Science topic

File Systems - Science topic

Explore the latest publications in File Systems, and find File Systems experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to File Systems (10,000)
Sorted by most recent
Article
Full-text available
Distributed computing frameworks are essential for enabling efficient processing of large-scale data across multiple interconnected systems. These frameworks leverage the power of parallelism, allowing tasks to be distributed among various nodes, which can operate simultaneously to perform computations more rapidly than traditional single-node syst...
Book
Full-text available
This study examines the evolving role of blockchain technology across multiple domains, with a particular emphasis on integration strategies, architectural frameworks, and real-world applications. It examines the transition of blockchain technology towards decentralisation and its implications for systemic architectures, including Web3 and collabor...
Article
Full-text available
The ability to share Electronic Health Records (EHRs) with the right people plays a crucial role in providing on-time diagnosis. The outsourcing of private health data on the cloud, with negligible control in the hands of the data owners, poses a significant challenge for e-healthcare applications. Obtaining the owner’s consent is not just essentia...
Article
Full-text available
As cloud computing continues to advance and become an integral part of modern IT infrastructure, container security has emerged as a critical factor in ensuring the smooth operation of cloud-native applications. An attacker can attack the service in the container or even perform the container escape attack by tampering with the files. Monitoring co...
Article
Full-text available
The traditional centralized knowledge base paradigm, exemplified by platforms like Wikipedia, grapples with numerous challenges like a solitary point of collapse, issues related to transparency, and potential integrity concerns in articles. To address these shortcomings, an innovative blockchain-enabled alternative is proposed which leverages the i...
Article
Full-text available
The rapid proliferation of images, driven by advancements in image-capturing technologies, poses significant challenges to the efficient management and retrieval of images from vast databases. Traditional Content-Based Image Retrieval (CBIR) systems struggle with scalability and complexity, resulting in suboptimal retrieval performance. To address...
Article
Full-text available
This review examines the integration of blockchain technology with the IoT in the Marine Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in areas such as oceanographic monitoring and naval defense. These environments present distinct challenges, including a limited communication bandwidth, energy constraints, a...
Article
Full-text available
The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based on blockchain for IIoT data. The authors first introduce the two-layer framework, which includes the...
Article
Full-text available
In the dynamic landscape of the tech industry, the escalating requirement for swift and secure data transmission has catalyzed innovation in integrated communication systems. Free-Space Optics (FSOs) has emerged as a promising contender in optical communications. While conventional optical fiber systems can achieve bit rates of up to 40 Gbps with p...
Article
Full-text available
Organizations are increasingly moving from traditional paper files to digital filing systems to gain a competitive edge and improve access to human resources and HR-related information. This digitalization process not only makes data more accessible but also enhances its utilization for HR decision-making. As a result, HR-related information become...
Article
Full-text available
Patient medical records and their accurate recording, storage, protection, and access are essential elements to high-quality healthcare. While many parts of the world have moved to traditional digital systems and electronic health records (EHRs), these systems require complex evaluation and large infrastructure investments, lack interoperability, a...
Article
Full-text available
In the industrial Internet of Things (IIoT), the interconnection between networks and hardware and between networks themselves produces a substantial volume of data. This leads to various security and privacy issues, greatly increasing the risk of data privacy breaches. Existing methods are not effective in ensuring secure storage of this data, and...
Article
Full-text available
The advent of blockchain technology within the healthcare domain has signified a paradigm shift, transitioning from an emerging trend to an essential infrastructure component that ensures decentralization, transparency, integrity, and persistent availability. Despite its potential, the healthcare sector has not fully capitalized on the vast array o...
Article
Full-text available
Physical Trading Card Games (TCGs) face inherent challenges, including vulnerability to theft, damage, and counterfeiting. Trading systems primarily depend on third-party marketplaces that collect fees from each trade, without benefiting the game developers. Players also deal with problems associated with shipping, such as high prices, long shippin...
Conference Paper
Full-text available
Introduction: The judicious selection of root canal instrumentation systems and obturating materials is pivotal in overcoming several operative challenges, ensuring successful treatment, and effectively managing postoperative pain in children. Aim: To evaluate and compare the synergistic effect of various root canal instrumentation file systems and...
Article
Full-text available
Teknologi menjadi kebutuhan sehari-hari bagi banyak orang. Penggunaan teknologi yang tidak tepat dapat menimbulkan dampak negatif baik bagi individu maupun organisasi seperti mendapatkan informasi-informasi yang bersifat illegal. Hal ini dapat dilakukan dengan memanfaatkan teknologi komputer sehingga menimbulkan kejahatan siber seperti eksploitasi...
