NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Deng, Houtao – ProQuest LLC, 2011
This dissertation transforms a set of system complexity reduction problems to feature selection problems. Three systems are considered: classification based on association rules, network structure learning, and time series classification. Furthermore, two variable importance measures are proposed to reduce the feature selection bias in tree…
Descriptors: Classification, Mathematics, Programming, Artificial Intelligence
Morris, Mitchell J. – ProQuest LLC, 2012
Quickly accessing the contents of a video is challenging for users, particularly for unstructured video, which contains no intentional shot boundaries, no chapters, and no apparent edited format. We approach this problem in the domain of lecture videos though the use of machine learning, to gather semantic information about the videos; and through…
Descriptors: Heuristics, Electronic Learning, Video Technology, Computer Interfaces
Kim, Iljoo – ProQuest LLC, 2011
The size and dynamism of the Web poses challenges for all its stakeholders, which include producers/consumers of content, and advertisers who want to place advertisements next to relevant content. A critical piece of information for the stakeholders is the demographics of the consumers who are likely to visit a given web site. However, predicting…
Descriptors: Stakeholders, Prediction, Internet, Audiences
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Schultz, Leah – ProQuest LLC, 2009
This study investigates the relationships between the use of a zoom tool, the terms they supply to describe the image, and the type of image being viewed. Participants were assigned to two groups, one with access to the tool and one without, and were asked to supply terms to describe forty images, divided into four categories: landscape, portrait,…
Descriptors: Control Groups, Indexing, Information Retrieval, Visual Aids
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business