Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,001 Full-Text Articles 1,313 Authors 428,562 Downloads 103 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,001 full-text articles. Page 1 of 39.

An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam 2019 Purdue University

An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam

Faculty Publications

Underground sensing and propagation of Signals in the Soil (SitS) medium is an electromagnetic issue. The path loss prediction with higher accuracy is an open research subject in digital agriculture monitoring applications for sensing and communications. The statistical data are predominantly derived from site-specific empirical measurements, which is considered an impediment to universal application. Nevertheless, in the existing literature, statistical approaches have been applied to the SitS channel modeling, where impulse response analysis and the Friis open space transmission formula are employed as the channel modeling tool in different soil types under varying soil moisture conditions at diverse communication distances ...


A Comparison Of X86 Computer Architecture Simulators, Ayaz Akram, Lina Sawalha 2019 Western Michigan University

A Comparison Of X86 Computer Architecture Simulators, Ayaz Akram, Lina Sawalha

Faculty Research and Creative Activities Award (FRACAA) Recipients

Computer architecture simulators are widely used to evaluate different design options and tradeoffs. This work explores different x86 computer architecture simulators and shows the experimental error of the simulators compared to real hardware runs. We selected gem5, Sniper, MARSSx86 and Zsim, and configured them to model one of the state-of-the- art high-performance processors, Intel’s Haswell microarchitecture. We compared simulators features and statistics, and quantified the experimental error of simulators for single- and multi-core runs compared to a real hardware platform. Finally, we pointed some causes of inaccuracies resulted by the simulators.


Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear 2019 University of Nebraska at Omaha

Decreasing Technology Design Costs By Using Youtube Video To Evaluate User Acceptance, Tom Chappelear

Student Research and Creative Activity Fair

User acceptance is a measure that contributes to technology feasibility which is a decision point that entrepreneurs use to help make better investment decisions (Hoffer, 2011). User acceptance testing is part of a design strategy where the system designer attempts to minimize risks and provide design information that an entrepreneur can use to make better investment decisions (Hoffer, 2011). A user acceptance testing instruments can range from a low-cost coffeeshop review to expensive lab-based user testing (Shneiderman, 2017). This study builds upon the User Acceptance of Information Technology (UTAUT) model to measure user acceptance for the system being evaluated (Venkatesh ...


A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan 2019 University of Nebraska at Omaha

A Shared-Memory Algorithm For Updating Single-Source Shortest Paths In Large Weighted Dynamic Networks, Sriram Srinivasan

Student Research and Creative Activity Fair

In the last decade growth of social media, increased the interest of network algorithms for analyzing large-scale complex systems. The networks are highly unstructured and exhibit poor locality, which has been a challenge for developing scalable parallel algorithms. The state-of-the-art network algorithms such as Prim's algorithm for Minimum Spanning Tree, Dijkstra's algorithm for Single Source Shortest Path and ISPAN algorithm for detecting strongly connected components are designed and optimized for static networks. The networks which change with time i.e. the dynamic networks such as social networks, the above-mentioned approaches can only be utilized if they are recomputed ...


Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu 2019 California State University, San Bernardino

Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu

Electronic Theses, Projects, and Dissertations

With the advent of technology in recent years, people depend more on online reviews to purchase a product. It is hard to determine whether the product is good or bad from hundreds of mixed reviews. Also, it is very time-consuming to read many reviews. So, opinion mining of reviews is necessary.

The main aim of this project is to convert the reviews of a product into a rating and to evaluate the ratings using machine learning algorithms such as Naïve Bayes and Support Vector Machine. In the process of converting the reviews to a rating, score words are created using ...


Visualising The Complex Features Of Source Code, Ivan Bacher 2019 Technological University Dublin

Visualising The Complex Features Of Source Code, Ivan Bacher

Doctoral

Software development is a complex undertaking composed of several activities that include reading, writing, and modifying source code. Indeed, previous studies have shown that the majority of the effort invested in software development is dedicated to understanding code. This includes understanding the static structure, dynamic behaviour, and evolution of the code. Given these particular characteristics, as well as the high complexity of source code, it is reasonable to consider how visualisation can facilitate source code understanding. This work proposes to extend existing software development tools with visualisations that can be used to encode the various complex features within a source ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick 2019 University of Pennsylvania Law School

