Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,366 Full-Text Articles 3,390 Authors 392,109 Downloads 102 Institutions

All Articles in Data Storage Systems

Faceted Search

1,366 full-text articles. Page 1 of 64.

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, shimaa mohamed ouf, Amira M. Idrees AMI 2022 BIS Helwan University

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of ...


Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, Neel Shah 2022 Northwestern University

Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, Neel Shah

Swarthmore Undergraduate History Journal

This paper writes a social history of the programming language COBOL that focuses on its reception in academia. Through this focus, the paper seeks to understand the contentious relationship between data processing and the academy. In historicizing COBOL, the paper also illuminates the changing nature of the academy-industry-military triangle that was a mainstay of early computing.


Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. McGrath 2022 California Polytechnic State University, San Luis Obispo

Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. Mcgrath

Mechanical Engineering

Solar farms like the Gold Tree Solar Farm at Cal Poly San Luis Obispo have difficulty delivering a consistent level of power output. Cloudy days can trigger a significant drop in the utility of a farm’s solar panels, and an unexpected loss of power from the farm could potentially unbalance the electrical grid. Being able to predict these power output drops in advance could provide valuable time to prepare a grid and keep it stable. Furthermore, with modern data analysis methods such as machine learning, these predictions are becoming more and more accurate – given a sufficient data set. The ...


Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones 2022 Harrisburg University of Science and Technology

Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones

Other Student Works

This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.


Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari 2022 Department of Computer Application, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be University, Odisha, India

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari

Graduate Research in Engineering and Technology (GRET)

The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients ...


Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo 2022 Odisha University of Technology and Research, Bhubaneswar, Odisha, India

Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo

Graduate Research in Engineering and Technology (GRET)

Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures ...


Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar 2022 Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, India-75103

Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

Supply chain management system is a centralized system which controls and plans the activities involved from production to delivery of a product. Disruption in treatment and loss of life occurs due to delay in delivery of pharmaceutical products. The objective is to do a model using Machine learning algorithms to determine: Classification to predict which product will be delayed and Regression shows how much time it will be delayed exactly. This study will use publicly available supply chain data which helps to identify primary aspect of predicting whether HIV drugs are delivered in time or not. It will then use ...


Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar 2022 Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, India-751030

Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

In recent market, there are several cell phones available, Smart phones differ based on their Operating system. Here we are going to do a comparison between two Operating systems i.e., “IOS and ANDROID”. The comparison starts including the basic features of smart phones. The features are varying from each other. Some of them are categorical and some are numerical. According to these data, classify the smart phones using machine learning classification model. After the classification we are going to analyse which operating system-based Smartphone will be taken for further classification. A “Recommendation system”, will be designed which recommend a ...


Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

In the current scenario, the Internet of Things (IoT) is an emerging technology. IoT is a new pattern that has changed the long-established way of living into a modernistic life style. IoT is the network of physical objects, which enables to collect data and exchange it without human intervention. In general, IoT has been established to interlink the latest healthcare resources and to provide smart and efficient healthcare facilities to the people. IoT allows objects to be sensed and controlled remotely across existing network infrastructure. Health maintenance has become a considerable socio-economic concern when it comes to health expenses, need ...


Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy 2022 Computer Application Dept of Institute of Technical Education & Research

Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

Text mining or information discovery is that sub manner of information mining that is extensively being used to find out hidden styles and huge records from the massive amount of unstructured written fabric. Text mining allows accelerate know-how discovery by way of notably growing the amount records that can be analyzed. Rapid development in digital facts acquisition strategies have caused huge extent of facts. More than 80 percentages of these day’s statistics is composed of unstructured or semi-based information. This sort of data cannot be used until or unless particular records or pattern is determined. The discovery of appropriate ...


A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra

Graduate Research in Engineering and Technology (GRET)

In today’s digital era healthcare is one among the major core areas of the medical domain. People trying to find suitable health-related information that they are concerned with. The Internet could be a great resource for this kind of data, however you need to take care to avoid getting harmful information. Nowadays, a colossal quantity of clinical information dispersed totally across different websites on the Internet prevents users from finding useful information for their well-being improvement. Errors in medication are one of the foremost severe medical faults that would be a threat to patients’ lives. These problems increases the ...


