Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1464

Full-Text Articles in Data Storage Systems

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb Mar 2024

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan Jan 2024

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran Nov 2023

Large Language Model Use Cases For Instruction, Plus A Primer On Prompt Engineering, Roy Haggerty, Justin Cochran

LSU Health New Orleans Symposium Series on Artificial Intelligence

AMA Credit Designation Statement: The Louisiana State University School of Medicine, New Orleans designates this live activity for a maximum of 1.0 AMA PRA Category 1 Credit™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.

NCPD Credit Designation Statement: Nursing participants may earn 1.0 NCPD contact hours. Each nursing participant must be present for the entire session for which NCPD contact hours are requested and must complete an evaluation of the session to receive credit.


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam Y. Otaif Oct 2023

Awareness Of Cybersecurity And Its Relationship To Digital Transformation Among Supervisors Of The Education Department In Jazan Region, Maryam Y. Otaif

International Journal for Research in Education

The study aimed to identify the degree of awareness of cybersecurity, and to reveal the reality of digital transformation and the relationship between them from the point of view of the supervisors of the Education Department in the Jazan region. The study followed the descriptive correlative approach, by stratified random sampling (257). a questionnaire was built , The study found that the degree of cybersecurity awareness is high with an arithmetic mean of (3.48), and also degree of awareness of cybersecurity concepts is high, (3,52), and awareness of cybersecurity risks and violations (3.45), and it was found that the total …


Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda Oct 2023

Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda

Electrical and Computer Engineering ETDs

This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …


Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala Oct 2023

Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala

College of Engineering Summer Undergraduate Research Program

In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.

In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …


Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng Oct 2023

Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) …


When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau Sep 2023

When Routing Meets Recommendation: Solving Dynamic Order Recommendations Problem In Peer-To-Peer Logistics Platforms, Zhiqin Zhang, Waldy Joe, Yuyang Er, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Peer-to-Peer (P2P) logistics platforms, unlike traditional last-mile logistics providers, do not have dedicated delivery resources (both vehicles and drivers). Thus, the efficiency of such operating model lies in the successful matching of demand and supply, i.e., how to match the delivery tasks with suitable drivers that will result in successful assignment and completion of the tasks. We consider a Same-Day Delivery Problem (SDDP) involving a P2P logistics platform where new orders arrive dynamically and the platform operator needs to generate a list of recommended orders to the crowdsourced drivers. We formulate this problem as a Dynamic Order Recommendations Problem (DORP). …


Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan Aug 2023

Paradigm Review Of Data Localization In India And Its Implications For China, Ying Fan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data localization is a focal point of global data governance and its impact on global data governance is no longer confined to a single country. Over the years, India has followed a unique policy framework in terms of cross-border data flows and data localization, and its insistence on data sovereignty reflects its position in the international arena. This study uses the Indian data localization paradigm as a research base to discuss the common phenomenon of disconnect between policy motivations and practical effects of data localization, and as an entry point to introduce the latest Indian research findings in this area. …


On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao Aug 2023

On Digital Productivity Base Of Policies For Cross-Border Data Flows Between Rcep Parties And Its Influences—Taking Digital Integration Index As A Reference, Gui Huang, Ru Tao

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study reviews the newest legislation and policies of Regional Comprehensive Economic Partnership (RCEP) participating countries on cross-border data flow, and then categorized them according to the ban on data transfer, local storage of data, permission-based regulation, and standards-based regulation. By referring to the indexes in the ASEAN Digital Integration Index, the subject and object factors of digital productivity in RCEP parities are sorted out, as well as the status quo of digital economy. Through the introduction of data value chain theory, the decisive impact of digital productivity factors on the policy formulation of cross-border data flow is expounded; by …


Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi Aug 2023

Research On Multi-Source Heterogeneous Big Data Fusion Based On Wsr, Aihua Li, Weijia Xu, Yong Shi

