Towards Cloud-Based Cost-Effective Serverless Information System, 2022 Eastern Washington University
Towards Cloud-Based Cost-Effective Serverless Information System, Isaac C. Angle
EWU Masters Thesis Collection
E-commerce information systems are becoming increasingly popular for businesses to adopt. In this work, we propose a serverless information system that will reduce costs for small businesses trying to create an e-commerce website. The proposed serverless system is built entirely in Amazon Web Services (AWS). The proposed serverless system allows businesses to pay for the use of cloud resources on a per-order granularity. This model reduces the cost of the information system when compared to a traditional cloud-based system. As e-commerce websites become more vital for small businesses, a cost effective serverless approach is promising.
Magic: The Gathering Card Virtualizer, 2022 The University of Akron
Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn
Williams Honors College, Honors Research Projects
Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …
Vehicle Maintenance Tracking Program, 2022 The University of Akron
Vehicle Maintenance Tracking Program, Jared Tomlinson
Williams Honors College, Honors Research Projects
In order to help consumers and businesses keep track of vehicle maintenance, I will create a program paired with a database that can track vehicle maintenance needs and when they should be performed. The program will be capable of tracking entire fleets of vehicles and based on the vehicle’s mileage, will notify users of what maintenance should be performed. Users will be able to add, remove, and edit vehicles in the system as needed and each vehicle will be paired with a maintenance schedule based on its needs. As maintenance is performed, it can be tracked on the schedule, which …
Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, 2022 West Virginia University
Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola
Graduate Theses, Dissertations, and Problem Reports
In many databases, there is private or sensitive data that should not be accessible to any but a few individuals, such as HIPAA (Health Insurance Portability and Accountability Act) protected or LE (law enforcement) data. However, there is often a need to work with the data or change it for proper and thorough testing, especially for the developers . In some cases, the developers may be authorized to access and view the data, but it is rarely allowable for that data to be changed. Further, it is unlikely, especially on a large project, that all of the developers will have …
Graph Based Management Of Temporal Data, 2021 Kennesaw State University
Graph Based Management Of Temporal Data, Alex Fotso
Master of Science in Computer Science Theses
In recent decades, there has been a significant increase in the use of smart devices and sensors that led to high-volume temporal data generation. Temporal modeling and querying of this huge data have been essential for effective querying and retrieval. However, custom temporal models have the problem of generalizability, whereas the extended temporal models require users to adapt to new querying languages. In this thesis, we propose a method to improve the modeling and retrieval of temporal data using an existing graph database system (i.e., Neo4j) without extending with additional operators. Our work focuses on temporal data represented as intervals …
Messiness: Automating Iot Data Streaming Spatial Analysis, 2021 CUNY New York City College of Technology
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …
Digitization Of Academic Libraries Through Cloud Environment, 2021 Hindustan Institute of Technology and Science (Hindustan University)
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Library Philosophy and Practice (e-journal)
Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …
Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, 2021 University of Arkansas, Fayetteville
Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir
Graduate Theses and Dissertations
Chip and packaging industries are making significant progress in 2.5D design as a result of increasing popularity of their application. In advanced high-density 2.5D packages, package redistribution layers become similar to chip Back-End-of-Line routing layers, and the gap between them scales down with pin density improvement. Chiplet-package interactions become significant and severely affect system performance and reliability. Moreover, 2.5D integration offers opportunities to apply novel design techniques. The traditional die-by-die design approach neither carefully considers these interactions nor fully exploits the cross-boundary design opportunities.
