• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1014
  • 224
  • 97
  • 96
  • 69
  • 31
  • 29
  • 19
  • 19
  • 14
  • 12
  • 8
  • 7
  • 7
  • 7
  • Tagged with
  • 2075
  • 745
  • 706
  • 585
  • 437
  • 357
  • 330
  • 310
  • 227
  • 221
  • 193
  • 189
  • 174
  • 165
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

The impact of the data management approach on information systems auditing

Furstenburg, Don Friedrich, 1953- 11 1900 (has links)
In establishing the impact of formal data management practices on systems and systems development auditing in the context of a corporate data base environment; the most significant aspects of a data base environment as well as the concept of data management were researched. It was established that organisations need to introduce a data management function to ensure the availability and integrity of data for the organisation. It was further established that an effective data management function can fulfil a key role in ensuring the integrity of the overall data base and as such it becomes an important general control on which the auditor can rely. The audit of information systems in a data base environment requires a more "holistic" audit approach and as a result the auditor has to expand the scope of the systems audit to include an evaluation of the overall data base environment. / Auditing / M. Com (Applied Accounting)
142

Early Detection of Online Auction Opportunistic Sellers Through the Use of Negative-Positive Feedback

Reinert, Gregory J. 01 January 2010 (has links)
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback. Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation. This category of positive feedback was described as “negative-positive” feedback. An example of negative-positive type feedback is “Good product, but slow shipping.” This research study investigated the concept of using negative-positive type feedback as a signature to identify potential opportunistic sellers in an online auction population. As experienced by prior researchers using data extracted from the eBay web site, the magnitude of data to be analyzed in the proposed study was massive. The nature of the analysis required - judgment of seller behavior and contextual analysis of buyer feedback comments – could not be automated. The traditional method of using multiple dedicated human raters would have taken months of labor with a correspondingly high labor cost. Instead, crowdsourcing in the form of Amazon Mechanical Turk was used to reduce the analysis time to a few days and at a fraction of the traditional labor cost. The research’s results found that the presence of subtle buyer behavior in the form of negative-positive type feedback comments are an inter-buyer signal indicating that a seller was behaving fraudulently. Sellers with negative-positive type feedback were 1.82 times more likely to be fraudulent. A correlation exists between an increasing number of negative-positive type feedback comments and an increasing probability that a seller was acting fraudulently. For every one unit increase in the number of negative-positive type feedback comments a seller was 4% more likely to be fraudulent.
143

Data mining temporal and indefinite relations with numerical dependencies

Collopy, Ethan Richard January 1999 (has links)
No description available.
144

VidIO : a model for personalized video information management

Salam, Sazilah January 1996 (has links)
No description available.
145

Electrostatic field similarity searching in databases of three-dimensional conformationally flexible chemical structures

Wright, P. Matthew January 1996 (has links)
No description available.
146

The application of cluster analysis to predicting the cellular uptake of foreign compounds

Ranade, Sonia January 1997 (has links)
No description available.
147

Augmenting the relational model with conceptual graphs

Bowen, Brian A. January 1995 (has links)
While the relational model for data storage is sufficient for the modelling and manipulation of a large number of application domains, a growing class of application domains are either difficult or impossible for the relational model to deal with efficiently. The realisation of this fact has led to a proliferation of data models that attempt to increase the complexity and semantic capture of the domains that they can model - the development of object-oriented databases and the various semantic data models are a result of this. The idea of using logic to define, manipulate and constrain data has given rise to large numbers of systems that interface - not always successfully - a database system and a logic processing system. Most such systems are based on Prolog or its derivations. This thesis describes the development and use of an object-oriented and semantically rich form of logic - conceptual graph theory - as a system for the definition, manipulation, and constraint of data. It describes a theoretical correspondence between conceptual graph theory and the relational model, and proceeds to develop an augmented, hybrid theory that is formally more expressive and as rigorous as those languages based on the relational algebra or calculus. This thesis also describes the design and implementation of a hybrid relational database - conceptual graph system, that has a cleaner and more principled system of semantic capture than other (for example, Prolog-based) systems, and that is also adaptive in nature - it automatically modifies its underlying storage structures in accordance with modifications made to the structures of the application domain over time. This completely shields the user from any responsibility for database design and maintenance, and so the user need only be concerned with application domain knowledge. Although the implementation described is incomplete, it can be extended to produce a deductive, object-oriented database system based on conceptual graphs.
148

