• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19623
  • 3369
  • 2417
  • 2007
  • 1551
  • 1432
  • 877
  • 406
  • 390
  • 359
  • 297
  • 233
  • 208
  • 208
  • 208
  • Tagged with
  • 38100
  • 12455
  • 9250
  • 7103
  • 6698
  • 5896
  • 5282
  • 5193
  • 4722
  • 3451
  • 3302
  • 2809
  • 2725
  • 2536
  • 2116
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Research Data Services Maturity in Academic Libraries

Kollen, Christine, Kouper, Inna, Ishida, Mayu, Williams, Sarah, Fear, Kathleen 01 1900 (has links)
An ACRL white paper from 2012 reported that, at that time, only a small number of academic libraries in the United States and Canada offered research data services (RDS), but many were planning to do so within the next two years (Tenopir, Birch, and Allard, 2012). By 2013, 74% of the Association of Research Libraries (ARL) survey respondents offered RDS and an additional 23% were planning to do so (Fearon, Gunia, Pralle, Lake, and Sallans, 2013). The academic libraries recognize that the landscape of services changes quickly and that they need to support the changing needs of research and instruction. In their efforts to implement RDS, libraries often respond to pressures originating outside the library, such as national or funder mandates for data management planning and data sharing. To provide effective support for researchers and instructors, though, libraries must be proactive and develop new services that look forward and yet accommodate the existing human, technological, and intellectual capital accumulated over the decades. Setting the stage for data curation in libraries means to create visionary approaches that supersede institutional differences while still accommodating diversity in implementation. How do academic libraries work towards that? This chapter will combine an historical overview of RDS thinking and implementations based on the existing literature with an empirical analysis of ARL libraries’ current RDS goals and activities. The latter is based on the study we conducted in 2015 that included a content analysis of North American research library web pages and interviews of library leaders and administrators of ARL libraries. Using historical and our own data, we will synthesize the current state of RDS implementation across ARL libraries. Further, we will examine the models of research data management maturity (see, for example, Qin, Crowston and Flynn, 2014) and discuss how such models compare to our own three-level classification of services and activities offered at libraries - basic, intermediate, and advanced. Our analysis will conclude with a set of recommendations for next steps, i.e., actions and resources that a library might consider to expand their RDS to the next maturity level. References Fearon, D. Jr., Gunia, B., Pralle, B.E., Lake, S., Sallans, A.L. (2013). Research data management services. (ARL Spec Kit 334). Washington, D.C.: ARL. Retrieved from: http://publications.arl.org/Research-Data-Management-Services-SPEC-Kit-334/ Tenopir, C., Birch, B., & Allard, S. (2012). Academic libraries and research data services: Current practices and plans for the future. ACRL. Retrieved from http://www.ala.org/acrl/sites/ala.org.acrl/files/content/publications/whitepapers/Tenopir_Birch_Allard.pdf Qin, J., Crowston, K., & Flynn, C. (2014). 1.1 Commitment to Perform. A Capability Maturity Model for Research Data Management. wiki. Retrieved http://rdm.ischool.syr.edu/xwiki/bin/view/CMM+for+RDM/WebHome
182

Retractions, Post-Publication Peer Review and Fraud: Scientific Publishing's Wild West

Oransky, Ivan 27 October 2016 (has links)
Presentation given on October 27, 2016 at Data Reproducibility: Integrity and Transparency program as part of Open Access Week 2016. / Ivan Oransky and Adam Marcus founded Retraction Watch in 2010. Unbeknownst to them, retractions had grown ten-fold in the previous decade. Oransky will discuss the reasons for that increase, whether fraud is on the rise, the growth of post-publication peer review, and other trends he and Marcus have seen as they've built a site that is now viewed by 150,000 people per month, and funded by philanthropies including the MacArthur and Arnold Foundations.
183

