Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems

2018

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 58

Full-Text Articles in Engineering

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan Dec 2018

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan

Distance Learning Faculty & Staff Books

The official Cisco DCICN book and practice exams are great resources, but this is not an easy exam. This study guide is a companion to those resources and summarizes the subject areas into additional review questions with an answer description for each item. This book is not a "braindump" and it is not bootleg screenshots of the actual exam. Instead, this book provides additional context and examples, serves to complement other study guides, and provides additional examples. If you are getting ready to take the exam for the first time, I hope that this guide provides the extra help to …


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali Dec 2018

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …


Scalable Spatial Framework For Nosql Databases - Haslam Scholars Program Undergraduate Thesis, Daniel F. Enciso Dec 2018

Scalable Spatial Framework For Nosql Databases - Haslam Scholars Program Undergraduate Thesis, Daniel F. Enciso

Haslam Scholars Projects

The spatial frameworks used for knowledge discovery in “Big Data” areas such as urban information systems (UIS) are well- developed in SQL databases but are not as extensive within certain NoSQL databases. The focus of this project is to develop this framework for emerging search systems (ESS) in UIS by utilizing NoSQL databases, notably the document-based MongoDB. Such framework includes spatial functions for the most fundamental spatial queries. An ESS in UIS can take advantage of these new and attractive features of scalability within MongoDB to provide a robust approach to spatial search that differs from SQL relations and scalability. …


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The relationship between the adoption …


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla Dec 2018

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to …


Co-Location Resistant Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta Dec 2018

Co-Location Resistant Virtual Machine Placement In Cloud Data Centers, Amit Agarwal, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to increasing number of avenues for conducting cross-virtual machine (VM) side-channel attacks, the security of public IaaS cloud data centers is a growing concern. These attacks allow an adversary to steal private information from a target user whose VM instance is co-located with that of the adversary. To reduce the probability of malicious co-location, we propose a novel VM placement algorithm called “Previously Co-Located Users First”. We perform a theoretical and empirical analysis of our proposed algorithm to evaluate its resource efficiency and security. Our results, obtained using real-world cloud traces containing millions of VM requests and thousands of …


Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh Nov 2018

Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh

Purdue Journal of Service-Learning and International Engagement

Deegan Atha, a graduating senior in electrical engineering and a future engineer, is interested in human-centered design and developing technology that helps students engage and be successful in STEM.

Courtney Balogh, a junior in mechanical engineering, is interested in human-centered design and the importance it plays in product development. Deegan and Courtney are members of the Purdue EPICS project, Learning Equations Across Platforms (LEAP). They partnered with the Indiana School for the Blind and Visually Impaired (ISBVI) to develop a braille transcription device and web application that converts braille to print in real time.


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto Nov 2018

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Department of Anthropology: Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi Nov 2018

Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi

Research Collection School Of Computing and Information Systems

With recent increases in incidences of political violence globally, the world has now become more uncertain and less predictable. Of particular concern is the case of violence against civilians, who are often caught in the crossfire between armed state or non-state actors. Classical methods of studying political violence and international relations need to be updated. Adopting the use of data analytic tools and techniques of studying big data would enable academics and policy makers to make sense of a rapidly changing world.


A Neuroimaging Web Interface For Data Acquisition, Processing And Visualization Of Multimodal Brain Images, Gabriel M. Lizarraga Oct 2018

A Neuroimaging Web Interface For Data Acquisition, Processing And Visualization Of Multimodal Brain Images, Gabriel M. Lizarraga

FIU Electronic Theses and Dissertations

Structural and functional brain images are generated as essential modalities for medical experts to learn about the different functions of the brain. These images are typically visually inspected by experts. Many software packages are available to process medical images, but they are complex and difficult to use. The software packages are also hardware intensive. As a consequence, this dissertation proposes a novel Neuroimaging Web Services Interface (NWSI) as a series of processing pipelines for a common platform to store, process, visualize and share data. The NWSI system is made up of password-protected interconnected servers accessible through a web interface. The …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao Oct 2018

Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao

Research Collection School Of Computing and Information Systems

Nowadays, many location-based applications require the ability of querying k-nearest neighbors over a very large scale of5 moving objects in road networks, e.g., taxi-calling and ride-sharing services. Traditional grid index with equal-sized cells can not adapt6 to the skewed distribution of moving objects in real scenarios. Thus, to obtain the fast querying response time, the grid needs to be split7 into more smaller cells which introduces the side-effect of higher memory cost, i.e., maintaining such a large volume of cells requires a8 much larger memory space at the server side. In this paper, we present SIMkNN, a scalable and in-memory …


Interpretable Multimodal Retrieval For Fashion Products, Lizi Liao, Xiangnan He, Bo Zhao, Chong-Wah Ngo, Tat-Seng Chua Oct 2018