Preprint
Full-text available
Effective detection mechanisms are crucial in addressing the growing sophistication and frequency of ransomware attacks. The proposed Multi-Dimensional Cryptographic Behavioral Analysis framework leverages advanced analytical techniques to identify and classify malicious activities through the examination of unique cryptographic and behavioral sign...
Preprint
Full-text available
Parallel input performance issues are often neglected in large scale parallel applications in Computational Science and Engineering. Traditionally, there has been less focus on input performance because either input sizes are small (as in biomolecular simulations) or the time doing input is insignificant compared with the simulation with many times...
Article
Full-text available
The demand for computing resources, including storage and processing capabilities, has surged in recent years. For example, during the COVID-19 pandemic, many activities typically conducted using local resources transitioned to online platforms. However, post-pandemic, services that were previously offered for free or at a reduced cost have become...
Article
Full-text available
This paper proposed a big data pipeline to analyze user behavior on Last.fm which aims to make data-driven recommendations for improving user engagement and attracting new users. The comprehensive analysis of user behavior in the music streaming industry using the Hadoop ecosystem and data analytics techniques. Specifically, the study focuses on La...
Article
Full-text available
Objective To analyze the remaining dentin thickness and crack formation after retreatment, comparing three file systems. Material and Methods Using a standard root length of 18 mm, forty-five single-rooted teeth were decoronated and obturated after being randomly divided into three groups. Solite RS3, Solite RS3 Black, and Solite RE Black retreatm...
Article
Full-text available
The traditional methods used in big data, like cluster creation and query-based data extraction, fail to yield accurate results on massive networks. To address such issues, the proposed approach involves using the Hadoop Distributed File System (HDFS) for data processing, the map-reduce programming paradigm for data processing, and query optimizati...
Method
Full-text available
The government of Ghana in the quest to boost the justice system in Ghana has invested in technology and digital platforms to automate processes and provide fair opportunities for all citizens to access justice. Through the use of online court filing systems, digital case management systems, and virtual courtrooms, the justice system can be more ef...
Preprint
Full-text available
The recent proliferation of portable computers, the advent of personal digital assistants (PDAs) and continuing advances in computer networking all point to a future in which mobility of both users and computing system elements will be standard. However, these developments also inval- idate many of the assumptions made by current system software, w...
Article
Full-text available
Kemajuan teknologi jaringan komputer telah meningkatkan kebutuhan akan protokol transfer file yang efisien dan andal, terutama dalam lingkungan jaringan lokal dan internet. Network File System (NFS) dan File Transfer Protocol (FTP) adalah dua protokol yang banyak digunakan dalam transfer file, masing-masing dengan keunggulan berbeda. Penelitian ini...
Article
Full-text available
In recent years, Electronic health records (EHR) has gradually become the mainstream in the healthcare field. However, due to the fact that EHR systems are provided by different vendors, data is dispersed and stored, which leads to the phenomenon of data silos, making medical information too fragmented and bringing some challenges to current medica...
Article
Full-text available
Efficient data transfer among CSPs is essential for the performance of cloud computing's basic operations, such as migration and disaster recovery. In this research, a novel approach to enhance data transmission performance using DTNs is presented. Using DTNs wisely, the proposed method enhances the speed and reliability of sending huge volumes of...
Preprint
Full-text available
Operating Systems enforce logical isolation using abstractions such as processes, containers, and isolation technologies to protect a system from malicious or buggy code. In this paper, we show new types of side channels through the file system that break this logical isolation. The file system plays a critical role in the operating system, managin...
Article
Full-text available
In the context of digital construction, responsibility management in smart city building information modeling (BIM) projects spans the entire building lifecycle. The involvement of numerous BIM designers in project management and frequent data exchanges pose significant challenges for the traceability, immutability, and responsibility attribution o...
Article
Full-text available
The recent advancements on the Internet of clinical things, intelligent agents, data frameworks, and cloud administrations has prompted a digitalized change in the health industry. The healthcare data has been processed using several software-based techniques over the years. The cloud environment is used to reduce the time and space complexity. The...
Article
Full-text available
This study aimed to assess and evaluate the canal shaping ability of two different Ni-Ti rotary systems, Vortex Blue (VB) and TruNatomy (TN), using micro-computed tomography in extracted premolars. A total of 20 extracted bifurcated maxillary first premolars with two separate canals were randomly divided into two groups and prepared with either VB...
Preprint
Full-text available
The every increasing sophistication of cyber threats requires innovative detection methodologies to safeguard digital infrastructures. Multi-Vector Anomaly Profiling (MVAP) emerges as a groundbreaking approach, offering a comprehensive analysis of system behaviors across multiple dimensions to identify subtle anomalies indicative of ransomware acti...
