Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,477 Full-Text Articles 3,595 Authors 460,469 Downloads 117 Institutions

All Articles in Data Storage Systems

Faceted Search

1,477 full-text articles. Page 1 of 70.

Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam y. Otaif 2023 Education management in Jazan region, Saudi Arabia

Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam Y. Otaif

International Journal for Research in Education

The study aimed to identify the degree of awareness of cybersecurity, and to reveal the reality of digital transformation and the relationship between them from the point of view of the supervisors of the Education Department in the Jazan region. The study followed the descriptive correlative approach, by stratified random sampling (257). a questionnaire was built , The study found that the degree of cybersecurity awareness is high with an arithmetic mean of (3.48), and also degree of awareness of cybersecurity concepts is high, (3,52), and awareness of cybersecurity risks and violations (3.45), and it was found that the total …


Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala 2023 California Polytechnic State University, San Luis Obispo

Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala

College of Engineering Summer Undergraduate Research Program

In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.

In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …


National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems), Subhrajit Pradhan Prof (Dr), Chandan Kumar Sahoo Dr., Tarini Prasad Pattnaik Prof., Tamasha Priyadarshini Prof 2023 Principal, GANDHI INSTITUTE OF EXCELLENT TECHNOCRATS (GIET) Ghangapatana, Bhubaneswar

National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems), Subhrajit Pradhan Prof (Dr), Chandan Kumar Sahoo Dr., Tarini Prasad Pattnaik Prof., Tamasha Priyadarshini Prof

Conference Proceedings - Full Volumes

As we enter the era of Computing 4.0, the landscape of technology and intelligent systems is rapidly evolving, with groundbreaking advancements in artificial intelligence, machine learning, data science, and beyond. The theme of this conference revolves around exploring and shaping the future of these intelligent systems that will revolutionize industries and transform the way we live, work, and interact with technology.

Conference Topics

  • Quantum Computing and Quantum Information
  • Edge Computing and Fog Computing
  • Artificial Intelligence and Machine Learning in Computing 4.0
  • Internet of Things (IOT) and Smart Cities
  • Block chain and Distributed Ledger Technologies
  • Cybersecurity and Privacy in the Computing …


Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua LI, Weijia XU, Yong SHI 2023 School of Management Science and Engineering, Central University of Finance and Economics, Beijing 100081, China

Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …


Paradigm Review Of Data Localization In India And Its Implications For China, Ying FAN 2023 School of Law, Henan University of Economics and Law, Zhengzhou 450046, China

Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …


On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui HUANG, Ru TAO 2023 Law School, Yunnan University, Kunming 650500, China Faculty of Law, University of Fribourg, Fribourg CH1700, Switzerland

On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …


Design And Analysis Of Content Caching Systems, Anirudh Sabnis 2023 University of Massachusetts Amherst

Design And Analysis Of Content Caching Systems, Anirudh Sabnis

Doctoral Dissertations

Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …


Transaction Management Sysyem For A Publisher, HASSAIN SHAREEF MOHAMMED JR 2023 California State University - San Bernardino

Transaction Management Sysyem For A Publisher, Hassain Shareef Mohammed Jr

Electronic Theses, Projects, and Dissertations

Managing the day-to-day operations of a publishing house isn't easy. For example, it's hard to keep track of stocks, manage vendor orders, and maintain transaction records. Our project titled Transaction Management System aims to solve these problems by offering a single tool that helps standardize and digitize publishing operations. It assists in automating and improving the efficiency of the various processes involved in a publishing house. The Transaction Management System is a full-stack web application that can be accessed through an internet browser. The user experience and interface are simple and easy to use so that users can find information …


Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan 2023 Clemson University

Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan

All Theses

Modern HPC applications compute and analyze massive amounts of data. The data volume is growing faster than memory capabilities and storage improvements leading to performance bottlenecks. An example of this is pySDC, a framework for solving collocation problems iteratively using parallel-in-time methods. These methods require storing and exchanging 3D volume data for each parallel point in time. If a simulation consists of M parallel-in-time stages, where the full spatial problem has to be stored for the next iteration, the memory demand for a single state variable is M ×Nx ×Ny ×Nz per time-step. For an application simulation with many state …


Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, Naresh Kshetri, Keith Miller, Gaurango Banerjee, Bikesh Raj Upreti 2023 Lindenwood University

Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, Naresh Kshetri, Keith Miller, Gaurango Banerjee, Bikesh Raj Upreti

International Journal of Emerging and Disruptive Innovation in Education : VISIONARIUM

Blockchain Technology is a distributed database technology that has emerged as a ground-breaking technology with several possible solutions to critical applications, say from supply chain management, agribusiness, marketing to healthcare industry including internet of medical things. Although it started as a digital coin (popularly known as bitcoin), it is slowly influencing business, marketing policy and society. We have presented an in-depth study and ethical analysis of how blockchain is applied over the economic and financial sector including banks, credit unions and other retail giants. During our research, we have also investigated how blockchain technology can affect financial institutions around the …


An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif 2023 Helwan University

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif

Future Computing and Informatics Journal

This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …


Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, shimaa mohamed ouf, Amira M. Idrees AMI 2023 Faculty of Commerce and Business Administration, Future University in Egypt, Egypt

Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …


News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed AbdelMawgoud, Amira M. Idrees AMI 2023 Business Information Systems, Faculty of Commerce and Business Administration, Helwan University, Egypt

News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami

Future Computing and Informatics Journal

Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …


Visual Question Answering: A Survey, Gehad Assem El-Naggar 2023 Future University in Egypt

Visual Question Answering: A Survey, Gehad Assem El-Naggar

Future Computing and Informatics Journal

Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …


Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth 2023 California Polytechnic State University, San Luis Obispo

Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth

Computer Engineering

PolyFlowBuilder is a web application that lets users create visually intuitive flowcharts to aid in academic planning at Cal Poly. These flowcharts can be customized in a variety of ways to accurately represent complex academic plans, such as double majors, minors, taking courses out- of-order, etc. The original version of PolyFlowBuilder, released Summer 2020, was not written for continued expansion and growth. Therefore, a complete rewrite was determined to be necessary to enable the project to grow in the future. This report details the process to completely rewrite the existing version of PolyFlowBuilder over the course of six months, using …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott III 2023 Stephen F. Austin State University

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe 2023 CUNY New York City College of Technology

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu 2023 Western Kentucky University

Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu

Masters Theses & Specialist Projects

Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim 2023 University of Arkansas, Fayetteville

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer 2023 University of Tartu

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Digital Commons powered by bepress