Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,655 Full-Text Articles 2,415 Authors 1,145,150 Downloads 139 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,655 full-text articles. Page 38 of 69.

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren 2017 Bard College

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren

Senior Projects Spring 2017

With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form of a …


Wind Turbine Noise And Wind Speed Prediction, Tyler H. Blanchard 2017 Georgia Southern University

Wind Turbine Noise And Wind Speed Prediction, Tyler H. Blanchard

Electronic Theses and Dissertations

In order to meet the US Department of Energy projected target of 35% of US energy coming from wind by 2050, there is a strong need to study the management and development of wind turbine technology and its impact on human health, wildlife and environment. The prediction of wind turbine noise and its propagation is very critical to study the impacts of wind turbine noise for long term adoption and acceptance by neighboring communities. The prediction of wind speed is critical in the assessment of feasibility of a potential wind turbine site. This work presents a study on prediction of …


A Testbed Design For Monitoring The Long-Term Spatial-Temporal Dynamics Of Underwater Acoustic Channels, Krishna Chaitanya Poduru 2017 Michigan Technological University

A Testbed Design For Monitoring The Long-Term Spatial-Temporal Dynamics Of Underwater Acoustic Channels, Krishna Chaitanya Poduru

Dissertations, Master's Theses and Master's Reports

The underwater acoustic network testbed helps to validate the theoretical results and bridge the gap between experimental results. Characterizing and modeling the spatial-temporal dynamics of underwater acoustic channels is essential to developing efficient and effective physical-layer communication algorithms and network protocols. This work dedicates to designing a testbed system to measure the spatial-temporal dynamics of underwater acoustic channels. The collected measurements will shed insights into the spatial-temporal correlation of underwater acoustic channels and will be used to evaluate the theoretical algorithms that are designed to model the spatial-temporal dynamics and to exploit the spatial-temporal dynamics for more efficient and effective …


Implementing Software Lab At Hackathons, Istvan Gates 2017 The University of Akron

Implementing Software Lab At Hackathons, Istvan Gates

Williams Honors College, Honors Research Projects

Hackathons are events where groups of college students have 24 hours to build up a any project, using Computer Science and Electrical Engineering skillsets. These events are typically hosted on college campuses, and attract over 200 students per event. Each student brings 2 devices - their phone, and their laptop. That means that 400 devices are connected to a University venue's Internet network, commonly overloading it. Software Lab alleviates this overloading by providing an abstracted NAS node network for events. Software Lab guarantees speeds of at least 100 mbits/s, and provides a 8-10x improvement on download speeds over the common …


Convolutional Neural Networks For Predicting Skin Lesions Of Melanoma, Anuruddha Jayasekara Pathiranage 2017 Regis University

Convolutional Neural Networks For Predicting Skin Lesions Of Melanoma, Anuruddha Jayasekara Pathiranage

Regis University Student Publications (comprehensive collection)

Diagnosis of an unknown skin lesion is crucial to enable proper treatments. While curable with early diagnosis, only highly trained dermatologists are capable of accurately recognize melanoma skin lesions. Expert dermatologist classification for melanoma dermoscopic images is 65-66%. As expertise is in limited supply, systems that can automatically classify skin lesions as either benign or malignant melanoma are very useful as initial screening tools. Towards this goal, this study presents a convolutional neural network model, trained on features extracted from a highway convolutional neural network pretrained on dermoscopic images of skin lesions. This requires no lesion segmentation nor complex preprocessing. …


Security Analysis Of Ecc Based Protocols, Chanchal Khatwani 2017 University of North Florida

Security Analysis Of Ecc Based Protocols, Chanchal Khatwani

UNF Graduate Theses and Dissertations

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities, and to enhance them to be more secure against threats. This work demonstrates how currently used ECC based protocols are vulnerable to attacks. If protocols are vulnerable, damages could include critical data loss and elevated privacy concerns. The protocols considered in thiswork differ in their usage of security factors (e.g. passwords, pins, and biometrics), encryption and timestamps. The threatmodel considers various kinds of attacks including …


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 2017 College of Business, University of Louisville, KY, USA

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman 2017 Kingsborough Community College

