Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 14 |
Descriptor
Data Processing | 14 |
Pattern Recognition | 14 |
Data Analysis | 6 |
Information Retrieval | 6 |
Information Science | 5 |
Models | 5 |
Computer Science | 4 |
Electronic Publishing | 3 |
Information Technology | 3 |
Internet | 3 |
Mathematics | 3 |
More ▼ |
Source
ProQuest LLC | 14 |
Author
Cai, Chaoli | 1 |
Dong, Xiao | 1 |
El-Bathy, Naser Ibrahim | 1 |
Guo, Ling | 1 |
Jiang, Wenxin | 1 |
Jones, Kenneth D., II. | 1 |
Mei, Qiaozhu | 1 |
Mindorff, David | 1 |
Nikelshpur, Dmitry O. | 1 |
Shen, Warren H. | 1 |
Stamper, John Carroll | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 14 |
Education Level
Higher Education | 1 |
Secondary Education | 1 |
Audience
Location
United States | 3 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mindorff, David – ProQuest LLC, 2023
Practical work involving laboratory experiments is agreed upon to be an essential component of secondary science education. Practical work encompasses a broad range of activity types. The different forms of practical work are not equal in terms of cognitive demand and learning benefit. Inquiry-based investigations provide experience of cognitive…
Descriptors: Secondary Education, Science Education, Biology, Information Retrieval
Nikelshpur, Dmitry O. – ProQuest LLC, 2014
Similar to mammalian brains, Artificial Neural Networks (ANN) are universal approximators, capable of yielding near-optimal solutions to a wide assortment of problems. ANNs are used in many fields including medicine, internet security, engineering, retail, robotics, warfare, intelligence control, and finance. "ANNs have a tendency to get…
Descriptors: Artificial Intelligence, Networks, Computation, Topology
Guo, Ling – ProQuest LLC, 2010
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…
Descriptors: Privacy, Data, Data Analysis, Internet
Tang, Jiang – ProQuest LLC, 2010
Tropical cyclones (TC), especially when their intensity reaches hurricane scale, can become a costly natural hazard. Accurate prediction of tropical cyclone intensity is very difficult because of inadequate observations on TC structures, poor understanding of physical processes, coarse model resolution and inaccurate initial conditions, etc. This…
Descriptors: Natural Disasters, Weather, Data Processing, Pattern Recognition
Zhang, Yi – ProQuest LLC, 2011
Due to the rapid advances in computing and sensing technologies, enormous amounts of data are being generated everyday in various applications. The integration of data mining and data visualization has been widely used to analyze these massive and complex data sets to discover hidden patterns. For both data mining and visualization to be…
Descriptors: Information Technology, Data Processing, Data Analysis, Information Retrieval
Zhu, Zutao – ProQuest LLC, 2010
In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…
Descriptors: Public Agencies, Models, Data Collection, Vignettes
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Jiang, Wenxin – ProQuest LLC, 2009
Recognition and separation of sounds played by various instruments is very useful in labeling audio files with semantic information. This is a non-trivial task requiring sound analysis, but the results can aid automatic indexing and browsing music data when searching for melodies played by user specified instruments. Melody match based on pitch…
Descriptors: Music, Semantics, Musical Instruments, Classification
Stamper, John Carroll – ProQuest LLC, 2010
Intelligent Tutoring Systems (ITSs) that adapt to an individual student's needs have shown significant improvement in achievement over non-adaptive instruction (Murray 1999). This improvement occurs due to the individualized instruction and feedback that an ITS provides. In order to achieve the benefits that ITSs provide, we must find a way to…
Descriptors: Intelligent Tutoring Systems, Individualized Instruction, Adjustment (to Environment), Feedback (Response)
El-Bathy, Naser Ibrahim – ProQuest LLC, 2010
The study of this dissertation provides a solution to a very specific problem instance in the area of data mining, data warehousing, and service-oriented architecture in publishing and newspaper industries. The research question focuses on the integration of data mining and data warehousing. The research problem focuses on the development of…
Descriptors: Research Problems, Information Retrieval, Artificial Intelligence, Computer Science
Mei, Qiaozhu – ProQuest LLC, 2009
With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…
Descriptors: Information Retrieval, Data Processing, Language Patterns, Pattern Recognition
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference
Jones, Kenneth D., II. – ProQuest LLC, 2010
The primary purpose of this study is to determine how students are impacted by the use of Classroom Response System (CRS) technology. This research explores the nature of the outcomes experienced by students and their perceptions on the leading pedagogy and practices for using CRS technology in the classroom. The research is both quantitative and…
Descriptors: Quasiexperimental Design, Personality, Information Systems, Educational Technology
Shen, Warren H. – ProQuest LLC, 2009
This dissertation studies information extraction (IE), the problem of extracting structured information from unstructured data. Example IE tasks include extracting person names from news articles, product information from e-commerce Web pages, street addresses from emails, and names of emerging music bands from blogs. IE is all increasingly…
Descriptors: Information Retrieval, Access to Information, Data Processing, Pattern Recognition