Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,199 Full-Text Articles 1,629 Authors 428,562 Downloads 112 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,199 full-text articles. Page 1 of 47.

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris 2020 Washington University in St. Louis

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris

Engineering and Applied Science Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...


Minet Magnetic Localization, Michael Robert Drake 2020 University of Mississippi

Minet Magnetic Localization, Michael Robert Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization is a less popular sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of optimizing a particle filter, by ...


Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam 2020 Purdue University

Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam

Faculty Publications

In this article, the results of experiments for the observation of Zenneck surface waves in sub GHz frequency range using dipole antennas are presented. Experiments are conducted over three different soils for communications distances of up to 1 m. This empirical analysis confirms the existence of Zenneck waves over the soil surface. Through the power delay profile (PDP) analysis, it has been shown that other subsurface components exhibit rapid decay as compared to the Zenneck waves. A potential application of the Zenneck waves for energy transmission in the area of decision agriculture is explored. Accordingly, a novel wireless through-the-soil power ...


Minet Magnetic Indoor Localization, Michael Drake 2020 University of Mississippi

Minet Magnetic Indoor Localization, Michael Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method ...


A Framework To Detect Presentation Attacks, Laeticia Etienne 2020 Kennesaw State University

A Framework To Detect Presentation Attacks, Laeticia Etienne

Master of Science in Information Technology Theses

Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed ...


Optimization Study Of An Image Classification Deep Neural Network, Rose Ault 2020 Grand Valley State University

Optimization Study Of An Image Classification Deep Neural Network, Rose Ault

Honors Projects

Machine Learning is an important and growing field within Artificial Intelligence. It is particularly useful in situations where developing an algorithm to perform the task in a conventional way would be extremely difficult. Instead of being programmed specifically to complete a task, a program embodies a trained model that can recognize patterns present in given example data, and is able use that model to make predictions on future data. Neural networks are a prominent example of machine learning models used for this purpose. Neural networks are models that are based on how brains work, with massive numbers of connected processing ...


Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan 2020 University of Massachusetts Amherst

Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan

Doctoral Dissertations

Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.

Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...


A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes 2020 Air Force Institute of Technology

A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes

Theses and Dissertations

To investigate the Data-Oriented Design (DOD) paradigm, in particular, an architecture built off its principles: the Entity-Component-System (ECS). ECS is commonly used by video game engines due to its ability to store data in a way that is optimal for the cache to access. Additionally, the structure of this paradigm produces a code-base that is simple to parallelize as the workload can be distributed across a thread-pool based on the data used with little to no need for data safety measures such as mutexes and locks. A final benefit, although not easily measured, is that the DOD paradigm produces a ...


Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat 2020 University of Massachusetts - Amherst

Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat

Doctoral Dissertations

A prodigious increase in video streaming content along with a simultaneous rise in end system capabilities has led to the proliferation of adaptive bit rate video streaming users in the Internet. Today, video streaming services range from Video-on-Demand services like traditional IP TV to more recent technologies such as immersive 3D experiences for live sports events. In order to meet the demands of these services, the multimedia and networking research community continues to strive toward efficiently delivering high quality content across the Internet while also trying to minimize content storage and delivery costs.

The introduction of flexible and adaptable technologies ...


Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian 2020 HDR

Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian

Purdue Road School

The BIM for Bridges and Structures initiative, also known as TPF-5(372), is a transportation pooled fund project that is a collaborative effort of 20 states, FHWA, and the AASHTO Committee on Bridges and Structures. The pooled fund objective is to develop an open, national standard for exchanging information necessary for the design, fabrication, and construction of bridges and structures in the United States. The presentation will provide an overview of the project and explain ways in which stakeholders can get involved.


Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University of Nebraska Online, University of Nebraska Information Technology Services 2020 University of Nebraska - Lincoln

Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services

Zea E-Books

Advancing Technology in Education at the University of Nebraska, May 7, 2019

Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6

Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6

Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6

Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7

5 Ways to Utilize ...


Web Application For Movie Performance Prediction, Devalkumar Patel 2020 California State University, San Bernardino

Web Application For Movie Performance Prediction, Devalkumar Patel

Electronic Theses, Projects, and Dissertations

This is an amazing and unique idea for the web application. The purpose of this application is to address those movie lover people who is always in a hurry to visit the theatre to watch upcoming movies irrespective of which star cast is in it. This system is a mixture of desktop applications, python libraries, and simple math arithmetic. The application can be used by anyone which is ultimately helping them to decide, either they should watch the movie or not. The user just submits the name of the movie. This application is developed in Visual Studio 2019 for functioning ...


A Mock Software Company: For Teaching Software Engineering (Cse 455) Course, Arturo Concepcion 2020 California State University, San Bernardino

A Mock Software Company: For Teaching Software Engineering (Cse 455) Course, Arturo Concepcion

Q2S Enhancing Pedagogy

This is a novel way of teaching software engineering as an upper-division course for senior computer science students. Teach the class as a mock software company where students play a role in the “software company” such as project managers, assistant project managers, team leads, software engineers, software designers, UI designers, QA engineers, etc. Then to make a realistic work environment, solicit software projects from real clients, not toy software projects that the instructors think of. It has been proven, pedagogically, that project-based learning is one of the most effective way of teaching. There are no quizzes, no mid-terms, and no ...


Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan 2020 Harrisburg University of Science and Technology

Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan

Other Student Works

Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.


Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore 2020 California Polytechnic State University, San Luis Obispo

Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore

Computer Engineering

The Tiny Disco is a WiFi based concert system, featuring improvements on popular “Silent Disco” concerts. Rather than being tied to compression and bandwidth restrictions present in traditional silent disco systems, the Tiny Disco system can deliver 320kbps+ audio quality, and allows listeners to bring their own headphones, further lending to the high quality audio experience.

Tiny Disco uses a Raspberry Pi as the audio server, and Espressif ESP32 microcontrollers as audio receivers/clients. The Tiny Disco is primarily geared toward smaller concerts and niche events where audio quality is valued, though due to its WiFi-based architecture, it can be ...


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir HaghighatiMaleki 2020 The University of Western Ontario

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...


Terraria Server On A Raspberry Pi, Bradley Stoldt 2020 The University of Akron

Terraria Server On A Raspberry Pi, Bradley Stoldt

Williams Honors College, Honors Research Projects

My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.


Creature Care, Alexander Weber 2020 The University of Akron

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a ...


Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar 2020 Virginia Commonwealth University

Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar

Theses and Dissertations

With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted ...


Evaluating The Impact Of Defeasible Argumentation As A Modelling Technique For Reasoning Under Uncertainty, Lucas Rizzo 2020 Technological University Dublin

Evaluating The Impact Of Defeasible Argumentation As A Modelling Technique For Reasoning Under Uncertainty, Lucas Rizzo

Doctoral

Limited work exists for the comparison across distinct knowledge-based approaches in Artificial Intelligence (AI) for non-monotonic reasoning, and in particular for the examination of their inferential and explanatory capacity. Non-monotonicity, or defeasibility, allows the retraction of a conclusion in the light of new information. It is a similar pattern to human reasoning, which draws conclusions in the absence of information, but allows them to be corrected once new pieces of evidence arise. Thus, this thesis focuses on a comparison of three approaches in AI for implementation of non-monotonic reasoning models of inference, namely: expert systems, fuzzy reasoning and defeasible argumentation ...


Digital Commons powered by bepress