Vessel segmentation / Vessel segmentation

Dupej, Ján January 2011 (has links)
Title: Vessel segmentation Author: Ján Dupej Department / Institute: Department of Software and Computer Science Education Supervisor of the master thesis: RNDr. Josef Pelikán, KSVI Abstract: In this thesis we researched some of the blood vessed segmentation and visualization techniques currently available for angiography on CT data. We then designed, implemented and tested a system that allows both semi-automatic and automatic vessel segmentation and visualization. For vessel segmantation and tracking we used a region-growing algorithm that we overhauled with several heuristics and combined with centerline detection. We then automated this algorithm by automatic seed generation. The visualization part is accomplished with an adaptation of the well-known straightened CPR method that we enhanced so that it visualizes the whole cross-section of the blood vessel, instead of just one line of it. Furthermore, we used the Bishop frame to maintain minimal twist of the curve-local coordinate system along the whole vessel. Keywords: vessel segmentation, medical data analysis, volume data
184

Analýza a vizualizace statistických Linkded Data / Analysing and Visualizing Statistical Linked Data

Helmich, Jiří January 2013 (has links)
The thesis describes several means of processing statistical data in the ambience of Linked Data and is in particular focused on the utilization of Data Cube Vocabulary metaformat. Its content offers a description of tools related to analysis and visualization of RDF data not only from the statistical view. An indivisible part of this work is the depiction of the Payola tool on whose development is the author still working on. The outcome of this thesis is mainly proposal and consequential implementation of the system that enables a conversion of RDF data in compliance with the DCV vocabularies. The designed system was implemented and integrated to the Payola application. Several other extensions of the system were also implemented by the author. Within the scope of the implementation process there are mentioned also limitations arising from the integration with Payola. In the conclusion the writer describes a few experiments where some of the chosen datasets were applied to the implemented system. Powered by TCPDF (www.tcpdf.org)
185

Sekerheid in elektroniese data-uitruiling

17 November 2014 (has links)
M.Sc. (Computer Science) / Please refer to full text to view abstract
186

Auditing electronic computer data

Unknown Date (has links)
"The purpose of this paper is to make an analysis of the acceptability of electronic data processing system information to the independent auditor as a basis for reliance thereon in expressing an opinion regarding the financial statements under examination"--Introduction. / Typescript. / "August, 1958." / "Submitted to the Graduate Council of Florida State University in partial fulfillment of the requirements for the degree of Master of Science." / Advisor: Finley E. Belcher, Professor Directing Paper. / Includes bibliographical references (leaves 40-42).
187

