Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,468 Full-Text Articles 3,571 Authors 520,855 Downloads 121 Institutions

All Articles in Data Storage Systems

Faceted Search

1,468 full-text articles. Page 1 of 69.

Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt 2024 Centre for Tourism and Leisure Research- Dalarna University

Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt

GSTC Academic Symposium - In conjunction with the GSTC Global Conference Sweden April 23, 2024

Planning for sustainable mobility and destination development in rural areas is increasingly important when tourism grows in numbers. A key to address the challenge of transformation and adaptation of local communities to mitigate adverse effects in seasonal peak hours like traffic congestion, power failure, waste management and sewage flooding, is to properly estimate the number of visitors to a destination.

The problem of estimating tourism numbers is a known challenge since, for example, guest nights statistics are in-complete and non-commercial lodging (sharing solutions) are increasing. Recently, the promising utilization of mobile phone data has emerged as a means to estimate …


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka 2024 William & Mary

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson 2024 Old Dominion University

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu 2024 University of Massachusetts Amherst

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb 2024 Lecturers at Department of Computer Sciences Yarmouk University Irbid, Jordan

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan 2024 Northern Kentucky University

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


Adaptive Load-Aware Elastic Data Reduction And Re-Computation For Adaptive Mesh Refinement, Mengxiao Wang 2024 University of Texas at Arlington

Adaptive Load-Aware Elastic Data Reduction And Re-Computation For Adaptive Mesh Refinement, Mengxiao Wang

Computer Science and Engineering Theses

The increasing performance gap between computation and I/O creates huge data management challenges for simulation-based scientific discovery. Data reduction, among others, is deemed to be a promising technique to bridge the gap through reducing the amount of data migrated to persistent storage. However, the reduction performance is still far from what is being demanded from production applications. To this end, we propose a new methodology that aggressively reduces data despite the substantial loss of information, and re-computes the original accuracy on-demand. As a result, our scheme creates an illusion of a fast and large storage medium with the availability of …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin 2024 Pace University - New York

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


Mechanism Design For Optimizing On-Chain Sell Order In Market Without Market Maker, Nico Pei 2024 Claremont Colleges

Mechanism Design For Optimizing On-Chain Sell Order In Market Without Market Maker, Nico Pei

CMC Senior Theses

The absence of market makers alters the microstructure of the market. It’s difficult to get exposed to time-weighted prices in markets without market makers. In this paper, we delve into three mechanism designs – discrete gradual dutch auction, continuous gradual dutch auction, and variable rate gradual dutch auction – to study how to execute time-weighted sell orders on blockchain in a market without market makers. To make it simpler for readers to understand, we imagine an example of helping a close friend of Picasso to sell his 100 Picasso paintings in the next 10 years since 1970, with the private …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco 2024 California Polytechnic State University, San Luis Obispo

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Securing Internet Of Things (Iot) Data Storage, Savannah Malo 2024 University of New Hampshire, Durham

Securing Internet Of Things (Iot) Data Storage, Savannah Malo

Honors Theses and Capstones

Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia 2023 Brigham Young University

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran 2023 Louisiana State University

Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran

LSU Health New Orleans Symposium Series on Artificial Intelligence

AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.

NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.


Data Provenance Via Differential Auditing, Xin MU, Ming PANG, Feida ZHU 2023 Peng Cheng Laboratory

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam y. Otaif 2023 Education management in Jazan region, Saudi Arabia

Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam Y. Otaif

International Journal for Research in Education

The study aimed to identify the degree of awareness of cybersecurity, and to reveal the reality of digital transformation and the relationship between them from the point of view of the supervisors of the Education Department in the Jazan region. The study followed the descriptive correlative approach, by stratified random sampling (257). a questionnaire was built , The study found that the degree of cybersecurity awareness is high with an arithmetic mean of (3.48), and also degree of awareness of cybersecurity concepts is high, (3,52), and awareness of cybersecurity risks and violations (3.45), and it was found that the total …


Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda 2023 University of New Mexico - Main Campus

Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda

Electrical and Computer Engineering ETDs

This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …


Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala 2023 California Polytechnic State University, San Luis Obispo

Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala

College of Engineering Summer Undergraduate Research Program

In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.

In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …


Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun TONG, Xinghua LI, Yinbin MIAO, Yunwei WANG, Ximeng LIU, Robert H. DENG 2023 Singapore Management University

Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) …


When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin ZHANG, Waldy JOE, Yuyang ER, Hoong Chuin LAU 2023 Singapore Management University

When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Peer-to-Peer (P2P) logistics platforms, unlike traditional last-mile logistics providers, do not have dedicated delivery resources (both vehicles and drivers). Thus, the efficiency of such operating model lies in the successful matching of demand and supply, i.e., how to match the delivery tasks with suitable drivers that will result in successful assignment and completion of the tasks. We consider a Same-Day Delivery Problem (SDDP) involving a P2P logistics platform where new orders arrive dynamically and the platform operator needs to generate a list of recommended orders to the crowdsourced drivers. We formulate this problem as a Dynamic Order Recommendations Problem (DORP). …


On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui HUANG, Ru TAO 2023 Law School, Yunnan University, Kunming 650500, China Faculty of Law, University of Fribourg, Fribourg CH1700, Switzerland

On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …


Digital Commons powered by bepress