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran 2017 CSU-Bakersfield

Cloud Computing Technology: Leveraging The Power Of The Internet To Improve Business Performance, Mohsen Attaran

Journal of International Technology and Information Management

In recent years, Cloud Computing Technology (CCT) has emerged as a meaningful technology that could contribute to operational efficiency of an IT platform by providing infrastructure and software solutions for the whole IT needs of an enterprise via Internet. The cloud has revolutionized IT infrastructure. It is predicted that 2017 will mark the rapid proliferation of enterprises transitioning to the cloud-based computing technology. The utilization of this innovative technology makes collaboration easier among companies and has the potential to create financial and operational benefits. This study discusses potential strategic benefits of this technology, highlights its evolving technologies and trends and …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr 2017 Emmanuel Uzoma Opara

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari 2017 The Institute of Finance Management

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian 2017 Quinnipiac University & Yale Law School

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo 2017 University of Kentucky

Hierarchical Implementation Of Aggregate Functions, Pablo Quevedo

Theses and Dissertations--Electrical and Computer Engineering

Most systems in HPC make use of hierarchical designs that allow multiple levels of parallelism to be exploited by programmers. The use of multiple multi-core/multi-processor computers to form a computer cluster supports both fine-grain and large-grain parallel computation. Aggregate function communications provide an easy to use and efficient set of mechanisms for communicating and coordinating between processing elements, but the model originally targeted only fine grain parallel hardware. This work shows that a hierarchical implementation of aggregate functions is a viable alternative to MPI (the standard Message Passing Interface library) for programming clusters that provide both fine grain and large …


Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar 2016 University of New Mexico

Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar

Electrical and Computer Engineering ETDs

This thesis proposes an open-source, maintainable system for detecting human activity in large video datasets using scalable hardware architectures. The system is validated by detecting writing and typing activities that were collected as part of the Advancing Out of School Learning in Mathematics and Engineering (AOLME) project. The implementation of the system using Amazon Web Services (AWS) is shown to be both horizontally and vertically scalable. The software associated with the system was designed to be robust so as to facilitate reproducibility and extensibility for future research.


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez 2016 California Polytechnic State University, San Luis Obispo

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …


Isopropyl Alcohol Pump For Printed Circuit Boards Using An Arduino, Lawrence Zhu 2016 California Polytechnic State University, San Luis Obispo

Isopropyl Alcohol Pump For Printed Circuit Boards Using An Arduino, Lawrence Zhu

Computer Engineering

No abstract provided.


Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work 2016 University of Tennessee, Knoxville / Oak Ridge National Laboratory

Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work

Chancellor’s Honors Program Projects

No abstract provided.


Coyotelab - Linux Containers For Educational Use, Michael D. Korcha 2016 California State University - San Bernardino

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha

Electronic Theses, Projects, and Dissertations

CoyoteLab is an exploration in the use of Linux container technology as a means to simplify the way students in computing fields access and complete laboratory work in their educational career. This project provides two main benefits: creating a simple way for students to log in and access their coursework without anything more than their web browser, and providing course instructors a way to verify that assigned work is completed successfully. Thanks to advances in container technology and the advent of WebSockets, this becomes a middle layer between a WebSocket opened up on the client’s browser and the SSH daemon …


Analog Spiking Neuromorphic Circuits And Systems For Brain- And Nanotechnology-Inspired Cognitive Computing, Xinyu Wu 2016 Boise State University

Analog Spiking Neuromorphic Circuits And Systems For Brain- And Nanotechnology-Inspired Cognitive Computing, Xinyu Wu

Boise State University Theses and Dissertations

Human society is now facing grand challenges to satisfy the growing demand for computing power, at the same time, sustain energy consumption. By the end of CMOS technology scaling, innovations are required to tackle the challenges in a radically different way. Inspired by the emerging understanding of the computing occurring in a brain and nanotechnology-enabled biological plausible synaptic plasticity, neuromorphic computing architectures are being investigated. Such a neuromorphic chip that combines CMOS analog spiking neurons and nanoscale resistive random-access memory (RRAM) using as electronics synapses can provide massive neural network parallelism, high density and online learning capability, and hence, paves …


Digital Commons powered by bepress