Sequential Data Mining and its Applications to Pharmacovigilance

Qin, Xiao 02 April 2019 (has links)
With the phenomenal growth of digital devices coupled with their ever-increasing capabilities of data generation and storage, sequential data is becoming more and more ubiquitous in a wide spectrum of application scenarios. There are various embodiments of sequential data such as temporal database, time series and text (word sequence) where the first one is synchronous over time and the latter two often generated in an asynchronous fashion. In order to derive precious insights, it is critical to learn and understand the behavior dynamics as well as the causality relationships across sequences. Pharmacovigilance is defined as the science and activities relating to the detection, assessment, understanding and prevention of adverse drug reactions (ADR) or other drug-related problems. In the post-marketing phase, the effectiveness and the safety of drugs is monitored by regulatory agencies known as post-marketing surveillance. Spontaneous Reporting System (SRS), e.g., U.S. Food and Drug Administration Adverse Event Reporting System (FAERS), collects drug safety complaints over time providing the key evidence to support regularity actions towards the reported products. With the rapid growth of the reporting volume and velocity, data mining techniques promise to be effective to facilitating drug safety reviewers performing supervision tasks in a timely fashion. My dissertation studies the problem of exploring, analyzing and modeling various types of sequential data within a typical SRS: Temporal Correlations Discovery and Exploration. SRS can be seen as a temporal database where each transaction encodes the co-occurrence of some reported drugs and observed ADRs in a time frame. Temporal association rule learning (TARL) has been proven to be a prime candidate to derive associations among the objects from such temporal database. However, TARL is parameterized and computational expensive making it difficult to use for discovering interesting association among drugs and ADRs in a timely fashion. Worse yet, existing interestingness measures fail to capture the significance of certain types of association in the context of pharmacovigilance, e.g. drug-drug interaction (DDI) related ADR. To discover DDI related ADR using TARL, we propose an interestingness measure that aligns with the DDI semantics. We propose an interactive temporal association analytics framework that supports real-time temporal association derivation and exploration. Anomaly Detection in Time Series. Abnormal reports may reveal meaningful ADR case which is overlooked by frequency-based data mining approach such as association rule learning where patterns are derived from frequently occurred events. In addition, the sense of abnormal or rareness may vary in different contexts. For example, an ADR, normally occurs to adult population, may rarely happen to youth population but with life threatening outcomes. Local outlier factor (LOF) is identified as a suitable approach to capture such local abnormal phenomenon. However, existing LOF algorithms and its variations fail to cope with high velocity data streams due to its high algorithmic complexity. We propose new local outlier semantics that leverage kernel density estimation (KDE) to effectively detect local outliers from streaming data. A strategy to continuously detect top-N KDE-based local outliers over streams is also designed, called KELOS -- the first linear time complexity streaming local outlier detection approach. Text Modeling. Language modeling (LM) is a fundamental problem in many natural language processing (NLP) tasks. LM is the development of probabilistic models that are able to predict the next word in the sequence given the words that precede it. Recently, LM is advanced by the success of the recurrent neural networks (RNNs) which overcome the Markov assumption made in the traditional statistical language models. In theory, RNNs such as Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) can “remember� arbitrarily long span of history if provided with enough capacity. However, they do not perform well on very long sequences in practice as the gradient computation for RNNs becomes increasingly ill-behaved as the expected dependency becomes longer. One way of tackling this problem is to feed succinct information that encodes the semantic structure of the entire document such as latent topics as context to guide the modeling process. Clinical narratives that describe complex medical events are often accompanied by meta-information such as a patient's demographics, diagnoses and medications. This structured information implicitly relates to the logical and semantic structure of the entire narrative, and thus affects vocabulary choices for the narrative composition. To leverage this meta-information, we propose a supervised topic compositional neural language model, called MeTRNN, that integrates the strength of supervised topic modeling in capturing global semantics with the capacity of contextual recurrent neural networks (RNN) in modeling local word dependencies.
188

Privacy preserving data publishing. / CUHK electronic theses & dissertations collection

January 2008 (has links)
The advance of information technologies has enabled various organizations (e.g., census agencies, hospitals) to collect large volumes of sensitive personal data (e.g., census data, medical records). Due to the great research value of such data, it is often released for public benefit purposes, which, however, poses a risk to individual privacy. A typical solution to this problem is to anonymize the data before releasing it to the public. In particular, the anonymization should be conducted in a careful manner, such that the published data not only prevents an adversary from inferring sensitive information, but also remains useful for data analysis. / This thesis prevents an extensive study on the anonymization techniques for privacy preserving data publishing. We explore various aspects of the problem (e.g., definitions of privacy, modeling of the adversary, methodologies of anonymization), and devise novel solutions that address several important issues overlooked by previous work. Experiments with real-world data confirm the effectiveness and efficiency of our techniques. / Xiao, Xiaokui. / Adviser: Yufei Yao. / Source: Dissertation Abstracts International, Volume: 70-06, Section: B, page: 3618. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 307-314). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
189

The re-design of PROSIM (a production management simulation) using interactive approach.

January 1984 (has links)
by Yeung Wei-ming. / Bibliography : leaf 116 / Thesis (M.B.A.)--Chinese University of Hong Kong, 1984
190

Entropy-based subspace clustering for mining numerical data.

