147,917 research outputs found

    A unified view of data-intensive flows in business intelligence systems : a survey

    Get PDF
    Data-intensive flows are central processes in today’s business intelligence (BI) systems, deploying different technologies to deliver data, from a multitude of data sources, in user-preferred and analysis-ready formats. To meet complex requirements of next generation BI systems, we often need an effective combination of the traditionally batched extract-transform-load (ETL) processes that populate a data warehouse (DW) from integrated data sources, and more real-time and operational data flows that integrate source data at runtime. Both academia and industry thus must have a clear understanding of the foundations of data-intensive flows and the challenges of moving towards next generation BI environments. In this paper we present a survey of today’s research on data-intensive flows and the related fundamental fields of database theory. The study is based on a proposed set of dimensions describing the important challenges of data-intensive flows in the next generation BI setting. As a result of this survey, we envision an architecture of a system for managing the lifecycle of data-intensive flows. The results further provide a comprehensive understanding of data-intensive flows, recognizing challenges that still are to be addressed, and how the current solutions can be applied for addressing these challenges.Peer ReviewedPostprint (author's final draft

    Solutions to Detect and Analyze Online Radicalization : A Survey

    Full text link
    Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing concern to the society, governments and law enforcement agencies around the world. Research shows that various platforms on the Internet (low barrier to publish content, allows anonymity, provides exposure to millions of users and a potential of a very quick and widespread diffusion of message) such as YouTube (a popular video sharing website), Twitter (an online micro-blogging service), Facebook (a popular social networking website), online discussion forums and blogosphere are being misused for malicious intent. Such platforms are being used to form hate groups, racist communities, spread extremist agenda, incite anger or violence, promote radicalization, recruit members and create virtual organi- zations and communities. Automatic detection of online radicalization is a technically challenging problem because of the vast amount of the data, unstructured and noisy user-generated content, dynamically changing content and adversary behavior. There are several solutions proposed in the literature aiming to combat and counter cyber-hate and cyber-extremism. In this survey, we review solutions to detect and analyze online radicalization. We review 40 papers published at 12 venues from June 2003 to November 2011. We present a novel classification scheme to classify these papers. We analyze these techniques, perform trend analysis, discuss limitations of existing techniques and find out research gaps

    The key performance indicators of the BIM implementation process

    Get PDF
    Contemporarily some firms in the construction industry are attempting to adopt a BIM method of working. Each of these attempts reflects a varying BIM adoption philosophy and inevitably different BIM technologies, implementation strategies and roadmaps. On the other hand, all these attempts are often motivated to attain competitive advantages for product delivery in the market place. The question of what the best method of adopting BIM has not been answered yet. That is to say, it is required to identify a standard method that will benchmark the different BIM adoption cases by comparing the efficiency gains in these cases: a standard benchmarking method can help the stakeholders to decide on the most appropriate strategies for themselves. This paper explains the live experience of BIM adoption in a KTP (Knowledge Transfer Partnership) project, undertaken between the University of Salford and John McCall Architects practicing in the housing and regeneration fields, with a particular focus on a set of KPIs that have been developed and tested through the action research strategy in the project. Weighting of these KPI’s has been developed from an architectural business perspectiv

    ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

    Get PDF
    Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received relatively little attention. Much of this enforcement is spread across system services, taking the form of hard-coded checks within their implementations. In this paper, we propose Authorization Check Miner (ACMiner), a framework for evaluating the correctness of Android's access control enforcement through consistency analysis of authorization checks. ACMiner combines program and text analysis techniques to generate a rich set of authorization checks, mines the corresponding protection policy for each service entry point, and uses association rule mining at a service granularity to identify inconsistencies that may correspond to vulnerabilities. We used ACMiner to study the AOSP version of Android 7.1.1 to identify 28 vulnerabilities relating to missing authorization checks. In doing so, we demonstrate ACMiner's ability to help domain experts process thousands of authorization checks scattered across millions of lines of code

    Cultivating Critical Thinking Skill In Teaching And Learning And Learning Process

    Get PDF
    The purpose of this article is to spearhead two objectives namely, to fulfill my assignment and to help our future leaders that are our beloved student to analyze multilogical problem of contemporary in teaching and learning process . Those problem that can be viewed holistically from the top or bird eyes perspective thus manages them using correct tool and try solve from many different angles. Joanne Kurfiss simply define critical as “ An investigation whose reason is to explore problem to arrive at the hypothesis that integrate all available information convincingly justified. It is a self regulatory which result in interpretation, analysis, evaluation and inference as well as explanation of evidence, conceptual, methodological or conceptual consideration upon which the judgment is base

    Environmental complexity influences association network structure and network-based diffusion of foraging information in fish shoals

    Get PDF
    This project was funded by grants from the Natural Environment Research Council (NE/D010365/1) and the European Research Council (EVOCULTURE 232823) to K.N.L.Socially transmitted information can significantly affect the ways in which animals interact with their environments. We used network-based diffusion analysis, a novel and powerful tool for exploring information transmission, to model the rate at which sticklebacks (Gasterosteus aculeatus) discovered prey patches, comparing shoals foraging in open and structured environments. We found that for groups in the open environment, individuals tended to recruit to both the prey patch and empty comparison patches at similar times, suggesting that patch discovery was not greatly affected by direct social transmission. In contrast, in structured environments we found strong evidence that information about prey patch location was socially transmitted and moreover that the pathway of information transmission followed the shoals' association network structures. Our findings highlight the importance of considering habitat structure when investigating the diffusion of information through populations and imply that association networks take on greater ecological significance in structured than open environments.Publisher PDFPeer reviewe
    • …
    corecore