Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems

PDF

2019

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 59

Full-Text Articles in Engineering

Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang Dec 2019

Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang

Computer Science Faculty Research

Background: Understanding the complex biological mechanisms of cancer patient survival using genomic and clinical data is vital, not only to develop new treatments for patients, but also to improve survival prediction. However, highly nonlinear and high-dimension, low-sample size (HDLSS) data cause computational challenges to applying conventional survival analysis. Results: We propose a novel biologically interpretable pathway-based sparse deep neural network, named Cox-PASNet, which integrates high-dimensional gene expression data and clinical data on a simple neural network architecture for survival analysis. Cox-PASNet is biologically interpretable where nodes in the neural network correspond to biological genes and pathways, while capturing the nonlinear …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri Nov 2019

Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri

LSU Master's Theses

The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …


Algorithms For Designing Processes Of Electronic Interactive Services, Ozod Radjabov Nov 2019

Algorithms For Designing Processes Of Electronic Interactive Services, Ozod Radjabov

Bulletin of TUIT: Management and Communication Technologies

Today, the integration of electronic interactive services is based on the correct placement of algorithms to ensure solidarity in information systems, the design stages of information systems based on interactive services and the corresponding events, the implementation of functions in a strict sequence.


Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid Nov 2019

Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid

FIU Electronic Theses and Dissertations

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the I/O performance behaviors …


Electronic Data Capture And Study Management, William A. Mattingly Nov 2019

Electronic Data Capture And Study Management, William A. Mattingly

Division of Infectious Diseases

Electronic Data Capture (EDC) is the process of recording data from a primary data source into a computerized system for improved reliability, security, and convenience. Data stored in EDC systems are used for analysis and, in the case of clinical studies, are an important part of the development pipeline for new drugs and medical devices. This text provides an introduction to data capture and the management of a scientific study using the popular EDC solution REDCap.


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …


Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock Oct 2019

Deep Hashing By Discriminating Hard Examples, Cheng Yan, Guansong Pang, Xiao Bai, Chunhua Shen, Jun Zhou, Edwin Hancock

Research Collection School Of Computing and Information Systems

This paper tackles a rarely explored but critical problem within learning to hash, i.e., to learn hash codes that effectively discriminate hard similar and dissimilar examples, to empower large-scale image retrieval. Hard similar examples refer to image pairs from the same semantic class that demonstrate some shared appearance but have different fine-grained appearance. Hard dissimilar examples are image pairs that come from different semantic classes but exhibit similar appearance. These hard examples generally have a small distance due to the shared appearance. Therefore, effective encoding of the hard examples can well discriminate the relevant images within a small Hamming distance, …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Sep 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Houbing Song

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …


Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon Sep 2019

Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon

Other

In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.

This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.

The soil moisture sensor will systematically collect high …


Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen Sep 2019

Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

We investigate whether additional photos beyond a single headshot makes a persona profile more informative without confusing the end user. We conduct an eye-tracking experiment and qualitative interviews with digital content creators after varying the persona in photos via a single headshot, a headshot and photo of the persona in different contexts, and a headshot with photos of different people with key persona attributes the gender and age. Findings show that contextual photos provide significantly more persona information to end users; however, showing photos of multiple people engenders confusion and lowers informativeness. Also, as anticipated, viewing additional photos requires more …


Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley Aug 2019

Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley

Minnesota Journal of Law, Science & Technology

No abstract provided.


Model-Driven Engineering For Big Data, Belachew Regane Aug 2019

Model-Driven Engineering For Big Data, Belachew Regane

African Conference on Information Systems and Technology

Accessing heterogeneous and huge amount of data through different sources heavily impacts users of data nowadays worldwide. Thus, Big Data has now become a hot emerging paradigm in computing environments. Issues in scalability, interoperability, platform independency, adaptability and reusability in big data systems are considered the main current challenges. This raises the need for appropriate software engineering approaches to develop effective and efficient Big Data system models, i.e. an approach which reduce investment cost and development time. Today, software engineering has emerged advanced methodologies to solve problems from different perspectives, while still further research is needed to overcome new challenges …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Jul 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Publications

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …


Do Grant Funding And Pro-Environmental Spillovers Influence Household Hazardous Waste Collection?, Kustini Lim-Wavde, Robert J Kauffman, Tin Seong Kam, Gregory S. Dawsond Jul 2019

Do Grant Funding And Pro-Environmental Spillovers Influence Household Hazardous Waste Collection?, Kustini Lim-Wavde, Robert J Kauffman, Tin Seong Kam, Gregory S. Dawsond

Research Collection School Of Computing and Information Systems

Agency and state grant funding should be disseminated in ways so it will result in better management of household hazardous waste (HHW) and environmental sustainability. Since location seems to matter in HHW collection activities, it is important to consider pro-environmental spatial spillovers that occur, based on agency actions and waste collection behavior taking place in other locations. These may influence HHW-related practices in close-by regions. Using a county-level spatio-temporal dataset that consists of economic, demographic, and HHW data in California from 2004 to 2015, we evaluate the impact of HHW grants on HHW collection activities while considering pro-environmental spillovers. We …


