Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,465 Full-Text Articles 3,568 Authors 520,855 Downloads 119 Institutions

All Articles in Data Storage Systems

Faceted Search

1,465 full-text articles. Page 7 of 69.

Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin WU, Xuan WANG, Willy SUSILO, Guomin YANG, Zoe L. JIANG, Qian CHEN, Peng XU 2021 Singapore Management University

Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu

Research Collection School Of Computing and Information Systems

With the ubiquity of mobile devices and rapid development of cloud computing, mobile cloud computing (MCC) has been considered as an essential computation setting to support complicated, scalable and flexible mobile applications by overcoming the physical limitations of mobile devices with the aid of cloud. In the MCC setting, since many mobile applications (e.g., map apps) interacting with cloud server and application server need to perform computation with the private data of users, it is important to realize secure computation for MCC. In this article, we propose an efficient server-aided secure two-party computation (2PC) protocol for MCC. This is the …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S 2021 PSN College of Engineering & Technology

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Which Variables Should I Log?, Zhongxin LIU, Xin XIA, David LO, Zhenchang XING, Ahmed E. HASSAN, Shanping LI 2021 Zhejiang University

Which Variables Should I Log?, Zhongxin Liu, Xin Xia, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li

Research Collection School Of Computing and Information Systems

Developers usually depend on inserting logging statements into the source code to collect system runtime information. Such logged information is valuable for software maintenance. A logging statement usually prints one or more variables to record vital system status. However, due to the lack of rigorous logging guidance and the requirement of domain-specific knowledge, it is not easy for developers to make proper decisions about which variables to log. To address this need, in this work, we propose an approach to recommend logging variables for developers during development by learning from existing logging statements. Different from other prediction tasks in software …


Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, Hakimjon Nasiridinovich Zaynidinov, Orif Kudratovich Makhmanov, Feruz Mukhammadjon ogli Latifov, Djamshid Bakhodirovich Sultanov 2021 doctor of technical sciences, professor of the department “Information Technologies” at Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Address: 108 Amir Temur st., 100084, Tashkent city, Republic of Uzbekistan, E-mail: tet2001@rambler.ru;

Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, Hakimjon Nasiridinovich Zaynidinov, Orif Kudratovich Makhmanov, Feruz Mukhammadjon Ogli Latifov, Djamshid Bakhodirovich Sultanov

Chemical Technology, Control and Management

In our country, comprehensive systemic measures are being taken to develop the digital economy and improve the widespread introduction of modern information and communication technologies in all sectors and industries, including education and science. This strategy requires improving the quality and efficiency of the system of training and attestation of highly qualified scientific and scientific-pedagogical personnel, further development of the industry through digitalization and adaptation to advanced world practice. This paper presents models and descriptions of scenarios for the use of "Complex-analytical information system of scientific degrees" developed for the exchange of electronic documents and the digitization of their attestation …


Multilateration Index., Chip Lynch 2021 University of Louisville

Multilateration Index., Chip Lynch

Electronic Theses and Dissertations

We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …


Context-Aware Outstanding Fact Mining From Knowledge Graphs, Yueji YANG, Yuchen LI, Panagiotis KARRAS, Anthony TUNG 2021 Singapore Management University

Context-Aware Outstanding Fact Mining From Knowledge Graphs, Yueji Yang, Yuchen Li, Panagiotis Karras, Anthony Tung

Research Collection School Of Computing and Information Systems

An Outstanding Fact (OF) is an attribute that makes a target entity stand out from its peers. The mining of OFs has important applications, especially in Computational Journalism, such as news promotion, fact-checking, and news story finding. However, existing approaches to OF mining: (i) disregard the context in which the target entity appears, hence may report facts irrelevant to that context; and (ii) require relational data, which are often unavailable or incomplete in many application domains. In this paper, we introduce the novel problem of mining Contextaware Outstanding Facts (COFs) for a target entity under a given context specified by …


Thunderrw: An In-Memory Graph Random Walk Engine, Shixuan SUN, Yuhang CHEN, Shengliang LU, Bingsheng HE, Yuchen LI 2021 Singapore Management University

Thunderrw: An In-Memory Graph Random Walk Engine, Shixuan Sun, Yuhang Chen, Shengliang Lu, Bingsheng He, Yuchen Li

Research Collection School Of Computing and Information Systems

As random walk is a powerful tool in many graph processing, mining and learning applications, this paper proposes an efficient inmemory random walk engine named ThunderRW. Compared with existing parallel systems on improving the performance of a single graph operation, ThunderRW supports massive parallel random walks. The core design of ThunderRW is motivated by our profiling results: common RW algorithms have as high as 73.1% CPU pipeline slots stalled due to irregular memory access, which suffers significantly more memory stalls than the conventional graph workloads such as BFS and SSSP. To improve the memory efficiency, we first design a generic …


A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa AMM, yehia M. Helmy YMH, Amira M. Idrees AMI 2021 Business Information Systems, Faculty of Commerce and Business Administration, Helwan University, Egypt

A Configurable Mining Approach For Learning Services Customization, Aya M. Mostafa Amm, Yehia M. Helmy Ymh, Amira M. Idrees Ami

Future Computing and Informatics Journal

There is no doubt that this age is the age of data and technology. Moreover, there is tremendous development in all fields. The personalized material is a good approach in the different fields. It provides a fit material that matches the styles of readers. It supports readers in various reading domains. This research paper aims to support students in the educational system. Additionally, the research paper designs to increase education values for students. Furthermore, the research paper builds the smart appropriate materials through Egyptian Knowledge Banking (EKB) based on the learner question. The Egyptian Knowledge Bank (EKB) is a rich …


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban 2021 October 6 University

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …


Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao 2021 University of Arkansas, Fayetteville

Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao

Graduate Theses and Dissertations

Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.