January 1999 (has links)
by Cheng, Chun-hung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1999. / Includes bibliographical references (leaves 72-76). / Abstracts in English and Chinese. / Abstract --- p.ii / Acknowledgments --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Six Tasks of Data Mining --- p.1 / Chapter 1.1.1 --- Classification --- p.2 / Chapter 1.1.2 --- Estimation --- p.2 / Chapter 1.1.3 --- Prediction --- p.2 / Chapter 1.1.4 --- Market Basket Analysis --- p.3 / Chapter 1.1.5 --- Clustering --- p.3 / Chapter 1.1.6 --- Description --- p.3 / Chapter 1.2 --- Problem Description --- p.4 / Chapter 1.3 --- Motivation --- p.5 / Chapter 1.4 --- Terminology --- p.7 / Chapter 1.5 --- Outline of the Thesis --- p.7 / Chapter 2 --- Survey on Previous Work --- p.8 / Chapter 2.1 --- Data Mining --- p.8 / Chapter 2.1.1 --- Association Rules and its Variations --- p.9 / Chapter 2.1.2 --- Rules Containing Numerical Attributes --- p.15 / Chapter 2.2 --- Clustering --- p.17 / Chapter 2.2.1 --- The CLIQUE Algorithm --- p.20 / Chapter 3 --- Entropy and Subspace Clustering --- p.24 / Chapter 3.1 --- Criteria of Subspace Clustering --- p.24 / Chapter 3.1.1 --- Criterion of High Density --- p.25 / Chapter 3.1.2 --- Correlation of Dimensions --- p.25 / Chapter 3.2 --- Entropy in a Numerical Database --- p.27 / Chapter 3.2.1 --- Calculation of Entropy --- p.27 / Chapter 3.3 --- Entropy and the Clustering Criteria --- p.29 / Chapter 3.3.1 --- Entropy and the Coverage Criterion --- p.29 / Chapter 3.3.2 --- Entropy and the Density Criterion --- p.31 / Chapter 3.3.3 --- Entropy and Dimensional Correlation --- p.33 / Chapter 4 --- The ENCLUS Algorithms --- p.35 / Chapter 4.1 --- Framework of the Algorithms --- p.35 / Chapter 4.2 --- Closure Properties --- p.37 / Chapter 4.3 --- Complexity Analysis --- p.39 / Chapter 4.4 --- Mining Significant Subspaces --- p.40 / Chapter 4.5 --- Mining Interesting Subspaces --- p.42 / Chapter 4.6 --- Example --- p.44 / Chapter 5 --- Experiments --- p.49 / Chapter 5.1 --- Synthetic Data --- p.49 / Chapter 5.1.1 --- Data Generation ´ؤ Hyper-rectangular Data --- p.49 / Chapter 5.1.2 --- Data Generation ´ؤ Linearly Dependent Data --- p.50 / Chapter 5.1.3 --- Effect of Changing the Thresholds --- p.51 / Chapter 5.1.4 --- Effectiveness of the Pruning Strategies --- p.53 / Chapter 5.1.5 --- Scalability Test --- p.53 / Chapter 5.1.6 --- Accuracy --- p.55 / Chapter 5.2 --- Real-life Data --- p.55 / Chapter 5.2.1 --- Census Data --- p.55 / Chapter 5.2.2 --- Stock Data --- p.56 / Chapter 5.3 --- Comparison with CLIQUE --- p.58 / Chapter 5.3.1 --- Subspaces with Uniform Projections --- p.60 / Chapter 5.4 --- Problems with Hyper-rectangular Data --- p.62 / Chapter 6 --- Miscellaneous Enhancements --- p.64 / Chapter 6.1 --- Extra Pruning --- p.64 / Chapter 6.2 --- Multi-resolution Approach --- p.65 / Chapter 6.3 --- Multi-threshold Approach --- p.68 / Chapter 7 --- Conclusion --- p.70 / Bibliography --- p.71 / Appendix --- p.77 / Chapter A --- Differential Entropy vs Discrete Entropy --- p.77 / Chapter A.1 --- Relation of Differential Entropy to Discrete Entropy --- p.78 / Chapter B --- Mining Quantitative Association Rules --- p.80 / Chapter B.1 --- Approaches --- p.81 / Chapter B.2 --- Performance --- p.82 / Chapter B.3 --- Final Remarks --- p.83

Page generated in 0.1511 seconds