Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,226 Full-Text Articles 3,151 Authors 300,648 Downloads 98 Institutions

All Articles in Data Storage Systems

Faceted Search

1,226 full-text articles. Page 1 of 58.

Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi 2021 University of Arkansas, Fayetteville

Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi

Computer Science and Computer Engineering Undergraduate Honors Theses

Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated ...


Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph 2021 UA Little Rock Center for Arkansas History and Culture

Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph

Digital Initiatives Symposium

Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and ...


Multi-Step-Ahead Exchange Rate Forecasting For South Asian Countries Using Multi-Verse Optimized Multiplicative Functional Link Neural Networks, Kishore Kumar Sahu, Sarat Chandra Nayak, Himansu Sekhar Behera 2021 Department of Information Technology, Veer Surendra Sai University of Technology, Burla, Sambalpur, India

Multi-Step-Ahead Exchange Rate Forecasting For South Asian Countries Using Multi-Verse Optimized Multiplicative Functional Link Neural Networks, Kishore Kumar Sahu, Sarat Chandra Nayak, Himansu Sekhar Behera

Karbala International Journal of Modern Science

The dynamic nonlinearity approach, coupled with the exchange rate data series, makes its future predictions difficult. Sophisticated methods are highly desired for effective prediction of such data. Artificial neural networks (ANNs) have shown their ability to model and predict such data. This article presents a multi-verse optimizer (MVO) based multiplicative functional link neural network (MV-MFLN) model to forecast the exchange rate data. Functional link neural network (FLN) makes use of functional expansion for input data with a fewer number of adjustable neuron weights, which makes it capable of learning the uncertainties accompanying the exchange rate data. In contrast to the ...


Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma 2021 National College of Ireland

Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma

Articles

Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange between the different healthcare providers. The work proposes the shift from patient’s electronic health records being managed and controlled by the healthcare industry to a patient-centric application where patients are in control of their data. The aim of this research is to build an Electronic Healthcare Record (EHR) system that is layered on the Ethereum blockchain platform and smart contract ...


Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil 2021 Symbiosis Institute of Technology (SIT), Symbiosis International (Deemed) University, Pune

Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil

Library Philosophy and Practice (e-journal)

The remaining useful life (RUL) estimations become one of the most essential aspects of predictive maintenance (PdM) in the era of industry 4.0. Predictive maintenance aims to minimize the downtime of machines or process, decreases maintenance costs, and increases the productivity of industries. The primary objective of this bibliometric paper is to understand the scope of literature available related to RUL prediction. Scopus database is used to perform the analysis of 1673 extracted scientific literature from the year 1985 to 2020. Based on available published documents, analysis is done on the year-wise publication data, document types, language-wise distribution of ...


Effect Of Information Technology Capital: Technology Infrastructure, Database, Software, And Brainware Toward Optimize The Use Of Information Technology (Case Study : Uin Sunan Ampel Of Surabaya), Rismawati Br Sitepu, Ilham m.said, Tanti Handriana, Praptini Yulianti 2021 Airlangga University of Surabaya, East Java East Java, Indonesia

Effect Of Information Technology Capital: Technology Infrastructure, Database, Software, And Brainware Toward Optimize The Use Of Information Technology (Case Study : Uin Sunan Ampel Of Surabaya), Rismawati Br Sitepu, Ilham M.Said, Tanti Handriana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This research was conducted to determine the extent of the influence of technology infrastructure costs, software costs, database costs and brainware costs to increase the information technology budget of the Sunan Ampel State Islamic University in Surabaya and efficient use of the budget. The purpose of this study is to prove that there is a positive and significant influence of technology infrastructure costs, software costs, database costs and brainware costs to increase information technology budgets by using validity and reliability tests and classic tests such as the Normality test, Multicollinearity test, autocorrelation test, Heteroskedasticity test , and Linearity test. This study ...


Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa 2021 The University of Akron

Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa

Williams Honors College, Honors Research Projects

The objective of this project would be to design and prototype an automated, light and temperature sensing window blinds system. The device would detect temperature, both inside and outside, and incoming sunlight to determine proper window blind position for maximum energy savings. The user would also have the ability to change the settings of the blind from a remote device to a setting that they desire at any given time


The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya 2021 Carleton University

The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya

Journal of International Technology and Information Management

This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system ...


Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli PhD 2021 Prairie View A &M University

Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd

Journal of International Technology and Information Management

This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with ...


Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel 2020 New Jersey Institute of Technology

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel

Theses

The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention ...


Significant Contribution Of Mobile Apps To The Development Of Tourism In Uzbekistan, Alimjon Dadamuhamedov Irgashevich 2020 INTERNATIONAL ISLAMIC ACADEMY ОF UZBEKISTAN,

Significant Contribution Of Mobile Apps To The Development Of Tourism In Uzbekistan, Alimjon Dadamuhamedov Irgashevich

The Light of Islam

Recently, Uzbekistan has taken comprehensive measures to develop tourism as one of the strategic sectors that contribute to the rapid development of regions, increase incomes and living standards of the population, as well as increase investment attractiveness. Modern information technologies make a signifcant contribution to the development of pilgrimage tourism. Advertising of online travel services in pilgrimage tourism currently does not allow you to automate the work of a travel Agency without creating an effective website. This article is devoted to the analysis of Internet technologies aimed at improving the tourism industry. The practical signifcance of the article lies in ...


A Supporting Tool For Requirements Prioritization Process In Agile Software Development, ramdan mowad, Khaled AbdElazim Muhammad, Essam Elfakharany 2020 Faculty of Computers and Information Technology, Future University in Egypt, Cairo, Egypt

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need ...


A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl 2020 Symbiosis Institute of Technology

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The ...


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro 2020 Seattle University School of Law

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed 2020 California State University - San Bernardino

Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed

Electronic Theses, Projects, and Dissertations

With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.

The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed ...


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman 2020 Airlangga University Of Surabaya, Indonesia

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to ...


Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil 2020 American University in Cairo

Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil

Theses and Dissertations

Database integrity is crucial to organizations that rely on databases of important data. They suffer from the vulnerability to internal fraud. Database tampering by internal malicious employees with high technical authorization to their infrastructure or even compromised by externals is one of the important attack vectors.

This thesis addresses such challenge in a class of problems where data is appended only and is immutable. Examples of operations where data does not change is a) financial institutions (banks, accounting systems, stock market, etc., b) registries and notary systems where important data is kept but is never subject to change, and c ...


A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B. 2020 University of New Mexico

A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.

Mathematics and Statistics Faculty and Staff Publications

With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a ...


Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub 2020 Western Kentucky University

Supply Chain Analysis To Determine E-Commerce Distribution Center Locations, Fatima Chebchoub

Masters Theses & Specialist Projects

Supply chain management is the key success for each business. Having a robust supply chain will help the business to improve service, quality, reduce the costs, improve the speed, and be more flexible. Organizations need to look at data and deploy plans to move the product from operation to logistics to manage a global chain. In this paper we will use E-Comm shipment data to identify the best locations to build a new distribution center (DC).


Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene YADAMJAV, Zhifeng BAO, Baihua ZHENG, Farhana M. CHOUDHURY, Hanan SAMET 2020 Royal Melbourne Institute of Technology

Querying Recurrent Convoys Over Trajectory Data, Munkh-Erdene Yadamjav, Zhifeng Bao, Baihua Zheng, Farhana M. Choudhury, Hanan Samet

Research Collection School Of Computing and Information Systems

Moving objects equipped with location-positioning devices continuously generate a large amount of spatio-temporal trajectory data. An interesting finding over a trajectory stream is a group of objects that are travelling together for a certain period of time. Existing studies on mining co-moving objects do not consider an important correlation between co-moving objects, which is the reoccurrence of the movement pattern. In this study, we define a problem of finding recurrent pattern of co-moving objects from streaming trajectories and propose an efficient solution that enables us to discover recent co-moving object patterns repeated within a given time period. Experimental results on ...


Digital Commons powered by bepress