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the era of multi-source heterogeneous big data, big data presents new features such as cross, diversity and variability. The applications of big data in a wider range of fields have new requirements for data fusion. Under this background, the connotation of data fusion is enriched and expanded. The generalized data fusion includes the fusion of data resources, the fusion of model methods, and the fusion of decision-makers' knowledge and experience. This study analyzes the characteristics of multi-source heterogeneous data fusion at three different fusion levels: data level, information level and decision level, and discusses challenges for data fusion in …


Design And Analysis Of Content Caching Systems, Anirudh Sabnis Aug 2023

Design And Analysis Of Content Caching Systems, Anirudh Sabnis

Doctoral Dissertations

Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …


Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan Aug 2023

Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan

All Theses

Modern HPC applications compute and analyze massive amounts of data. The data volume is growing faster than memory capabilities and storage improvements leading to performance bottlenecks. An example of this is pySDC, a framework for solving collocation problems iteratively using parallel-in-time methods. These methods require storing and exchanging 3D volume data for each parallel point in time. If a simulation consists of M parallel-in-time stages, where the full spatial problem has to be stored for the next iteration, the memory demand for a single state variable is M ×Nx ×Ny ×Nz per time-step. For an application simulation with many state …


Transaction Management Sysyem For A Publisher, Hassain Shareef Mohammed Jr Aug 2023

Transaction Management Sysyem For A Publisher, Hassain Shareef Mohammed Jr

Electronic Theses, Projects, and Dissertations

Managing the day-to-day operations of a publishing house isn't easy. For example, it's hard to keep track of stocks, manage vendor orders, and maintain transaction records. Our project titled Transaction Management System aims to solve these problems by offering a single tool that helps standardize and digitize publishing operations. It assists in automating and improving the efficiency of the various processes involved in a publishing house. The Transaction Management System is a full-stack web application that can be accessed through an internet browser. The user experience and interface are simple and easy to use so that users can find information …


Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, Naresh Kshetri, Keith Miller, Gaurango Banerjee, Bikesh Raj Upreti Jul 2023

Finchain: Adaptation Of Blockchain Technology In Finance And Business - An Ethical Analysis Of Applications, Challenges, Issues And Solutions, Naresh Kshetri, Keith Miller, Gaurango Banerjee, Bikesh Raj Upreti

International Journal of Emerging and Disruptive Innovation in Education : VISIONARIUM

Blockchain Technology is a distributed database technology that has emerged as a ground-breaking technology with several possible solutions to critical applications, say from supply chain management, agribusiness, marketing to healthcare industry including internet of medical things. Although it started as a digital coin (popularly known as bitcoin), it is slowly influencing business, marketing policy and society. We have presented an in-depth study and ethical analysis of how blockchain is applied over the economic and financial sector including banks, credit unions and other retail giants. During our research, we have also investigated how blockchain technology can affect financial institutions around the …


An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif Jul 2023

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif

Future Computing and Informatics Journal

This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …


Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2023

Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …


News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami Jul 2023

News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami

Future Computing and Informatics Journal

Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …


Visual Question Answering: A Survey, Gehad Assem El-Naggar Jul 2023

Visual Question Answering: A Survey, Gehad Assem El-Naggar

Future Computing and Informatics Journal

Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …


Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth Jun 2023

Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth

Computer Engineering

PolyFlowBuilder is a web application that lets users create visually intuitive flowcharts to aid in academic planning at Cal Poly. These flowcharts can be customized in a variety of ways to accurately represent complex academic plans, such as double majors, minors, taking courses out- of-order, etc. The original version of PolyFlowBuilder, released Summer 2020, was not written for continued expansion and growth. Therefore, a complete rewrite was determined to be necessary to enable the project to grow in the future. This report details the process to completely rewrite the existing version of PolyFlowBuilder over the course of six months, using …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe May 2023

Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe

Publications and Research

Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim May 2023

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …