Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,535 Full-Text Articles 2,225 Authors 972,665 Downloads 129 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,535 full-text articles. Page 7 of 63.

Multi-Agent Radiation Localization, Teresa Nguyen 2021 Portland State University

Multi-Agent Radiation Localization, Teresa Nguyen

REU Final Reports

Advancement of radiation detection technology is an ongoing process, and adjustments are made based on pre-existing conditions of radiation presence--both natural and man made. Tools that are currently used for safely detecting radiation in urban environments exist in several forms: drones, robots, or handheld radiation detection devices. This is a harm reductive way to explore radiation-infected environments while preserving human health as best as possible. In order for these autonomous platforms to successfully detect radiation sources, an algorithm needs to be created that is capable of gathering crucial data on its own with little to no human interference. Machine learning …


Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong 2021 University of Tennessee, Knoxville

Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong

Doctoral Dissertations

As the scale of High-performance Computing (HPC) systems continues to grow, researchers are devoted themselves to achieve the best performance of running long computing jobs on these systems. My research focus on reliability and efficiency study for HPC software.

First, as systems become larger, mean-time-to-failure (MTTF) of these HPC systems is negatively impacted and tends to decrease. Handling system failures becomes a prime challenge. My research aims to present a general design and implementation of an efficient runtime-level failure detection and propagation strategy targeting large-scale, dynamic systems that is able to detect both node and process failures. Using multiple overlapping …


Linking Social Media, Medical Literature, And Clinical Notes Using Deep Learning., Mohsen Asghari 2021 University of Louisville

Linking Social Media, Medical Literature, And Clinical Notes Using Deep Learning., Mohsen Asghari

Electronic Theses and Dissertations

Researchers analyze data, information, and knowledge through many sources, formats, and methods. The dominant data format includes text and images. In the healthcare industry, professionals generate a large quantity of unstructured data. The complexity of this data and the lack of computational power causes delays in analysis. However, with emerging deep learning algorithms and access to computational powers such as graphics processing unit (GPU) and tensor processing units (TPUs), processing text and images is becoming more accessible. Deep learning algorithms achieve remarkable results in natural language processing (NLP) and computer vision. In this study, we focus on NLP in the …


A Black-Box Approach For Containerized Microservice Monitoring In Fog Computing, Shi Chang 2021 The University of Western Ontario

A Black-Box Approach For Containerized Microservice Monitoring In Fog Computing, Shi Chang

Electronic Thesis and Dissertation Repository

The goal of the Internet of Things (IoT) is to convert the physical world into a smart space in which physical objects, called things, are equipped with computing and communication capabilities. Those things can connect with anything, anyone at any time, any space via any network or service. The predominant Internet of Things (IoT) system model today is cloud centric. This model introduces latencies into the application execution, as data travels first upstream for processing and secondly the results, i.e., control commands, travel downstream to the devices. In contrast with the cloud-model, the cloud-fog-based model pushes computing capability to the …


Eye Tracking In Virtual Reality For Educational Technology Research, Jorge Bacca-Acosta, Julian Tejada 2021 Fundación Universitaria Konrad Lorenz

Eye Tracking In Virtual Reality For Educational Technology Research, Jorge Bacca-Acosta, Julian Tejada

Frameless

No abstract provided.


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban 2021 October 6 University

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …


Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel 2021 University of Arkansas, Fayetteville

Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel

Graduate Theses and Dissertations

This dissertation proposes a novel cooperative 3D printing (C3DP) approach for multi-robot additive manufacturing (AM) and presents scheduling and planning strategies that enable multi-robot cooperation in the manufacturing environment. C3DP is the first step towards achieving the overarching goal of swarm manufacturing (SM). SM is a paradigm for distributed manufacturing that envisions networks of micro-factories, each of which employs thousands of mobile robots that can manufacture different products on demand. SM breaks down the complicated supply chain used to deliver a product from a large production facility from one part of the world to another. Instead, it establishes a network …


Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí de Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima 2021 Technological University Dublin

Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima

Conference papers

Data center networks (DCNs) are the backbone of many cloud and Internet services. They are vulnerable to link failures, that occur on a daily basis, with a high frequency. Service disruption due to link failure may incur financial losses, compliance breaches and reputation damage. Performance metrics such as packet loss and routing flaps are negatively affected by these failure events. We propose a new Bayesian learning approach towards adaptive path allocation that aims to improve DCN performance by reducing both packet loss and routing flaps ratios. The proposed approach incorporates historical information about link failure and usage probabilities into its …


Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman 2021 University of Arkansas, Fayetteville

Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman

Graduate Theses and Dissertations

Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …


Website Based Library Service Development For Elementary School Library Services (Case Study: A Private Elementary School Library In Surabaya), Nasa Zata Dina, Iva Nur Annisya, Nyoman Juniarta 2021 Universitas Airlangga, Indonesia

Website Based Library Service Development For Elementary School Library Services (Case Study: A Private Elementary School Library In Surabaya), Nasa Zata Dina, Iva Nur Annisya, Nyoman Juniarta

Library Philosophy and Practice (e-journal)

This study was conducted to develop library services at a private elementary school by developing a system using the waterfall method and PHP framework. It is developed to provide website based library. Many users, especially librarian, experience restlessness in cataloging, processing and lending services because all the services had been processed manually. Librarian’s workload increased because there is limited number of people work in the library. The purpose of this research is to make librarian easier to provide library services which are packaged in a website based library services. This study uses the waterfall method to develop library services. The …


Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays do Nascimento, Gustavo Dalmarco 2021 PUCRS

Fasten: An Iot Platform For Supply Chain Management In A Covid-19 Pandemic Scenario, Fernando Lemos, Thays Do Nascimento, Gustavo Dalmarco

Markets, Globalization & Development Review

This paper points out the major disruptions caused by the COVID-19 pandemic. It proposes an automated Internet-of-Things (IoT) based manufacturing and supply chain system, termed FASTEN, that can deal with such severe disruptions.


Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux 2021 Purdue University

Six Sigma, Sustainability, And It Management: A Research Review And Discussion Of Future Directions, Manal Alduraibi, Timothy Winders, Chad Laux

International Conference on Lean Six Sigma

Abstract

Purpose- Six Sigma is based upon quality improvement by finding the root cause and refining processes to the precision of process outcomes. The purpose of this research was to conduct a systematic literature review (SLR) to explore the Six Sigma techniques and information technology (IT) management concepts to identify the IT management principle's impact on the sustainability of Six Sigma project efforts and identify the gaps that are essential to be addressed through further research. This research also discusses the principles of IT management upon the influence on Six Sigma projects, and subsequent contribution to organizational economic sustainability. An …


The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola 2021 Harrisburg University of Science and Technology

The Revenue Operations (Revops) Framework: A Qualitative Study Of Industry Practitioners., Oliviero Mottola

Dissertations and Theses

In recent years Revenue Operations or RevOps has emerged in professional circles as a new approach to manage Sales, Marketing and Customer Success teams in the context of b2b sales. In practitioner circles, RevOps definitions range from the increased collaboration of the three job functions to an all-out creation of job function within organizations. While the subject of interdepartmental alignment has been covered extensively in academia (albeit not exhaustively), RevOps as a term and set of practices has received no attention and industry practitioners struggle to find a unified set of best practices that isn’t coming from organizations trying to …


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin 2021 Independent Researcher

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays III 2021 California Polytechnic State University, San Luis Obispo

A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii

Master's Theses

The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …


The State Of Artificial Intelligence In Medical Imaging, Catalin Cristian Veghes 2021 Clark University

The State Of Artificial Intelligence In Medical Imaging, Catalin Cristian Veghes

School of Professional Studies

This study explores the current state of Artificial Intelligence in medical imaging and provides an accessible assessment of how radiologists perceive the emerging technologies. Throughout the research, we analyze different aspects such as the adoption rate of Artificial Intelligence or the performance of state-of-the-art models, and we identify some of the significant barriers that prevent a wider adoption, such as the lack of collaboration between radiologists and computer scientists. Additionally, we provide a brief theoretical background that explains how deep learning works and how it can be helpful in medical imaging. We describe the architecture of a binary classifier in …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. McIntyre 2021 California Polytechnic State University, San Luis Obispo

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu 2021 Clark University

The Effects Of Artificial Intelligence On Competitive Sports, Qiyu Pu

School of Professional Studies

This Research thesis is to explore the application and impact of artificial intelligence in the field of competitive sports, discover the risks and problems in it, and discuss solutions. Nowadays, artificial intelligence has been applied to all walks of life, and the field of competitive sports is no exception, such as VR video technology, artificial intelligence for competition and player data analysis, artificial intelligence equipment to help players train, artificial intelligence to develop tactics, etc. But artificial intelligence has also brought about problems such as disrupting game viewing, making intellectual competitive sports meaningless, and threatening the status of industry practitioners. …


Ultrapin: Inferring Pin Entries Via Ultrasound, LIU, Ximing, Robert H. DENG, Robert H. DENG 2021 Singapore Management University

Ultrapin: Inferring Pin Entries Via Ultrasound, Liu, Ximing, Robert H. Deng, Robert H. Deng

Research Collection School Of Computing and Information Systems

While PIN-based user authentication systems such as ATM have long been considered to be secure enough, they are facing new attacks, named UltraPIN, which can be launched from commodity smartphones. As a target user enters a PIN on a PIN-based user authentication system, an attacker may use UltraPIN to infer the PIN from a short distance (50 cm to 100 cm). In this process, UltraPIN leverages smartphone speakers to issue human-inaudible ultrasound signals and uses smartphone microphones to keep recording acoustic signals. It applies a series of signal processing techniques to extract high-quality feature vectors from low-energy and high-noise signals …


When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan WU, Debin GAO, Robert H. DENG, Rocky CHANG 2021 Singapore Management University

When Program Analysis Meets Bytecode Search: Targeted And Efficient Inter-Procedural Analysis Of Modern Android Apps In Backdroid, Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky Chang

Research Collection School Of Computing and Information Systems

Widely-used Android static program analysis tools,e.g., Amandroid and FlowDroid, perform the whole-app interprocedural analysis that is comprehensive but fundamentallydifficult to handle modern (large) apps. The average app size hasincreased three to four times over five years. In this paper, weexplore a new paradigm of targeted inter-procedural analysis thatcan skip irrelevant code and focus only on the flows of securitysensitive sink APIs. To this end, we propose a technique calledon-the-fly bytecode search, which searches the disassembled appbytecode text just in time when a caller needs to be located. In thisway, it guides targeted (and backward) inter-procedural analysisstep by step until reaching …


Digital Commons powered by bepress