Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Data Storage Systems

Institution
Keyword
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Digital Communications and Networking

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany Dec 2020

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle Nov 2020

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle

Computer Science ETDs

Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …


A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B. Oct 2020

A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.

Branch Mathematics and Statistics Faculty and Staff Publications

With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a …


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh May 2020

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


Trading Up: Exchanging Our Data For A Better Life, Nathan Turner May 2020

Trading Up: Exchanging Our Data For A Better Life, Nathan Turner

Marriott Student Review

We live in a data-driven economy. Many people feel like consumers are on the losing end of an economic data-battle with tech giants, but this is simply not true; our data can drive innovation. That’s right—personal data collected from you and me can influence new technologies that will improve our lives. This should excite us, but our fear of losing data privacy can quell our excitement for progress and even restrict innovation. Our quality of life has already begun to improve through data driven innovation, and technological progress is not slowing down. If we let our fear of losing data …


Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans Feb 2020

Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans

Presentations

No matter what member of the team you are or what type of library you are in - be it electronic resources manager, cataloger, head of acquisitions, ILS or systems administrator, or even repository coordinator - getting things done and meeting goals depends largely on how you communicate with one another and how you handle your time. Meeting goals and deadlines on both big and small projects in addition to your personal tasks can be achieved less painfully by making effective use of a few on point tools. This session will use the presenter's preferred platforms to show specific examples …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …


Annual Report 2019-2020, Depaul University College Of Computing And Digital Media Jan 2020

Annual Report 2019-2020, Depaul University College Of Computing And Digital Media

CDM Annual Reports

LETTER FROM THE DEAN

As I write this letter wrapping up the 2019-20 academic year, we remain in a global pandemic that has profoundly altered our lives. While many things have changed, some stayed the same: our CDM community worked hard, showed up for one another, and continued to advance their respective fields. A year that began like many others changed swiftly on March 11th when the University announced that spring classes would run remotely. By March 28th, the first day of spring quarter, we had moved 500 CDM courses online thanks to the diligent work of our faculty, staff, …


Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal Jan 2020

Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal

Ingeniería Ambiental y Sanitaria

El presente proyecto tiene como objetivo principal desarrollar un esquema de gestión hídrica (EGH) en el sistema acuífero SAP 3.1, provincia llanos orientales, con base en la tipificación de suelos y el modelo conceptual de Tӧth, partiendo de que las aguas subterráneas se consideran una fuente alternativa de abastecimiento por su mejor calidad y el bajo costo de manejo en comparación al agua superficial, y teniendo en cuenta que el Departamento del Meta conoce la riqueza hídrica que está en su jurisdicción, no cuenta con una regulación adecuada en pro de una gestión hídrica a nivel subterráneo. La metodología empleada …


Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd Jan 2020

Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd

Journal of International Technology and Information Management

Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …


Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari Jan 2020

Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari

Journal of International Technology and Information Management

System success is considered to be an important element in accomplishing the goals of the organization; therefore evaluation of system success needs to be done in order to ensure that investment in Information System is successful. Most of Higher Learning Institutions (HLIs) in Tanzania have adopted the use of IS in providing service to their customers. Nevertheless, there is less evidence that system success evaluation has been done in order to identify the desired characteristics which could make IS more effective. Due to that, this study evaluates the effectiveness of Student Information System (SIS) used at the Institute of Finance …


An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang Jan 2020

An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang

Journal of International Technology and Information Management

Data management has become an important challenge. Good data management requires an effective approach to collecting, storing, and accessing data across the enterprise. In this paper, a knowledge modeling approach to data management is introduced with an emphasis on data requirements analysis. A knowledge model can provide a high-level view of organizational data by specifying the structure and relationships of the knowledge contents used in business processes. The proposed knowledge modeling approach is business process oriented and decision oriented. The description of the knowledge contents in the model is based on ontological specification. The model is comprised of five elements: …


Table Of Contents Jitim Vol 29 Issue 1, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 1, 2020

Journal of International Technology and Information Management

Table of contents


Table Of Contents Jitim Vol 29 Issue 2, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 2, 2020

Journal of International Technology and Information Management

Table of contents


The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani Jan 2020

The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani

Journal of International Technology and Information Management

This paper is based on a Ph.D. study investigating the critical challenges facing e-commerce adoption by entrepreneurs in Saudi Arabia, identifying the major driving factors, barriers, motivations, perceived advantages, potential problems and some practical solutions as well as future expectations from entrepreneurs’ perspectives. From the study findings, a set of practical recommendations were derived for the government, entrepreneurs and investors in Saudi Arabia to consider, to promote ecommerce entrepreneurship in the county.

The research was undertaken using a qualitative approach. Data collection techniques involved in-depth, semi-structured interviews, with (1) e-commerce entrepreneurs, and (2) government authorities, educational initiatives and private support …


Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi Jan 2020

Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi

Journal of International Technology and Information Management

Technology empowers entrepreneurs to pursue alternative funding through platforms like crowdfunding. This research explores significant startup funding factors using Crunchbase. Controlling for common factors (acquisition/funding-rounds/IPO), the research uniquely focuses on web attention - the visibility on social media - and its impact on funding. It also examines the moderating influence of startup’s home country culture (individualism/collectivism). Findings show stronger positive impact of web attention on startup funding for collectivist countries. While individualistic investors value personal goals, collectivists value collaborative goals - inclinations that align with crowdfunding behavior. Therefore while increasing web attention, crowdfunding efforts can be targeted towards collectivist countries.


Table Of Contents Jitim Vol 29 Issue 3, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 3, 2020

Journal of International Technology and Information Management

Table of contents


Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call Jan 2020

Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call

Williams Honors College, Honors Research Projects

Motor vehicle operators’ attention levels can be monitored to improve driver safety. By recording and analyzing the drivers eye gaze, hand position, vehicle speed and engine rpm the driver’s attention can be determined. A Raspberry Pi will be the main processing unit. Data will be pulled and analyzed from the OBD-II port on vehicle speed and engine rpm. The system will be powered from a 12V, 4A pin on the OBD-II port connected to the car battery. A webcam will be used to track the pupil location and determine when the driver is looking at the road. A battery powered …