Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

601 Full-Text Articles 1248 Authors 142592 Downloads 52 Institutions

All Articles in Data Storage Systems

Faceted Search

601 full-text articles. Page 1 of 27.

Metadata For Describing Water Models, Mohamed M. Morsy, Jonathan L. Goodall, Christina Bandaragoda, Anthony M. Castronova, Jane Greenberg 2016 University of Virginia

Metadata For Describing Water Models, Mohamed M. Morsy, Jonathan L. Goodall, Christina Bandaragoda, Anthony M. Castronova, Jane Greenberg

Anthony Castronova

Computer models are widely used in hydrology and water resources management. A large variety of models exist, each tailored to address specific challenges related to hydrologic science and water resources management. When scientists and engineers apply one of these models to address a specific question, they must devote significant effort to set up, calibrate, and evaluate that model instance built for some place and time. In many cases, there is a benefit to sharing these computer models and associated datasets with the broader scientific community. Core to model reuse in any context is metadata describing the model. A standardized metadata ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang 2016 University of Nebraska-Lincoln

On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang

Computer Science and Engineering: Theses, Dissertations, and Student Research

Virtual Machine (VM) live storage migration is widely performed in the data cen- ters of the Cloud, for the purposes of load balance, reliability, availability, hardware maintenance and system upgrade. It entails moving all the state information of the VM being migrated, including memory state, network state and storage state, from one physical server to another within the same data center or across different data centers. To minimize its performance impact, this migration process is required to be transparent to applications running within the migrating VM, meaning that ap- plications will keep running inside the VM as if there were ...


Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael 2016 California Polytechnic State University, San Luis Obispo

Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael

Computer Engineering

No abstract provided.


Polyfs Visualizer, Paul Martin Fallon 2016 California Polytechnic State University, San Luis Obispo

Polyfs Visualizer, Paul Martin Fallon

Master's Theses and Project Reports

One of the most important operating system topics, file systems, control how we store and access data and form a key point in a computer scientists understanding of the underlying mechanisms of a computer. However, file systems, with their abstract concepts and lack of concrete learning aids, is a confusing subjects for students. Historically at Cal Poly, the CPE 453 Introduction to Operating Systems has been on of the most failed classes in the computing majors, leading to the need for better teaching and learning tools. Tools allowing students to gain concrete examples of abstract concepts could be used to ...


Energetic Behavior Of Resistive Random-Access Memory Cells, Christopher M. Bisbee 2016 Macalester College

Energetic Behavior Of Resistive Random-Access Memory Cells, Christopher M. Bisbee

Macalester Journal of Physics and Astronomy

In order to investigate the switching characteristics of Resistive Random Access Memory cells (ReRAM) in terms of their thermodynamic free energy properties, we need to build a number of models that replicate the system. This report contains the models used to investigate filament growth patterns based on different boundary conditions applied to the electrode-filament system. Using Comsol Multiphysics software, we determined that when a fixed voltage is applied to each electrode in the electrode-filament system, we should expect filament dissolution that resets our cells into the High Resistance State (HRS). If we instead fix a set amount of charge on ...


A Study Of Three Paradigms For Storing Geospatial Data: Distributed-Cloud Model, Relational Database, And Indexed Flat File, Matthew A. Toups 2016 University of New Orleans

A Study Of Three Paradigms For Storing Geospatial Data: Distributed-Cloud Model, Relational Database, And Indexed Flat File, Matthew A. Toups

University of New Orleans Theses and Dissertations

Geographic Information Systems (GIS) and related applications of geospatial data were once a small software niche; today nearly all Internet and mobile users utilize some sort of mapping or location-aware software. This widespread use reaches beyond mere consumption of geodata; projects like OpenStreetMap (OSM) represent a new source of geodata production, sometimes dubbed “Volunteered Geographic Information.” The volume of geodata produced and the user demand for geodata will surely continue to grow, so the storage and query techniques for geospatial data must evolve accordingly.

This thesis compares three paradigms for systems that manage vector data. Over the past few decades ...