Preprint
Full-text available
With the rapidly increasing capabilities and adoption of code agents for AI-assisted coding, safety concerns, such as generating or executing risky code, have become significant barriers to the real-world deployment of these agents. To provide comprehensive and practical evaluations on the safety of code agents, we propose RedCode, a benchmark for...
Article
Full-text available
The advancement of Intelligent Transport Systems (ITSs) and the Internet of Vehicles (IoVs) introduces significant security challenges, particularly in ensuring secure communication between vehicles and vehicles (V2V), vehicles and Road Side Units (V2RSU). These vulnerabilities could potentially compromise the integrity of vehicular networks, makin...
Conference Paper
Full-text available
The InterPlanetary File System is a protocol and peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting all computing devices. The distributed system would allow data users to upload and locate their content to the IPFS blockchain n...
Article
Full-text available
Objective: This study evaluated the efficacy of the ProTaper Universal Retreatment system (PTUR) and XP-endo Finisher R instrument (XPFR) in removing 64-month-old root filling material from minimally-instrumented mandibular molar canals. Methods: Forty-eight root canals with Vertucci type II or IV configurations from 30 mandibular molars were inst...
Article
Full-text available
Technology Development plays the role in influencing modernization of tax system one of them is e-Filing System. E-Filing is a tax filing system electronically that facilitates taxpayers in submitting Tax Return anytime and anywhere. The objective of this study is to analyze the implementation of policy on individual tax e-Filing, obstacles encount...
Article
Full-text available
Capacitive touch screens (CTS's) are essential components in most of today's digital devices. However, for the visually impaired (VI) users due to the uneven topography of the tactile surface, CTS's are more challenging to implement and thus this field remains largely underdeveloped. Considering the limited space around the microactuators driving t...
Article
Full-text available
The constraints of data protection make the data confined to different enterprises and organizations, forming many “data islands” and making it difficult to bring out the important value it contains. In this paper, we use federated learning technology as the service foundation and introduce differential privacy, federation chain, interstellar file...
Article
Full-text available
Vehicular ad hoc networks (VANETs) in portable broadband networks are a revolutionary concept with enormous potential for developing safe and efficient transportation systems. Because VANETs are open networks that require regular information sharing, it might be difficult to ensure the security of data delivered through VANETs as well as driver pri...
Article
Full-text available
Background: Canal curvature is a major risk factor for canal transportation, which in turn causes that many parts of the root canal system remain untouched leading to persistence of microorganisms and debris, promoting structural weakening, and compromising the apical seal. Aim: To compare canal transportation and centering ability of reciprocating...
Article
Full-text available
On‐chain sealed auctions represent a novel approach to electronic bidding auctions, wherein the introduction of zero‐knowledge proof technology has significantly enhanced the security of auctions. However, most mainstream on‐chain sealed auction schemes currently employ Bulletproofs to prove auction correctness, which leaves room for optimization i...
Article
Full-text available
The proliferation of Internet of Things (IoT) devices generates vast amounts of data, traditionally stored, processed, and analyzed using centralized systems, making them susceptible to attacks. Blockchain offers a solution by storing and securing IoT data in a distributed manner. However, the low performance and poor scalability of blockchain tech...
Article
Full-text available
Solid-state drives (SSDs) are widely adopted in mobile devices, desktop PCs, and data centers since they offer higher throughput, lower latency, and lower power consumption to modern computing systems and applications compared with hard disk drives (HDDs). However, the performance of the SSDs can be degraded depending on the I/O access pattern due...
Article
Full-text available
This paper introduces the Computational Fluid Dynamics High-Order Writer Library (CFD-HOWL), which performs I/O operations on solution data from high-order CFD simulations. The library centers around the novel mesh upgrade algorithm, which is coupled with the functionalities of the CGNS file system. Even though the library is in Python, users can r...
Article
Full-text available
This paper proposes an online medical pre-diagnosis scheme based on blockchain. It mainly focuses on the problems faced in the medical diagnosis scheme nowadays, such as the huge scale of medical treatment, the lack of data sharing, the impossibility of pursuing responsibility, etc., and constructs a safe and reliable online medical diagnosis schem...
Article
Full-text available
Objectives: The aim of this in-vitro study is to assess and compare the load capacity of teeth with canals prepared using progressive taper versus regressive taper. Methods: Twenty-seven extracted mandibular molars were categorized into three equal groups. The negative control group involved teeth that were accessed and restored with composite resi...
Article
Full-text available
In the healthcare sector, the protection of patient information is an essential factor in terms of secrecy and privacy. This information is very useful for industrial and research purposes. Electronic medical records (EMR) hold data related to patients and their treatments. According to GDPR (general data protection regulation), patient information...
