Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,472 Full-Text Articles 3,577 Authors 531,511 Downloads 119 Institutions

All Articles in Data Storage Systems

Faceted Search

1,472 full-text articles. Page 1 of 69.

Optimizing Resume Authenticity And Ats Compatibility With Llm Feedback Integration, Katie He, Justin Lau 2024 California Polytechnic State University, San Luis Obispo

Optimizing Resume Authenticity And Ats Compatibility With Llm Feedback Integration, Katie He, Justin Lau

College of Engineering Summer Undergraduate Research Program

Resume generation using Large Language Models (LLMs) like ChatGPT is becoming increasingly popular for automating the creation of customized resumes, but significant user modification is often required before submission. Common issues include poor alignment with job descriptions, inflated qualifications, and lack of authenticity, which undermine the effectiveness of LLM-generated resumes. This project addresses these challenges by integrating feedback from Applicant Tracking Systems (ATS) to guide LLMs in producing resumes that accurately reflect an applicant’s qualifications and better align with job-specific requirements. By optimizing the model's output through ATS feedback, the project aims to create more authentic, tailored, and ATS-compatible resumes, …


Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda 2024 California State University, San Bernardino

Crime Data Prediction Based On Geographical Location Using Machine Learning, Sai Bharath Yarlagadda

Electronic Theses, Projects, and Dissertations

This project employs machine learning methods like K Nearest Neighbors (KNN), Random Forest, Logistic Regression, and Decision Tree algorithms to monitor crime data based on location and pinpoint areas with risks. The project implements and tunes the four models to improve the precision of predicting crime levels. These models collaborate to offer a trustworthy evaluation of crime patterns. K Nearest Neighbors (KNN) categorizes locations by examining the proximity of data points considering coordinates and other factors to identify trends linked to increased crime data. Logistic Regression gauges the likelihood of crime incidents by studying the connection, between factors (like location …


Enterprise Systems: Installing And Configuring Erpnext On Macos, Yazan Abbasi 2024 Liberty University

Enterprise Systems: Installing And Configuring Erpnext On Macos, Yazan Abbasi

Senior Honors Theses

Enterprise Resource Planning (ERP) systems integrate business processes across organizations onto unified digital platforms through data and workflow consolidation. However, high licensing costs of proprietary ERP solutions like SAP and Oracle limit adoption for small and medium enterprises. This led to the emergence of open-source ERP alternatives like ERPNext which provide sophisticated capabilities at much lower total cost of ownership. However, ERPNext faces documentation gaps that hamper onboarding, customization, and widespread adoption. Accelerating ERPNext implementation by developing a comprehensive installation and configuration guide tailored for developers using Mac environments will be examined furthermore.

The background on ERP systems explores critical …


Welcome To Cheney App, Timothy Nelson, Nolan Posey, Tanner Stephenson, Daniel Palmer, Matthew Matriciano 2024 Eastern Washington University

Welcome To Cheney App, Timothy Nelson, Nolan Posey, Tanner Stephenson, Daniel Palmer, Matthew Matriciano

2024 Symposium

Welcome to Cheney is a non-profit organization committed to fostering communication, connection, and action within the city of Cheney. Their primary purpose is to provide timely and accurate information to the residents of Cheney. Welcome to Cheney has tried utilizing other forms of social media such as Facebook and Instagram to share information, but their presence is being overshadowed amidst the noise on those platforms. Therefore, the intention of this project is to develop a mobile app with the sole purpose of being a reliable means of sharing important information with the residents of Cheney.

The information being shared on …


Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud bahloul 2024 Future University in Egypt, Egypt

Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul

Future Computing and Informatics Journal

Researchers are motivated to use artificial intelligence in biometrics, medical imaging encryption, as well as cybersecurity due to its rapid progress. An encryption method for CT scans—which are used to diagnose COVID-19 disease—is proposed in this study. The suggested encryption method creates a connection among an individual's face picture and CT image to increase confidentiality. The simple CT picture is first enhanced with a host image. An encryption key is multiplied by the final result. This key is produced by applying a Convolutional Neural Network (CNN) to recognize characteristics from people's face photographs. Additionally, a straightforward CNN with three convolutional …


Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa WALEED, Liznerski PHILIPP, Antoine LEDENT, Wagner DENNIS, Wang PUYU, Kloft MARIUS 2024 Singapore Management University

Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa Waleed, Liznerski Philipp, Antoine Ledent, Wagner Dennis, Wang Puyu, Kloft Marius

Research Collection School Of Computing and Information Systems

Adversarial examples are manipulated samples used to deceive machine learning models, posing a serious threat in safety-critical applications. Existing safety certificates for machine learning models are limited to individual input examples, failing to capture generalization to unseen data. To address this limitation, we propose novel generalization bounds based on the PAC-Bayesian and randomized smoothing frameworks, providing certificates that predict the model’s performance and robustness on unseen test samples based solely on the training data. We present an effective procedure to train and compute the first non-vacuous generalization bounds for neural networks in adversarial settings. Experimental results on the widely recognized …


Analysis Of Cnn Performance Utilizing Jpeg Compressed Images Created On An Fpga, Timothy Shaughnessy 2024 Clemson University

Analysis Of Cnn Performance Utilizing Jpeg Compressed Images Created On An Fpga, Timothy Shaughnessy

