Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,462 Full-Text Articles 3,565 Authors 460,469 Downloads 119 Institutions

All Articles in Data Storage Systems

Faceted Search

1,462 full-text articles. Page 5 of 69.

Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan 2022 University of Arkansas, Fayetteville

Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan

Graduate Theses and Dissertations

Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …


Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn 2022 Southern Adventist University

Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn

Campus Research Day

One of the primary challenges instructors face when educating scientists and engineers is the introduction of important theory, both to show its essential nature in research as well as its practicality. This paper analyzes two pedagogical methods for the instruction of database normal forms. The first of these methods is a theory-based approach that relies on written works and practices to introduce the concept. The second of these focuses on a project-based approach which aligns with normal form standards as students implement a database schema. This paper compares these in a small study and advises an appropriate method for educators.


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu 2022 Old Dominion University

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …


Pre-Training Graph Neural Networks For Link Prediction In Biomedical Networks, Yahui LONG, Min WU, Yong LIU, Yuan FANG, Chee Kong KWOH, Jiawei LUO, Xiaoli LI 2022 Singapore Management University

Pre-Training Graph Neural Networks For Link Prediction In Biomedical Networks, Yahui Long, Min Wu, Yong Liu, Yuan Fang, Chee Kong Kwoh, Jiawei Luo, Xiaoli Li

Research Collection School Of Computing and Information Systems

Motivation: Graphs or networks are widely utilized to model the interactions between different entities (e.g., proteins, drugs, etc) for biomedical applications. Predicting potential links in biomedical networks is important for understanding the pathological mechanisms of various complex human diseases, as well as screening compound targets for drug discovery. Graph neural networks (GNNs) have been designed for link prediction in various biomedical networks, which rely on the node features extracted from different data sources, e.g., sequence, structure and network data. However, it is challenging to effectively integrate these data sources and automatically extract features for different link prediction tasks. Results: In …


Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack In Cloud Storage, Yinbin MIAO, Robert H. DENG, Kim-Kwang Raymond CHOO, Ximeng LIU, Hongwei LI 2022 Xidian University

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack In Cloud Storage, Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li

Research Collection School Of Computing and Information Systems

Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency and security, but most of them are still susceptible to insider Keyword-Guessing Attacks (KGA), which implies that the internal attackers can guess the candidate keywords successfully in an off-line manner. Also in existing SE solutions, a semi-honest-but-curious cloud server may deliver incorrect search results by performing only a fraction of retrieval operations honestly (e.g., to save storage space). To address these two challenging issues, we first construct the basic Verifiable SE Framework (VSEF), which can withstand …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D 2022 University of Nebraska - Lincoln

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Batchlens: A Visualization Approach For Analyzing Batch Jobs In Cloud Systems, Shaolun RUAN, Yong WANG, Hailong JIANG, Weijia XU, Qiang. GUAN 2022 Singapore Management University

Batchlens: A Visualization Approach For Analyzing Batch Jobs In Cloud Systems, Shaolun Ruan, Yong Wang, Hailong Jiang, Weijia Xu, Qiang. Guan

Research Collection School Of Computing and Information Systems

Cloud systems are becoming increasingly powerful and complex. It is highly challenging to identify anomalous execution behaviors and pinpoint problems by examining the overwhelming intermediate results/states in complex application workflows. Domain scientists urgently need a friendly and functional interface to understand the quality of the computing services and the performance of their applications in real time. To meet these needs, we explore data generated by job schedulers and investigate general performance metrics (e.g., utilization of CPU, memory and disk I/O). Specifically, we propose an interactive visual analytics approach, BatchLens, to provide both providers and users of cloud service with an …


Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics, Lei ZHOU, Anmin FU, Guomin YANG, Huaqun WANG, Yuqing ZHANG 2022 Singapore Management University

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics, Lei Zhou, Anmin Fu, Guomin Yang, Huaqun Wang, Yuqing Zhang

Research Collection School Of Computing and Information Systems

To improve data availability and durability, cloud users would like to store multiple copies of their original files at servers. The multi-copy auditing technique is proposed to provide users with the assurance that multiple copies are actually stored in the cloud. However, most multi-replica solutions rely on Public Key Infrastructure (PKI), which entails massive overhead of certificate computation and management. In this article, we propose an efficient multi-copy dynamic integrity auditing scheme by employing certificateless signatures (named MDSS), which gets rid of expensive certificate management overhead and avoids the key escrow problem in identity-based signatures. Specifically, we improve the classic …


Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun 2022 San Jose State University

Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun

Faculty Research, Scholarly, and Creative Activity

The analytics in online performance monitoring systems have often been limited due to the query performance of large scale multidimensional data. In this paper, we introduce a faster query approach using the bit-sliced index (BSI). Our study covers multidimensional grouping and preference top-k queries with the BSI, algorithms design, time complexity evaluation, and the query time comparison on a real-time production performance monitoring system. Our research work extended the BSI algorithms to cover attributes filtering and multidimensional grouping. We evaluated the query time with the single attribute, multiple attributes, feature filtering, and multidimensional grouping. To compare with the existing prior …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel 2022 CUNY New York City College of Technology

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink 2022 University of Glasgow

Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink

Department of Anthropology: Faculty Publications

Most contemporary 3D data used in archaeological research and heritage management have been created through ‘reality capture,’ the recording of the physical features of extant archaeological objects, structures, and landscapes using technologies such as laser scanning and photogrammetry (Garstki 2020, ch.2; Magnani et al. 2020). A smaller quantity of data are generated by Computer Aided Design (CAD) and Building Information Modeling (BIM) projects, and even fewer data are generated through procedural modeling, the rapid prototyping of multi-component threedimensional (3D) models from a set of rules (Figure 8.1.). It is unsurprising therefore that in archaeology and heritage, efforts around digital 3D …


Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu 2022 Old Dominion University

Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu

Electrical & Computer Engineering Faculty Publications

Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …


Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku 2022 The University of Akron

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku

Williams Honors College, Honors Research Projects

Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya 2022 The Institute of Finance Management

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter 2022 Bard College

Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter

Senior Projects Spring 2022

Senior Project submitted to The Division of Social Studies of Bard College.


E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. McMurtrey Ph.D., Michael E. Ellis 2022 University of Central Arkansas

E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis

Journal of International Technology and Information Management

Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion 2022 Penn State Dickinson Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Towards Cloud-Based Cost-Effective Serverless Information System, Isaac C. Angle 2022 Eastern Washington University

Towards Cloud-Based Cost-Effective Serverless Information System, Isaac C. Angle

EWU Masters Thesis Collection

E-commerce information systems are becoming increasingly popular for businesses to adopt. In this work, we propose a serverless information system that will reduce costs for small businesses trying to create an e-commerce website. The proposed serverless system is built entirely in Amazon Web Services (AWS). The proposed serverless system allows businesses to pay for the use of cloud resources on a per-order granularity. This model reduces the cost of the information system when compared to a traditional cloud-based system. As e-commerce websites become more vital for small businesses, a cost effective serverless approach is promising.


Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn 2022 The University of Akron

Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn

Williams Honors College, Honors Research Projects

Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …


Digital Commons powered by bepress