Current Search: Databases (x)
Pages
-
-
Title
-
Collabortive filtering using machine learning and statistical techniques.
-
Creator
-
Su, Xiaoyuan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Collaborative filtering (CF), a very successful recommender system, is one of the applications of data mining for incomplete data. The main objective of CF is to make accurate recommendations from highly sparse user rating data. My contributions to this research topic include proposing the frameworks of imputation-boosted collaborative filtering (IBCF) and imputed neighborhood based collaborative filtering (INCF). We also proposed a model-based CF technique, TAN-ELR CF, and two hybrid CF...
Show moreCollaborative filtering (CF), a very successful recommender system, is one of the applications of data mining for incomplete data. The main objective of CF is to make accurate recommendations from highly sparse user rating data. My contributions to this research topic include proposing the frameworks of imputation-boosted collaborative filtering (IBCF) and imputed neighborhood based collaborative filtering (INCF). We also proposed a model-based CF technique, TAN-ELR CF, and two hybrid CF algorithms, sequential mixture CF and joint mixture CF. Empirical results show that our proposed CF algorithms have very good predictive performances. In the investigation of applying imputation techniques in mining incomplete data, we proposed imputation-helped classifiers, and VCI predictors (voting on classifications from imputed learning sets), both of which resulted in significant improvement in classification performance for incomplete data over conventional machine learned classifiers, including kNN, neural network, one rule, decision table, SVM, logistic regression, decision tree (C4.5), random forest, and decision list (PART), and the well known Bagging predictors. The main imputation techniques involved in these algorithms include EM (expectation maximization) and BMI (Bayesian multiple imputation).
Show less
-
Date Issued
-
2008
-
PURL
-
http://purl.flvc.org/FAU/186301
-
Subject Headings
-
Filters (Mathematics), Machine learning, Data mining, Technological innovations, Database management, Combinatorial group theory
-
Format
-
Document (PDF)
-
-
Title
-
Reducing impedance mismatch in SQL embeddings for object-oriented programming languages.
-
Creator
-
Hurtado, Jose Luis, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
We survey and compare the different major mechanisms for embedding the relational database language SQL in object-oriented programming languages such as Java and C#, with regard to how much impedance mismatch these embeddings suffer. Here impedance mismatch refers to clarity and performance difficulties that arise because of the nature of the embedding. Because of the central position in the information technology industry of object-oriented programs that access SQL-based relational database...
Show moreWe survey and compare the different major mechanisms for embedding the relational database language SQL in object-oriented programming languages such as Java and C#, with regard to how much impedance mismatch these embeddings suffer. Here impedance mismatch refers to clarity and performance difficulties that arise because of the nature of the embedding. Because of the central position in the information technology industry of object-oriented programs that access SQL-based relational database systems, reducing impedance mismatch is generally recognized in that industry as an important practical problem. We argue for the suitability of SQL as a database language, and hence for the desirability of keeping SQL as the view provided by a SQL embedding. We make the case that SQLJ, a SQL embedding for Java in which it appears that Java directly supports SQL commands, is the kind of SQL embedding that suffers the least impedance mismatch, when compared with call-level interfaces and object-relational mappings. We propose extensions to SQLJ that would reduce its impedance mismatch even further.
Show less
-
Date Issued
-
2012
-
PURL
-
http://purl.flvc.org/FAU/3355565
-
Subject Headings
-
Object-oriented programming (Computer science), SQL (Computer program language), Java (Computer program language), Relational databases
-
Format
-
Document (PDF)
-
-
Title
-
Approaches to relational database access from object-oriented programming languages.
-
Creator
-
Ghouse, Murtuza., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
In this thesis, different methods to access relational databases from an object oriented programming language like Java have been investigated. The approaches that are covered are JDBC (Java Database Connectivity), SQLJ (industry standard for embedding SQL in Java) and Java Blend (product from Sun Microsystems, that provides object-oriented way to access data in a relational database). The emphasis is given to Java Blend, as it is a new tool with a very broad scope. And arguments in support...
Show moreIn this thesis, different methods to access relational databases from an object oriented programming language like Java have been investigated. The approaches that are covered are JDBC (Java Database Connectivity), SQLJ (industry standard for embedding SQL in Java) and Java Blend (product from Sun Microsystems, that provides object-oriented way to access data in a relational database). The emphasis is given to Java Blend, as it is a new tool with a very broad scope. And arguments in support of Java Blend as a better approach compared to JDBC and SQLJ are presented.
Show less
-
Date Issued
-
2001
-
PURL
-
http://purl.flvc.org/fcla/dt/12830
-
Subject Headings
-
Object-oriented programming (Computer science), Relational databases, Java (Computer program language)
-
Format
-
Document (PDF)
-
-
Title
-
Efficient and Effective Searching m Unstructured FileSharing Peer-to-Peer Networks.