Factors Affecting Big Data Technology Adoption, Nayem Rahman 2016 Portland State University

Factors Affecting Big Data Technology Adoption, Nayem Rahman

Student Research Symposium

With the advancement of computer science, hardware and software engineering, and computing power, and later with the advent of the internet, social networking tools and other sources such as sensors data growth has increased significantly. These data are called big data which are mostly unstructured, generated in large volumes, data need to be captured in near real-time. To handle big data a completely new set of tools and technologies are being emerged. I have studied big data literature to identify the factors that might influence big data adoption. I was able to list quite a few factors or attributes that ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki 2016 United Arab Emirates University

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is match with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


Ac Power Monitoring System Provides Individual Circuit Energy Consumption Data, Jared L. Newman, Grayson H. Dearing, Luke M. Tomlinson, Frederick G. Harmon 2016 Cedarville University

Ac Power Monitoring System Provides Individual Circuit Energy Consumption Data, Jared L. Newman, Grayson H. Dearing, Luke M. Tomlinson, Frederick G. Harmon

The Research and Scholarship Symposium

Motivated by high energy costs, people and organizations want to cut back on their energy consumption. However, the only feedback consumers typically receive is a monthly bill listing their total electricity usage (in kWh). Some companies have begun developing systems that allow households and organizations to monitor their energy usage for individual circuits. Available systems are expensive so a CU engineering senior design team has designed, fabricated, and tested a system for use at Cedarville University. The AC power monitoring system has the ability to measure energy consumption for each individual circuit in the breaker panel, store the data, and ...


No Repository Is An Island: Putting The Whoas Community Repository In A Geoscience Context, Audrey Mickle, Lisa Raymond 2016 Woods Hole Oceanographic Institution

No Repository Is An Island: Putting The Whoas Community Repository In A Geoscience Context, Audrey Mickle, Lisa Raymond

University of Massachusetts and New England Area Librarian e-Science Symposium

Description: The MBLWHOI Library is partner in the NSF-funded EarthCube building block, GeoLink, whose goal is to push the boundaries of semantic technology in cross-repository discovery within the geosciences field. GeoLink has created ontology design patterns that link together: the MBLWHOI Library’s Woods Hole Open Access Server (WHOAS); data repositories, including Rolling Deck to Repository (R2R), Biological and Chemical Oceanography Data Management Office (BCO-DMO), Integrated Earth Data Applications (IEDA), Long-Term Ecological Research Network (LTER), DataONE and the International Ocean Discovery Program (IODP); the National Science Foundation (NSF) funded awards; and American Geophysical Union (AGU) conference presentations. ­

Methods: The Library ...


An Integrated Framework For Patent Analysis And Mining, longhui zhang 2016 Florida International University

An Integrated Framework For Patent Analysis And Mining, Longhui Zhang

FIU Electronic Theses and Dissertations

Patent documents are important intellectual resources of protecting interests of individuals, organizations and companies. These patent documents have great research values, beneficial to the industry, business, law, and policy-making communities. Patent mining aims at assisting patent analysts in investigating, processing, and analyzing patent documents, which has attracted increasing interest in academia and industry. However, despite recent advances in patent mining, several critical issues in current patent mining systems have not been well explored in previous studies.

These issues include: 1) the query retrieval problem that assists patent analysts finding all relevant patent documents for a given patent application; 2) the ...


“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams 2016 Liberty University

“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams

Senior Honors Theses

Alan Turing asked if machines can think, but intelligence is more than logic and reason. I ask if a machine can feel pain or joy, have visions and dreams, or paint a masterpiece. The human brain sets the bar high, and despite our progress, artificial intelligence has a long way to go. Studying neurology from a software engineer’s perspective reveals numerous uncanny similarities between the functionality of the brain and that of a computer. If the brain is a biological computer, then it is the embodiment of artificial intelligence beyond anything we have yet achieved, and its architecture is ...


Storage Management Of Data-Intensive Computing Systems, Yiqi Xu 2016 Florida International University

Storage Management Of Data-Intensive Computing Systems, Yiqi Xu

FIU Electronic Theses and Dissertations

Computing systems are becoming increasingly data-intensive because of the explosion of data and the needs for processing the data, and storage management is critical to application performance in such data-intensive computing systems. However, existing resource management frameworks in these systems lack the support for storage management, which causes unpredictable performance degradations when applications are under I/O contention. Storage management of data-intensive systems is a challenging problem because I/O resources cannot be easily partitioned and distributed storage systems require scalable management. This dissertation presents the solutions to address these challenges for typical data-intensive systems including high-performance computing (HPC) systems ...


Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo 2016 Florida International University

Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo

FIU Electronic Theses and Dissertations

As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared VM storage systems becomes a serious issue. Client-side flash-based caching has the potential to improve the performance of cloud VM storage by employing flash storage available on the VM hosts to exploit the locality inherent in VM IOs. However, there are several challenges to the effective use of flash caching in cloud systems. First, cache configurations such as size, write policy, metadata persistency and RAID level have significant impacts on flash caching. Second, the typical capacity of flash devices is ...


Digital Commons powered by bepress