Research Article
BibTex RIS Cite

Data Storage and Management System Using Spider Web Structure: A New Model

Year 2025, EARLY VIEW, 1 - 1
https://doi.org/10.2339/politeknik.1591401

Abstract

This model is a system that optimises the management, storage and processing of data, inspired by the structural resilience and organisational distribution of the spider web in nature. This system has a decentralised, distributed structure, connecting data storage points and processing centres through spider web-like nodes and links. The migration map, represented by arrows from a central control node to different storage and processing nodes, describes how data moves through the system and the routes it takes. The main purpose of this system is to provide secure, fast and flexible management of data storage and processing processes. The central control unit, like a node at the centre of the spider web, supervises the system and ensures that the data is directed to the correct destinations, while the peripheral nodes act as data storage and processing centres. By establishing flexible connections between these structures, a redundancy mechanism has been created against data loss and failures. Thanks to the migration map, it can be clearly seen which storage or processing unit the data has been moved to and which paths it has travelled. The innovative aspect of this system is that it is based on the flexibility and security of the distributed structure.

References

  • [1] Choi T. Y., Dooley K. J., and Rungtusanatham M. “Supply networks and complex adaptive systems: control versus emergence”, Journal of operations management, 19(3): 351-366, (2001).
  • [2] Surana A., Kumara S., Greaves M., and Raghavan U. N. “Supply-chain networks: a complex adaptive systems perspective”, International Journal of Production Research, 43(20): 4235-4265, (2005).
  • [3] Dawaliby S., Bradai A., and Pousset Y. “Distributed network slicing in large scale IoT based on coalitional multi-game theory”, IEEE Transactions on Network and Service Management, 16(4): 1567-1580, (2019).
  • [4] Fan J., Han F., and Liu H. “Challenges of big data analysis”, National science review, 1(2): 293-314, (2014).
  • [5] Lawal Z. K., Zakari R. Y., Shuaibu M. Z., and Bala A. “A review: Issues and Challenges in Big Data from Analytic and Storage perspectives”, International Journal of Engineering and Computer Science, 5(3): 15947-15961, (2016).
  • [6] Roman R., Zhou J., and Lopez J. “On the features and challenges of security and privacy in distributed internet of things”, Computer networks, 57(10): 2266-2279, (2013).
  • [7] Gharaibeh A., Salahuddin M. A., Hussini S. J., Khreishah A., Khalil I., Guizani M., and Al-Fuqaha A. “Smart cities: A survey on data management, security, and enabling Technologies”, IEEE Communications Surveys & Tutorials, 19(4): 2456-2501, (2017).
  • [8] Sakr S., Liu A., Batista D. M., and Alomari M. “A survey of large scale data management approaches in cloud environments”, IEEE communications surveys & tutorials, 13(3): 311-336, (2011).
  • [9] Qin Z., Compton B. G., Lewis J. A., and Buehler M. J. “Structural optimization of 3D-printed synthetic spider webs for high strength”, Nature communications, 6(1): 7038, (2015).
  • [10] Greco G., Mastellari V., Holland C., and Pugno N. M. “Comparing modern and classical perspectives on spider silks and webs”, Perspectives on Science, 29(2): 133-156, (2021).
  • [11] Harmer A. M., Blackledge T.A., Madin J. S., and Herberstein M. E. “High-performance spider webs: integrating biomechanics, ecology and behaviour”, Journal of the Royal Society Interface, 8(57): 457-471, (2011).
  • [12] Kaewunruen S., Ngamkhanong C., and Yang T. “Large-amplitude vibrations of spider web structures”, Applied Sciences, 10(17): 6032, (2020).
  • [13] Regassa Y., Lemu H. G., Sirabizuh B., and Rahimeto S. “Studies on the geometrical design of spider webs for reinforced composite structures”, Journal of Composites Science, 5(2): 57, (2021).
  • [14] Su I., Narayanan N., Logrono M. A., Guo K., Bisshop A., Mühlethaler R., Saraceno T., and Buehler M. J. “In situ three-dimensional spider web construction and mechanics”, Proceedings of the National Academy of Sciences, 118(33): e2101296118, (2021).
  • [15] Tariq U., Ahmed I., Bashir A. K., and Shaukat K. “A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review”, Sensors, 23(8): 4117, (2023).
  • [16] Qi W., Sun M., and Hosseini S. R. A. “Facilitating big-data management in modern business and organizations using cloud computing: a comprehensive study”, Journal of Management & Organization, 29(4): 697-723, (2023).
  • [17] Aldossary S., and Allen W. “Data security, privacy, availability and integrity in cloud computing: issues and current solutions”, International Journal of Advanced Computer Science and Applications, 7(4), (2016).
  • [18] Colombari R., Geuna A., Helper S., Martins R., Paolucci E., Ricci R., and Seamans R. “The interplay between data-driven decision-making and digitalization: A firm-level survey of the Italian and US automotive industries”, International Journal of Production Economics, 255: 108718, (2023).
  • [19] Wilkin C., Ferreira A., Rotaru K., and Gaerlan L. R. “Big data prioritization in SCM decision-making: Its role and performance implications”, International Journal of Accounting Information Systems, 38: 100470, (2020).
  • [20] Yashodha Sambrani R. “Efficient Data Backup Mechanism for Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 5(7): 92-95, (2016).