Interpretable Multimodal Retrieval For Fashion Products, Lizi Liao, Xiangnan He, Bo Zhao, Chong-Wah Ngo, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Deep learning methods have been successfully applied to fashion retrieval. However, the latent meaning of learned feature vectors hinders the explanation of retrieval results and integration of user feedback. Fortunately, there are many online shopping websites organizing fashion items into hierarchical structures based on product taxonomy and domain knowledge. Such structures help to reveal how human perceive the relatedness among fashion products. Nevertheless, incorporating structural knowledge for deep learning remains a challenging problem. This paper presents techniques for organizing and utilizing the fashion hierarchies in deep learning to facilitate the reasoning of search results and user intent. The novelty of …


Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng Sep 2018

Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng

Research Collection School Of Computing and Information Systems

As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the …


Exact Processing Of Uncertain Top-K Queries In Multi-Criteria Settings, Kyriakos Mouratidis, Bo Tang Aug 2018

Exact Processing Of Uncertain Top-K Queries In Multi-Criteria Settings, Kyriakos Mouratidis, Bo Tang

Research Collection School Of Computing and Information Systems

Traditional rank-aware processing assumes a dataset that contains available options to cover a specific need (e.g., restaurants, hotels, etc) and users who browse that dataset via top-k queries with linear scoring functions, i.e., by ranking the options according to the weighted sum of their attributes, for a set of given weights. In practice, however, user preferences (weights) may only be estimated with bounded accuracy, or may be inherently uncertain due to the inability of a human user to specify exact weight values with absolute accuracy. Motivated by this, we introduce the uncertain top-k query (UTK). Given uncertain preferences, that is, …


Learning Representations Of Ultrahigh-Dimensional Data For Random Distance-Based Outlier Detection, Guansong Pang, Longbing Cao, Ling Chen, Defu Lian, Huan Liu Aug 2018

Learning Representations Of Ultrahigh-Dimensional Data For Random Distance-Based Outlier Detection, Guansong Pang, Longbing Cao, Ling Chen, Defu Lian, Huan Liu

Research Collection School Of Computing and Information Systems

Learning expressive low-dimensional representations of ultrahigh-dimensional data, e.g., data with thousands/millions of features, has been a major way to enable learning methods to address the curse of dimensionality. However, existing unsupervised representation learning methods mainly focus on preserving the data regularity information and learning the representations independently of subsequent outlier detection methods, which can result in suboptimal and unstable performance of detecting irregularities (i.e., outliers).This paper introduces a ranking model-based framework, called RAMODO, to address this issue. RAMODO unifies representation learning and outlier detection to learn low-dimensional representations that are tailored for a state-of-the-art outlier detection approach - the random …


Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian Mcmanus, Terry W. Fenger Jul 2018

Retrieval Of Infotainment System Artifacts From Vehicles Using Ive, Celia J. Whelan, John Sammons, Brian Mcmanus, Terry W. Fenger

Journal of Applied Digital Evidence

The analysis of mobile devices and hard drives has been the focus of the digital forensics world for years, but there is another source of potential evidence not often considered: vehicles. Many of today’s “connected cars” have systems that function like computers, storing information they process including user data from devices synced to the system. There has been little to no research done regarding what types of user artifacts can be found on the system, how long these artifacts remain, whether or not the user can remove those artifacts, and whether certain systems provide more information than others. For this …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung Jul 2018

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das Jun 2018

A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das

LSU Doctoral Dissertations

Recent advances in large-scale experimental facilities ushered in an era of data-driven science. These large-scale data increase the opportunity to answer many fundamental questions in basic science. However, these data pose new challenges to the scientific community in terms of their optimal processing and transfer. Consequently, scientists are in dire need of robust high performance computing (HPC) solutions that can scale with terabytes of data.

In this thesis, I address the challenges in three major aspects of scientific big data processing as follows: 1) Developing scalable software and algorithms for data- and compute-intensive scientific applications. 2) Proposing new cluster architectures …


Investigating On Through Glass Via Based Rf Passives For 3-D Integration, Libo Qian, Jifei Sang, Yinshui Xia, Jian Wang, Peiyi Zhao Jun 2018

Investigating On Through Glass Via Based Rf Passives For 3-D Integration, Libo Qian, Jifei Sang, Yinshui Xia, Jian Wang, Peiyi Zhao

Mathematics, Physics, and Computer Science Faculty Articles and Research

Due to low dielectric loss and low cost, glass is developed as a promising material for advanced interposers in 2.5-D and 3-D integration. In this paper, through glass vias (TGVs) are used to implement inductors for minimal footprint and large quality factor. Based on the proposed physical structure, the impact of various process and design parameters on the electrical characteristics of TGV inductors is investigated with 3-D electromagnetic simulator HFSS. It is observed that TGV inductors have identical inductance and larger quality factor in comparison with their through silicon via counterparts. Using TGV inductors and parallel plate capacitors, a compact …


Delegation Application, Erik Matthew Phillips Jun 2018

Delegation Application, Erik Matthew Phillips

Computer Science and Software Engineering

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Genetic Algorithm Amplifier Biasing System (Gaabs): Genetic Algorithm For Biasing On Differential Analog Amplifiers, Sean Whalen Jun 2018

Genetic Algorithm Amplifier Biasing System (Gaabs): Genetic Algorithm For Biasing On Differential Analog Amplifiers, Sean Whalen

Computer Engineering

Genetic Algorithm Amplifier Biasing System (GAABS) - Senior Project Analysis

Summary of Functional Requirements

This project integrates LTSpice with a python script that runs a genetic algorithm to bias a differential amplifier. The system biases the amplifier with 2 different voltages, the base voltage for the PNP BJTs of the active loads and a voltage controlling the current of the current sink. The project runs via a python script, gets data from LTSpice’s command line call, and iteratively runs until the system is biased to achieve the greatest gain on an arbitrary input voltage.