All Theses

JPEG (Joint Photographic Experts Group) was formed in 1986 to create a method to reduce image size primarily for ease of transfer on the Internet. Released to the public in 1992, JPEG compression is a form of lossless compression that has been a staple for compressing images. JPEG is the go-to image compressor because it provides high compression ratios while maintaining visual integrity for the human eye. Growing image sizes have made JPEG compression increasingly relevant. It is vital to keep up with growing data sizes for improved image handling performance on an edge device like a Field-Programmable Gate Array …


Analyzing An In-Line Compression Management System For Improved Performance In A High-Performance Computing Environment, Steven Platt 2024 Clemson University

Analyzing An In-Line Compression Management System For Improved Performance In A High-Performance Computing Environment, Steven Platt

All Theses

High-performance computing (HPC) has enabled advancements in computation speed and resource cost by utilizing all available server resources and using parallelization for speedup. This computation scheme encourages simulation model development, massive data collection, and AI computation models, all of which store and compute on massive amounts of data. Data compression has enhanced the performance of storing and transferring this HPC application data to enable acceleration, but the benefits of data compression can also be transferred to the active allocated memory used by the application. In-line compression is a compression method that keeps the application memory compressed in allocated memory, decompressing …


Orms And Database Design, Kalim Dumas 2024 University of Nebraska-Lincoln

Orms And Database Design, Kalim Dumas

Honors Theses

This thesis explores the relationship between database design and Object-Relational Mapping (ORM) design, investigating how they have evolved together and influenced each other. It addresses a theoretical discussion, a practical implementation, and some observations regarding integrating an ORM into my Senior Design project. My Senior Design project was originally built without the intention of implementing an ORM.

There are a lot of complicated discrepancies between Relational Databases (RDBs) and Object-Oriented Programming Languages (OOPLs), called the Impedance Mismatch Problem. The fact that they are both foundational pillars in software engineering means that one cannot simply change to match the other. ORMs …


Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt 2024 Centre for Tourism and Leisure Research- Dalarna University

Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt

GSTC Academic Symposium - In conjunction with the GSTC Global Conference Sweden April 23, 2024

Planning for sustainable mobility and destination development in rural areas is increasingly important when tourism grows in numbers. A key to address the challenge of transformation and adaptation of local communities to mitigate adverse effects in seasonal peak hours like traffic congestion, power failure, waste management and sewage flooding, is to properly estimate the number of visitors to a destination.

The problem of estimating tourism numbers is a known challenge since, for example, guest nights statistics are in-complete and non-commercial lodging (sharing solutions) are increasing. Recently, the promising utilization of mobile phone data has emerged as a means to estimate …


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka 2024 William & Mary

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson 2024 Old Dominion University

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb 2024 Lecturers at Department of Computer Sciences Yarmouk University Irbid, Jordan

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan 2024 Northern Kentucky University

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


Mechanism Design For Optimizing On-Chain Sell Order In Market Without Market Maker, Nico Pei 2024 Claremont Colleges

Mechanism Design For Optimizing On-Chain Sell Order In Market Without Market Maker, Nico Pei

CMC Senior Theses

The absence of market makers alters the microstructure of the market. It’s difficult to get exposed to time-weighted prices in markets without market makers. In this paper, we delve into three mechanism designs – discrete gradual dutch auction, continuous gradual dutch auction, and variable rate gradual dutch auction – to study how to execute time-weighted sell orders on blockchain in a market without market makers. To make it simpler for readers to understand, we imagine an example of helping a close friend of Picasso to sell his 100 Picasso paintings in the next 10 years since 1970, with the private …


Managing Inventory With A Database, David Bartlett 2024 The University of Akron

Managing Inventory With A Database, David Bartlett

Williams Honors College, Honors Research Projects

Large commercial companies often use warehouses to store and organize their product inventory. However, manually keeping track of inventory through physical means can be a tedious process and is at risk for a variety of potential issues. It is very easy for records to be inaccurate or duplicated, especially if large reorganizations are undertaken, as this can cause issues such as duplicate product ID numbers. Therefore, it was decided that an inventory management system utilizing a SQL database should be created. The system needed to have capabilities including allowing the entry of product information, the ability to search database records …


Securing Internet Of Things (Iot) Data Storage, Savannah Malo 2024 University of New Hampshire, Durham

Securing Internet Of Things (Iot) Data Storage, Savannah Malo

Honors Theses and Capstones

Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin 2024 Pace University - New York

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar 2024 HU University of Applied Sciences Utrecht

What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar

Journal of International Technology and Information Management

This paper describes the approach and lessons learned from a co-creation process with Dutch development NGOs to create a practical and easy-to-use assessment tool for practitioners to assess the organisation's maturity level of digital transformation. For this study, we applied a design science research methodology, specifically a six-step co-creation approach suitable for developing maturity models. The digital maturity assessment tool (quick scan) created is a domain- specific digital transformation maturity tool for development NGOs rather than a generally applicable tool. This artefact was evaluated using an eight-point Requirements framework for the development of digital maturity assessment tools. By developing a …


Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa 2024 University of Salford

Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa

Journal of International Technology and Information Management

Developing quality agile healthcare information systems requires understanding regulatory compliance and evolving healthcare needs through activities tailored within agile scrum roles. Agile scrum, a widely adopted philosophy, offers significant advantages in managing software development processes. This research explores how activities within the agile scrum roles are tailored to agile healthcare information systems development within the Nigerian context. This study adopted a qualitative case study methodology and interviewed 12 agile practitioners developing healthcare information systems within Nigeria using semi-structured open-ended interview guide questions. The practitioners were selected based on a snowballing process, a sunset of purposive sampling techniques from our network …


Digital Commons powered by bepress