Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,451 Full-Text Articles 2,086 Authors 867,329 Downloads 124 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,451 full-text articles. Page 1 of 59.

Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg 2022 California Polytechnic State University, San Luis Obispo

Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg

Computer Engineering

This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.


Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari 2022 Department of Computer Application, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be University, Odisha, India

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari

Graduate Research in Engineering and Technology (GRET)

The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients ...


Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo 2022 Odisha University of Technology and Research, Bhubaneswar, Odisha, India

Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo

Graduate Research in Engineering and Technology (GRET)

Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures ...


Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik 2022 Dartmouth College

Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik

Dartmouth College Master’s Theses

The vision of smart homes is rapidly becoming a reality, as the Internet of Things and other smart devices are deployed widely. Although smart devices offer convenience, they also create a significant management problem for home residents. With a large number and variety of devices in the home, residents may find it difficult to monitor, or even locate, devices. A central controller that brings all the home’s smart devices under secure management and a unified interface would help homeowners and residents track and manage their devices.

We envision a solution called the SPLICEcube whose goal is to detect smart ...


Offensive Cyber Operations And Future Littoral Operating Concepts, JD Work 2022 National Defense University

Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work

Military Cyber Affairs

Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to ...


Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner 2022 University of Arkansas, Fayetteville

Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner

Industrial Engineering Undergraduate Honors Theses

The global investment industry offers a wide variety of investment products especially for individual investors. One such product, index funds, which are younger than actively managed mutual funds, have typically outperformed managed funds. Despite this phenomenon, investors have displayed a tendency to continue investing in actively managed funds. Although only a small percentage of actively managed funds outperform index funds, the costs of actively managed funds are significantly higher. Also, managed fund performances are most often determined by their fund category such as growth or real estate. I wanted to answer the following question for individual investors: can we forecast ...


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall 2022 University of Arkansas, Fayetteville

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move ...


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague 2022 University of Arkansas, Fayetteville

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the ...


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover 2022 University of Arkansas, Fayetteville

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture ...


The Development Of Tigra: A Zero Latency Interface For Accelerator Communication In Risc-V Processors, Wesley Brad Green 2022 Clemson University

The Development Of Tigra: A Zero Latency Interface For Accelerator Communication In Risc-V Processors, Wesley Brad Green

All Dissertations

Field programmable gate arrays (FPGA) give developers the ability to design application specific hardware by means of software, providing a method of accelerating algorithms with higher power efficiency when compared to CPU or GPU accelerated applications. FPGA accelerated applications tend to follow either a loosely coupled or tightly coupled design. Loosely coupled designs often use OpenCL to utilize the FPGA as an accelerator much like a GPU, which provides a simplifed design flow with the trade-off of increased overhead and latency due to bus communication. Tightly coupled designs modify an existing CPU to introduce instruction set extensions to provide a ...


Enter The Battleverse: China's Metaverse War, Josh Baughman 2022 University of South Florida

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Unconventional Computation Including Quantum Computation, Bruce J. MacLennan 2022 University of Tennessee, Knoxville

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.


Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn 2022 Morehead State University

Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the degree Master of Science by Thomas A. Buteyn on April 25, 2022.


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in ...


Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor 2022 University of South Carolina

Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor

Senior Theses

Current work in the field of deep learning and neural networks revolves around several variations of the same mathematical model for associative learning. These variations, while significant and exceptionally applicable in the real world, fail to push the limits of modern computational prowess. This research does just that: by leveraging high order tensors in place of 2nd order tensors, quadratic neural networks can be developed and can allow for substantially more complex machine learning models which allow for self-interactions of collected and analyzed data. This research shows the theorization and development of mathematical model necessary for such an idea to ...


Seabem: An Artificial Intelligence Powered Web Application To Predict Cover Crop Biomass, Aime Christian Tuyishime, Andrea Basche 2022 University of Nebraska - Lincoln

Seabem: An Artificial Intelligence Powered Web Application To Predict Cover Crop Biomass, Aime Christian Tuyishime, Andrea Basche

Honors Theses, University of Nebraska-Lincoln

SEABEM, the Stacked Ensemble Algorithms Biomass Estimator Model, is a web application with a stacked ensemble of Machine Learning (ML) algorithms running on the backend to predict cover crop biomass for locations in Sub-Saharan. The SEABEM model was developed using a previously developed database of crop growth and yield that included site characteristics such as latitude, longitude, soil texture (sand, silt, and clay percentages), temperature, and precipitation. The goal of SEABEM is to provide global farmers, mainly small-scale African farmers, the knowledge they need before practicing and benefiting from cover crops while avoiding the expensive and time-consuming operations that come ...


Predicting Faultiness Of Program Modules Using Mamdani Model By Fuzzy Profile Development Of Software Metrics, Mohammed Ali, Ahmed Abusnaina 2022 Birzeit University

Predicting Faultiness Of Program Modules Using Mamdani Model By Fuzzy Profile Development Of Software Metrics, Mohammed Ali, Ahmed Abusnaina

International Journal of Computer and Communication Technology

This research seminar proposed and implemented a new approach toward reliability and quality measurement of software systems by building a fault prediction model and faultiness degree estimation before starting the testing phase. The main goals of this model were to support decision making with regard to testing phase which leads to reduce the testing efforts, and to optimally assign the needed resources for testing activities. This research used KC2 dataset originated from National Aeronautics and Space Administration (NASA) project to evaluate the predictive accuracy of the proposed model. Software metrics in this dataset are of fuzzy nature, consequently, this work ...


Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink 2022 University of Glasgow

Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink

Anthropology Faculty Publications

Most contemporary 3D data used in archaeological research and heritage management have been created through ‘reality capture,’ the recording of the physical features of extant archaeological objects, structures, and landscapes using technologies such as laser scanning and photogrammetry (Garstki 2020, ch.2; Magnani et al. 2020). A smaller quantity of data are generated by Computer Aided Design (CAD) and Building Information Modeling (BIM) projects, and even fewer data are generated through procedural modeling, the rapid prototyping of multi-component threedimensional (3D) models from a set of rules (Figure 8.1.). It is unsurprising therefore that in archaeology and heritage, efforts around ...


Vehicle Maintenance Tracking Program, Jared Tomlinson 2022 The University of Akron

Vehicle Maintenance Tracking Program, Jared Tomlinson

Williams Honors College, Honors Research Projects

In order to help consumers and businesses keep track of vehicle maintenance, I will create a program paired with a database that can track vehicle maintenance needs and when they should be performed. The program will be capable of tracking entire fleets of vehicles and based on the vehicle’s mileage, will notify users of what maintenance should be performed. Users will be able to add, remove, and edit vehicles in the system as needed and each vehicle will be paired with a maintenance schedule based on its needs. As maintenance is performed, it can be tracked on the schedule ...


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion 2022 Penn State Dickinson Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review

No abstract provided.


Digital Commons powered by bepress