Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,001 Full-Text Articles 1,315 Authors 428,562 Downloads 103 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,001 full-text articles. Page 3 of 39.

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar 2018 California Polytechnic State University, San Luis Obispo

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


A Basic, Four Logic Cluster, Disjoint Switch Connected Fpga Architecture, Joseph Prachar 2018 California Polytechnic State University, San Luis Obispo

A Basic, Four Logic Cluster, Disjoint Switch Connected Fpga Architecture, Joseph Prachar

Computer Engineering

This paper seeks to describe the process of developing a new FPGA architecture from nothing, both in terms of knowledge about FPGAs and in initial design material. Specifically, this project set out to design an FPGA architecture which can implement a simple state machine type design with 10 inputs, 10 outputs and 10 states. The open source Verilog-to-Routing FPGA CAD flow tool was used in order to synthesize, place, and route HDL files onto the architecture. This project was completed in terms of the spirit of the original goals of implementing an FPGA from scratch. Although, the project resulted in ...


Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang 2018 California Polytechnic State University, San Luis Obispo

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang

Computer Engineering

After Cal Poly Racing’s electrical team began to hit the technical limits of the ADC and other I/O features of the current 8-bit Atmel AT90 microcontroller unit, it became clear that an upgrade was due. This replatforming project takes the functionalities of the old, 8-bit architecture, and aims to provide a 32-bit version using the ARM MKE1xF MCU. With the idea of having a working PCB as a stretch goal, the scope of the library development was limited to enable base functionality. Thus, the only libraries developed were for the Timer, ADC, SPI, UART, and CAN. Additionally, this ...


Career Path Web Application, Annamarie Roger 2018 California Polytechnic State University, San Luis Obispo

Career Path Web Application, Annamarie Roger

Computer Science

This web application provides a new approach to organizing career advice. It allows a prospective student to outline career priorities and receive suggestions drawing from a repository of reports from professionals in their respective fields. This gives the student access to advice from individuals who do not know the user personally and aims to remove the possible bias that may exist on that level. Furthermore, the system is periodically updated to include recent reports.


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Epicconfigurator Computer Configurator And Cms Platform, IVO A. TANTAMANGO 2018 California State University, San Bernardino

Epicconfigurator Computer Configurator And Cms Platform, Ivo A. Tantamango

Electronic Theses, Projects, and Dissertations

Very often when we are looking to buy new IT equipment in an online store, we face the problem that certain parts of our order are not compatible with others or sometimes one part needs additional components. From another point of view in this process, when an online store owner wants to manage the products available in stock, assign prices, set conditions to make an order, or manage customer information, he or she must often rely on information from different systems, physical files, or other sources.

EpicConfigurator simplifies and solves the issues mentioned above. EpicConfigurator makes it easy for User ...


Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham 2018 CSUSB

Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham

Electronic Theses, Projects, and Dissertations

Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is ...


How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He 2018 University of Maine

How Gpu Rendering Affects Image Processing And Scientific Calculation Speed, Power And Energy On A Raspberry Pi, Qihao He

Electronic Theses and Dissertations

In this thesis, we explore the speed, power, and energy performance of the same data process on the central processing unit (CPU) with and without the acceleration of the Graphics Processing Unit (GPU) on the microcomputer Raspberry Pi (RPI). We tested on the RPI in two different fields. The first was comparing the speed, power, and energy usage with and without GPU acceleration in the image processing impacts on RPI model B+. The second was comparing speed, power, energy usage, and accuracy for scientific calculation with and without GPU acceleration on RPI model B+ and 3B.

We used a novel ...


Combining Algorithms For More General Ai, Mark Robert Musil 2018 Portland State University

Combining Algorithms For More General Ai, Mark Robert Musil

Undergraduate Research & Mentoring Program

Two decades since the first convolutional neural network was introduced the AI sub-domains of classification, regression and prediction still rely heavily on a few ML architectures despite their flaws of being hungry for data, time, and high-end hardware while still lacking generality. In order to achieve more general intelligence that can perform one-shot learning, create internal representations, and recognize subtle patterns it is necessary to look for new ML system frameworks. Research on the interface between neuroscience and computational statistics/machine learning has suggested that combined algorithms may increase AI robustness in the same way that separate brain regions specialize ...


Binder Free Graphene Hybridized Fe3o4 Nanoparticles For Supercapacitor Applications, Nathan D. Jansen 2018 Portland State University

Binder Free Graphene Hybridized Fe3o4 Nanoparticles For Supercapacitor Applications, Nathan D. Jansen

Undergraduate Research & Mentoring Program

In a world with increasing energy demands, the need for safe and mobile energy storage grows. There are a number of renewable energy sources that can be harvested, however peak demand and peak production times tend to not overlap. As the capabilities of collecting the energy grows so does the need to store the energy for later consumption. The two promising methods of storing energy are batteries or supercapacitors. Both technologies employ an electrode consisting of an active material bound to a current collector. This material participates in a redox reaction, storing charge electrochemically to later be used as energy ...


Automating Knife-Edge Method Of Thz Beam Characterization, Christopher Charles Faber 2018 Portland State University

Automating Knife-Edge Method Of Thz Beam Characterization, Christopher Charles Faber

Undergraduate Research & Mentoring Program

The goal of this project is to create a time and cost-effective solution for THz beam profiling.

