Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

5,925 Full-Text Articles 7,728 Authors 2,672,546 Downloads 196 Institutions

All Articles in Databases and Information Systems

Faceted Search

5,925 full-text articles. Page 1 of 218.

Learning Comprehensive Global Features In Person Re-Identification: Ensuring Discriminativeness Of More Local Regions, Jiali XIA, Jianqiang HUANG, Shibao ZHENG, Qin ZHOU, Bernt SCHIELE, Xian-Sheng HUA, Qianru SUN 2023 Singapore Management University

Learning Comprehensive Global Features In Person Re-Identification: Ensuring Discriminativeness Of More Local Regions, Jiali Xia, Jianqiang Huang, Shibao Zheng, Qin Zhou, Bernt Schiele, Xian-Sheng Hua, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification (Re-ID) aims to retrieve person images from a large gallery given a query image of a person of interest. Global information and fine-grained local features are both essential for the representation. However, global embedding learned by naive classification model tends to be trapped in the most discriminative local region, leading to poor evaluation performance. To address the issue, we propose a novel baseline network that learns strong global feature termed as Comprehensive Global Embedding (CGE), ensuring more local regions of global feature maps to be discriminative. In this work, two key modules are proposed including Non-parameterized Local Classifier …


Online Hyperparameter Optimization For Class-Incremental Learning, Yaoyao LIU, Yingying LI, Bernt SCHIELE, Qianru SUN 2023 Singapore Management University

Online Hyperparameter Optimization For Class-Incremental Learning, Yaoyao Liu, Yingying Li, Bernt Schiele, Qianru Sun

Research Collection School Of Computing and Information Systems

Class-incremental learning (CIL) aims to train a classification model while the number of classes increases phase-by-phase. An inherent challenge of CIL is the stability-plasticity tradeoff, i.e., CIL models should keep stable to retain old knowledge and keep plastic to absorb new knowledge. However, none of the existing CIL models can achieve the optimal tradeoff in different data-receiving settings—where typically the training-from-half (TFH) setting needs more stability, but the training-from-scratch (TFS) needs more plasticity. To this end, we design an online learning method that can adaptively optimize the tradeoff without knowing the setting as a priori. Specifically, we first introduce the …


Big Data Technology Enabling Legal Supervision, Qingjie LIU, Shuo LIU, Yirong WU, Yueqiang WENG, Yihao WEN, Ming LI 2022 Aerospace Information Research Institute, Chinese Academy of Sciences, Beijing 100094, China

Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn 2022 Grand Valley State University

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Malware Detection And Analysis, Namratha Suraneni 2022 Grand Valley State University

Malware Detection And Analysis, Namratha Suraneni

Culminating Experience Projects

Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a global pandemic in the form of computer viruses, Trojan horses, and Internet worms. Studies imply that the effects of malware are deteriorating. The main defense against malware is malware detectors. The methods that such a detector employ define its level of quality. Therefore, it is crucial that we research malware detection methods and comprehend their advantages and disadvantages. Attackers are creating malware that is polymorphic and metamorphic and has the capacity to modify their source code as they spread. Furthermore, existing defenses, which often utilize …


Full-Text Search Using Elasticsearch, Akash Shrestha 2022 Grand Valley State University

Full-Text Search Using Elasticsearch, Akash Shrestha

Culminating Experience Projects

Search engines have changed the way we use the internet. They can search or filter out relevant and valuable content of interest to the users. But many of the applications we use today lack search or are just poor. So how can we leverage the same power of search engines in our applications? This project aims to look at “Full-Text Search” which allows us to do a text-based search in text-intensive data. The search will be performed by matching any, or all words of the query exactly or with some relevancy against the indexes created by the searching tool. The …


Notebooks Web Application, Vivekananda Marellali 2022 Grand Valley State University

