peijuan Chi, Hualing Xie, Ping Zhao, Fang Chen, Ning Wu, Zhixi Tian, Weicai Yang, Yanping Yang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Biotech seed industry is a strategic core industry. Biotechnology combined with digital technology has promoted the seed industry into an intelligent era, and the breeding paradigm has changed from “experimental selection” to “computational selection”. Biotech seed industry has become a research and development intensive industry, and the market is highly concentrated, which is controlled by large multinational enterprises. The scientific and technological output of China and the United States is in the first echelon, and the number of papers and authorized patents ranks among the top two in the world. From the perspective of core competitiveness, the United States is …


Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost 2023 Portland State University

Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost

University Honors Theses

This essay looks to reflect back upon the successes and failures of the EPL Card Reader capstone project, sponsored by Edward Ivory, head of Portland State University's Electronics Prototyping Lab. The EPL Card Reader's goal is to provide a means of tracking and updating student activity and training on the various machines in the lab. Using a local computer port to host this web app a lab administrator or manager is able to scan a student's access badge to review which machines they have been trained on as well as update that training status. The app also has a running …


Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner 2023 Washington University in St. Louis

Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner

McKelvey School of Engineering Theses & Dissertations

Survey data collected from human subjects can contain a high number of features while having a comparatively low quantity of examples. Machine learning models that attempt to predict outcomes from survey data under these conditions can overfit and result in poor generalizability. One remedy to this issue is feature selection, which attempts to select an optimal subset of features to learn upon. A relatively unexplored source of information in the feature selection process is the usage of textual names of features, which may be semantically indicative of which features are relevant to a target outcome. The relationships between feature names …


Understanding Data Mining And Its Relation To Information Systems, Malak Alammari 2023 CUNY New York City College of Technology

Understanding Data Mining And Its Relation To Information Systems, Malak Alammari

Publications and Research

This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott III 2023 Stephen F. Austin State University

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Areas Of Same Cardinal Direction, Periyandy Thunendran 2023 The University of Maine

Areas Of Same Cardinal Direction, Periyandy Thunendran

Electronic Theses and Dissertations

Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …


Hidden Stratagem - Microtargeting: The Future Of Conflict, Jessica Dawson 2023 United States Military Academy

Hidden Stratagem - Microtargeting: The Future Of Conflict, Jessica Dawson

ACI Books & Book Chapters

In September 2020, General Paul Nakasone, NSA Director and Commander of U.S. Cyber Command, called foreign influence operations “the next great disruptor.”[1] Nearly every intelligence agency in the United States government has been sounding the alarm over targeted influence operations enabled by social media companies since at least 2016, even though some of these operations started earlier. What often goes unstated and even less understood is the digital surveillance economy underlying these platforms and how this economic structure of trading free access for data collection about individuals’ lives poses a national security threat. Harvard sociologist Shoshana Zuboff calls this phenomenon …


Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr 2023 Whittier College

Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr

Whittier Scholars Program

Robust indoor positioning systems based on low energy bluetooth signals will service a wide range of applications. We present an example of a low energy bluetooth positioning system. First, the steps taken to locate the target with the bluetooth data will be reviewed. Next, we describe the algorithms of the set of android apps developed to utilize the bluetooth data for positioning. Similar to GPS, the algorithms use trilateration to approximate the target location by utilizing the corner devices running one of the apps. Due to the fluctuating nature of the bluetooth signal strength indicator (RSSI), we used an averaging …


A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum 2023 California State University, San Bernardino

A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum

Electronic Theses, Projects, and Dissertations

Social media is a great domain for news consumption; however, it is referred to as a double-edged sword. While it is user-friendly and low-cost, social media is the reason why fake news can spread rapidly, which is detrimental to society, businesses, and many consumers. Therefore, fake news detection is an emerging field. However, some challenges have restricted other researchers from developing a universal machine learning model that is fast, efficient, and reliable to stop the proliferation because of the lack of resources available, such as large-sized datasets. The goal of this culminating experience project is to explore how varying datasets …


Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton 2023 University of Arkansas, Fayetteville

Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton

Computer Science and Computer Engineering Undergraduate Honors Theses

Undergraduate research has proven to be highly beneficial to students, yet there are many students who do not know how to get involved or who are too timid to approach professors to inquire about potential research opportunities. Our hypothesis is that a cross-platform application has the potential to bridge the gap and help more students get involved in undergraduate research by providing them information about open positions and the faculty or staff members who are mentoring the projects. The key focus of this thesis is to develop an application that provides details about participating faculty or staff including their research …


Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John ABISHEGANADEN, Kheng Hock LEE, Lian Leng LOW, Eugene SHUM, Han Leong GOH, Christine Gia Lee ANG, Adny An Ta WEE, Steven M. MILLER 2023 Tan Tock Seng Hospital

Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John Abisheganaden, Kheng Hock Lee, Lian Leng Low, Eugene Shum, Han Leong Goh, Christine Gia Lee Ang, Adny An Ta Wee, Steven M. Miller

Research Collection School Of Computing and Information Systems

In a prior practice and policy article published in Healthcare Science, we introduced the deployed application of an artificial intelligence (AI) model to predict longer-term inpatient readmissions to guide community care interventions for patients with complex conditions in the context of Singapore's Hospital to Home (H2H) program that has been operating since 2017. In this follow on practice and policy article, we further elaborate on Singapore's H2H program and care model, and its supporting AI model for multiple readmission prediction, in the following ways: (1) by providing updates on the AI and supporting information systems, (2) by reporting on customer …


Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau 2023 East Tennessee State University

Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau

Undergraduate Honors Theses

Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …


Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa 2023 Department of Oral Pathology, Graduate School of Medical and Dental Sciences, Tokyo Medical and Dental University (TMDU), Tokyo, Japan

Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa

Journal of Dentistry Indonesia

Image representation via machine learning is an approach to quantitatively represent histopathological images of head and neck tumors for future applications of artificial intelligence-assisted pathological diagnosis systems. Objective: This study compares image representations produced by a pre-trained convolutional neural network (VGG16) to those produced by a vision transformer (ViT-L/14) in terms of the classification performance of head and neck tumors. Methods: W hole-slide images of five oral t umor categories (n = 319 cases) were analyzed. Image patches were created from manually annotated regions at 4096, 2048, and 1024 pixels and rescaled to 256 pixels. Image representations were …


Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin 2023 Arkansas Tech University

Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin

ATU Research Symposium

The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …


Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe 2023 Arkansas Tech University

Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe

ATU Research Symposium

Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.


A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell 2023 Christopher Newport University

A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell

Cybersecurity Undergraduate Research Showcase

Data collection is a vital component in any organization in regards to keeping track of user activity, gaining statistics and improving the user experience, and user identification. While the underlying basis of data collection is understandable, the use of this data has to be closely regulated and documented. In many cases, the VCDPA (Virginia Consumer Data Protection Act) outlines the guidelines for data use, data controller responsibilities, and limitations however nonprofit organizations are exempt from compliance. Colleges and universities, although still held to some degree of limitation, range in permissiveness with what data they choose to collect and retain but …


A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga 2023 Southern Adventist University

A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga

Campus Research Day

Many times it can be difficult to accomplish all this is proposed in a meeting. This project aimed to build a simple planner application using React Native that allows groups of people to collaborate and stay organized. The application was built using the BASIC Framework as a guide, and featured a collaboration feature that enabled users to share tasks, projects, and communicate with one another in order to stay coordinated and productive. The user interface was designed for easy use, allowing for quick and efficient task management within a group. The goal of the application was to provide a useful …


Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr 2023 Southern Adventist University

Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr

Campus Research Day

A research repository was created so that Southern Adventist University has a central place for all past, current, and future research projects. This repository is a web application created with the use of the Yii framework that utilizes PHP and SQL. The repository has a user-friendly interface to let authorized users upload the information about their projects. Also, professors and students from different departments can see the list of projects per department.


Digital Commons powered by bepress