  • [21] Dawood M., Tu S., Xiao C., Alasmary H., Waqas M., and Rehman S. U. “Cyberattacks and security of cloud computing: a complete guideline”, Symmetry, 15(1): 1981, (2023).
  • [22] Qi P., Chiaro D., Guzzo A., Ianni M., Fortino G., and Piccialli F. “Model aggregation techniques in federated learning: A comprehensive survey”, Future Generation Computer Systems, 150: 272-293, (2024).
  • [23] Li C., Chen Y., and Shang Y. “A review of industrial big data for decision making in intelligent manufacturing”, Engineering Science and Technology, an International Journal, 29: 101021 (2022).
  • [24] Zineb E. F., Najat R., and Jaafar A. “An intelligent approach for data analysis and decision making in big data: a case study on e-commerce industry”, International Journal of Advanced Computer Science and Applications, 12(7), (2021).
  • [25] Lee I., and Shin Y. J. “Machine learning for enterprises: Applications, algorithm selection, and challenges”, Business Horizons, 63(2): 157-170, (2020).
  • [26] Adaga E. M., Okorie G. N., Egieya Z. E., Ikwue U., Udeh C. A., DaraOjimba D. O., and Oriekhoe O. I. “The role of big data in business strategy: a critical review”, Computer Science & IT Research Journal, 4(3): 27-350, (2023).
  • [27] Santos N., Rodrigues R., Gummadi K., and Saroiu S. “Excalibur: Building Trustworthy Cloud Services,” Technical Report MPISWS-2011-004”, MPI-SWS, (2011).
  • [28] Foelix R. F., and Erb B. “Microscopical studies on exuviae of the jumping spider Phidippus regius”, Peckhamia, 90: 1-15, (2011).
  • [29] Tanenbaum A. S., and Van Steen M. Distributed systems. In: CreateSpace Independent Publishing Platform, (pp.298-303), (2017).
  • [30] Buede D. M., and Miller W. D. “The engineering design of systems: models and methods”, John Wiley & Sons, (2024).
  • [31] Ross A. M., Rhodes D. H., and Hastings D. E. “Defining changeability: Reconciling flexibility, adaptability, scalability, modifiability, and robustness for maintaining system lifecycle value”, Systems engineering, 11(3): 246-262, (2008).
  • [32] Grumbach J. L., and Thomas L. D. “Integration principles for complex systems”, Systems Engineering, 23(6): 684-706, (2020).
  • [33] Pipek V., and Wulf V. “Infrastructuring: Toward an integrated perspective on the design and use of information technology”, Journal of the Association for Information Systems, 10(5): 1, (2009).
  • [34] Dashofy E. M., Hoek A. V. D., and Taylor R. N. “A comprehensive approach for the development of modular software architecture description languages”, ACM Transactions on Software Engineering and Methodology (TOSEM), 14(2): 199-245, (2005).
  • [35] Breivold H. P., Crnkovic I., and Larsson M. “A systematic review of software architecture evolution research”, Information and Software Technology, 54(1): 16-40, (2012).
  • [36] Rasheedh J. A., and Saradha S. “Design and development of resilient microservices architecture for cloud based applications using hybrid design patterns”, Indian J. Comput. Sci. Eng, 13(2): 365-378, (2022).
  • [37] Blinowski G., Ojdowska A., and Przybyłek A. “Monolithic vs. microservice architecture: A performance and scalability evaluation”, IEEE Access, 10: 20357-20374, (2022).
  • [38] Folmer E., Van Gurp J., and Bosch J. “A framework for capturing the relationship between usability and software architecture”, Software Process: Improvement and Practice, 8(2): 67-87, (2003).
  • [39] Duggineni S. “Impact of controls on data integrity and information systems”, Science and Technology, 13(2): 29-35, (2023).
  • [40] Borky J. M., Bradley T. H., Borky J. M., and Bradley T. H. “Protecting information with cybersecurity”, Effective Model-Based Systems Engineering, 9: 345-404, (2019).
  • [41] Wei P., Wang D., Zhao Y., Tyagi S. K. S., and Kumar N. “Blockchain data-based cloud data integrity protection mechanism”, Future Generation Computer Systems, 102: 902-911, (2020).
  • [42] Hao Z., Zhong S., and Yu N. “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability”, IEEE transactions on Knowledge and Data Engineering, 23(9): 1432-1437, (2011).
  • [43] Suh B., and Han I. “The impact of customer trust and perception of security control on the acceptance of electronic commerce”, International Journal of electronic commerce, 7(3): 135-161, (2003).
  • [44] Evans N., Miklosik A., and Du J. T. “University-industry collaboration as a driver of digital transformation: Types, benefits and enablers”, Heliyon, 9(10), (2023).
  • [45] Alkhazaleh R., Mykoniatis K., and Alahmer A. “The success of technology transfer in the industry 4.0 era: A systematic literature review”, Journal of Open Innovation: Technology, Market, and Complexity, 8(4): 202, (2022).
  • [46] Clarysse B., and Bruneel J. “Nurturing and growing innovative start‐ups: the role of policy as integrator”, R&d Management, 37(2): 139-149 (2007).
  • [47] Bala M., and Verma D. “A critical review of digital marketing” International Journal of Management, IT & Engineering, 8(10): 321-339, (2018).
  • [48] Pascucci F., Savelli E., and Gistri G. “How digital technologies reshape marketing: evidence from a qualitative investigation”, Italian Journal of Marketing, 2023(1): 27-58, (2023).
  • [49] Füller J., Hutter K., Wahl J., Bilgram V., and Tekic Z. “How AI revolutionizes innovation management–Perceptions and implementation preferences of AI-based innovators”, Technological Forecasting and Social Change,178: 121598, (2022).
  • [50] Radicic D., and Petković S. “Impact of digitalization on technological innovations in small and medium-sized enterprises (SMEs)”, Technological Forecasting and Social Change, 191: 122474, (2023).

