Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

University of North Florida

Theses/Dissertations

Keyword
Publication Year

Articles 1 - 13 of 13

Full-Text Articles in Engineering

Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections, Aaron M. Wilson Jan 2021

Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections, Aaron M. Wilson

UNF Graduate Theses and Dissertations

Building voting systems for secret ballot elections has many challenges and is the subject of significant academic research efforts. These challenges come from conflicting requirements. In this paper, we introduce a novel architectural approach to voting system construction that may help satisfy conflicting requirements and increase voter satisfaction. Our design, called Open Voting Client Architecture, defines a voting system architectural approach that can harness the power of individualized voting clients. In this work, we contribute a voting system reference architecture to depict the current voting system construction and then use it to define Open Voting Client Architecture. We then detail …


On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa Jan 2019

On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa

UNF Graduate Theses and Dissertations

Preferences are very important in research fields such as decision making, recommendersystemsandmarketing. The focus of this thesis is on preferences over combinatorial domains, which are domains of objects configured with categorical attributes. For example, the domain of cars includes car objects that are constructed withvaluesforattributes, such as ‘make’, ‘year’, ‘model’, ‘color’, ‘body type’ and ‘transmission’.Different values can instantiate an attribute. For instance, values for attribute ‘make’canbeHonda, Toyota, Tesla or BMW, and attribute ‘transmission’ can haveautomaticormanual. To this end,thisthesis studiesproblemsonpreference visualization and learning for lexicographic preference trees, graphical preference models that often are compact over complex domains of objects built of …


A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan Jan 2019

A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan

UNF Graduate Theses and Dissertations

In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based …


Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair Jan 2018

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair

UNF Graduate Theses and Dissertations

Powerful, handheld computing devices have proliferated among consumers in recent years. Combined with new cameras and sensors capable of detecting objects in three-dimensional space, new gesture-based paradigms of human computer interaction are becoming available. One possible application of these developments is an automated sign language recognition system. This thesis reviews the existing body of work regarding computer recognition of sign language gestures as well as the design of systems for speech recognition, a similar problem. Little work has been done to apply the well-known architectural patterns of speech recognition systems to the domain of sign language recognition. This work creates …


Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais Jan 2018

Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais

UNF Graduate Theses and Dissertations

Network security is an ongoing major problem in today’s Internet world. Even though there have been simulation studies related to denial of service and cache attacks, studies of attacks on real networks are still lacking in the research. In this thesis, the effects of cache attacks in real information-centric networking systems were investigated. Cache attacks were implemented in real networks with different cache sizes and with Least Recently Used, Random and First In First Out algorithms to fill the caches in each node. The attacker hits the cache with unpopular content, making the user request that the results be fetched …


Generating A Normalized Database Using Class Normalization, Daniel Sushil Sudhindaran Jan 2017

Generating A Normalized Database Using Class Normalization, Daniel Sushil Sudhindaran

UNF Graduate Theses and Dissertations

Relational databases are the most popular databases used by enterprise applications to store persistent data to this day. It gives a lot of flexibility and efficiency. A process called database normalization helps make sure that the database is free from redundancies and update anomalies. In a Database-First approach to software development, the database is designed first, and then an Object-Relational Mapping (ORM) tool is used to generate the programming classes (data layer) to interact with the database. Finally, the business logic code is written to interact with the data layer to persist the business data to the database. However, in …


Security Analysis Of Ecc Based Protocols, Chanchal Khatwani Jan 2017

Security Analysis Of Ecc Based Protocols, Chanchal Khatwani

UNF Graduate Theses and Dissertations

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities, and to enhance them to be more secure against threats. This work demonstrates how currently used ECC based protocols are vulnerable to attacks. If protocols are vulnerable, damages could include critical data loss and elevated privacy concerns. The protocols considered in thiswork differ in their usage of security factors (e.g. passwords, pins, and biometrics), encryption and timestamps. The threatmodel considers various kinds of attacks including …


Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii Jan 2016

Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii

UNF Graduate Theses and Dissertations

Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …


Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar Jan 2015

Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar

UNF Graduate Theses and Dissertations

Cloud computing is a relatively new form of computing which uses virtualized resources. It is dynamically scalable and is often provided as pay for use service over the Internet or Intranet or both. With increasing demand for data storage in the cloud, the study of data-intensive applications is becoming a primary focus. Data intensive applications are those which involve high CPU usage, processing large volumes of data typically in size of hundreds of gigabytes, terabytes or petabytes. The research in this thesis is focused on the Amazon’s Elastic Cloud Compute (EC2) and Amazon Elastic Map Reduce (EMR) using HiBench Hadoop …


Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish Jan 2015

Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish

UNF Graduate Theses and Dissertations

In computer security, cryptographic algorithms and protocols are required to ensure security of data and applications. This research investigates techniques to reduce the energy consumed by cryptographic hash functions. The specific hash functions considered are Message Digest-2 (MD2), Message Digest-5 (MD5), Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2).

The discussion around energy conservation in handheld devices like laptops and mobile devices is gaining momentum. Research has been done at the hardware and operating system levels to reduce the energy consumed by these devices. However, research on conserving energy at the application level is a new approach. This research …


An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni Jan 2015

An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni

UNF Graduate Theses and Dissertations

Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and …


Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam Jan 2013

Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam

UNF Graduate Theses and Dissertations

There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed computing paradigm for analysis of large volumes of data. The Apache Hadoop is the most popular open source implementation of MapReduce model and LINQ to HPC is Microsoft's alternative to open source Hadoop. In this thesis, the performance of LINQ to HPC and Hadoop are compared using different benchmarks.

To this end, we identified four benchmarks (Grep, Word Count, Read and Write) that we have run on LINQ to HPC as well as on Hadoop. For each benchmark, we measured each system’s performance metrics (Execution Time, Average CPU …


Evaluating Speedup In Parallel Compilers, Deepa V. Komathukattil Jan 2012

Evaluating Speedup In Parallel Compilers, Deepa V. Komathukattil

UNF Graduate Theses and Dissertations

Parallel programming is prevalent in every field mainly to speed up computation. Advancements in multiprocessor technology fuel this trend toward parallel programming. However, modern compilers are still largely single threaded and do not take advantage of the machine resources available to them. There has been a lot of work done on compilers that add parallel constructs to the programs they are compiling, enabling programs to exploit parallelism at run time. Auto parallelization of loops by a compiler is one such example. Researchers have done very little work towards parallelizing the compilation process itself.

The research done here focuses on parallel …