Benford’S Law For Data Cleaning In Big Data, Prachurya Ray 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

Benford’S Law For Data Cleaning In Big Data, Prachurya Ray

Graduate Research in Engineering and Technology (GRET)

With the exponential increase in data, the need to authenticate the integrity accuracy of the data also increases. Regarded as a mysterious law, Benford's Law has seen many use cases over the centuries ranging from detecting fraud in accounting to checking for GAN generated images. This First digit law has helped finding anomalies in various data across many domains. This paper summarizes what this mysterious law is and implements the same to asteroid data to check for the pattern. This law has the potential to handle the growing need for authenticity for the big data revolution. Further research on ...


Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover 2022 University of Arkansas, Fayetteville

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked ...


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar 2022 University of Arkansas, Fayetteville

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0 ...


Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn 2022 Southern Adventist University

Introducing Normal Forms To Students: A Comparison Of Theory-First Vs. Project-First Educational Approaches, Dakota C. Cookenmaster, Jacob A. Bahn

Campus Research Day

One of the primary challenges instructors face when educating scientists and engineers is the introduction of important theory, both to show its essential nature in research as well as its practicality. This paper analyzes two pedagogical methods for the instruction of database normal forms. The first of these methods is a theory-based approach that relies on written works and practices to introduce the concept. The second of these focuses on a project-based approach which aligns with normal form standards as students implement a database schema. This paper compares these in a small study and advises an appropriate method for educators.


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in ...


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu 2022 Old Dominion University

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper ...


Pre-Training Graph Neural Networks For Link Prediction In Biomedical Networks, Yahui LONG, Min WU, Yong LIU, Yuan FANG, Chee Kong KWOH, Jiawei LUO, Xiaoli LI 2022 Singapore Management University

Pre-Training Graph Neural Networks For Link Prediction In Biomedical Networks, Yahui Long, Min Wu, Yong Liu, Yuan Fang, Chee Kong Kwoh, Jiawei Luo, Xiaoli Li

Research Collection School Of Computing and Information Systems

Motivation: Graphs or networks are widely utilized to model the interactions between different entities (e.g., proteins, drugs, etc) for biomedical applications. Predicting potential links in biomedical networks is important for understanding the pathological mechanisms of various complex human diseases, as well as screening compound targets for drug discovery. Graph neural networks (GNNs) have been designed for link prediction in various biomedical networks, which rely on the node features extracted from different data sources, e.g., sequence, structure and network data. However, it is challenging to effectively integrate these data sources and automatically extract features for different link prediction tasks ...


Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr. 2022 Dept. of Tourism & Hotel Management , Penguin School of Hotel Management, Kolkata, India

Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.

International Journal of Computer Science and Informatics

A unique Tourism Decision Making System TDMS) describes and evaluates the evaluation of research and developments in information technology meant for pronouncement sustain as well as examination during the sector of visiting the attractions. Individuals in the tourism sector are classified according to their decision-making technologies. The current trends and growth directions of choice help technologies were analysed for visitors from various advertising categories. The potential to provide customising, augmentation, and help for visitors at all phases of their trips by integrating modern automated approaches with GIS capabilities demonstrates the need for breakthroughs in digital advanced analytics.


Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink 2022 University of Glasgow

Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink

Anthropology Faculty Publications

Most contemporary 3D data used in archaeological research and heritage management have been created through ‘reality capture,’ the recording of the physical features of extant archaeological objects, structures, and landscapes using technologies such as laser scanning and photogrammetry (Garstki 2020, ch.2; Magnani et al. 2020). A smaller quantity of data are generated by Computer Aided Design (CAD) and Building Information Modeling (BIM) projects, and even fewer data are generated through procedural modeling, the rapid prototyping of multi-component threedimensional (3D) models from a set of rules (Figure 8.1.). It is unsurprising therefore that in archaeology and heritage, efforts around ...


Digital Commons powered by bepress