Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,639 Full-Text Articles 2,383 Authors 1,145,150 Downloads 138 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,639 full-text articles. Page 5 of 68.

Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera 2023 California State University, San Bernardino

Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera

Electronic Theses, Projects, and Dissertations

This culminating experience sought to lay the foundation for a miniaturized physical SCADA testbed to be built at California State University San Bernardino to enable students to apply the cybersecurity knowledge, skills and abilities in a fun and engaging environment while learning about what SCADA is, how it works, and how to improve the security of it. This project was conducted in response to a growing trend of cybersecurity attacks that have targeted our critical infrastructure systems through SCADA systems which are legacy systems that manage critical infrastructure systems within the past 10 years. Since SCADA systems require constant availability, …


Government Aid Portal, Darshan Togadiya 2023 California State University, San Bernardino

Government Aid Portal, Darshan Togadiya

Electronic Theses, Projects, and Dissertations

In today’s world, contacting government officials seems a big task when it comes to reporting small concerns. There are many authorities and officials which makes it very difficult for ordinary people to figure out who they should contact to resolve their daily issues. To address this problem, I have developed an application which can act as intermediary between citizens and government authorities. This portal will enable locals to submit complaints regarding personal or general issues through a complaint form, which will then be routed to the appropriate government department. Once a complaint is filed, government teams are immediately alerted and …


Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira WIDYASARI, Zhou YANG, Ferdian THUNG, Sheng Qin SIM, Fiona WEE, Camellia LOK, Jack PHAN, Haodi QI, Constance TAN, David LO, David LO 2023 Singapore Management University

Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo

Research Collection School Of Computing and Information Systems

Machine learning (ML) has gained much attention and has been incorporated into our daily lives. While there are numerous publicly available ML projects on open source platforms such as GitHub, there have been limited attempts in filtering those projects to curate ML projects of high quality. The limited availability of such a high-quality dataset poses an obstacle to understanding ML projects. To help clear this obstacle, we present NICHE, a manually labelled dataset consisting of 572 ML projects. Based on the evidence of good software engineering practices, we label 441 of these projects as engineered and 131 as non-engineered. This …


Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap 2023 Grand Valley State University

Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap

Culminating Experience Projects

In my master’s project, I used Terraform to create a scalable infrastructure on Amazon Web Services (AWS) for my personal website. Terraform is an open-source infrastructure-as-code (IAC) tool that allows you to create, manage and provision infrastructure resources, such as virtual machines, storage accounts, networks, and more, across multiple cloud providers and on-premises data centers using a declarative configuration language. A scalable infrastructure is important because it enables a system or application to handle increasing amounts of traffic or workload without experiencing performance issues or downtime. It ensures that the system remains responsive, available, and reliable as an organization grows …


Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha 2023 Kennesaw State University

Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha

Master of Science in Information Technology Theses

The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …


Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi. Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan. E-mail: botirov_fz@mail.ru, Phone:+998-97-751-16-97.

Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers 2023 Old Dominion University

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.


Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng WANG, Weidong LI 2023 School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan 430074, China

Research On Construction Method Of Ubiquitous Operating System Open Source Ecosystem Based On Internet Of Everything, Meng Wang, Weidong Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Building an independent, healthy, and sustainable open source ecosystem is a key link in the development and application of ubiquitous operating system. Aiming at the Internet of Everything, combined with the new characteristics of ubiquitous operating system, this study summarizes the constituent elements and system model of ubiquitous operating system open source ecosystem, and puts forward the construction method of ubiquitous operating system open source ecosystem. This study provides new ideas to promote the iterative innovation of ubiquitous operating system, integrate the isolated island of ubiquitous operating system open source ecosystem, and promote the preliminary practice and collaborative development of …


From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu ZHUANG, Cheng ZHOU 2023 Department of Philosophy, Peking University, Beijing 100871, China; Peking University Third Hospital, Beijing 100191, China

From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou

Bulletin of Chinese Academy of Sciences (Chinese Version)

In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan 2023 Old Dominion University

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson 2023 Embry-Riddle Aeronautical University

Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson

Doctoral Dissertations and Master's Theses

This research project examined the cyberspace domain in the United States (U.S.) aviation industry from many different angles. The research involved learning about the U.S. aviation cyberspace environment, the landscape of cyber threats, new technologies like 5G and smart airports, cybersecurity frameworks and best practices, and the use of aviation cyberspace monitoring capabilities. The research looked at how vulnerable the aviation industry is from cyber-attacks, analyzed the possible effects of cyber-attacks on the industry, and suggests ways to improve the industry's cybersecurity posture. The project's main goal was to protect against possible cyber-attacks and make sure that the aviation industry …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) 2023 Central University of South Bihar, Panchanpur, Gaya, Bihar

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Procedural Model Of The Monitoring System, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi. Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan, E-mail: botirov_fz@mail.ru, Phone: +998-97-751-16-97.

Procedural Model Of The Monitoring System, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.


Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang 2023 The Graduate Center, City University of New York

Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang

Dissertations, Theses, and Capstone Projects

With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …


Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V 2023 Research Scholar, Department of Computer Science and Engineering, JSS Academy of Technical Education (affiliated to VTU), Bengaluru, India.

Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V

Karbala International Journal of Modern Science

Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …


A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees 2023 Information Systems Department, Helwan University

A Literature Review On Agile Methodologies Quality, Extreme Programming And Scrum, Naglaa A. Eldanasory, Engy Yehia, Amira M. Idrees

Future Computing and Informatics Journal

most applied methods in the software development industry. However, agile methodologies face some challenges such as less documentation and wasting time considering changes. This review presents how the previous studies attempted to cover issues of agile methodologies and the modifications in the performance of agile methodologies. The paper also highlights unresolved issues to get the attention of developers, researchers, and software practitioners.


Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. shaban 2023 Helwan Univesity

Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban

Future Computing and Informatics Journal

Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …


A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose 2023 University of Kentucky

A Flexible Photonic Reduction Network Architecture For Spatial Gemm Accelerators For Deep Learning, Bobby Bose

Theses and Dissertations--Electrical and Computer Engineering

As deep neural network (DNN) models increase significantly in complexity and size, it has become important to increase the computing capability of specialized hardware architectures typically used for DNN processing. The major linear operations of DNNs, which comprise the fully connected and convolution layers, are commonly converted into general matrix-matrix multiplication (GEMM) operations for acceleration. Specialized GEMM accelerators are typically employed to implement these GEMM operations, where a GEMM operation is decomposed into multiple vector-dot-product operations that run in parallel. A common challenge that arises in modern DNNs is the mismatch between the matrices used for GEMM operations and the …


Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez 2023 Virginia Commonwealth University

Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez

Theses and Dissertations

WiFi sensing offers a powerful method for tracking physical activities using the radio-frequency signals already found throughout our homes and offices. This novel sensing modality offers continuous and non-intrusive activity tracking since sensing can be performed (i) without requiring wearable sensors, (ii) outside the line-of-sight, and even (iii) through the wall. Furthermore, WiFi has become a ubiquitous technology in our computers, our smartphones, and even in low-cost Internet of Things devices. In this work, we consider how the ubiquity of these low-cost WiFi devices offer an unparalleled opportunity for improving the scalability of wireless sensing systems. Thus far, WiFi sensing …


Quantum Computing And Its Applications In Healthcare, Vu Giang 2023 Old Dominion University

Quantum Computing And Its Applications In Healthcare, Vu Giang

OUR Journal: ODU Undergraduate Research Journal

This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.


Digital Commons powered by bepress