Örümcek Ağı Yapısını Kullanarak Veri Depolama ve İşletme Yönetimi Sistemi: Yeni Bir Model

Year 2025, EARLY VIEW, 1 - 1
https://doi.org/10.2339/politeknik.1591401

Abstract

Bu model, doğadaki örümcek ağının yapısal dayanıklılığından ve örgütsel dağılımından esinlenerek verilerin yönetimini, depolanmasını ve işlenmesini optimize eden bir sistemdir. Bu sistem, veri depolama noktalarını ve işleme merkezlerini örümcek ağı benzeri düğümler ve bağlantılar aracılığıyla birbirine bağlayan merkezi olmayan, dağıtılmış bir yapıya sahiptir. Merkezi bir kontrol düğümünden farklı depolama ve işleme düğümlerine oklarla gösterilen göç haritası, verilerin sistem içinde nasıl hareket ettiğini ve hangi rotaları izlediğini açıklamaktadır. Bu sistemin temel amacı, veri depolama ve işleme süreçlerinin güvenli, hızlı ve esnek bir şekilde yönetilmesini sağlamaktır. Örümcek ağının merkezindeki bir düğüm gibi olan merkezi kontrol ünitesi, sistemi denetler ve verilerin doğru hedeflere yönlendirilmesini sağlarken, çevresel düğümler veri depolama ve işleme merkezleri olarak işlev görür. Bu yapılar arasında esnek bağlantılar kurularak, veri kaybına ve arızalara karşı bir yedeklilik mekanizması oluşturulmuştur. Göç haritası sayesinde, verilerin hangi depolama veya işleme birimine taşındığı ve hangi yolları izlediği açıkça görülebilir. Bu sistemin yenilikçi yönü, dağıtılmış yapının esnekliğine ve güvenliğine dayanmasıdır.