-
Creator
-
Li, Xiuqi, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Peer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to...
Show morePeer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to desired files through reinforcement learning when topology adaptation is impossible or infeasible. To discover the best path to desired files, ISRL not only explores new paths by forwarding queries to randomly chosen neighbors, but also exploits the paths that have been discovered for reducing the cumulative query cost. Three models of ISRL are put forwarded: a basic version for finding one desired file, MP-ISRL (MP stands for Multiple-Path ISRL) for finding at least k files, and C-ISRL (C refers to Clustering) for reducing maintenance overhead through clustering when there are many queries. ISRL outperforms existing searching approaches in unstructured peer-to-peer networks by achieving similar query quality with lower cumulative query cost. The experimental results confirm the performance improvement of ISRL. The second approach, HS-SDBF (Hint-based Searching by Scope Decay Bloom Filter), addresses the issue of effective and efficient hint propagation. We design a new data structure called SDBF (Scope Decay Bloom Filter) to represent and advertise probabilistic hints. Compared to existing proactive schemes, HSSDBF can answer many more queries successfully at a lower amortized cost considering both the query traffic and hint propagation traffic. Both the analytic and the experimental results support the performance improvement of our protocol. The third algorithm, hybrid search, seeks to combine the benefits of both forwarding and non-forwarding searching schemes. In this approach, a querying source directly probes its own extended neighbors and forwards a query to a subset of its extended neighbors and guides these neighbors to probe their own extended neighbors on its behalf. The hybrid search is able to adapt query execution to the popularity of desired files without generating too much state maintenance overhead because of the 1-hop forwarding inherent in the approach. It achieves a higher query efficiency than the forwarding scheme and a better success rate than the non-forwarding approach. To the best of our knowledge, this work is the first attempt to integrate forwarding and non-forwarding schemes. Simulation results demonstrate the effectiveness of the hybrid search.
Show less
-
Date Issued
-
2006
-
PURL
-
http://purl.flvc.org/fau/fd/FA00012572
-
Subject Headings
-
Peer-to-peer architecture (Computer networks), Computer security, Database searching, Internetworking (Telecommunication), Heterogeneous computing
-
Format
-
Document (PDF)
-
-
Title
-
Secure access of legacy databases from the Web using CORBA.
-
Creator
-
Xue, Richard Zhihuai., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
After comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object...
Show moreAfter comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object Request Broker (ORB); this was a Virtual Car Reservation System (VCRS). In the VCRS system, a user can get a reservation number when necessary information is entered from a Web browser. The user can also retrieve the reservation information by using the reservation number. All reservation information is stored in a distributed database system at a remote site. A realistic application of the proposed architecture is also described. We also provide an evaluation and comparison of the proposed architecture with other architectures.
Show less
-
Date Issued
-
2000
-
PURL
-
http://purl.flvc.org/fcla/dt/15756
-
Subject Headings
-
Computer security, CORBA (Computer architecture), World Wide Web, Distributed databases, Internet, Business--Data processing
-
Format
-
Document (PDF)
-
-
Title
-
An authorization model for object-oriented and semantic databases.
-
Creator
-
Song, Haiyan., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
The incorporation of object-oriented and semantic modeling concepts to databases is one of the most significant advances in the evolution of database systems. Among the many issues brought along by this integration, one that becomes important is the protection of the information. This thesis presents an authorization model that applies two basic aspects: control of users' access to data values, and control of administrators' access to data definitions and authorization rules. The model...
Show moreThe incorporation of object-oriented and semantic modeling concepts to databases is one of the most significant advances in the evolution of database systems. Among the many issues brought along by this integration, one that becomes important is the protection of the information. This thesis presents an authorization model that applies two basic aspects: control of users' access to data values, and control of administrators' access to data definitions and authorization rules. The model consists of a set of policies, a structure for authorization rules, algorithms for access request validation and procedures for administrative functions. Even though this model is developed in the context of a particular data model, the discussion is sufficiently general and can be applied to similar environments.
Show less
-
Date Issued
-
1990
-
PURL
-
http://purl.flvc.org/fcla/dt/14592
-
Subject Headings
-
Object-oriented databases, Data base security, Computers--Access control
-
Format
-
Document (PDF)
-
-
Title
-
An investigation of Oracle8i.
-
Creator
-
He, Li., Florida Atlantic University, Solomon, Martin K.
-
Abstract/Description
-
Oracle8i, the database for Internet computing, changes the way information is managed and accessed. Not only does Oracle8i introduce new features and enhancement for traditional OLTP and data warehouse, it also provides breakthrough technologies concerning the Internet and Java. This thesis presents a concrete investigation of Oracle8i's new features and new technologies, especially in the area of Internet and Java support. The following research tasks are performed: A comprehensive survey on...
