Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

978 Full-Text Articles 1,215 Authors 323,728 Downloads 99 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

978 full-text articles. Page 1 of 37.

Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam 2018 California State University, San Bernardino

Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam

Electronic Theses, Projects, and Dissertations

Indoor Positioning System (IPS) focuses on locating objects inside

Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library ...


Career Path Web Application, Annamarie Roger 2018 California Polytechnic State University, San Luis Obispo

Career Path Web Application, Annamarie Roger

Computer Science

This web application provides a new approach to organizing career advice. It allows a prospective student to outline career priorities and receive suggestions drawing from a repository of reports from professionals in their respective fields. This gives the student access to advice from individuals who do not know the user personally and aims to remove the possible bias that may exist on that level. Furthermore, the system is periodically updated to include recent reports.


Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham 2018 CSUSB

Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham

Electronic Theses, Projects, and Dissertations

Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is ...


Epicconfigurator Computer Configurator And Cms Platform, IVO A. TANTAMANGO 2018 California State University, San Bernardino

Epicconfigurator Computer Configurator And Cms Platform, Ivo A. Tantamango

Electronic Theses, Projects, and Dissertations

Very often when we are looking to buy new IT equipment in an online store, we face the problem that certain parts of our order are not compatible with others or sometimes one part needs additional components. From another point of view in this process, when an online store owner wants to manage the products available in stock, assign prices, set conditions to make an order, or manage customer information, he or she must often rely on information from different systems, physical files, or other sources.

EpicConfigurator simplifies and solves the issues mentioned above. EpicConfigurator makes it easy for User ...


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Combining Algorithms For More General Ai, Mark Robert Musil 2018 Portland State University

Combining Algorithms For More General Ai, Mark Robert Musil

Undergraduate Research & Mentoring Program

Two decades since the first convolutional neural network was introduced the AI sub-domains of classification, regression and prediction still rely heavily on a few ML architectures despite their flaws of being hungry for data, time, and high-end hardware while still lacking generality. In order to achieve more general intelligence that can perform one-shot learning, create internal representations, and recognize subtle patterns it is necessary to look for new ML system frameworks. Research on the interface between neuroscience and computational statistics/machine learning has suggested that combined algorithms may increase AI robustness in the same way that separate brain regions specialize ...


Binder Free Graphene Hybridized Fe3o4 Nanoparticles For Supercapacitor Applications, Nathan D. Jansen 2018 Portland State University

Binder Free Graphene Hybridized Fe3o4 Nanoparticles For Supercapacitor Applications, Nathan D. Jansen

Undergraduate Research & Mentoring Program

In a world with increasing energy demands, the need for safe and mobile energy storage grows. There are a number of renewable energy sources that can be harvested, however peak demand and peak production times tend to not overlap. As the capabilities of collecting the energy grows so does the need to store the energy for later consumption. The two promising methods of storing energy are batteries or supercapacitors. Both technologies employ an electrode consisting of an active material bound to a current collector. This material participates in a redox reaction, storing charge electrochemically to later be used as energy ...


Automating Knife-Edge Method Of Thz Beam Characterization, Christopher Charles Faber 2018 Portland State University

Automating Knife-Edge Method Of Thz Beam Characterization, Christopher Charles Faber

Undergraduate Research & Mentoring Program

The goal of this project is to create a time and cost-effective solution for THz beam profiling.

The knife edge method of beam characterization is a technique to verify the intensity profile of a beam involving traveling a blade orthogonal to the beam path and measuring transmission in successive steps. We use a vector network analyzer (VNA) to measure S21 transmission from a THz source. Manual implementation of this method was time-consuming and inefficient.

Project hardware includes an Arduino, a motor shield, and a ball screw linear rail with stepper motor actuator. Software was created in LabView and data is ...


"Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power", Saurabh Gupta 2018 Southern Methodist University

"Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power", Saurabh Gupta

Computer Science and Engineering Theses and Dissertations

Modern System-on-Chips (SoCs) provide benefits such as reduction in overall system cost, and size, increased performance, and lower power consumption. Increasing complexity of these Integrated Circuits (ICs) has resulted in a higher probability of manufacturing defects. Manufacturing defects can result in the faulty operation of a system. Thus, it is essential to test an IC after it is manufactured to detect any possible faults in it. These SoCs include on-chip embedded instruments that can be used for test, debug, diagnosis, validation, monitoring, characterization, configuration, or functional purposes. IEEE 1687 Std. (IJTAG) provides a standard interface for the reconfigurable access and ...


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta 2018 Indraprastha Institute of Information Technology, New Delhi, India

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity ...


The Viability Of Quantum Computing, Brennan Michael King 2018 Missouri University of Science and Technology

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that ...


Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter 2018 East Tennessee State University

Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter

Undergraduate Honors Theses

A web app was developed which allows any internet-connected device to remotely monitor a roadway intersection’s state over HTTP. A mapping simulation was enhanced to allow researchers to retroactively track the location and the ad-hoc connectivity of vehicle clusters. A performance analysis was conducted on the utilized network partitioning algorithm. This work was completed under and for the utility of ETSU’s Vehicular Networking Lab. It can serve as a basis for further development in the field of wireless automobile connectivity.


Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay 2018 Utah State University

Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay

All Graduate Plan B and other Reports

The Skill Builder application is assistive technology for helping individuals build skills through reminders and self-reporting feedback. The application has been built to support Android and iOS devices and followed a user-centric design methodology. Skill Builder’s architecture and development processes are set forth using cross-platform development environments and a native software development kit for the three different versions of the application that were built. The strengths and weaknesses of each of the platforms are explored.

Several studies have been proposed for helping individuals with different needs learn the skills to cope with their challenges. Applications of Skill Builder include ...


Behavior-Based Authentication System, Taylor Means, Jared Frank 2018 University of Wyoming

Behavior-Based Authentication System, Taylor Means, Jared Frank

Honors Theses AY 17/18

All current forms of authentication are exploitable via social engineering, theft, hacking, or replication. Due to this, a new form of authentication should be explored: behavioral. A solution to this problem would result in more secure digital environment, including physical access to computers as well as software access. The maze-solving approach presented by this project allows for multiple variables to be observed within a user, presenting many facets of behavior that can be analyzed. In order to solve this problem, enough parameters must be collected and contrasted against one another in order to tell different humans apart from each other ...


Policy-Preferred Paths In As-Level Internet Topology Graphs, Mehmet Engin Tozal 2018 University of Louisiana at Lafayette

Policy-Preferred Paths In As-Level Internet Topology Graphs, Mehmet Engin Tozal

Theory and Applications of Graphs

Using Autonomous System (AS) level Internet topology maps to determine accurate AS-level paths is essential for network diagnostics, performance optimization, security enforcement, business policy management and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance as a means to find the shortest paths between the ASes. A less significant drawback is restricting the shortest paths to only valley-free paths. Both approaches usually inflate the number of paths between ASes; introduce erroneous paths that do not conform to ...


Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach LE, Ferdian THUNG, David LO, Claire LE GOUES 2018 Singapore Management University

Overfitting In Semantics-Based Automated Program Repair, Dinh Xuan Bach Le, Ferdian Thung, David Lo, Claire Le Goues

Research Collection School Of Information Systems

The primary goal of Automated Program Repair (APR) is to automatically fix buggy software, to reduce the manual bug-fix burden that presently rests on human developers. Existing APR techniques can be generally divided into two families: semantics- vs. heuristics-based. Semantics-based APR uses symbolic execution and test suites to extract semantic constraints, and uses program synthesis to synthesize repairs that satisfy the extracted constraints. Heuristic-based APR generates large populations of repair candidates via source manipulation, and searches for the best among them. Both families largely rely on a primary assumption that a program is correctly patched if the generated patch leads ...


Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui FAN, Xin XIA, David LO, Shanping LI 2018 Singapore Management University

Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui Fan, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Modern Code Review (MCR) has been widely used by open source and proprietary software projects. Inspecting code changes consumes reviewers much time and effort since they need to comprehend patches, and many reviewers are often assigned to review many code changes. Note that a code change might be eventually abandoned, which causes waste of time and effort. Thus, a tool that predicts early on whether a code change will be merged can help developers prioritize changes to inspect, accomplish more things given tight schedule, and not waste reviewing effort on low quality changes. In this paper, motivated by the above ...


A Real-Time Wireless Sweat Rate Measurement System For Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, Tolga Kaya 2018 Central Michigan University

A Real-Time Wireless Sweat Rate Measurement System For Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, Tolga Kaya

Exercise Science Faculty Publications

There has been significant research on the physiology of sweat in the past decade, with one of the main interests being the development of a real-time hydration monitor that utilizes sweat. The contents of sweat have been known for decades; sweat provides significant information on the physiological condition of the human body. However, it is important to know the sweat rate as well, as sweat rate alters the concentration of the sweat constituents, and ultimately affects the accuracy of hydration detection. Towards this goal, a calorimetric based flow-rate detection system was built and tested to determine sweat rate in real ...


Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan 2018 University of Pennsylvania

Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan

Technical Reports (CIS)

This paper presents CaM, a holistic cache and memory bandwidth resource allocation strategy for multicore real-time systems. CaM is designed for partitioned scheduling, where tasks are mapped onto cores, and the shared cache and memory bandwidth resources are partitioned among cores to reduce resource interferences due to concurrent accesses. Based on our extension of LITMUSRT with Intel’s Cache Allocation Technology and MemGuard, we present an experimental evaluation of the relationship between the allocation of cache and memory bandwidth resources and a task’s WCET. Our resource allocation strategy exploits this relationship to map tasks onto cores, and to compute ...


The Construction Of Open Data Portal Using Dkan For Integrate To Multiple Japanese Local Government Open Data, Toshikazu Seto, Yoshihide Sekimoto 2018 Center for Spatial Information Science, the University of Tokyo

The Construction Of Open Data Portal Using Dkan For Integrate To Multiple Japanese Local Government Open Data, Toshikazu Seto, Yoshihide Sekimoto

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

In recent years, the Code for Japan, a civic tech community in Japan, has focused on the context of the FOSS4G. Consequently, the Japanese have published open data in more than 150 local governments, but these data are almost simply provided as a file on their website. And also CKAN portal are used less than 20 cities. In this study, we built open data platform that uses DKAN for integrated open data distribution of Japanese local governments.


Digital Commons powered by bepress