Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 113

Full-Text Articles in Other Computer Engineering

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …


Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar Jan 2015

Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar

UNF Graduate Theses and Dissertations

Cloud computing is a relatively new form of computing which uses virtualized resources. It is dynamically scalable and is often provided as pay for use service over the Internet or Intranet or both. With increasing demand for data storage in the cloud, the study of data-intensive applications is becoming a primary focus. Data intensive applications are those which involve high CPU usage, processing large volumes of data typically in size of hundreds of gigabytes, terabytes or petabytes. The research in this thesis is focused on the Amazon’s Elastic Cloud Compute (EC2) and Amazon Elastic Map Reduce (EMR) using HiBench Hadoop …


Badge Web Application, Ryan Green Dec 2014

Badge Web Application, Ryan Green

Computer Engineering

This project includes the imagining, design, build, and test of a web application that creates and tracks a user’s progress on completing tasks that an administrator has created for the user. The goal of this project is to have a functioning webpage that is robust and scalable to support many users and many tasks. The application will be developed for use on all modern web browsers, and will have a persistent server to access from any platform. This project was designed to be an exercise in building a modern web application, and as such is written using many different languages, …


Foss Big Data Storage Solution, Nurdeen Salami Aug 2014

Foss Big Data Storage Solution, Nurdeen Salami

STAR Program Research Presentations

NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to …


Implementing A Robust Data Storage Software System For Cp9, Stuart Andrew Weickgenant Jun 2014

Implementing A Robust Data Storage Software System For Cp9, Stuart Andrew Weickgenant

Computer Engineering

This project focuses on the continuation of the CP9 CubeSat project, specifically the software which will be running on the satellite when it goes into space. This project mostly goes into designing a robust system which stores the data collected from the sensors on board CP9, whose purpose is to collect vibrations data from its launch vehicle during its ascent into space, into an easy to analyze system once the data is downlinked to PolySat’s ground station after launch. One other thing this system does is to prevent CP9 from collecting unnecessary data after launch. Testing was done on this …


The I: A Client-Based Point-And-Click Puzzle Game, Aldo Lewis Jun 2014

The I: A Client-Based Point-And-Click Puzzle Game, Aldo Lewis

Electronic Theses, Projects, and Dissertations

Given mobile devices’ weak computational power, game programmers must learn to create games with simple graphics that are engaging and easy to play. Though seldom created for phones and tablets, puzzle games are a perfect fit. In recent years, the genre has gained a following and even won some acclaim. Games like Myst, The Seventh Guest and Portal all engage gamers with challenging puzzles and then reward them with story components upon task fulfillment. Few such games have been created for mobile devices, in part due to the difficulty of developing for devices with different operating systems. Android, WebIOS and …


Computational-Communicative Actions Of Informational Processing, Florentin Smarandache, Stefan Vladutescu Apr 2014

Computational-Communicative Actions Of Informational Processing, Florentin Smarandache, Stefan Vladutescu

Branch Mathematics and Statistics Faculty and Staff Publications

This study is circumscribed to the Information Science. The zetetic aim of research is double: a) to define the concept of action of informational processing and b) to design a taxonomy of actions of informational processing. First, the investigation trays to demonstrate that the computational actions of informational processing or the informational actions are computational-investigative configurations for structuring information: clusters of highly-aggregated operations which are carried out in a unitary manner operate convergently and behave like a unique computational device. From a methodological point of view, they are comprised within the category of analytical instruments for the informational processing of …


Distance In Matrices And Their Applications To Fuzzy Models And Neutrosophic Models, Florentin Smarandache, W.B. Vasantha Kandasamy, K. Ilanthenral Jan 2014

Distance In Matrices And Their Applications To Fuzzy Models And Neutrosophic Models, Florentin Smarandache, W.B. Vasantha Kandasamy, K. Ilanthenral

Branch Mathematics and Statistics Faculty and Staff Publications

In this book authors for the first time introduce the notion of distance between any two m  n matrices. If the distance is 0 or m  n there is nothing interesting. When the distance happens to be a value t; 0 < t < m  n the study is both innovating and interesting. The three cases of study which is carried out in this book are 1. If the difference between two square matrices is large, will it imply the eigen values and eigen vectors of those matrices are distinct? Several open conjectures in this direction are given. 2. The difference between parity check matrix and the generator matrix for the same C(n, k) code is studied. This will help in detecting errors in storage systems as well as in cryptography.


Tascked: The Sanity Promoting Task Manager, Jake Tobin Dec 2013

Tascked: The Sanity Promoting Task Manager, Jake Tobin

Computer Science and Software Engineering

Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system …


Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu Oct 2013

Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …


More Like This, Geoffrey Lawson Jun 2013

More Like This, Geoffrey Lawson

Computer Science and Software Engineering

No abstract provided.


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


Application Of Self-Monitoring For Situational Awareness, Christopher Trickler Jan 2013

Application Of Self-Monitoring For Situational Awareness, Christopher Trickler

Electronic Theses and Dissertations

Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute to …


Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam Jan 2013

Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam

UNF Graduate Theses and Dissertations

There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed computing paradigm for analysis of large volumes of data. The Apache Hadoop is the most popular open source implementation of MapReduce model and LINQ to HPC is Microsoft's alternative to open source Hadoop. In this thesis, the performance of LINQ to HPC and Hadoop are compared using different benchmarks.

To this end, we identified four benchmarks (Grep, Word Count, Read and Write) that we have run on LINQ to HPC as well as on Hadoop. For each benchmark, we measured each system’s performance metrics (Execution Time, Average CPU …


Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero Dec 2012

Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero

Master's Theses

Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …


Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp Oct 2012

Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp

Eric Copp

The DNA Safeguard project involves processing DNA sequence data in order to find nullomer sequences (non-existent short DNA sequences). While the fundamental algorithm for finding nullomer sequences is simple, it is complicated by the amount of data that must be handled. Four methods for handling terabytes of of data are investigated, single instance of a MySQL database, PVFS (Parallel Virtual File System), Hadoop, and a custom MPI (Message Passing Interface) program.


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss Sep 2012

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss

Martin L Griss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri Mar 2012

An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri

Master's Theses

The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …


Neutrosophic Masses & Indeterminate Models Applications To Information Fusion, Florentin Smarandache Jan 2012

Neutrosophic Masses & Indeterminate Models Applications To Information Fusion, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper we introduce the indeterminate models in information fusion, which are due either to the existence of some indeterminate elements in the fusion space or to some indeterminate masses. The best approach for dealing with such models is the neutrosophic logic.


Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai Jan 2012

Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai

Branch Mathematics and Statistics Faculty and Staff Publications

In this book the authors study the erasure techniques in concatenated Maximum Rank Distance (MRD) codes. The authors for the first time in this book introduce the new notion of concatenation of MRD codes with binary codes, where we take the outer code as the RD code and the binary code as the inner code. The concatenated code consists of the codewords of the outer code expressed in terms of the alphabets of the inner code. These new class of codes are defined as CRM codes. This concatenation techniques helps one to construct any CRM code of desired minimum distance …


Data Exploration Interface For Digital Forensics, Varun Dontula Dec 2011

Data Exploration Interface For Digital Forensics, Varun Dontula

University of New Orleans Theses and Dissertations

The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst.

We present an alternative approach, which leverages data visualization techniques to provide a more …


Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey Jan 2011

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss Jan 2011

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which …