The knife edge method of beam characterization is a technique to verify the intensity profile of a beam involving traveling a blade orthogonal to the beam path and measuring transmission in successive steps. We use a vector network analyzer (VNA) to measure S21 transmission from a THz source. Manual implementation of this method was time-consuming and inefficient.

Project hardware includes an Arduino, a motor shield, and a ball screw linear rail with stepper motor actuator. Software was created in LabView and data is ...


Resource Brokering In Grid Computing, Adrian T. Bienkowski 2018 The University of Western Ontario

Resource Brokering In Grid Computing, Adrian T. Bienkowski

Electronic Thesis and Dissertation Repository

Grid Computing has emerged in the academia and evolved towards the bases of what is currently known as Cloud Computing and Internet of Things (IoT). The vast collection of resources that provide the nature for Grid Computing environment is very complex; multiple administrative domains control access and set policies to the shared computing resources. It is a decentralized environment with geographically distributed computing and storage resources, where each computing resource can be modeled as an autonomous computing entity, yet collectively can work together. This is a class of Cooperative Distributed Systems (CDS). We extend this by applying characteristic of open ...


Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta 2018 Southern Methodist University

Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta

Computer Science and Engineering Theses and Dissertations

Modern System-on-Chips (SoCs) provide benefits such as reduction in overall system cost, and size, increased performance, and lower power consumption. Increasing complexity of these Integrated Circuits (ICs) has resulted in a higher probability of manufacturing defects. Manufacturing defects can result in the faulty operation of a system. Thus, it is essential to test an IC after it is manufactured to detect any possible faults in it. These SoCs include on-chip embedded instruments that can be used for test, debug, diagnosis, validation, monitoring, characterization, configuration, or functional purposes. IEEE 1687 Std. (IJTAG) provides a standard interface for the reconfigurable access and ...


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta 2018 Indraprastha Institute of Information Technology, New Delhi, India

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity ...


The Viability Of Quantum Computing, Brennan Michael King 2018 Missouri University of Science and Technology

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that ...


Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter 2018 East Tennessee State University

Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter

Undergraduate Honors Theses

A web app was developed which allows any internet-connected device to remotely monitor a roadway intersection’s state over HTTP. A mapping simulation was enhanced to allow researchers to retroactively track the location and the ad-hoc connectivity of vehicle clusters. A performance analysis was conducted on the utilized network partitioning algorithm. This work was completed under and for the utility of ETSU’s Vehicular Networking Lab. It can serve as a basis for further development in the field of wireless automobile connectivity.


Wifi Gate Guard: A Captive Portal Implementation For Home Networks, Ben Blumenberg 2018 California Polytechnic State University, San Luis Obispo

Wifi Gate Guard: A Captive Portal Implementation For Home Networks, Ben Blumenberg

Computer Science

WiFi Gate Guard aims to improve the user experience for authentication on home wireless networks, by alleviating some of the hardships causes by passwords and by offering a platform on which further security enhancements could be built. It accomplishes this by using captive portal technology, making it extremely easy for guests to authenticate without needing to ask for a password. Home network administrators can approve or deny access using a simple iOS app. WiFi Gate Guard is built to run on basic home routers, with minimal other hardware requirements. Once it’s up and running, passwords never need to be ...


Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay 2018 Utah State University

Skill Builder: Assistive Technology For Developing Skill And Habits, Aaron Kay

All Graduate Plan B and other Reports

The Skill Builder application is assistive technology for helping individuals build skills through reminders and self-reporting feedback. The application has been built to support Android and iOS devices and followed a user-centric design methodology. Skill Builder’s architecture and development processes are set forth using cross-platform development environments and a native software development kit for the three different versions of the application that were built. The strengths and weaknesses of each of the platforms are explored.

Several studies have been proposed for helping individuals with different needs learn the skills to cope with their challenges. Applications of Skill Builder include ...


Behavior-Based Authentication System, Taylor Means, Jared Frank 2018 University of Wyoming

Behavior-Based Authentication System, Taylor Means, Jared Frank

Honors Theses AY 17/18

All current forms of authentication are exploitable via social engineering, theft, hacking, or replication. Due to this, a new form of authentication should be explored: behavioral. A solution to this problem would result in more secure digital environment, including physical access to computers as well as software access. The maze-solving approach presented by this project allows for multiple variables to be observed within a user, presenting many facets of behavior that can be analyzed. In order to solve this problem, enough parameters must be collected and contrasted against one another in order to tell different humans apart from each other ...


Real-Time Audio-Midi Controller, Brian Shino Balberchak 2018 California Polytechnic State University, San Luis Obispo

Real-Time Audio-Midi Controller, Brian Shino Balberchak

Computer Engineering

Most MIDI controllers used in music production use a regular keyboard to generate the MIDI notes that are sent to the synthesizer. This project aims to provide the user with a different way of generating MIDI data: by playing an instrument of their choice with a passive electronic pickup to generate MIDI notes that correspond with the fundamental frequency of the musical pitch being played. The pitch-detecting algorithm used in this application utilizes a modified form of auto-correlation.

As an embedded systems project that uses signal-processing techniques, the knowledge of topics from the following courses was essential:

EE 211: Op-Amp ...


Digital Commons powered by bepress