Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Aeronautical Vehicles (1)
- Aerospace Engineering (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Manufacturing (1)
-
- Materials Science and Engineering (1)
- Mechanical Engineering (1)
- Navigation, Guidance, Control and Dynamics (1)
- Polymer and Organic Materials (1)
- Propulsion and Power (1)
- Science and Technology Studies (1)
- Social and Behavioral Sciences (1)
- Structural Materials (1)
- Systems Engineering and Multidisciplinary Design Optimization (1)
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Profile-Guided Data Management For Heterogeneous Memory Systems, Matthew B. Olson
Profile-Guided Data Management For Heterogeneous Memory Systems, Matthew B. Olson
Doctoral Dissertations
Market forces and technological constraints have led to a gap between CPU and memory performance that has widened for decades. While processor scaling has plateaued in recent years, this gap persists and is not expected to diminish for the foreseeable future. This discrepancy presents a host of challenges for scaling application performance, which have only been exacerbated in recent years, as increasing demands for fast and effective data analytics are driving memory energy, bandwidth, and capacity requirements to new heights.
To address these trends, hardware architects have introduced a plethora of memory technologies. For example, most modern memory systems include …
Simulation Of A Configurable Hybrid Aircraft, Brandon Bartlett
Simulation Of A Configurable Hybrid Aircraft, Brandon Bartlett
Master's Theses
As the demand for air transportation is projected to increase, the environmental impacts produced by air travel will also increase. In order to counter the environmental impacts while also meeting the demand for air travel, there are goals and research initiatives that aim to develop more efficient aircraft. An emerging technology that supports these goals is the application of hybrid propulsion to aircraft, but there is a challenge in effectively exploring the performance of hybrid aircraft due to the time and money required for safe flight testing and due to the diverse design space of hybrid architectures and components. Therefore, …
3d Printing Of Hybrid Architectures Via Core-Shell Material Extrusion Additive Manufacturing, Robert Cody Pack
3d Printing Of Hybrid Architectures Via Core-Shell Material Extrusion Additive Manufacturing, Robert Cody Pack
Doctoral Dissertations
Biological materials often employ hybrid architectures, such as the core-shell motif present in porcupine quills and plant stems, to achieve unique properties and performance. Drawing inspiration from these natural materials, a new method to fabricate lightweight and stiff core-shell architected filaments is reported. Specifically, a core-shell printhead conducive to printing highly loaded fiber-filled inks, as well as a new low-density syntactic foam ink, are utilized to 3D-print core-shell architectures consisting of a syntactic epoxy foam core surrounded by a stiff carbon fiber-reinforced epoxy composite shell. Effective printing of test specimens and structures with controlled geometry, composition, and architecture is demonstrated …
A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong
A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong
Faculty of Engineering and Information Sciences - Papers: Part B
In recent years, machine learning-based cyber intrusion detection methods have gained increasing popularity. The number and complexity of new attacks continue to rise; therefore, effective and intelligent solutions are necessary. Unsupervised machine learning techniques are particularly appealing to intrusion detection systems since they can detect known and unknown types of attacks as well as zero-day attacks. In the current paper, we present an unsupervised anomaly detection method, which combines Sub-Space Clustering (SSC) and One Class Support Vector Machine (OCSVM) to detect attacks without any prior knowledge. The proposed approach is evaluated using the well-known NSL-KDD dataset. The experimental results demonstrate …