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles 2019 Univ of New Brunswick Fredericton

Blockchain-Based Healthcare: Three Successful Proof-Of-Concept Pilots Worth Considering, Rebecca Angeles

Journal of International Technology and Information Management

This paper features the use of blockchain technology in the healthcare industry, with special focus on healthcare data exchange and interoperability; drug supply chain integrity and remote auditing; and clinical trials and population health research. This study uses the research method of analyzing the published case studies, academic articles, trade articles, and videos on MEDRec, Patientory, and the AmerisourceBergen/Merck alliance with SAP/CryptoWerk. The “blockchain” concept was introduced around October 2008 when a proposal for the virtual currency, bitcoin, was offered. Blockchain is a much broader concept than bitcoin and has the following key attributes: distributed database; peer-to-peer transmission ...


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye 2019 University of East London

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis ...


Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali 2018 The University of Western Ontario

Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali

Electronic Thesis and Dissertation Repository

The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify ...


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo 2018 University of Pennsylvania Law School

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

Faculty Scholarship at Penn Law

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the ...


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He 2018 Fairfield University

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


Table Of Contents Jitim Vol 27 Issue 3, 2018, 2018 California State University, San Bernardino

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris 2018 California Polytechnic State University, San Luis Obispo

Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris

Master's Theses and Project Reports

Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to ...


Feature-Based Transfer Learning In Natural Language Processing, Jianfei YU 2018 Singapore Management University

Feature-Based Transfer Learning In Natural Language Processing, Jianfei Yu

Dissertations and Theses Collection (Open Access)

In the past few decades, supervised machine learning approach is one of the most important methodologies in the Natural Language Processing (NLP) community. Although various kinds of supervised learning methods have been proposed to obtain the state-of-the-art performance across most NLP tasks, the bottleneck of them lies in the heavy reliance on the large amount of manually annotated data, which is not always available in our desired target domain/task. To alleviate the data sparsity issue in the target domain/task, an attractive solution is to find sufficient labeled data from a related source domain/task. However, for most NLP ...


Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui FAN, Xin XIA, David LO, Shanping LI 2018 Zhejiang University

Early Prediction Of Merged Code Changes To Prioritize Reviewing Tasks, Yuanrui Fan, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Modern Code Review (MCR) has been widely used by open source and proprietary software projects. Inspecting code changes consumes reviewers much time and effort since they need to comprehend patches, and many reviewers are often assigned to review many code changes. Note that a code change might be eventually abandoned, which causes waste of time and effort. Thus, a tool that predicts early on whether a code change will be merged can help developers prioritize changes to inspect, accomplish more things given tight schedule, and not waste reviewing effort on low quality changes. In this paper, motivated by the above ...


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai 2018 University of Arkansas, Fayetteville

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing ...


Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade 2018 University of Arkansas, Fayetteville

Smart Surge Irrigation Using Microcontroller Based Embedded Systems And Internet Of Things, Prashant Dinkar Borhade

Theses and Dissertations

Surge Irrigation is a type of furrow irrigation and one of many efficient irrigation techniques. It is one of the economical techniques and requires minimum labor for monitoring it. In surge irrigation, water is applied intermittently to a field to achieve uniform distribution of water along the furrows, which is important while irrigating, as it ensures that there is enough water near the root zone of the crop. The uneven distribution can cause a loss in crop productivity.

Surge irrigation uses a surge valve, which is an electro-mechanical device that irrigates a field. The commercial surge valves available on the ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla 2018 California State University, San Bernardino

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


California State University, San Bernardino Chatbot, Krutarth Desai 2018 California State University, San Bernardino

California State University, San Bernardino Chatbot, Krutarth Desai

Electronic Theses, Projects, and Dissertations

Now-a-days the chatbot development has been moving from the field of Artificial-Intelligence labs to the desktops and mobile domain experts. In the fastest growing technology world, most smartphone users spend major time in the messaging apps such as Facebook messenger. A chatbot is a computer program that uses messaging channels to interact with users using natural Languages. Chatbot uses appropriate mapping techniques to transform user inputs into a relational database and fetch the data by calling an existing API and then sends an appropriate response to the user to drive its chats. Drawbacks include the need to learn and use ...


Digital Commons powered by bepress