Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,535 Full-Text Articles 2,225 Authors 972,665 Downloads 129 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,535 full-text articles. Page 6 of 63.

Synthesis Methodologies For Robust And Reconfigurable Clock Networks, Necati Uysal 2021 University of Central Florida

Synthesis Methodologies For Robust And Reconfigurable Clock Networks, Necati Uysal

Electronic Theses and Dissertations, 2020-

In today's aggressively scaled technology nodes, billions of transistors are packaged into a single integrated circuit. Electronic Design Automation (EDA) tools are needed to automatically assemble the transistors into a functioning system. One of the most important design steps in the physical synthesis is the design of the clock network. The clock network delivers a synchronizing clock signal to each sequential element. The clock signal is required to be delivered meeting timing constraints under variations and in multiple operating modes. Synthesizing such clock networks is becoming increasingly difficult with the complex power management methodologies and severe manufacturing variations. Clock network …


Ahmedabad City App, Rushabh Picha 2021 California State University, San Bernardino

Ahmedabad City App, Rushabh Picha

Electronic Theses, Projects, and Dissertations

The Ahmedabad City App is a city guide app that provides information on the city's accessible resources. The project's goal is to provide a concrete, one-stop platform for finding information on all of Ahmedabad's accessible resources. The main goal is to simplify the railway's schedule and make it easier for customers to get from one point to another swiftly and safely. Emergency connections such as the blood bank, fire department, police station, and hospitals will be included in the app. Restaurants and picnic areas are also included in the rejuvenation process.

The proposed system uses SQLite as the database and …


Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang 2021 California State University, San Bernardino

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


Respiratory Sound Analysis For The Evidence Of Lung Health, Priyanka Sreerama 2021 University of South Dakota

Respiratory Sound Analysis For The Evidence Of Lung Health, Priyanka Sreerama

Dissertations and Theses

Significant changes have been made on audio-based technologies over years in several different fields along with healthcare industry. Analysis of Lung sounds is a potential source of noninvasive, quantitative information along with additional objective on the status of the pulmonary system. To do that medical professionals listen to sounds heard over the chest wall at different positions with a stethoscope which is known as auscultation and is important in diagnosing respiratory diseases. At times, possibility of inaccurate interpretation of respiratory sounds happens because of clinician’s lack of considerable expertise or sometimes trainees such as interns and residents misidentify respiratory sounds. …


Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally 2021 Clemson University

Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally

All Theses

Floods are among the most destructive natural hazards that affect millions of people across the world leading to severe loss of life and damage to property, critical infrastructure, and the environment. Deep learning algorithms are exceptionally valuable tools for collecting and analyzing the catastrophic readiness and countless actionable flood data. Convolutional neural networks (CNNs) are one form of deep learning algorithms widely used in computer vision which can be used to study flood images and assign learnable weights and biases to various objects in the image. Here, we leveraged and discussed how connected vision systems can be used to embed …


The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi 2021 Faculty of Commerce & Business Information System,Helwan University

The Strategic Goals Of -Using Service Oriented Architecture Principles, Ashraf Saied Abdel Nabi

Future Computing and Informatics Journal

different platforms, different databases, and different language programs. These systems need to exchange information and reuse the same functionality to achieve integration between these systems.

Many Software companies failed to achieve information follow and reuse the same functionality

This paper introduces guidelines introduces Service-Oriented Architecture Principles guidelines and rules to help Applications developers to achieve information integrations and reuse the same functionality, SOA principles providing rules and guidelines that specify exactly how solution logic should be decomposed and molded into technology solutions

Teeeeeeeest


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, IKHLAS ZAMZAMI 2021 King Abdulaziz University, Saudi Arabia

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah ElDin Ghoneim 2021 Canadian International College, Egypt

Enhancing Academic Advising In Credit Hours System Using Dss, Alaa Salah Eldin Ghoneim

Future Computing and Informatics Journal

Academic advising plays a vital role in achieving higher educational institution’s purposes. Academic advising is a process where an academic advisor decides to select a certain number of courses for a student to register in each semester to fulfil the graduation requirements. This paper presents an Academic Advising Decision Support System (AADSS) to enhance advisors make better decisions regarding their students’ cases. AADSS framework divided into four layers, data preparation layer, data layer, processing layer and decision layer. The testing results from those participating academic advisors and students considered are that AADSS beneficial in enhancing their decision for selecting courses.


