Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,057 Full-Text Articles 2,783 Authors 207,240 Downloads 80 Institutions

All Articles in Data Storage Systems

Faceted Search

1,057 full-text articles. Page 1 of 50.

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater 2019 Southern Methodist University

Improving Vix Futures Forecasts Using Machine Learning Methods, James Hosker, Slobodan Djurdjevic, Hieu Nguyen, Robert Slater

SMU Data Science Review

The problem of forecasting market volatility is a difficult task for most fund managers. Volatility forecasts are used for risk management, alpha (risk) trading, and the reduction of trading friction. Improving the forecasts of future market volatility assists fund managers in adding or reducing risk in their portfolios as well as in increasing hedges to protect their portfolios in anticipation of a market sell-off event. Our analysis compares three existing financial models that forecast future market volatility using the Chicago Board Options Exchange Volatility Index (VIX) to six machine/deep learning supervised regression methods. This analysis determines which models provide ...


Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. McCollum, Mary-Margaret Chantre, Gregory Campbell 2019 Capitol Technology University

Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell

International Journal of Applied Management and Technology

Agencies from various disciplines supporting law enforcement functions and processes have integrated, shared, and communicated data through ad hoc methods to address crime, terrorism, and many other threats in the United States. Data integration in law enforcement plays a critical role in the technical, business, and intelligence processes created by users to combine data from various sources and domains to transform them into valuable information. The purpose of this qualitative phenomenological study was to explore the current conditions of data integration frameworks through user and system interactions among law enforcement organizational processes. Further exploration of critical success factors used to ...


Behind Emammal’S Success: A Data Curator With A Data Standard, Jennifer Y. Zhao, William J. McShea 2018 Smithsonian Institution

Behind Emammal’S Success: A Data Curator With A Data Standard, Jennifer Y. Zhao, William J. Mcshea

Journal of eScience Librarianship

This paper explores the data challenges of a major collection method in the field of ecology: using infrared-activated cameras to detect wildlife. One such solution, eMammal, is now available to address these struggles. We delineate the key reason behind its success: a data curator who manages an established data standard and communicates with eMammal’s users and stakeholders. We outline the tasks of this data curator, mention how they can work with data librarians, and demonstrate that the data curator position is already applicable in several biological science fields with a few examples. We end by emphasizing the growth of ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali 2018 The University of Western Ontario

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla 2018 California State University, San Bernardino

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He 2018 Fairfield University

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti 2018 San Francisco State University

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The ...


Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr. 2018 Iowa State University

Seasonal Warranty Prediction Based On Recurrent Event Data, Qianqian Shan, Yili Hong, William Q. Meeker Jr.

Statistics Preprints

Warranty return data from repairable systems, such as vehicles, usually result in recurrent event data. The non-homogeneous Poisson process (NHPP) model is used widely to describe such data. Seasonality in the repair frequencies and other variabilities, however, complicate the modeling of recurrent event data. Not much work has been done to address the seasonality, and this paper provides a general approach for the application of NHPP models with dynamic covariates to predict seasonal warranty returns. A hierarchical clustering method is used to stratify the population into groups that are more homogeneous than the than the overall population. The stratification facilitates ...


Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh 2018 Purdue University

Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh

Purdue Journal of Service-Learning and International Engagement

Deegan Atha, a graduating senior in electrical engineering and a future engineer, is interested in human-centered design and developing technology that helps students engage and be successful in STEM.

Courtney Balogh, a junior in mechanical engineering, is interested in human-centered design and the importance it plays in product development. Deegan and Courtney are members of the Purdue EPICS project, Learning Equations Across Platforms (LEAP). They partnered with the Indiana School for the Blind and Visually Impaired (ISBVI) to develop a braille transcription device and web application that converts braille to print in real time.


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto 2018 University of York

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Anthropology Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin CAO, Chenyu HOU, Suifei LI, Jing FAN, Jianwei YIN, Baihua ZHENG, Jie BAO 2018 Singapore Management University

Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao

Research Collection School Of Information Systems

Nowadays, many location-based applications require the ability of querying k-nearest neighbors over a very large scale of5 moving objects in road networks, e.g., taxi-calling and ride-sharing services. Traditional grid index with equal-sized cells can not adapt6 to the skewed distribution of moving objects in real scenarios. Thus, to obtain the fast querying response time, the grid needs to be split7 into more smaller cells which introduces the side-effect of higher memory cost, i.e., maintaining such a large volume of cells requires a8 much larger memory space at the server side. In this paper, we present SIMkNN, a scalable ...


Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie Wissel, Lisa DeLuca 2018 Seton Hall University

Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie Wissel, Lisa Deluca

Lisa DeLuca, MLIS, MPA

No abstract provided.


Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui ZHANG, Robert H. DENG, Ximeng LIU, Dong ZHENG 2018 Singapore Management University

Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng

Research Collection School Of Information Systems

As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the ...


Exact Processing Of Uncertain Top-K Queries In Multi-Criteria Settings, Kyriakos MOURATIDIS, Bo TANG 2018 Singapore Management University

Exact Processing Of Uncertain Top-K Queries In Multi-Criteria Settings, Kyriakos Mouratidis, Bo Tang

Research Collection School Of Information Systems

Traditional rank-aware processing assumes a dataset that contains available options to cover a specific need (e.g., restaurants, hotels, etc) and users who browse that dataset via top-k queries with linear scoring functions, i.e., by ranking the options according to the weighted sum of their attributes, for a set of given weights. In practice, however, user preferences (weights) may only be estimated with bounded accuracy, or may be inherently uncertain due to the inability of a human user to specify exact weight values with absolute accuracy. Motivated by this, we introduce the uncertain top-k query (UTK). Given uncertain preferences ...


Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian McManus, Terry W. Fenger 2018 Marshall University

Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian Mcmanus, Terry W. Fenger

Journal of Applied Digital Evidence

The analysis of mobile devices and hard drives has been the focus of the digital forensics world for years, but there is another source of potential evidence not often considered: vehicles. Many of today’s “connected cars” have systems that function like computers, storing information they process including user data from devices synced to the system. There has been little to no research done regarding what types of user artifacts can be found on the system, how long these artifacts remain, whether or not the user can remove those artifacts, and whether certain systems provide more information than others. For ...


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin LIU, Jinshu SU, Rongmao CHEN, Ximeng LIU, Xiaofeng WANG, Shuhui CHEN, Ho-fung Fung LEUNG 2018 Singapore Management University

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are ...


Investigating On Through Glass Via Based Rf Passives For 3-D Integration, Libo Qian, Jifei Sang, Yinshui Xia, Jian Wang, Peiyi Zhao 2018 Ningbo University

Investigating On Through Glass Via Based Rf Passives For 3-D Integration, Libo Qian, Jifei Sang, Yinshui Xia, Jian Wang, Peiyi Zhao

Mathematics, Physics, and Computer Science Faculty Articles and Research

Due to low dielectric loss and low cost, glass is developed as a promising material for advanced interposers in 2.5-D and 3-D integration. In this paper, through glass vias (TGVs) are used to implement inductors for minimal footprint and large quality factor. Based on the proposed physical structure, the impact of various process and design parameters on the electrical characteristics of TGV inductors is investigated with 3-D electromagnetic simulator HFSS. It is observed that TGV inductors have identical inductance and larger quality factor in comparison with their through silicon via counterparts. Using TGV inductors and parallel plate capacitors, a ...


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Genetic Algorithm Amplifier Biasing System (Gaabs): Genetic Algorithm For Biasing On Differential Analog Amplifiers, Sean Whalen 2018 California Polytechnic State University, San Luis Obispo

Genetic Algorithm Amplifier Biasing System (Gaabs): Genetic Algorithm For Biasing On Differential Analog Amplifiers, Sean Whalen

Computer Engineering

Genetic Algorithm Amplifier Biasing System (GAABS) - Senior Project Analysis

Summary of Functional Requirements

This project integrates LTSpice with a python script that runs a genetic algorithm to bias a differential amplifier. The system biases the amplifier with 2 different voltages, the base voltage for the PNP BJTs of the active loads and a voltage controlling the current of the current sink. The project runs via a python script, gets data from LTSpice’s command line call, and iteratively runs until the system is biased to achieve the greatest gain on an arbitrary input voltage.

Primary Constraints

Some of the main ...


Digital Commons powered by bepress