95 research outputs found
CLOUD-BASED MACHINE LEARNING AND SENTIMENT ANALYSIS
The role of a Data Scientist is becoming increasingly ubiquitous as companies and institutions see the need to gain additional insights and information from data to make better decisions to improve the quality-of-service delivery to customers. This thesis document contains three aspects of data science projects aimed at improving tools and techniques used in analyzing and evaluating data. The first research study involved the use of a standard cybersecurity dataset and cloud-based auto-machine learning algorithms were applied to detect vulnerabilities in the network traffic data. The performance of the algorithms was measured and compared using standard evaluation metrics. The second research study involved the use of text-mining social media, specifically Reddit. We mined up to 100,000 comments in multiple subreddits and tested for hate speech via a custom designed version of the Python Vader sentiment analysis package. Our work integrated standard sentiment analysis with Hatebase.org and we demonstrate our new method can better detect hate speech in social media. Following sentiment analysis and hate speech detection, in the third research project, we applied statistical techniques in evaluating the significant difference in text analytics, specifically the sentiment-categories for both lexicon-based software and cloud-based tools. We compared the three big cloud providers, AWS, Azure, and GCP with the standard python Vader sentiment analysis library. We utilized statistical analysis to determine a significant difference between the cloud platforms utilized as well as Vader and demonstrated that each platform is unique in its analysis scoring mechanism
Information Technology in Africa: An Exploratory Analysis
This article investigates the competitive landscape enhanced by the outburst of the information technology [IT] and addresses its impact on businesses in Africa. Also, the article identifies problems encountered in Africa and discusses their systematic characteristic and impact on businesses. In sum, the analysis offers some recommendations for solving each problem
Recommended from our members
XML: GATEWAY FOR DATA MOBILITY AND UNIVERSAL CONNECTIVITY
Extensible Markup Language (XML) started as an effort to simplify the standard Generalized Markup Language (SGML), which was the International Organization for Standardization’s (ISO) standard for defining data vocabularies. This study investigates XML technology as a substitute to SGML that would be Web friendly, and easy to learn and use while supporting a variety of applications for faster and more efficient data mobility on the Web. It describes several compelling reasons why XML is a useful technology for representing structured data mobility. XML is a markup language used for data structure in a textual form. A specific goal of XML is to keep most of the descriptive power of SGML, while removing as much of the complexity as possible. This article includes an overview of XML and its specifications and corresponding components, development of schemas for defining industry standards data definitions, potential problematic impact on information systems and recommended solutions for developers and practitioners
Recommended from our members
Scalability, Interoperability and Movement of Data on the Web Using XML Technology
Today\u27s economy pulses with electronic vibrancy, extensible Markup Language (XML) has prompted individuals and organizations to discover new and creative ways of enhancing existing technologies and creating new ones. This study investigates emerging XML-related technologies that cover abroad range of industries and their organizational systems. XML provides access to a plethora of technologies for manipulating, structuring, transforming and querying data
Recommended from our members
Connectivity via Web Services: An Analysis for Interoperable E-Commerce.
The Web Services platform depicts a systematic, inter operable, and messaging infrastructure on which enterprise systems build sophisticated and dynamic applications for data mobility on the web. This article examine how scalability and interoperability of data using Web Services can promises a dramatic progression for both the technological and the business aspects of ecommerce
Recommended from our members
Ethical Framework for the IT and Business Professions
Within an information technology (IT) environment, managerial and organizational influences may affect individual’s ethical behavior. Understanding the individual difference in value systems, locus of control, Machiavellianism, and cognitive moral development, helps the IT managers to appreciate the reasons for individuals working within and outside the IT environment aware of the ethical behavior. This paper evaluates applicability of Kohlberg\u27s framework on moral theory that focuses solely on justice-orientated moral approach in the IT profession. Results of semi-structured interviews with two IT managers suggest that the framework lacks flexibility, and needs to incorporate a caring perspective (referring to the content) and a cognitive-structural perspective (referring to the basic assumptions of the model). The caring, concerns, integrity and accountability concepts are important values of the cognitive aspect, the profession and individual professionals in the real world. The finding adds our understandings on the IT professions and societal norms
Recommended from our members
Enterprise Systems Network: SecurID Solutions, the Authentication to Global Security Systems
Enterprise systems need reliable, flexible and secure means for making public and confidential information available to users in a secured and trusted manner. Although enterprise systems have variety of choice to authenticate these users, organizations face significant issues when granting access and providing a manageable structure for valuable access control. Logon functionalities such as user name and password algorithm have been used to grant authentication and authorization into enterprise systems network resources. Since most systems clients prefer the ease of using passwords, and since passwords are easily compromised, the urgency for a stronger authentication process becomes paramount. This study performed an internal evaluation of enterprise systems such as rating the effectiveness of a security platform as well as an external evaluation; i.e., analyzing how a security system is been rated by external entities. The study will examine correlations between system security best practices and reported or observed outcomes. The study concluded by evaluating the use of added protective layers to the two or multi-factor authentication security system
Recommended from our members
Bioinetric and Systems Security: An Overview of End-To-End Security System
As online security threats continue to spread, protecting valuable data becomes one of the security challenges businesses face in today\u27s business-to-customer (B2C) and business-to-business (B2B) ecommerce. Biometrics technology shows increased promise in enterprise network security. It will play a vital role as system developers fortify the security apparatus of its organization. In this paper, we analyze biometrics technologies and describe techniques that can be utilized to decrease the probabilities of online attacks
Recommended from our members
Effect of Virtualization on Enterprise Network, Server/Desktop Systems on Small and Mid-Size Businesses (SMB)
Enterprise small and mid-size businesses (SMB) are embracing virtualization because of the need to reduce risks associated to IT outages and data loss. Most of these establishments have loss critical enterprise data due to systems failures, accidents or natural causes. Virtualization platforms increase application availability which can shorten disaster recovery time and improve SMBs business continuity preparedness. This study will explore these benefits to find critical issues that can enable SMBs to maintain competiveness by utilizing less to do more
Recommended from our members
Enterprise Integrated Security Platform: A Comparison of Remote Access And Extranet Virtual Private Networks
The Internet has created unprecedented opportunities for both organizations and individuals. However, these opportunities also have created a double-edge sword as organizations attempt to connect trading partners, customers, and remote users while providing adequate security measures that are flexible and cost-effective. This paper explores why secured socket layer (SSL) may be better tool for secured remote access and extranets by comparing it to internet protocol security virtual private networks (IPSec-based VPNs)
- …