Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

5,954 Full-Text Articles 7,768 Authors 2,833,088 Downloads 197 Institutions

All Articles in Databases and Information Systems

Faceted Search

5,954 full-text articles. Page 2 of 220.

Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going 2022 Grand Valley State University

Muse: A Genetic Algorithm For Musical Chord Progression Generation, Griffin Going

Culminating Experience Projects

Foundational to our understanding and enjoyment of music is the intersection of harmony and movement. This intersection manifests as chord progressions which themselves underscore the rhythm and melody of a piece. In musical compositions, these progressions often follow a set of rules and patterns which are themselves frequently broken for the sake of novelty. In this work, we developed a genetic algorithm which learns these rules and patterns (and how to break them) from a dataset of 890 songs from various periods of the Billboard Top 100 rankings. The algorithm learned to generate increasingly valid, yet interesting chord progressions via …


Malware Detection And Analysis, Namratha Suraneni 2022 Grand Valley State University

Malware Detection And Analysis, Namratha Suraneni

Culminating Experience Projects

Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a global pandemic in the form of computer viruses, Trojan horses, and Internet worms. Studies imply that the effects of malware are deteriorating. The main defense against malware is malware detectors. The methods that such a detector employ define its level of quality. Therefore, it is crucial that we research malware detection methods and comprehend their advantages and disadvantages. Attackers are creating malware that is polymorphic and metamorphic and has the capacity to modify their source code as they spread. Furthermore, existing defenses, which often utilize …


Big Data Analytics Of Medical Data, ASHWIN RAJASANKAR 2022 Grand Valley State University

Big Data Analytics Of Medical Data, Ashwin Rajasankar

Culminating Experience Projects

Data has become a huge part of modern decision making. With the improvements in computing performance and storage in the past two decades, storing large amounts of data has become much easier. Analyzing large amounts of data and creating data models with them can help organizations obtain insights and information which helps their decision making. Big data analytics has become an integral part of many fields such as retail, real estate, education, and medicine. In the project, the goal is to understand the working of Apache Spark and its different storage methods and create a data warehouse to analyze data. …


Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning 2022 Grand Valley State University

Exploring Coral Reefs With Interactive Geospatial Visualizations, David Nicolas Tonning

Culminating Experience Projects

This project uses geospatial data to generate custom polygons in an interactive setting to represent the size and location of coral reefs to extract insights from coral reef-centered data sets. Historically, the data used by the Reef Restoration Group Bonaire exists in disparate sources, making it difficult to track and analyze the outcomes of their restoration work. Additionally, this information is not available in a digestible format for other audiences who would be interested in this data, such as citizen scientists seeking coral reef health statistics, the general public wanting to better understand the coral reefs surrounding Bonaire or recreational …


Devops: Course Development, James Lee VanderZouwen 2022 Grand Valley State University

Devops: Course Development, James Lee Vanderzouwen

Culminating Experience Projects

DevOps has become somewhat of a buzzword amongst software engineers in the industry. Often developers do not have a dedicated DevOps engineer let alone a DevOps team. Developers benefit when they know what happens between ‘works on my machine’ and production. Making sure those steps make sense and are safe benefits the operations team. From compliance to code review to regression testing, understanding the full SDLC, employing DevOps concepts, and minimizing overhead from dependencies is quickly becoming a pre-requisite for the modern software engineer. This project attempts to bridge the gap between buzzword and best practice by developing a college-level …


Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang 2022 Grand Valley State University

Building A Deep Model For Multi-Class Coral Species Discrimination, Hyeong Gyu Jang

Culminating Experience Projects

The goal of this qualitative research project is to develop and optimize a multi-class discrimination model to identify different species of coral based on their digital images. Currently, there are artificial intelligence (AI) models that can distinguish between coral and other undersea objects such as sand or rocks, but to our knowledge the problem of multi-species classification has not yet been addressed. Given that coral reefs are a good indicator of overall ocean health, it is important to develop models that can classify the presence of different species in underwater images as a way to monitor the effects of climate …


Travel Dashboard, Naveen Kumar Lalam 2022 Grand Valley State University

Travel Dashboard, Naveen Kumar Lalam

Culminating Experience Projects

Travel Dashboard is a one stop solution for all the travel needs of travelers and tourists visiting a new place. In today’s world travel has become a part of everyone’s life and we love to travel whenever there is a holiday or long a weekend. Earlier, the travel industry was mostly dictated by tour operators who used to plan and organize tours with standard itinerary, while tourists had very limited choices and needed to pick one of the itineraries given by operator as there was no other option left for them. Time have changed now as travelers love to plan …


Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni 2022 Grand Valley State University

Covid-19 Prediction Using Machine Learning, Parashuram Singaraveni

Culminating Experience Projects

All around the globe, humankind faces a disastrous situation that witnessed COVID-19 outbreak. The COVID-19 pandemic caused severe loss of human life across the world. Most of the countries had been socially and economically weakened. The health sector faced lots of challenges in diagnosing the COVID patients, vaccinating the people, identifying the people who are infected by the virus. At the earlier stage, it has been difficult to identify the symptoms in infected person that is caused by the virus. Months later, symptoms were identified and, disease detecting machines were invented. But still, time taking for the results from the …


College Job Portal, Harikrishna Gonuguntla 2022 Grand Valley State University

College Job Portal, Harikrishna Gonuguntla

Culminating Experience Projects

Through this project, I am producing a portal called "College Job Portal" that will make life easier for students, colleges, and the companies who hire the students by handling the hiring process. On-campus job placements are a crucial component in contemporary educational institutions. By entering information about their educational history, grades, technological abilities, and CV, students would register with the portal. Like students, companies would sign up with the site by supplying basic details like their address and contact information for human resources. The college would be the portal's administrator. Companies can advertise job openings using this site by including …


Full-Text Search Using Elasticsearch, Akash Shrestha 2022 Grand Valley State University

Full-Text Search Using Elasticsearch, Akash Shrestha

Culminating Experience Projects

Search engines have changed the way we use the internet. They can search or filter out relevant and valuable content of interest to the users. But many of the applications we use today lack search or are just poor. So how can we leverage the same power of search engines in our applications? This project aims to look at “Full-Text Search” which allows us to do a text-based search in text-intensive data. The search will be performed by matching any, or all words of the query exactly or with some relevancy against the indexes created by the searching tool. The …


Docker Container Image – Vulnerability Scanning, Joseph U. Ohaeche 2022 Grand Valley State University

Docker Container Image – Vulnerability Scanning, Joseph U. Ohaeche

Culminating Experience Projects

The technology landscape for container adoption has greatly evolved over the years from the first known Unix U7 container concept introduced in 1979 to the most utilized docker container concept which emerged in 2013. Docker container image is essentially a lightweight, standalone executable software package with capabilities to run an application. It is important to know that container images become containers when deployed, and simultaneously docker container images become docker containers when deployed on Docker Engine. This project paper aims, evaluates, and presents a methodology useful in vulnerability scanning of docker container images and suggests possible fixes based on OWASP …


Lawrence County Archives Website, Brianna Hawkins, Areeb Mohammed, David Niederweis, Mary-Kate Rynders 2022 University of Alabama in Huntsville

Lawrence County Archives Website, Brianna Hawkins, Areeb Mohammed, David Niederweis, Mary-Kate Rynders

Honors Capstone Projects and Theses

No abstract provided.


A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov 2022 Kennesaw State University

A Maturity Model Of Data Modeling In Self-Service Business Intelligence Software, Anna Kurenkov

Master of Science in Information Technology Theses

Although Self-Service Business Intelligence (SSBI) is continually being adopted in various industries, there is a lack of research focused on data modeling in SSBI. This research aims to fill that research gap and propose a maturity model for SSBI data modeling which is generalizeable between different software and applicable for users of all technical backgrounds. Through extensive literature review, a five-tier maturity model was proposed, explained, and instantiated in PowerBI and Tableau. The testing of the model was found to be simple and intuitive, and the research concludes that the model is applicable to enterprise SSBI environments. This research is …


Payload-Byte: A Tool For Extracting And Labeling Packet Capture Files Of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, Nathaniel D. Bastian 2022 Army Cyber Institute, United States Military Academy

Payload-Byte: A Tool For Extracting And Labeling Packet Capture Files Of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, Nathaniel D. Bastian

ACI Journal Articles

Adapting modern approaches for network intrusion detection is becoming critical, given the rapid technological advancement and adversarial attack rates. Therefore, packet-based methods utilizing payload data are gaining much popularity due to their effectiveness in detecting certain attacks. However, packet-based approaches suffer from a lack of standardization, resulting in incomparability and reproducibility issues. Unlike flow-based datasets, no standard labeled dataset exists, forcing researchers to follow bespoke labeling pipelines for individual approaches. Without a standardized baseline, proposed approaches cannot be compared and evaluated with each other. One cannot gauge whether the proposed approach is a methodological advancement or is just being benefited …


Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez 2022 Kennesaw State University

Software Supply Chain Security Attacks And Analysis Of Defense, Juanjose Rodriguez-Cardenas, Jobair Hossain Faruk, Masura Tansim, Asia Shavers, Corey Brookins, Shamar Lake, Ava Norouzi, Marie Nassif, Kenneth Burke, Miranda Dominguez

Symposium of Student Scholars

The Software Supply chain or SSC is the backbone of the logistics industry and is crucial to a business's success and operation. The surge of attacks and risks for the SSC has grown in coming years with each attack's impact becoming more significant. These attacks have led to the leaking of both client and company sensitive information, corruption of the data, and having it subject to malware and ransomware installation, despite new practices implemented and investments into SSC security and its branches that have not stopped attackers from developing new vulnerabilities and exploits. In our research, we have investigated Software …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage are the reasons for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Using Landsat Satellite Imagery To Estimate Groundcover In The Grainbelt Of Western Australia, Justin Laycock, Nick Middleton, Karen Holmes 2022 Department of Primary Industries and Regional Development, Western Australia

Using Landsat Satellite Imagery To Estimate Groundcover In The Grainbelt Of Western Australia, Justin Laycock, Nick Middleton, Karen Holmes

Resource management technical reports

Maintaining vegetative groundcover is an important component of sustainable agricultural systems and plays a critical function for soil and land conservation in Western Australia’s (WA) grainbelt (the south-west cropping region). This report describes how satellite imagery can be used to quantitatively and objectively estimate total vegetative groundcover, both in near real time and historically across large areas. We used the Landsat seasonal fractional groundcover products developed by the Joint Remote Sensing Research Program from the extensive archive of Landsat imagery. These products provide an estimate of the percentage of green vegetation, non-green vegetation and bare soil for each 30 m …


Segment-Wise Time-Varying Dynamic Bayesian Network With Graph Regularization, Xing YANG, Chen ZHANG, Baihua ZHENG 2022 Singapore Management University

Segment-Wise Time-Varying Dynamic Bayesian Network With Graph Regularization, Xing Yang, Chen Zhang, Baihua Zheng

Research Collection School Of Computing and Information Systems

Time-varying dynamic Bayesian network (TVDBN) is essential for describing time-evolving directed conditional dependence structures in complex multivariate systems. In this article, we construct a TVDBN model, together with a score-based method for its structure learning. The model adopts a vector autoregressive (VAR) model to describe inter-slice and intra-slice relations between variables. By allowing VAR parameters to change segment-wisely over time, the time-varying dynamics of the network structure can be described. Furthermore, considering some external information can provide additional similarity information of variables. Graph Laplacian is further imposed to regularize similar nodes to have similar network structures. The regularized maximum a …


Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng LAU, Rafael Jose BARROS BARRIOS, GOTTIPATI Swapna, Kyong Jin SHIM 2022 Singapore Management University

Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng Lau, Rafael Jose Barros Barrios, Gottipati Swapna, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

Online industry learning platforms are widely used by organizations for employee training and upskilling. Courses or lessons offered by these platforms can be generic or specific to an enterprise application. The increased demand of new hires to learn these platforms or who are already certified in some of these courses has led universities to look at the opportunities for integrating online industry learning platforms into their curricula. Universities hope to use these platforms to aid students in their learning of concepts and theories. At the same time, these platforms can equip students with industryrecognized certifications or digital badges. This paper …


Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan KE, Ka Chung Boris NG 2022 Singapore Management University

Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan Ke, Ka Chung Boris Ng

Research Collection School Of Computing and Information Systems

Decentralized Finance (DeFi) emerged rapidly in recent years and provided open and transparent financial services to the public. Due to its popularity, it is not uncommon to see cybersecurity incidents in the DeFi landscape, yet the impact of such incidents is under-studied. In this paper, we examine two incidents in DeFi protocol that are mainly caused by misgovernance and mistake in the smart contract. By using the synthetic control method, we found that the incident in Alchemix did not have a significant effect on the total value locked (TVL) in the protocol, whereas the incident in Compound caused a 6.13% …


Digital Commons powered by bepress