Show moreOracle8i, the database for Internet computing, changes the way information is managed and accessed. Not only does Oracle8i introduce new features and enhancement for traditional OLTP and data warehouse, it also provides breakthrough technologies concerning the Internet and Java. This thesis presents a concrete investigation of Oracle8i's new features and new technologies, especially in the area of Internet and Java support. The following research tasks are performed: A comprehensive survey on the new features and new technologies of Oracle8i; An identification of the key features of Java utilities in Oracle8i, including JDBC drivers, SQLJ, and Enterprise JavaBeans, with complete examples running in Windows NT 4.0 environment; Discussions of Oracle8i and Internet, including Oracle WebDB and iFS; A presentation on areas for further study.
Show less
-
Date Issued
-
1999
-
PURL
-
http://purl.flvc.org/fcla/dt/15710
-
Subject Headings
-
Oracle (Computer file), Relational databases, Web servers, Java (Computer program language)
-
Format
-
Document (PDF)
-
-
Title
-
A selectively redundant file system.
-
Creator
-
Veradt, Joy L., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Disk arrays have been proposed as a means of achieving high performance, reliability and availability in computer systems. This study looks at the RAID (Redundant Array of Inexpensive Disks) disk array architecture and its advantages and disadvantages for use in personal computer environments, specifically in terms of how data is protected (redundant information) and the tradeoff required to achieve that protection (sacrifice of disk capacity). It then proposes an alternative to achieving a...
Show moreDisk arrays have been proposed as a means of achieving high performance, reliability and availability in computer systems. This study looks at the RAID (Redundant Array of Inexpensive Disks) disk array architecture and its advantages and disadvantages for use in personal computer environments, specifically in terms of how data is protected (redundant information) and the tradeoff required to achieve that protection (sacrifice of disk capacity). It then proposes an alternative to achieving a real-time method of protecting a user's data, which involves the modification of an operating system's file system to implement selective redundancy at the file level. This approach, based on modified RAIDs, is shown to be considerably more efficient in using the capacity of the available disks. It also provides flexibility in allowing users to tradeoff space for reliability.
Show less
-
Date Issued
-
1992
-
PURL
-
http://purl.flvc.org/fcla/dt/14844
-
Subject Headings
-
Computer files--Reliability, Systems software--Reliability, Databases--Reliability
-
Format
-
Document (PDF)
-
-
Title
-
The future will be better tomorrow: a novel of apocalyptic sarcasm.
-
Creator
-
Irving, Christopher J., Bucak, Ayse Papatya, Florida Atlantic University, Dorothy F. Schmidt College of Arts and Letters, Department of English
-
Abstract/Description
-
The Future Will Be Better Tomorrow is a satirical post-apocalyptic novel that examines the personal and social ironies that occur in a society that is unbalanced by an unexplained apocalyptic event. Working with a combination of dark humor and the terrifying realities of an apocalyptic event – in this case: a blackout – the novel aims to challenge the machinery established by this particular subset of the science fiction genre.
-
Date Issued
-
2014
-
PURL
-
http://purl.flvc.org/fau/fd/FA00004124, http://purl.flvc.org/fau/fd/FA00004124
-
Subject Headings
-
Computer science., Computer communication systems., Data structures (Computer science)., Database management., Information storage and retrieval., Artificial intelligence., Computer Science., Data Structures, Cryptology and Information Theory., Database Management., Information Storage and Retrieval.
-
Format
-
Document (PDF)
-
-
Title
-
An intelligent data repository.
-
Creator
-
Dave, Trupti., Florida Atlantic University, Pandya, Abhijit S.
-
Abstract/Description
-
In this thesis, importance of Intelligent Data Repository (IDR) and its real life applications are studied. We proposed an IDR for oncology applications which can handle large datasets and which can be used on both the intranet and the Internet. It is designed to provide one or multiple medical institutions on a global scale a common platform for patient care and consultation. The proposed application consists of two key models, Body Surface Area model and Search model, which are described in...
Show moreIn this thesis, importance of Intelligent Data Repository (IDR) and its real life applications are studied. We proposed an IDR for oncology applications which can handle large datasets and which can be used on both the intranet and the Internet. It is designed to provide one or multiple medical institutions on a global scale a common platform for patient care and consultation. The proposed application consists of two key models, Body Surface Area model and Search model, which are described in detail and their results are discussed. We have implemented the proposed IDR for oncology application using ColdFusion MX. Existing research in this area have been studied and compared. Framework of the proposed IDR, structure, front-end user interface and back-end database schema of the proposed oncology application are explained in this thesis.