A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees AMI 2021 Faculty of Computers and Information Technology, Future University in Egypt

A Statistical-Mining Techniques’ Collaboration For Minimizing Dimensionality In Ovarian Cancer Data, Mohamed Attia, Maha Farghaly, Mohamed Hamada, Amira M. Idrees Ami

Future Computing and Informatics Journal

A feature is a single measurable criterion to an observation of a process. While knowledge discovery techniques successfully contribute in many fields, however, the extensive required data processing could hinder the performance of these techniques. One of the main issues in processing data is the dimensionality of the data. Therefore, focusing on reducing the data dimensionality through eliminating the insignificant attributes could be considered one of the successful steps for raising the applied techniques’ performance. On the other hand, focusing on the applied field, ovarian cancer patients continuously suffer from the extensive analysis requirements for detecting the disease as well …


Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero 2021 Kennesaw State University

Ehr Data Management: Hyperledger Fabric-Based Health Data Storing And Sharing, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Despite the type of industry, data sharing has always been a concern across the globe within the conventional database model; particularly in the healthcare industry, where the lack of data interoperability in existing applications creates not only security and transparency issues in EHR but also cost-related concerns that impact the quality of patient care. Without adopting novel and emerging technologies that allow patients to store and share EHR data within a tamper-evident, immutable, and secure data storing and sharing network, this current problem could not be resolved. Emerging Hyperledger Fabric-based Blockchain technology can be an ideal solution to address these …


Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim 2021 Universitas Andalas

Analysis Of Library Book Borrower Patterns Using Apriori Association Data Mining Techniques, Lucky Zamzami, Ari Agung Prastowo, R Rulinawaty, Robbi Rahim

Library Philosophy and Practice (e-journal)

The library is one of the most important facilities because it manages collections of written works, printed works, and recorded works and can provide information resources as well as be a driving force for the advancement of an educational institution. Conventional libraries will have piles of book borrowing transaction data recorded in the agenda book, which is only an archive, and the placement of books far apart, which causes members to take longer to find books when borrowing books of different types, is an issue that must be addressed. To overcome these two issues, a recommendation for an intelligent system …


Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio de Toledo, Giancarlo Salton, Robert Ross 2021 Technological University Dublin

Formulating Automated Responses To Cognitive Distortions For Cbt Interactions, Ignacio De Toledo, Giancarlo Salton, Robert Ross

Conference papers

One of the key ideas of Cognitive Behavioural Therapy (CBT) is the ability to convert negative or distorted thoughts into more realistic alternatives. Although modern machine learning techniques can be successfully applied to a variety of Natural Language Processing tasks, including Cognitive Behavioural Therapy, the lack of a publicly available dataset makes supervised training difficult for tasks such as reforming distorted thoughts. In this research, we constructed a small CBT dataset via crowd-sourcing, and leveraged state of the art pre-trained architectures to transform cognitive distortions, producing text that is relevant and more positive than the original negative thoughts. In particular, …


Concolic Execution Of Nmap Scripts For Honeyfarm Generation, Zhe Li, Bo Chen, Wu-chang Feng, Fei Xie 2021 Portland State University

Concolic Execution Of Nmap Scripts For Honeyfarm Generation, Zhe Li, Bo Chen, Wu-Chang Feng, Fei Xie

Computer Science Faculty Publications and Presentations

Attackers rely upon a vast array of tools for automating attacksagainst vulnerable servers and services. It is often the case thatwhen vulnerabilities are disclosed, scripts for detecting and exploit-ing them in tools such asNmapandMetasploitare released soonafter, leading to the immediate identification and compromise ofvulnerable systems. Honeypots, honeynets, tarpits, and other decep-tive techniques can be used to slow attackers down, however, such approaches have difficulty keeping up with the sheer number of vulnerabilities being discovered and attacking scripts that are being released. To address this issue, this paper describes an approach for applying concolic execution on attacking scripts in Nmap in …


Action : Adaptive Cache Block Migration In Distributed Cache Architectures, Chandra Sekhar Mummidi 2021 University of Massachusetts Amherst

Action : Adaptive Cache Block Migration In Distributed Cache Architectures, Chandra Sekhar Mummidi

Masters Theses

Increasing number of cores in chip multiprocessors (CMP) result in increasing traffic to last-level cache (LLC). Without commensurate increase in LLC bandwidth, such traffic cannot be sustained resulting in loss of performance. Further, as the number of cores increases, it is necessary to scale up the LLC size; otherwise, the LLC miss rate will rise, resulting in a loss of performance. Unfortunately, for a unified LLC with uniform cache access time, access latency increases with cache size, resulting in performance loss. Previously, researchers have proposed partitioning the cache into multiple smaller caches interconnected by a communication network which increases aggregate …


Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula 2021 University of Massachusetts Amherst

Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula

Masters Theses

Connected systems are becoming more ingrained in our daily lives with the advent of cloud computing, the Internet of Things (IoT), and artificial intelligence. As technology progresses, we expect the number of networked systems to rise along with their complexity. As these systems become abstruse, it becomes paramount to understand their interactions and nuances. In particular, Mobile Ad hoc Networks (MANET) and swarm communication systems exhibit added complexity due to a multitude of environmental and physical conditions. Testing these types of systems is challenging and incurs high engineering and deployment costs. In this work, we propose a scalable MANET emulation …


Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus 2021 Comenius University

Enterprise Environment Modeling For Penetration Testing On The Openstack Virtualization Platform, Vincent Karovic Jr., Jakub Bartalos, Vincent Karovic, Michal Gregus

Journal of Global Business Insights

The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal terms and in accordance with international security standards. The model was created based on a specific team from the unnamed company. The virtual working environment offered the same functions as the physical environment. The virtual working environment was created in OpenStack and tested with a Linux distribution Kali Linux. We demonstrated that the virtual environment is functional and its security testable. Virtualizing …


Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, Hakimjon Nasiridinovich Zaynidinov, Orif Kudratovich Makhmanov, Feruz Mukhammadjon ogli Latifov, Djamshid Bakhodirovich Sultanov 2021 doctor of technical sciences, professor of the department “Information Technologies” at Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Address: 108 Amir Temur st., 100084, Tashkent city, Republic of Uzbekistan, E-mail: tet2001@rambler.ru;

Information Models Of "Complex-Analytical Information System Of Scientific Degrees" In The Field Of Attestation Of Higher Qualified Scientific And Scientific-Pedagogical Personnel, Hakimjon Nasiridinovich Zaynidinov, Orif Kudratovich Makhmanov, Feruz Mukhammadjon Ogli Latifov, Djamshid Bakhodirovich Sultanov

Chemical Technology, Control and Management

In our country, comprehensive systemic measures are being taken to develop the digital economy and improve the widespread introduction of modern information and communication technologies in all sectors and industries, including education and science. This strategy requires improving the quality and efficiency of the system of training and attestation of highly qualified scientific and scientific-pedagogical personnel, further development of the industry through digitalization and adaptation to advanced world practice. This paper presents models and descriptions of scenarios for the use of "Complex-analytical information system of scientific degrees" developed for the exchange of electronic documents and the digitization of their attestation …


Distributed Parallel Processing, Adrian Wu 2021 Western University

Distributed Parallel Processing, Adrian Wu

Undergraduate Student Research Internships Conference

This report summarizes the development of testing new microcontrollers in performing image processing and parallel processing to solve the problem of testing and deploying expensive computer hardware technology in space. The project determined that the I2C communication protocol should be converted to an alternative protocol to maximize data transfer in parallel processing. This report also analyzes the software components and hardware components of the Distributed Parallel Processing project.

This project was to research the alternative protocols for the recently developed project Distributed Parallel Processing with CubeSats. There project was to develop a suitable microcontroller to perform image processing techniques with …


Forest Park Trail Monitoring, Adan Robles, Colton S. Maybee, Erin Dougherty 2021 Portland State University

Forest Park Trail Monitoring, Adan Robles, Colton S. Maybee, Erin Dougherty

REU Final Reports

Forest Park, one of the largest public parks in the United States with over 40 trails to pick from when planning a hiking trip. One of the main problems this park has is that there are too many trails, and a lot of the trails extend over 3 miles. Due to these circumstances’ trails are not checked frequently and hikers are forced to hike trails in the area with no warnings of potential hazards they can encounter. In this paper I researched how Forest Park currently monitors its trails and then set up a goal to solve the problem. We …


Digitally Reporting Trail Obstructions In Forest Park, Colton S. Maybee 2021 Portland State University

Digitally Reporting Trail Obstructions In Forest Park, Colton S. Maybee

REU Final Reports

The inclusion of technology on the trail can lead to better experiences for everyone involved in the hobby. Hikers can play a more prominent role in the maintenance of the trails by being able to provide better reports of obstructions while directly on the trail. This paper goes into the project of revamping the obstruction report system applied at Forest Park in Portland, Oregon. Most of my contributions to the project focus on mobile app development with some research into path planning algorithms related to the continuations of this project.


Digital Commons powered by bepress