Primary Constraints

Some of the main …


Microgrid Protection Student Laboratory: Human-Machine Interface And Scada Database, Nathan P. Martinez Jun 2018

Microgrid Protection Student Laboratory: Human-Machine Interface And Scada Database, Nathan P. Martinez

Electrical Engineering

The electric utility system, a ubiquitous and fundamental component of modern life, has changed more in the last 20 years than the last 100. With more homes and businesses installing distributed energy resources (DERs) such as solar panels, battery storage, and other intermittent sources, massive changes need to take place in the electric transmission and distribution systems. Engineers must develop a new skill set for a modern utility industry. This project summarizes a component for a new laboratory class aimed at power engineering students at Cal Poly which supports the laboratory through the creation of a human-machine interface (HMI) and …


Combining Algorithms For More General Ai, Mark Robert Musil May 2018

Combining Algorithms For More General Ai, Mark Robert Musil

Undergraduate Research & Mentoring Program

Two decades since the first convolutional neural network was introduced the AI sub-domains of classification, regression and prediction still rely heavily on a few ML architectures despite their flaws of being hungry for data, time, and high-end hardware while still lacking generality. In order to achieve more general intelligence that can perform one-shot learning, create internal representations, and recognize subtle patterns it is necessary to look for new ML system frameworks. Research on the interface between neuroscience and computational statistics/machine learning has suggested that combined algorithms may increase AI robustness in the same way that separate brain regions specialize. In …


Laser-Scribed Graphene Micro-Supercapacitors, Kimi D. Owens May 2018

Laser-Scribed Graphene Micro-Supercapacitors, Kimi D. Owens

Undergraduate Research & Mentoring Program

M. F. El-Kady and R. B. Kaner, “Scalable fabrication of high-power graphene micro-supercapacitors for flexible and on-chip energy storage,” Nature Communications, vol. 4, p. 1475, Feb. 2013.

Supercapacitors are electrical components that have higher energy density than regular capacitors. Currently, they are large and bulky which makes it hard to be implemented into smaller electronic devices or on-chip. In Scalable Fabrication of High-power Graphene Micro-supercapacitors for Flexible and On-chip Energy Storage, El-Kady and Kaner developed an inexpensive and reliable method for scaling down supercapacitors to be approximately 7.53 x 5.35 mm. To make the laser-scribed graphene (LSG) micro-supercapacitors, an aqueous …


An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz May 2018

An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz

Computer Science and Computer Engineering Undergraduate Honors Theses

It is fair to say that Pompeii is the most studied archaeological site in the world. Beyond the extensive remains of the city itself, the timing of its rediscovery and excavation place it in a unique historiographical position. The city has been continuously studied since the 18th century, with historians and archaeologists constantly reevaluating older sources as our knowledge of the ancient world expands. While several studies have approached the city from a data driven perspective, no studies of the city have taken a quantitative holistic approach on the scale of the VR Pompeii project. Hyper-specificity has been the order …


An Empirical Study On The Recovery Speed Of Usb Flash Drives Utilizing Raid-5 Compared To Hdds And Ssds, Joshua Manuel Martins May 2018

An Empirical Study On The Recovery Speed Of Usb Flash Drives Utilizing Raid-5 Compared To Hdds And Ssds, Joshua Manuel Martins

Honors Theses

Since their creation and implementation, storage drives have undergone and continue to undergo drastic changes in speed, size, and reliability. The original storage drives, known as hard disk drives (HDDs), are constructed using moving parts. The second modern type of storage drives, known as solid state drives (SSDs), are constructed using a series of silicon chips that utilize no moving parts. The third and most recent innovation in storage drives, known as USB flash drives (USBs), use only a single silicon chip to provide storage which grants them the smallest form factor of the three drive types.

This study compared …


Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas Apr 2018

Library Awesome Sauce Undergraduate Research, Jeremy Evert, Phillip Joe Fitzsimmons, Hector Lucas

Faculty Articles & Research

Library Awesome Sauce Undergraduate Research was a presentation at the 2018 CADRE Conference in Stillwater, OK. The presenters discussed their collaboration on a video project to film interviews of students giving progress reports about their software engineering projects. The videos were posted on the institutional repository.

The speakers discussed Student-Led research and the role that academic libraries play in facilitating student and faculty research and publishing for all disciplines on campus.