Show less
-
Date Issued
-
2004
-
PURL
-
http://purl.flvc.org/fcla/dt/13187
-
Subject Headings
-
Database design, Medicine--Computer network resources, Medical telematics, Medical informatics, ColdFusion, Oncology--Computer network resources
-
Format
-
Document (PDF)
-
-
Title
-
A survey of object-oriented features in SQL3.
-
Creator
-
Wu, Zaiwu., Florida Atlantic University, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the...
Show moreThis thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the careful examination and explication of ADTs and the corresponding families--type templates as they are used in SQL3. These topics involve four aspects: (1) general concepts and technologies in object-oriented data models, (2) the definition of ADTs and their advantages, (3) the manipulation of ADTs in SQL3, including type templates (e.g., distinct types, explicit ADTs, user-defined type templates, standard type templates) and collection types, (4) "tables of ADTs" (row types with table), and (5) conclusions and challenges.
Show less
-
Date Issued
-
1994
-
PURL
-
http://purl.flvc.org/fcla/dt/15044
-
Subject Headings
-
Abstract data types (Computer science), Object-oriented programming (Computer science), Database management, SQL (Computer program language)
-
Format
-
Document (PDF)
-
-
Title
-
Text Mining and Topic Modeling for Social and Medical Decision Support.
-
Creator
-
Hurtado, Jose Luis, Zhu, Xingquan, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Effective decision support plays vital roles in people's daily life, as well as for professional practitioners such as health care providers. Without correct information and timely derived knowledge, a decision is often suboptimal and may result in signi cant nancial loss or compromises of the performance. In this dissertation, we study text mining and topic modeling and propose to use text mining methods, in combination with topic models, to discover knowledge from texts popularly available...
Show moreEffective decision support plays vital roles in people's daily life, as well as for professional practitioners such as health care providers. Without correct information and timely derived knowledge, a decision is often suboptimal and may result in signi cant nancial loss or compromises of the performance. In this dissertation, we study text mining and topic modeling and propose to use text mining methods, in combination with topic models, to discover knowledge from texts popularly available from a wide variety of sources, such as research publications, news, medical diagnose notes, and further employ discovered knowledge to assist social and medical decision support. Examples of such decisions include hospital patient readmission prediction, which is a national initiative for health care cost reduction, academic research topics discovery and trend modeling, and social preference modeling for friend recommendation in social networks etc. To carry out text mining, our research, in Chapter 3, first emphasizes on single document analyzing to investigate textual stylometric features for user pro ling and recognition. Our research confirms that by using properly designed features, it is possible to identify the authors who wrote the article, using a number of sample articles written by the author as the training data. This study serves as the base to assert that text mining is a powerful tool for capturing knowledge in texts for better decision making. In the Chapter 4, we advance our research from single documents to documents with interdependency relationships, and propose to model and predict citation relationship between documents. Given a collection of documents with known linkage relationships, our research will discover e ective features to train prediction models, and predict the likelihood of two documents involving a citation relationships. This study will help accurately model social network linkage relationships, and can be used to assist e ective decision making for friend recommendation in social networking, and reference recommendation in scienti c writing etc. In the Chapter 5, we advance a topic discovery and trend prediction principle to discover meaningful topics from a set of data collection, and further model the evolution trend of the topic. By proposing techniques to discover topics from text, and using temporal correlation between trend for prediction, our techniques can be used to summarize a large collection of documents as meaningful topics, and further forecast the popularity of the topic in a near future. This study can help design systems to discover popular topics in social media, and further assist resource planning and scheduling based on the discovered topics and the their evolution trend. In the Chapter 6, we employ both text mining and topic modeling to the medical domain for effective decision making. The goal is to discover knowledge from medical notes to predict the risk of a patient being re-admitted in a near future. Our research emphasizes on the challenge that re-admitted patients are only a small portion of the patient population, although they bring signficant financial loss. As a result, the datasets are highly imbalanced which often result in poor accuracy for decision making. Our research will propose to use latent topic modeling to carryout localized sampling, and combine models trained from multiple copies of sampled data for accurate prediction. This study can be directly used to assist hospital re-admission assessment for early warning and decision support. The text mining and topic modeling techniques investigated in the dissertation can be applied to many other domains, involving texts and social relationships, towards pattern and knowledge based e ective decision making.
Show less
-
Date Issued
-
2016
-
PURL
-
http://purl.flvc.org/fau/fd/FA00004782, http://purl.flvc.org/fau/fd/FA00004782
-
Subject Headings
-
Social sciences--Research--Methodology., Data mining., Machine learning., Database searching., Discourse analysis--Data processing., Communication--Network analysis., Medical care--Quality control.
-
Format
-
Document (PDF)
Pages