Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

1,465 Full-Text Articles 3,573 Authors 460,469 Downloads 115 Institutions

All Articles in Data Storage Systems

Faceted Search

1,465 full-text articles. Page 1 of 69.

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif 2023 Helwan University

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif

Future Computing and Informatics Journal

This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …


Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, shimaa mohamed ouf, Amira M. Idrees AMI 2023 Faculty of Commerce and Business Administration, Future University in Egypt, Egypt

Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …


News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed AbdelMawgoud, Amira M. Idrees AMI 2023 Business Information Systems, Faculty of Commerce and Business Administration, Helwan University, Egypt

News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami

Future Computing and Informatics Journal

Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …


Visual Question Answering: A Survey, Gehad Assem El-Naggar 2023 Future University in Egypt

Visual Question Answering: A Survey, Gehad Assem El-Naggar

Future Computing and Informatics Journal

Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott III 2023 Stephen F. Austin State University

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe 2023 CUNY New York City College of Technology

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant 2023 University of Nebraska at Omaha

Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant

Theses/Capstones/Creative Projects

The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim 2023 University of Arkansas, Fayetteville

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros 2023 California State University, San Bernardino

Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros

Electronic Theses, Projects, and Dissertations

Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …


Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu 2023 Western Kentucky University

Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu

Masters Theses & Specialist Projects

Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer 2023 University of Tartu

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr 2023 Southern Adventist University

Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr

Campus Research Day

Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …


Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei WANG 2023 Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China

Evolution And Enlightenment Of Us-Japan “Advanced Storage Research Consortium”, Sumei Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the process of comprehensively promoting Chinese-style modernization, we must adhere to scientific and technological selfreliance and self-improvement as the strategic support for national development, and scientific and technological innovation is the main driving force for high-quality economic development. As one of the carriers, the innovation consortium formed by enterprises as main entities aims to realize the deep integration of innovation chain and industrial chain, accelerating the transformation of scientific and technological achievements into real productivity, and solving the problem of disconnection between scientific research activities and industrial demand. On the basis of reviewing and summarizing the evolution of the …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) 2023 Central University of South Bihar, Panchanpur, Gaya, Bihar

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer 2023 California Polytechnic State University, San Luis Obispo

Shelfaware: Accelerating Collaborative Awareness With Shelf Crdt, John C. Waidhofer

Master's Theses

Collaboration has become a key feature of modern software, allowing teams to work together effectively in real-time while in different locations. In order for a user to communicate their intention to several distributed peers, computing devices must exchange high-frequency updates with transient metadata like mouse position, text range highlights, and temporary comments. Current peer-to-peer awareness solutions have high time and space complexity due to the ever-expanding logs that each client must maintain in order to ensure robust collaboration in eventually consistent environments. This paper proposes an awareness Conflict-Free Replicated Data Type (CRDT) library that provides the tooling to support an …


Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma 2023 University Of the Cumberlands, KY

Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma

International Journal of Smart Sensor and Adhoc Network

In recent times, organizations are examining the art training situation to improve the operation efficiency and the cost of warehouse retail distribution and supply chain management. Microsoft Azure emerges as an expressive technology that leads optimization by giving infrastructure, software, and platform resolutions for the whole warehouse retail distribution and supply chain management. Using Microsoft Azure as a cloud computing tool in retail warehouse distribution and supply manacle management contributes to active and monetary benefits. At the same time, potential limitations and risks should be considered by the retail warehouse distribution and the supply chain administration investors. In this research …


Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V 2023 Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.

Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V

Karbala International Journal of Modern Science

Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. shaban 2023 Helwan Univesity

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens, Sumer Sareen 2023 Claremont Colleges

Blockchain Games: What On And Off-Chain Factors Affect The Volatility, Returns, And Liquidity Of Gaming Crypto Tokens, Sumer Sareen

CMC Senior Theses

Blockchain games took the internet by storm as they offered a new way for users to play video games, own the assets in those games, and benefit monetarily from their efforts. Through Non-Fungible Tokens (NFTs) and cryptocurrencies, new, Web3 games ushered in a unique asset class for retail and institutional investors to diversify into and benefit from. This paper uses cross-sectional data from 30 blockchain gaming companies to identify on and off-chain factors that affect the company’s token volatility, returns, and liquidity. A multiple linear regression found the percentage of tokens dedicated to a company’s private sale and rewarding users, …


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes 2023 Arcadia University

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …


Digital Commons powered by bepress