This thesis presents chiplet-package cross-boundary design, extraction, analysis, and optimization tool flows and methodologies for high-density …
Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, 2021 Clemson University
Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally
All Theses
Floods are among the most destructive natural hazards that affect millions of people across the world leading to severe loss of life and damage to property, critical infrastructure, and the environment. Deep learning algorithms are exceptionally valuable tools for collecting and analyzing the catastrophic readiness and countless actionable flood data. Convolutional neural networks (CNNs) are one form of deep learning algorithms widely used in computer vision which can be used to study flood images and assign learnable weights and biases to various objects in the image. Here, we leveraged and discussed how connected vision systems can be used to embed …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, 2021 King Abdulaziz University, Saudi Arabia
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, 2021 Faculty of Computers and Information Technology, Future University in Egypt
A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami
Future Computing and Informatics Journal
A feature is a single measurable criterion to an observation of a process. While knowledge discovery techniques successfully contribute in many fields, however, the extensive required data processing could hinder the performance of these techniques. One of the main issues in processing data is the dimensionality of the data. Therefore, focusing on reducing the data dimensionality through eliminating the insignificant attributes could be considered one of the successful steps for raising the applied techniques’ performance. On the other hand, focusing on the applied field, ovarian cancer patients continuously suffer from the extensive analysis requirements for detecting the disease as well …
Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, 2021 Kennesaw State University
Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Symposium of Student Scholars
Despite the type of industry, data sharing has always been a concern across the globe within the conventional database model; particularly in the healthcare industry, where the lack of data interoperability in existing applications creates not only security and transparency issues in EHR but also cost-related concerns that impact the quality of patient care. Without adopting novel and emerging technologies that allow patients to store and share EHR data within a tamper-evident, immutable, and secure data storing and sharing network, this current problem could not be resolved. Emerging Hyperledger Fabric-based Blockchain technology can be an ideal solution to address these …
Disaster Recovery System And Service Continuity Of Digital Library, 2021 Hindustan University
Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M
Library Philosophy and Practice (e-journal)
This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, 2021 Florida International University
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner
FIU Electronic Theses and Dissertations
Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …
Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, 2021 Singapore Management University
Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu
Research Collection School Of Computing and Information Systems
With the ubiquity of mobile devices and rapid development of cloud computing, mobile cloud computing (MCC) has been considered as an essential computation setting to support complicated, scalable and flexible mobile applications by overcoming the physical limitations of mobile devices with the aid of cloud. In the MCC setting, since many mobile applications (e.g., map apps) interacting with cloud server and application server need to perform computation with the private data of users, it is important to realize secure computation for MCC. In this article, we propose an efficient server-aided secure two-party computation (2PC) protocol for MCC. This is the …
The Impact Of Cloud Computing On Academic Libraries, 2021 PSN College of Engineering & Technology
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
Library Philosophy and Practice (e-journal)
With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …
Which Variables Should I Log?, 2021 Zhejiang University
Which Variables Should I Log?, Zhongxin Liu, Xin Xia, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li
Research Collection School Of Computing and Information Systems
Developers usually depend on inserting logging statements into the source code to collect system runtime information. Such logged information is valuable for software maintenance. A logging statement usually prints one or more variables to record vital system status. However, due to the lack of rigorous logging guidance and the requirement of domain-specific knowledge, it is not easy for developers to make proper decisions about which variables to log. To address this need, in this work, we propose an approach to recommend logging variables for developers during development by learning from existing logging statements. Different from other prediction tasks in software …
Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, 2021 doctor of technical sciences, professor of the department “Information Technologies” at Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Address: 108 Amir Temur st., 100084, Tashkent city, Republic of Uzbekistan, E-mail: tet2001@rambler.ru;
Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, Hakimjon Nasiridinovich Zaynidinov, Orif Kudratovich Makhmanov, Feruz Mukhammadjon Ogli Latifov, Djamshid Bakhodirovich Sultanov
Chemical Technology, Control and Management
In our country, comprehensive systemic measures are being taken to develop the digital economy and improve the widespread introduction of modern information and communication technologies in all sectors and industries, including education and science. This strategy requires improving the quality and efficiency of the system of training and attestation of highly qualified scientific and scientific-pedagogical personnel, further development of the industry through digitalization and adaptation to advanced world practice. This paper presents models and descriptions of scenarios for the use of "Complex-analytical information system of scientific degrees" developed for the exchange of electronic documents and the digitization of their attestation …
Multilateration Index., 2021 University of Louisville
Multilateration Index., Chip Lynch
Electronic Theses and Dissertations
We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …
Context-Aware Outstanding Fact Mining From Knowledge Graphs, 2021 Singapore Management University
Context-Aware Outstanding Fact Mining From Knowledge Graphs, Yueji Yang, Yuchen Li, Panagiotis Karras, Anthony Tung
Research Collection School Of Computing and Information Systems
An Outstanding Fact (OF) is an attribute that makes a target entity stand out from its peers. The mining of OFs has important applications, especially in Computational Journalism, such as news promotion, fact-checking, and news story finding. However, existing approaches to OF mining: (i) disregard the context in which the target entity appears, hence may report facts irrelevant to that context; and (ii) require relational data, which are often unavailable or incomplete in many application domains. In this paper, we introduce the novel problem of mining Contextaware Outstanding Facts (COFs) for a target entity under a given context specified by …