References

  • [1] Choi T. Y., Dooley K. J., and Rungtusanatham M. “Supply networks and complex adaptive systems: control versus emergence”, Journal of operations management, 19(3): 351-366, (2001).
  • [2] Surana A., Kumara S., Greaves M., and Raghavan U. N. “Supply-chain networks: a complex adaptive systems perspective”, International Journal of Production Research, 43(20): 4235-4265, (2005).
  • [3] Dawaliby S., Bradai A., and Pousset Y. “Distributed network slicing in large scale IoT based on coalitional multi-game theory”, IEEE Transactions on Network and Service Management, 16(4): 1567-1580, (2019).
  • [4] Fan J., Han F., and Liu H. “Challenges of big data analysis”, National science review, 1(2): 293-314, (2014).
  • [5] Lawal Z. K., Zakari R. Y., Shuaibu M. Z., and Bala A. “A review: Issues and Challenges in Big Data from Analytic and Storage perspectives”, International Journal of Engineering and Computer Science, 5(3): 15947-15961, (2016).
  • [6] Roman R., Zhou J., and Lopez J. “On the features and challenges of security and privacy in distributed internet of things”, Computer networks, 57(10): 2266-2279, (2013).
  • [7] Gharaibeh A., Salahuddin M. A., Hussini S. J., Khreishah A., Khalil I., Guizani M., and Al-Fuqaha A. “Smart cities: A survey on data management, security, and enabling Technologies”, IEEE Communications Surveys & Tutorials, 19(4): 2456-2501, (2017).
  • [8] Sakr S., Liu A., Batista D. M., and Alomari M. “A survey of large scale data management approaches in cloud environments”, IEEE communications surveys & tutorials, 13(3): 311-336, (2011).
  • [9] Qin Z., Compton B. G., Lewis J. A., and Buehler M. J. “Structural optimization of 3D-printed synthetic spider webs for high strength”, Nature communications, 6(1): 7038, (2015).
  • [10] Greco G., Mastellari V., Holland C., and Pugno N. M. “Comparing modern and classical perspectives on spider silks and webs”, Perspectives on Science, 29(2): 133-156, (2021).
  • [11] Harmer A. M., Blackledge T.A., Madin J. S., and Herberstein M. E. “High-performance spider webs: integrating biomechanics, ecology and behaviour”, Journal of the Royal Society Interface, 8(57): 457-471, (2011).
  • [12] Kaewunruen S., Ngamkhanong C., and Yang T. “Large-amplitude vibrations of spider web structures”, Applied Sciences, 10(17): 6032, (2020).
  • [13] Regassa Y., Lemu H. G., Sirabizuh B., and Rahimeto S. “Studies on the geometrical design of spider webs for reinforced composite structures”, Journal of Composites Science, 5(2): 57, (2021).
  • [14] Su I., Narayanan N., Logrono M. A., Guo K., Bisshop A., Mühlethaler R., Saraceno T., and Buehler M. J. “In situ three-dimensional spider web construction and mechanics”, Proceedings of the National Academy of Sciences, 118(33): e2101296118, (2021).
  • [15] Tariq U., Ahmed I., Bashir A. K., and Shaukat K. “A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review”, Sensors, 23(8): 4117, (2023).
  • [16] Qi W., Sun M., and Hosseini S. R. A. “Facilitating big-data management in modern business and organizations using cloud computing: a comprehensive study”, Journal of Management & Organization, 29(4): 697-723, (2023).
  • [17] Aldossary S., and Allen W. “Data security, privacy, availability and integrity in cloud computing: issues and current solutions”, International Journal of Advanced Computer Science and Applications, 7(4), (2016).
  • [18] Colombari R., Geuna A., Helper S., Martins R., Paolucci E., Ricci R., and Seamans R. “The interplay between data-driven decision-making and digitalization: A firm-level survey of the Italian and US automotive industries”, International Journal of Production Economics, 255: 108718, (2023).
  • [19] Wilkin C., Ferreira A., Rotaru K., and Gaerlan L. R. “Big data prioritization in SCM decision-making: Its role and performance implications”, International Journal of Accounting Information Systems, 38: 100470, (2020).
  • [20] Yashodha Sambrani R. “Efficient Data Backup Mechanism for Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 5(7): 92-95, (2016).
  • [21] Dawood M., Tu S., Xiao C., Alasmary H., Waqas M., and Rehman S. U. “Cyberattacks and security of cloud computing: a complete guideline”, Symmetry, 15(1): 1981, (2023).
  • [22] Qi P., Chiaro D., Guzzo A., Ianni M., Fortino G., and Piccialli F. “Model aggregation techniques in federated learning: A comprehensive survey”, Future Generation Computer Systems, 150: 272-293, (2024).
  • [23] Li C., Chen Y., and Shang Y. “A review of industrial big data for decision making in intelligent manufacturing”, Engineering Science and Technology, an International Journal, 29: 101021 (2022).
  • [24] Zineb E. F., Najat R., and Jaafar A. “An intelligent approach for data analysis and decision making in big data: a case study on e-commerce industry”, International Journal of Advanced Computer Science and Applications, 12(7), (2021).