Article
Full-text available
This paper examines methods for extracting and analyzing metadata for evidentiary purposes in civil proceedings. Through a comprehensive review of current literature, legal cases, and forensic techniques, it explores the diverse approaches to metadata analysis across various digital domains, including file systems, emails, documents, web browsers,...
Preprint
Full-text available
The persistent evolution of cyber threats necessitates innovative detection frameworks capable of addressing complex ransomware behaviors that evade traditional security systems. Dynamic Entropy Layer Profiling (DELP) introduces a behavior-based approach centered on entropy profiling across multiple file system layers, capturing distinctive shifts...
Article
Full-text available
The potential for blockchain technology to transform healthcare systems globally is enormous. Blockchain technology has the potential to revolutionize healthcare by creating a decentralized, transparent, and secure platform that can tackle issues like data interoperability, supply chain management, and patient participation. Using blockchain techno...
Preprint
Full-text available
The current telephone communication service mainly uses the call control signaling protocol like SIP and the multimedia dialogue based on SIP ensures high real-time characteristic. However, compared to traditional Web groups, database groups and file system groups, it must be improved in some aspects including system throughput, system response tim...
Preprint
Full-text available
Blockchain has been widely criticized due to the use of inefficient consensus protocols and energy-intensive mechanisms that derived into a global enormous power consumption. Fortunately, since the first blockchain was conceived in 2008 (the one that supports Bitcoin), hardware and consensus protocols have evolved, decreasing energy consumption sig...
Article
Full-text available
Purpose: Despite the rapid adoption of e-filing in Kenya, the filing system is still unreliable especially at peak period and on voluntary usage which lead to low level of compliance perceived by taxpayer. The aim of the study was to determine the effect of excisable goods management system on domestic taxes compliance among small and medium enterp...
Article
Full-text available
The primary risks associated with game account trading include the exposure of personal information and the potential for account retrieval. In a system leveraging blockchain technology, specifically Ethereum combined with the InterPlanetary File System (IPFS), personal and game-related information is kept confidential. This system ensures that onl...
Preprint
Full-text available
Current methods for data access control, especially regarding AI and AI automation, face unique challenges in ensuring appropriate data access. We introduce Integer-Based Access Control (IBAC), addressing the limitations of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). IBAC's mathematical foundations enable its applica...
Article
Full-text available
Deploying LSM-tree-based key-value stores on distributed file systems is a common approach to building distributed key-value storage systems, such as RocksDB on HDFS (RoH). However, due to the inherent read amplification characteristics of the LSM-tree, RoH faces performance degradation issues in read operations, including gets and scans, caused by...
Article
Full-text available
In view of the limitations of the existing methods for personal massive photos management and browsing, a method of using geodatabase to manage and browse massive personal photos is proposed. Firstly, vector geodatabase is created and defined based on geographic information technology. Then, attribute information including the file name, photo date...
Preprint
Full-text available
Many approaches have been proposed to share data in a decentralized manner using blockchain, which solves many security and data management issues but has some limitations, such as transaction fees, mining time, power consumption, etc. The alternative to a traditional blockchain is using IOTA, a directed acyclic graph (DAG) based system, but this a...
Article
Full-text available
The problem in this study is there any effect of the Archive System, Information System and Infrastructure Facilities on the performance of Employees at the Secretariat of the District Parliament of Tapin. This study aims to determine whether there is an influence of the filing system, information systems and infrastructure on the performance of Em...
Article
Full-text available
An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global eigenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transformation model is built, combining with public key cryptography RSA and random numbers to compute the initial values for Lorenz system...
Article
Full-text available
In the digital information age, distributed file storage technologies like the InterPlanetary File System (IPFS) have gained considerable traction as a means of storing and disseminating media content. Despite the advantages of decentralized storage, the proliferation of decentralized technologies has highlighted the need to address the issue of fi...
Article
Full-text available
This paper displays the architecture and implementation of an online voting system that employs Blockchain technology and the InterPlanetary File System (IPFS) to assure safe, transparent, and tamper-proof elections. The offered framework utilizes IPFS to record and supervises voter details, such as name, father’s name, address, constituency, and d...
Method
Full-text available
FileTrust is a decentralized, secure file-sharing solution that leverages blockchain, InterPlanetary File System(IPFS), and advanced cryptographic technologies to provide privacy-focused, distributed data storage. Unlike traditional cloud storage, FileTrust ensures that no single entity has complete control over your data. Instead, files are split...
Preprint
Full-text available
Ransomware has become one of the most prevalent and dangerous cybersecurity threats, capable of encrypting critical files and demanding ransom payments within minutes of infection. A novel hybrid detection system is proposed that combines Isolation Forest for anomaly detection with XGBoost for classification, addressing the limitations of tradition...