Notebooks Web Application, Vivekananda Marellali

Culminating Experience Projects

In our day-to-day activities we often need to make quick short notes related to our work, study, or other activities. Later, those notes should be easy to access, modify, delete, share with others, or create PDF documents as and when required. It is ideal if the note content is rich text format such as HTML, as it provides many text formatting options and provide better view and readability. The Notes are better organized if they are grouped into notebooks where each notebook consists of related topic note pages and multiple users can create such notebooks and share with other users …


Devops: Course Development, James Lee VanderZouwen 2022 Grand Valley State University

Devops: Course Development, James Lee Vanderzouwen

Culminating Experience Projects

DevOps has become somewhat of a buzzword amongst software engineers in the industry. Often developers do not have a dedicated DevOps engineer let alone a DevOps team. Developers benefit when they know what happens between ‘works on my machine’ and production. Making sure those steps make sense and are safe benefits the operations team. From compliance to code review to regression testing, understanding the full SDLC, employing DevOps concepts, and minimizing overhead from dependencies is quickly becoming a pre-requisite for the modern software engineer. This project attempts to bridge the gap between buzzword and best practice by developing a college-level …


Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning 2022 Grand Valley State University

Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning

Culminating Experience Projects

This project uses geospatial data to generate custom polygons in an interactive setting to represent the size and location of coral reefs to extract insights from coral reef-centered data sets. Historically, the data used by the Reef Restoration Group Bonaire exists in disparate sources, making it difficult to track and analyze the outcomes of their restoration work. Additionally, this information is not available in a digestible format for other audiences who would be interested in this data, such as citizen scientists seeking coral reef health statistics, the general public wanting to better understand the coral reefs surrounding Bonaire or recreational …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn 2022 Grand Valley State University

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni 2022 Grand Valley State University

Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni

Culminating Experience Projects

All around the globe, humankind faces a disastrous situation that witnessed COVID-19 outbreak. The COVID-19 pandemic caused severe loss of human life across the world. Most of the countries had been socially and economically weakened. The health sector faced lots of challenges in diagnosing the COVID patients, vaccinating the people, identifying the people who are infected by the virus. At the earlier stage, it has been difficult to identify the symptoms in infected person that is caused by the virus. Months later, symptoms were identified and, disease detecting machines were invented. But still, time taking for the results from the …


Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh 2022 Grand Valley State University

Curriculum Development In Technical Education For Boys And Girls Club, Damanpreet Singh

Culminating Experience Projects

Technical education has been and will continue to be more and more important to succeed in the future. The Boys and Girls Club, founded in 1860, is a national organization of local chapters which provide voluntary after-school programs for young individuals. The Boys and Girls Club have life-changing programs that prepare the young individuals in the club for their future whether it’s for college, career, or life. The perfect way to prepare best prepare these kids for the future is to develop their technical education. Unfortunately, the boys and girls club of Muskegon has a lack of educational resources for …


Big Data Analytics Of Medical Data, ASHWIN RAJASANKAR 2022 Grand Valley State University

Big Data Analytics Of Medical Data, Ashwin Rajasankar

Culminating Experience Projects

Data has become a huge part of modern decision making. With the improvements in computing performance and storage in the past two decades, storing large amounts of data has become much easier. Analyzing large amounts of data and creating data models with them can help organizations obtain insights and information which helps their decision making. Big data analytics has become an integral part of many fields such as retail, real estate, education, and medicine. In the project, the goal is to understand the working of Apache Spark and its different storage methods and create a data warehouse to analyze data. …


Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going 2022 Grand Valley State University

Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going

Culminating Experience Projects

Foundational to our understanding and enjoyment of music is the intersection of harmony and movement. This intersection manifests as chord progressions which themselves underscore the rhythm and melody of a piece. In musical compositions, these progressions often follow a set of rules and patterns which are themselves frequently broken for the sake of novelty. In this work, we developed a genetic algorithm which learns these rules and patterns (and how to break them) from a dataset of 890 songs from various periods of the Billboard Top 100 rankings. The algorithm learned to generate increasingly valid, yet interesting chord progressions via …


Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang 2022 Grand Valley State University

Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang

Culminating Experience Projects

The goal of this qualitative research project is to develop and optimize a multi-class discrimination model to identify different species of coral based on their digital images. Currently, there are artificial intelligence (AI) models that can distinguish between coral and other undersea objects such as sand or rocks, but to our knowledge the problem of multi-species classification has not yet been addressed. Given that coral reefs are a good indicator of overall ocean health, it is important to develop models that can classify the presence of different species in underwater images as a way to monitor the effects of climate …


Travel Dashboard, Naveen Kumar Lalam 2022 Grand Valley State University

Travel Dashboard, Naveen Kumar Lalam

Culminating Experience Projects

Travel Dashboard is a one stop solution for all the travel needs of travelers and tourists visiting a new place. In today’s world travel has become a part of everyone’s life and we love to travel whenever there is a holiday or long a weekend. Earlier, the travel industry was mostly dictated by tour operators who used to plan and organize tours with standard itinerary, while tourists had very limited choices and needed to pick one of the itineraries given by operator as there was no other option left for them. Time have changed now as travelers love to plan …


College Job Portal, Harikrishna Gonuguntla 2022 Grand Valley State University

College Job Portal, Harikrishna Gonuguntla

Culminating Experience Projects

Through this project, I am producing a portal called "College Job Portal" that will make life easier for students, colleges, and the companies who hire the students by handling the hiring process. On-campus job placements are a crucial component in contemporary educational institutions. By entering information about their educational history, grades, technological abilities, and CV, students would register with the portal. Like students, companies would sign up with the site by supplying basic details like their address and contact information for human resources. The college would be the portal's administrator. Companies can advertise job openings using this site by including …


A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov 2022 Kennesaw State University

A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov

Master of Science in Information Technology Theses

Although Self-Service Business Intelligence (SSBI) is continually being adopted in various industries, there is a lack of research focused on data modeling in SSBI. This research aims to fill that research gap and propose a maturity model for SSBI data modeling which is generalizeable between different software and applicable for users of all technical backgrounds. Through extensive literature review, a five-tier maturity model was proposed, explained, and instantiated in PowerBI and Tableau. The testing of the model was found to be simple and intuitive, and the research concludes that the model is applicable to enterprise SSBI environments. This research is …


Payload-Byte: A Tool For Extracting And Labeling Packet Capture Files Of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, Nathaniel D. Bastian 2022 Army Cyber Institute, United States Military Academy

Payload-Byte: A Tool For Extracting And Labeling Packet Capture Files Of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, Nathaniel D. Bastian

ACI Journal Articles

Adapting modern approaches for network intrusion detection is becoming critical, given the rapid technological advancement and adversarial attack rates. Therefore, packet-based methods utilizing payload data are gaining much popularity due to their effectiveness in detecting certain attacks. However, packet-based approaches suffer from a lack of standardization, resulting in incomparability and reproducibility issues. Unlike flow-based datasets, no standard labeled dataset exists, forcing researchers to follow bespoke labeling pipelines for individual approaches. Without a standardized baseline, proposed approaches cannot be compared and evaluated with each other. One cannot gauge whether the proposed approach is a methodological advancement or is just being benefited …


Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez 2022 Kennesaw State University

Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez

Symposium of Student Scholars

The Software Supply chain or SSC is the backbone of the logistics industry and is crucial to a business's success and operation. The surge of attacks and risks for the SSC has grown in coming years with each attack's impact becoming more significant. These attacks have led to the leaking of both client and company sensitive information, corruption of the data, and having it subject to malware and ransomware installation, despite new practices implemented and investments into SSC security and its branches that have not stopped attackers from developing new vulnerabilities and exploits. In our research, we have investigated Software …


Digital Commons powered by bepress