  • [25] Lee I., and Shin Y. J. “Machine learning for enterprises: Applications, algorithm selection, and challenges”, Business Horizons, 63(2): 157-170, (2020).
  • [26] Adaga E. M., Okorie G. N., Egieya Z. E., Ikwue U., Udeh C. A., DaraOjimba D. O., and Oriekhoe O. I. “The role of big data in business strategy: a critical review”, Computer Science & IT Research Journal, 4(3): 27-350, (2023).
  • [27] Santos N., Rodrigues R., Gummadi K., and Saroiu S. “Excalibur: Building Trustworthy Cloud Services,” Technical Report MPISWS-2011-004”, MPI-SWS, (2011).
  • [28] Foelix R. F., and Erb B. “Microscopical studies on exuviae of the jumping spider Phidippus regius”, Peckhamia, 90: 1-15, (2011).
  • [29] Tanenbaum A. S., and Van Steen M. Distributed systems. In: CreateSpace Independent Publishing Platform, (pp.298-303), (2017).
  • [30] Buede D. M., and Miller W. D. “The engineering design of systems: models and methods”, John Wiley & Sons, (2024).
  • [31] Ross A. M., Rhodes D. H., and Hastings D. E. “Defining changeability: Reconciling flexibility, adaptability, scalability, modifiability, and robustness for maintaining system lifecycle value”, Systems engineering, 11(3): 246-262, (2008).
  • [32] Grumbach J. L., and Thomas L. D. “Integration principles for complex systems”, Systems Engineering, 23(6): 684-706, (2020).
  • [33] Pipek V., and Wulf V. “Infrastructuring: Toward an integrated perspective on the design and use of information technology”, Journal of the Association for Information Systems, 10(5): 1, (2009).
  • [34] Dashofy E. M., Hoek A. V. D., and Taylor R. N. “A comprehensive approach for the development of modular software architecture description languages”, ACM Transactions on Software Engineering and Methodology (TOSEM), 14(2): 199-245, (2005).
  • [35] Breivold H. P., Crnkovic I., and Larsson M. “A systematic review of software architecture evolution research”, Information and Software Technology, 54(1): 16-40, (2012).
  • [36] Rasheedh J. A., and Saradha S. “Design and development of resilient microservices architecture for cloud based applications using hybrid design patterns”, Indian J. Comput. Sci. Eng, 13(2): 365-378, (2022).
  • [37] Blinowski G., Ojdowska A., and Przybyłek A. “Monolithic vs. microservice architecture: A performance and scalability evaluation”, IEEE Access, 10: 20357-20374, (2022).
  • [38] Folmer E., Van Gurp J., and Bosch J. “A framework for capturing the relationship between usability and software architecture”, Software Process: Improvement and Practice, 8(2): 67-87, (2003).
  • [39] Duggineni S. “Impact of controls on data integrity and information systems”, Science and Technology, 13(2): 29-35, (2023).
  • [40] Borky J. M., Bradley T. H., Borky J. M., and Bradley T. H. “Protecting information with cybersecurity”, Effective Model-Based Systems Engineering, 9: 345-404, (2019).
  • [41] Wei P., Wang D., Zhao Y., Tyagi S. K. S., and Kumar N. “Blockchain data-based cloud data integrity protection mechanism”, Future Generation Computer Systems, 102: 902-911, (2020).
  • [42] Hao Z., Zhong S., and Yu N. “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability”, IEEE transactions on Knowledge and Data Engineering, 23(9): 1432-1437, (2011).
  • [43] Suh B., and Han I. “The impact of customer trust and perception of security control on the acceptance of electronic commerce”, International Journal of electronic commerce, 7(3): 135-161, (2003).
  • [44] Evans N., Miklosik A., and Du J. T. “University-industry collaboration as a driver of digital transformation: Types, benefits and enablers”, Heliyon, 9(10), (2023).
  • [45] Alkhazaleh R., Mykoniatis K., and Alahmer A. “The success of technology transfer in the industry 4.0 era: A systematic literature review”, Journal of Open Innovation: Technology, Market, and Complexity, 8(4): 202, (2022).
  • [46] Clarysse B., and Bruneel J. “Nurturing and growing innovative start‐ups: the role of policy as integrator”, R&d Management, 37(2): 139-149 (2007).
  • [47] Bala M., and Verma D. “A critical review of digital marketing” International Journal of Management, IT & Engineering, 8(10): 321-339, (2018).
  • [48] Pascucci F., Savelli E., and Gistri G. “How digital technologies reshape marketing: evidence from a qualitative investigation”, Italian Journal of Marketing, 2023(1): 27-58, (2023).
  • [49] Füller J., Hutter K., Wahl J., Bilgram V., and Tekic Z. “How AI revolutionizes innovation management–Perceptions and implementation preferences of AI-based innovators”, Technological Forecasting and Social Change,178: 121598, (2022).
  • [50] Radicic D., and Petković S. “Impact of digitalization on technological innovations in small and medium-sized enterprises (SMEs)”, Technological Forecasting and Social Change, 191: 122474, (2023).
There are 50 citations in total.

Details

Primary Language English
Subjects Environmental Management (Other)
Journal Section Research Article
Authors

Ayşe Meriç Yazıcı 0000-0001-6769-2599

Hüseyin Çiçeklioğlu 0000-0003-3922-6755

Early Pub Date August 18, 2025
Publication Date October 25, 2025
Submission Date November 26, 2024
Acceptance Date February 9, 2025
Published in Issue Year 2025 EARLY VIEW

Cite

APA Yazıcı, A. M., & Çiçeklioğlu, H. (2025). Data Storage and Management System Using Spider Web Structure: A New Model. Politeknik Dergisi1-1. https://doi.org/10.2339/politeknik.1591401
AMA Yazıcı AM, Çiçeklioğlu H. Data Storage and Management System Using Spider Web Structure: A New Model. Politeknik Dergisi. Published online August 1, 2025:1-1. doi:10.2339/politeknik.1591401
Chicago Yazıcı, Ayşe Meriç, and Hüseyin Çiçeklioğlu. “Data Storage and Management System Using Spider Web Structure: A New Model”. Politeknik Dergisi, August (August 2025), 1-1. https://doi.org/10.2339/politeknik.1591401.
EndNote Yazıcı AM, Çiçeklioğlu H (August 1, 2025) Data Storage and Management System Using Spider Web Structure: A New Model. Politeknik Dergisi 1–1.
IEEE A. M. Yazıcı and H. Çiçeklioğlu, “Data Storage and Management System Using Spider Web Structure: A New Model”, Politeknik Dergisi, pp. 1–1, August2025, doi: 10.2339/politeknik.1591401.
ISNAD Yazıcı, Ayşe Meriç - Çiçeklioğlu, Hüseyin. “Data Storage and Management System Using Spider Web Structure: A New Model”. Politeknik Dergisi. August2025. 1-1. https://doi.org/10.2339/politeknik.1591401.
JAMA Yazıcı AM, Çiçeklioğlu H. Data Storage and Management System Using Spider Web Structure: A New Model. Politeknik Dergisi. 2025;:1–1.
MLA Yazıcı, Ayşe Meriç and Hüseyin Çiçeklioğlu. “Data Storage and Management System Using Spider Web Structure: A New Model”. Politeknik Dergisi, 2025, pp. 1-1, doi:10.2339/politeknik.1591401.
Vancouver Yazıcı AM, Çiçeklioğlu H. Data Storage and Management System Using Spider Web Structure: A New Model. Politeknik Dergisi. 2025:1-.