The Impact Of Changes Mislabeled By Szz On Just-In-Time Defect Prediction, Yuanrui Fan, Xin Xia, Daniel A. Costa, David Lo, Ahmed E. Hassan, Shanping Li Jul 2019

The Impact Of Changes Mislabeled By Szz On Just-In-Time Defect Prediction, Yuanrui Fan, Xin Xia, Daniel A. Costa, David Lo, Ahmed E. Hassan, Shanping Li

Research Collection School Of Computing and Information Systems

Just-in-Time (JIT) defect prediction—a technique which aims to predict bugs at change level—has been paid more attention. JIT defect prediction leverages the SZZ approach to identify bug-introducing changes. Recently, researchers found that the performance of SZZ (including its variants) is impacted by a large amount of noise. SZZ may considerably mislabel changes that are used to train a JIT defect prediction model, and thus impact the prediction accuracy. In this paper, we investigate the impact of the mislabeled changes by different SZZ variants on the performance and interpretation of JIT defect prediction models. We analyze four SZZ variants (i.e., B-SZZ, …


Table Of Contents Jitim Vol 28 Issue 2, 2019 Jul 2019

Table Of Contents Jitim Vol 28 Issue 2, 2019

Journal of International Technology and Information Management

Table of Contents JITIM 2, 2019


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson Jun 2019

Developing A Workflow To Integrate Tree Inventory Data Into Urban Energy Models, Farzad Hashemi, Breanna L. Marmur, Ulrike Passe, Janette R. Thompson

Farzad Hashemi

Building energy simulation is of considerable interest and benefit for architects, engineers, and urban planners. Only recently has it become possible to develop integrated energy models for clusters of buildings in urban areas. Simulating energy consumption of the built environment on a relatively large scale (e.g., such as a neighborhood) will be necessary to obtain more reliable results, since building energy parameters are influenced by characteristics of the nearby environment. Therefore, the construction of a 3-D model of urban built areas with detail of the near-building environment should enhance simulation approaches and provide more accurate results. This paper describes the …


Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove Jun 2019

Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove

Presentations

ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …


A Database For Indexable Carbide Inserts, Andrew Yoder Jun 2019

A Database For Indexable Carbide Inserts, Andrew Yoder

Computer Engineering

The indexable inserts project is a collaborative effort to aggregate into a single database as many indexable carbide inserts from as many manufacturers as possible. Inserts are generally labeled with a part number following a specific standard determined by shapes and measurements, however specifications for certain aspects of carbide inserts—such as which materials they can cut—can vary by manufacturer. There currently is not a way to search a comprehensive database containing tools from multiple manufacturers for a handful of inserts that would satisfy some necessary parameters, making finding the correct tool in a shop a much more time-consuming process than …


Adversarial Contract Design For Private Data Commercialization, Parinaz Naghizadeh, Arunesh Sinha Jun 2019

Adversarial Contract Design For Private Data Commercialization, Parinaz Naghizadeh, Arunesh Sinha

Research Collection School Of Computing and Information Systems

The proliferation of data collection and machine learning techniques has created an opportunity for commercialization of private data by data aggregators. In this paper, we study this data monetization problem as a mechanism design problem, specifically using a contract-theoretic approach. Our proposed adversarial contract design framework provides a fundamental extension to the classic contract theory set-up in order to account for the heterogeneity in honest buyers’ demands for data, as well as the presence of adversarial buyers who may purchase data to compromise its privacy. We propose the notion of Price of Adversary (PoAdv) to quantify the effects of adversarial …


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera Jun 2019

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …


R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao Jun 2019

R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao

Research Collection School Of Computing and Information Systems

Representing procedure text such as recipe for crossmodal retrieval is inherently a difficult problem, not mentioning to generate image from recipe for visualization. This paper studies a new version of GAN, named Recipe Retrieval Generative Adversarial Network (R2GAN), to explore the feasibility of generating image from procedure text for retrieval problem. The motivation of using GAN is twofold: learning compatible cross-modal features in an adversarial way, and explanation of search results by showing the images generated from recipes. The novelty of R2GAN comes from architecture design, specifically a GAN with one generator and dual discriminators is used, which makes the …


Your Internet Data Is Rotting, Paul Royster May 2019

Your Internet Data Is Rotting, Paul Royster

UNL Libraries: Faculty Publications

The internet is growing, but old information continues to disappear daily.

Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.

Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then it …


Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo May 2019

Designated-Server Identity-Based Authenticated Encryption With Keyword Search For Encrypted Emails, Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo

Research Collection School Of Computing and Information Systems

In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with keyword search (PEKS) is an efficient solution to it. However, PEKS suffers from the complex key management problem in the public key infrastructure. Its variant in the identity-based setting addresses the drawback, however, almost all the schemes does not resist against offline keyword guessing attacks (KGA) by inside adversaries. In this work we introduce the notion of designated-server identity-based authenticated encryption with keyword search (dIBAEKS), in which the email sender authenticates the message while encrypting so that …


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …