Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

976 Full-Text Articles 1,278 Authors 323,728 Downloads 99 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

976 full-text articles. Page 1 of 37.

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick 2019 University of Pennsylvania Law School

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla 2018 California State University, San Bernardino

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


California State University, San Bernardino Chatbot, Krutarth Desai 2018 California State University, San Bernardino

California State University, San Bernardino Chatbot, Krutarth Desai

Electronic Theses, Projects, and Dissertations

Now-a-days the chatbot development has been moving from the field of Artificial-Intelligence labs to the desktops and mobile domain experts. In the fastest growing technology world, most smartphone users spend major time in the messaging apps such as Facebook messenger. A chatbot is a computer program that uses messaging channels to interact with users using natural Languages. Chatbot uses appropriate mapping techniques to transform user inputs into a relational database and fetch the data by calling an existing API and then sends an appropriate response to the user to drive its chats. Drawbacks include the need to learn and use ...


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai 2018 University of Arkansas, Fayetteville

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing ...


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He 2018 Fairfield University

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade 2018 University of Arkansas, Fayetteville

Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade

Theses and Dissertations

Surge Irrigation is a type of furrow irrigation and one of many efficient irrigation techniques. It is one of the economical techniques and requires minimum labor for monitoring it. In surge irrigation, water is applied intermittently to a field to achieve uniform distribution of water along the furrows, which is important while irrigating, as it ensures that there is enough water near the root zone of the crop. The uneven distribution can cause a loss in crop productivity.

Surge irrigation uses a surge valve, which is an electro-mechanical device that irrigates a field. The commercial surge valves available on the ...


Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh 2018 Purdue University

Transcribing Braille Code: Learning Equations Across Platforms, Deegan Atha, Courtney Balogh

Purdue Journal of Service-Learning and International Engagement

Deegan Atha, a graduating senior in electrical engineering and a future engineer, is interested in human-centered design and developing technology that helps students engage and be successful in STEM.

Courtney Balogh, a junior in mechanical engineering, is interested in human-centered design and the importance it plays in product development. Deegan and Courtney are members of the Purdue EPICS project, Learning Equations Across Platforms (LEAP). They partnered with the Indiana School for the Blind and Visually Impaired (ISBVI) to develop a braille transcription device and web application that converts braille to print in real time.


Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto 2018 University of York

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Anthropology Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


Development Of Digital Control Systems For Wearable Mechatronic Devices: Applications In Musculoskeletal Rehabilitation Of The Upper Limb, Tyler Desplenter 2018 The University of Western Ontario

Development Of Digital Control Systems For Wearable Mechatronic Devices: Applications In Musculoskeletal Rehabilitation Of The Upper Limb, Tyler Desplenter

Electronic Thesis and Dissertation Repository

The potential for wearable mechatronic systems to assist with musculoskeletal rehabilitation of the upper limb has grown with the technology. One limiting factor to realizing the benefits of these devices as motion therapy tools is within the development of digital control solutions. Despite many device prototypes and research efforts in the surrounding fields, there are a lack of requirements, details, assessments, and comparisons of control system characteristics, components, and architectures in the literature. Pairing this with the complexity of humans, the devices, and their interactions makes it a difficult task for control system developers to determine the best solution for ...


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley 2018 Embry-Riddle Aeronautical University

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh OUH, Yunghans IRAWAN 2018 Singapore Management University

Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan

Research Collection School Of Information Systems

This paper shares our insights on exploring theexperiential learning model and risk management process todesign an undergraduate software architecture course. The keychallenge for undergraduate students to appreciate softwarearchitecture design is usually their limited experience in thesoftware industry. In software architecture, the high-level designprinciples are heuristics lacking the absoluteness of firstprinciples which for inexperienced undergraduate students, thisis a frustrating divergence from what they used to value. From aneducator's perspective, teaching software architecture requirescontending with the problem of how to express this level ofabstraction practically and also make the learning realistic. Inthis paper, we propose a model adapting the concepts ofexperiential ...


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli 2018 Kennesaw State University

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices ...


Teaching Adult Learners On Software Architecture Design Skills, Eng Lieh OUH, Yunghans IRAWAN 2018 Singapore Management University

Teaching Adult Learners On Software Architecture Design Skills, Eng Lieh Ouh, Yunghans Irawan

Research Collection School Of Information Systems

Software architectures present high-level views ofsystems, enabling developers to abstract away the unnecessarydetails and focus on the overall big picture. Designing a softwarearchitecture is an essential skill in software engineering and adultlearners are seeking this skill to further progress in their career.With the technology revolution and advancements in this rapidlychanging world, the proportion of adult learners attendingcourses for continuing education are increasing. Their learningobjectives are no longer to obtain good grades but the practicalskills to enable them to perform better in their work and advancein their career. Teaching software architecture to upskill theseadult learners requires contending with the problem ...


Minutes & Seconds: The Scientists, Patrick Aievoli 2018 Long Island University - C W Post Campus

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an ...


Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin 2018 Purdue University

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join ...


Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, Zhao Xing Lim, Mohammad Jahanshahi, Tarutal Ghosh Mondal, Da Cheng, Shutao Wang, Mohammad K. Sweidan, Aanis Ahmad, Omar Hesham Abouhussein, Xi Chen 2018 Purdue University

Real-Time Non-Contact Road Defect Detection Using Inexpensive Sensors, Zhao Xing Lim, Mohammad Jahanshahi, Tarutal Ghosh Mondal, Da Cheng, Shutao Wang, Mohammad K. Sweidan, Aanis Ahmad, Omar Hesham Abouhussein, Xi Chen

The Summer Undergraduate Research Fellowship (SURF) Symposium

Road defects such as potholes, humps, and road cracks have become one of the main concerns for road and traffic safety worldwide. Pavement defect detection is crucial to ensure road safety. However, current solutions to this problem are either too time-consuming or too expensive to be employed large-scale. We propose a novel approach which has the ability to autonomously detect potholes in real-time using cost-effective sensors. Inexpensive sensors are mounted on a vehicle and a deep learning algorithm is used to identify road defects. The detection system is paired with a GPS and positional sensors to map the location of ...


Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun ZHANG, David LO, Xin XIA, Giuseppe SCANNIELLO, Tien-Duy B. LE, Jianling SUN 2018 Singapore Management University

Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun Zhang, David Lo, Xin Xia, Giuseppe Scanniello, Tien-Duy B. Le, Jianling Sun

Research Collection School Of Information Systems

Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that are relevant to the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose a multi-abstraction ...


Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian 2018 Carnegie Mellon University

Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian

Journal of Public Transportation

This paper introduces a novel transit data analytics platform for public transit planning, assessing service quality and revealing service problems in high spatiotemporal resolution for public transit systems based on Automatic Passenger Counting (APC) and Automatic Vehicle Location (AVL) technologies. The platform offers a systematic way for users and decision makers to understand system performance from many aspects of service quality, including passenger waiting time, stop-skipping frequency, bus bunching level, bus travel time, on-time performance, and bus fullness. The AVL-APC data from September 2012 to March 2016 were archived in a database to support the development of a user-friendly web ...


Digital Commons powered by bepress