Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,535 Full-Text Articles 2,225 Authors 972,665 Downloads 129 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,535 full-text articles. Page 1 of 63.

Open Resources For Teaching Iot Physical Security, Maria Valero 2023 Kennesaw State University

Open Resources For Teaching Iot Physical Security, Maria Valero

All Things Open

IoT and physical devices are around us all the time. From a simple watch that measures your heartbeat to an advanced voice assistant that turns on your light, IoT devices are everywhere. Teaching security in this type of physical device is a new topic, and finding good quality resources for teaching is also a complicated task. In this project, the instructor took the best online open-source materials to create 15 modules that teach students with hands-on activities the interaction with IoT devices and their security. The materials include labs with emulators of physical devices like raspberry PI and voice assistants. …


Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang 2023 The Graduate Center, City University of New York

Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang

Dissertations, Theses, and Capstone Projects

With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …


Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah 2023 University Of the Cumberlands

Effect Of Cyber Vulnerabilities On The Adoption Of Self-Driving Vehicles – A Review, Vidhi Shah

International Journal of Smart Sensor and Adhoc Network

One of the leading disruptive technologies in the upcoming technological revolution is Self-Driving vehicles. However, the absence of security is the greatest obstacle to adoption. This study looks at how cybersecurity impacts the adoption of driverless cars. The purpose of this paper is to perform a literature review supporting the in-depth analysis of cybersecurity and its impacts on the slower adoption rate of Self-Driving Vehicles. The study's primary goal is to determine the connection between worries about cybersecurity and the rate of adoption of self-driving vehicles. Driverless vehicles are the most effective and cutting-edge technology in the transportation sector, yet …


Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma 2023 University Of the Cumberlands, KY

Cloud Computing For Supply Chain Management And Warehouse Automation: A Case Study Of Azure Cloud, Pawankumar Sharma

International Journal of Smart Sensor and Adhoc Network

In recent times, organizations are examining the art training situation to improve the operation efficiency and the cost of warehouse retail distribution and supply chain management. Microsoft Azure emerges as an expressive technology that leads optimization by giving infrastructure, software, and platform resolutions for the whole warehouse retail distribution and supply chain management. Using Microsoft Azure as a cloud computing tool in retail warehouse distribution and supply manacle management contributes to active and monetary benefits. At the same time, potential limitations and risks should be considered by the retail warehouse distribution and the supply chain administration investors. In this research …


Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu 2023 NYIT

Improvement Of Key Financial Performance Indicators In The Insurance Industry Using Machine Learning – A Quantitative Analysis, Vineeth Jeppu

International Journal of Smart Sensor and Adhoc Network

AI and Machine learning are playing a vital role in the financial domain in predicting future growth and risk and identifying key performance areas. We look at how machine learning and artificial intelligence (AI) directly or indirectly alter financial management in the banking and insurance industries. First, a non-technical review of the prior machine learning and AI methodologies beneficial to KPI management is provided. This paper will analyze and improve key financial performance indicators in insurance using machine learning (ML) algorithms. Before applying an ML algorithm, we must determine the attributes directly impacting the business and target attributes. The details …


Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V 2023 Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.

Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V

Karbala International Journal of Modern Science

Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …


Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham 2023 Air Force Institute of Technology

Towards Hardware-Based Application Fingerprinting With Microarchitectural Signals For Zero Trust Environments, Tor J. Langehaug, Scott R. Graham

Faculty Publications

The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine learning models that identify software tasks. The proposed approach considers software task identification in hardware as a general problem with attacks treated as a subset of software tasks. Two lines of effort are presented. First, a data collection approach is described to extract sequences of control signals labeled by task identity during real (i.e., non-simulated) system operation. Second, experimental design is used to select hardware and software configuration to train and evaluate machine learning models. The …


A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees 2023 Information Systems Department, Helwan University

A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees

Future Computing and Informatics Journal

most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. shaban 2023 Helwan Univesity

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar 2022 Faculty of Engineering, Beirut Arab University

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar

BAU Journal - Science and Technology

This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn 2022 Grand Valley State University

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak 2022 Southern Methodist University

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li 2022 Kennesaw State University

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson 2022 Department of Chemical Engineering and Materials Science, Wayne State University, Detroit, MI

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst 2022 Washington University in St. Louis

Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst

McKelvey School of Engineering Theses & Dissertations

The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …


Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal 2022 University of Tennessee, Knoxville

Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal

Masters Theses

A portable, real-time vital sign estimation protoype is developed using neural network- based localization, multi-object tracking, and embedded processing optimizations. The system estimates heart and respiration rates of multiple subjects using directional of arrival techniques on RADAR data. This system is useful in many civilian and military applications including search and rescue.

The primary contribution from this work is the implementation and benchmarking of neural networks for real time detection and localization on various systems including the testing of eight neural networks on a discrete GPU and Jetson Xavier devices. Mean average precision (mAP) and inference speed benchmarks were performed. …


A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen 2022 California Polytechnic State University, San Luis Obispo

A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen

Master's Theses

Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …


Proposed Web Application For Guidance And Support Of Students: Smartlad, Mukul Aggarwal, Himanshu Tariyal 2022 KIET Group of Institutions, Delhi NCR , Ghaziabad, INDIA

Proposed Web Application For Guidance And Support Of Students: Smartlad, Mukul Aggarwal, Himanshu Tariyal

International Journal of Computer and Communication Technology

SmartLAD is a Support Platform that connects students, mentors, and professionals of the field and enables them to share their knowledge and experience. We equip the students with a powerful network to rely on, skill-oriented courses that impart real-life skills, and experienced mentors to guide them. Our platform helps students to stay focused on their goals and keep on working hard to achieve their dreams. SmartLAD works as a Support Platform that helps students in their journey of being successful and excelling in their careers by providing them with skills, resources, guidance, and network. We help the students by providing …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss 2022 Kennesaw State University

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. LeCompte 2022 Louisiana State University at Baton Rouge

Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte

LSU Doctoral Dissertations

Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …


Digital Commons powered by bepress