Cloud computing has become more and more popular in …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. McIntyre 2021 California Polytechnic State University, San Luis Obispo

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays III 2021 California Polytechnic State University, San Luis Obispo

A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii

Master's Theses

The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …


Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu 2021 Western Michigan University

Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu

Dissertations

The unprecedented increase in volume and influx of structured and unstructured data has overwhelmed conventional data management system capabilities in organizing, analyzing, and procuring useful information in a timely fashion. Structured data sources have a pre-defined pattern that makes data preprocessing and information retrieval tasks relatively easy for the current technologies that have been designed to handle structured and repeatable data. Unlike structured data, unstructured data usually exists in an unorganized format that offers no or little insight unless indexed and stored in an organized fashion. The inherent format of unstructured data exacerbates difficulties in data preprocessing and information extraction. …


Hierarchical Reinforcement Learning: A Comprehensive Survey, Shubham PATERIA, Budhitama SUBAGDJA, Ah-hwee TAN, Chai QUEK 2021 Singapore Management University

Hierarchical Reinforcement Learning: A Comprehensive Survey, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek

Research Collection School Of Computing and Information Systems

Hierarchical Reinforcement Learning (HRL) enables autonomous decomposition of challenging long-horizon decision-making tasks into simpler subtasks. During the past years, the landscape of HRL research has grown profoundly, resulting in copious approaches. A comprehensive overview of this vast landscape is necessary to study HRL in an organized manner. We provide a survey of the diverse HRL approaches concerning the challenges of learning hierarchical policies, subtask discovery, transfer learning, and multi-agent learning using HRL. The survey is presented according to a novel taxonomy of the approaches. Based on the survey, a set of important open problems is proposed to motivate the future …


Minimum Coresets For Maxima Representation Of Multidimensional Data, Yanhao WANG, Michael MATHIOUDAKIS, Yuchen LI, Kian-Lee TAN 2021 Singapore Management University

Minimum Coresets For Maxima Representation Of Multidimensional Data, Yanhao Wang, Michael Mathioudakis, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Coresets are succinct summaries of large datasets such that, for a given problem, the solution obtained from a coreset is provably competitive with the solution obtained from the full dataset. As such, coreset-based data summarization techniques have been successfully applied to various problems, e.g., geometric optimization, clustering, and approximate query processing, for scaling them up to massive data. In this paper, we study coresets for the maxima representation of multidimensional data: Given a set �� of points in R �� , where �� is a small constant, and an error parameter �� ∈ (0, 1), a subset �� ⊆ �� …


On M-Impact Regions And Standing Top-K Influence Problems, Bo TANG, Kyriakos MOURATIDIS, Mingji HAN 2021 Singapore Management University

On M-Impact Regions And Standing Top-K Influence Problems, Bo Tang, Kyriakos Mouratidis, Mingji Han

Research Collection School Of Computing and Information Systems

In this paper, we study the ��-impact region problem (mIR). In a context where users look for available products with top-�� queries, mIR identifies the part of the product space that attracts the most user attention. Specifically, mIR determines the kind of attribute values that lead a (new or existing) product to the top-�� result for at least a fraction of the user population. mIR has several applications, ranging from effective marketing to product improvement. Importantly, it also leads to (exact and efficient) solutions for standing top-�� impact problems, which were previously solved heuristically only, or whose current solutions face …


Framework For Collecting Data From Iot Device, Md Saiful Islam 2021 Kennesaw State University

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …


Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, subhashini narayan 2021 VIT University

Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan

Future Computing and Informatics Journal

In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …


A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy NAB, Ayman E. Khedr AEK, Laila A. Abd-Elmegid LAA, Amira M. Idrees AMI 2021 Faculty of Computers and Information Technology, Future University in Egypt

A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami

Future Computing and Informatics Journal

Due to the changing dynamics of the business environment, organizations need to redesign or reengineer their business processes in order to provide services with the lowest cost and shortest response time while increasing quality. Thence, Business Process Re-engineering (BPR) provides a roadmap to achieve operational goals that leads to enhance flexibility and productivity, cost reduction, and quality of service/product. In this paper, we propose a literature review for the different proposed models for Business Process Reengineering. The models specify where the breakdowns occur in BPR implementation, justifies why such breakdowns occur, and propose techniques to prevent their occurrence again. The …


Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri 2021 University of Arkansas, Fayetteville

Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri

Graduate Theses and Dissertations

As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …


Digital Commons powered by bepress