The returns to human capital migration within the Department of Defense civilian internal labor market

Macias, Miguel S. 09 1900 (has links)
The objective of this thesis is to examine the returns to mobility of civilian personnel within the Department of Defense (DoD). This study employs panel data provided by the Defense Manpower Data Center (DMDC) and drawn from the Department of Defense Civilian Personnel Data Files. The dataset consisted of 21,143 personnel who were new hires in years 1994-1995. Between 1994-1995 and 2003, 3,267 (15.4%) employees were interstate migrants. The data were set up as an unbalanced panel with a total of 132,068 observations. This study uses ordinary least squares (OLS), probit and Heckman selection-correction techniques to explore two returns to mobility measures: compensation and promotion. Multivariate models were specified and estimated for each performance measure. The results indicated workers who migrate are more likely subsequently to be promoted. Migration is a strategic move for workers to advance and maximize their personal utility since migrants earn higher salaries than non-migrants. Females present no evidence of tied-mover effects, and pursue promotion and salary opportunities like males. Women promote faster than men, and women migrants increase their promotion rates even more. Females, however, earn lower salaries than males. The models also reveal that veterans earn lower salaries than non-veterans and have no significant advantages in promotion over their counterparts.
149

An object-oriented view of backend databases in a mobile environment for navy and marine corps applications

Miller, Kasey C. 09 1900 (has links)
A Database Management System (DBMS) is system software for managing a large amount of data in secondary memory. The standard DBMS used today in both industry and the military is the Relational DBMS (RDBMS). The RDBMS is based upon the relational paradigm, whereas modern software development technologies that interact with the RDBMS are based upon the object-oriented paradigm. This difference in paradigms presents a conceptual mismatch which greatly reduces programmer and developer productivity. Additionally, wireless handheld devices have become ubiquitous both in the military and in the community at large. These handheld devices provide a convenient means of information access. To date, the military has failed to capitalize on the use of handheld devices as a convenient means of information access with respect to the large amounts of information stored in its databases. This thesis investigates various database application architectures and proposes an architecture that will not only overcome the conceptual mismatch between the relational and object-oriented paradigms, but also allows handheld device access to the database. A proof-of-concept prototype database application that provides handheld device access to a military personnel database is built to show the viability of the proposed architecture.
150

Uncooled infrared imaging face recognition using kernel-based feature vector selection

Alexandropoulos, Ioannis M. 09 1900 (has links)
A considerable amount of research has been recently conducted on face recognition tasks, due to increasing demands for security and authentication applications. Recent technological developments in uncooled IR imagery technology have boosted IR face recognition research applications. Our study is part of an on-going research initiated at the Naval Postgraduate School that considers an uncooled low-resolution and low-cost IR camera used for face recognition applications. This work investigates a recent approach which approximates nonlinear kernel-based methods at a significantly reduced computational cost. Our research was applied to an IR database. Results show that this scheme may perform sufficiently close to its â kernelizedâ version considered in a previous study, at a fraction of the computational cost, provided that the associated parameters are well tuned. The thesis considers a relative comparison between the two algorithms, based on identification and verification experiments and considers a statistical test to investigate whether classification performance differences may be considered statistically significant. Results show that, from a cost perspective, a low-resolution uncooled IR camera in conjunction with a low computational-cost classification scheme can be embedded in a robust face recognition system to efficiently address the issue of authentication in security-related tasks.

Page generated in 0.0431 seconds