Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1198

Full-Text Articles in Computer Engineering

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris Aug 2020

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris

Engineering and Applied Science Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...


Minet Magnetic Localization, Michael Robert Drake May 2020

Minet Magnetic Localization, Michael Robert Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization is a less popular sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of optimizing a particle filter, by ...


Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam May 2020

Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam

Faculty Publications

In this article, the results of experiments for the observation of Zenneck surface waves in sub GHz frequency range using dipole antennas are presented. Experiments are conducted over three different soils for communications distances of up to 1 m. This empirical analysis confirms the existence of Zenneck waves over the soil surface. Through the power delay profile (PDP) analysis, it has been shown that other subsurface components exhibit rapid decay as compared to the Zenneck waves. A potential application of the Zenneck waves for energy transmission in the area of decision agriculture is explored. Accordingly, a novel wireless through-the-soil power ...


Minet Magnetic Indoor Localization, Michael Drake Apr 2020

Minet Magnetic Indoor Localization, Michael Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method ...


A Framework To Detect Presentation Attacks, Laeticia Etienne Apr 2020

A Framework To Detect Presentation Attacks, Laeticia Etienne

Master of Science in Information Technology Theses

Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed ...


Optimization Study Of An Image Classification Deep Neural Network, Rose Ault Apr 2020

Optimization Study Of An Image Classification Deep Neural Network, Rose Ault

Honors Projects

Machine Learning is an important and growing field within Artificial Intelligence. It is particularly useful in situations where developing an algorithm to perform the task in a conventional way would be extremely difficult. Instead of being programmed specifically to complete a task, a program embodies a trained model that can recognize patterns present in given example data, and is able use that model to make predictions on future data. Neural networks are a prominent example of machine learning models used for this purpose. Neural networks are models that are based on how brains work, with massive numbers of connected processing ...


Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan Mar 2020

Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan

Doctoral Dissertations

Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.

Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...


A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes Mar 2020

A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes

Theses and Dissertations

To investigate the Data-Oriented Design (DOD) paradigm, in particular, an architecture built off its principles: the Entity-Component-System (ECS). ECS is commonly used by video game engines due to its ability to store data in a way that is optimal for the cache to access. Additionally, the structure of this paradigm produces a code-base that is simple to parallelize as the workload can be distributed across a thread-pool based on the data used with little to no need for data safety measures such as mutexes and locks. A final benefit, although not easily measured, is that the DOD paradigm produces a ...


Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat Mar 2020

Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat

Doctoral Dissertations

A prodigious increase in video streaming content along with a simultaneous rise in end system capabilities has led to the proliferation of adaptive bit rate video streaming users in the Internet. Today, video streaming services range from Video-on-Demand services like traditional IP TV to more recent technologies such as immersive 3D experiences for live sports events. In order to meet the demands of these services, the multimedia and networking research community continues to strive toward efficiently delivering high quality content across the Internet while also trying to minimize content storage and delivery costs.

The introduction of flexible and adaptable technologies ...


Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian Mar 2020

Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian

Purdue Road School

The BIM for Bridges and Structures initiative, also known as TPF-5(372), is a transportation pooled fund project that is a collaborative effort of 20 states, FHWA, and the AASHTO Committee on Bridges and Structures. The pooled fund objective is to develop an open, national standard for exchanging information necessary for the design, fabrication, and construction of bridges and structures in the United States. The presentation will provide an overview of the project and explain ways in which stakeholders can get involved.


Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services Mar 2020

Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services

Zea E-Books

Advancing Technology in Education at the University of Nebraska, May 7, 2019

Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6

Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6

Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6

Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7

5 Ways to Utilize ...


Web Application For Movie Performance Prediction, Devalkumar Patel Mar 2020

Web Application For Movie Performance Prediction, Devalkumar Patel

Electronic Theses, Projects, and Dissertations

This is an amazing and unique idea for the web application. The purpose of this application is to address those movie lover people who is always in a hurry to visit the theatre to watch upcoming movies irrespective of which star cast is in it. This system is a mixture of desktop applications, python libraries, and simple math arithmetic. The application can be used by anyone which is ultimately helping them to decide, either they should watch the movie or not. The user just submits the name of the movie. This application is developed in Visual Studio 2019 for functioning ...


A Mock Software Company: For Teaching Software Engineering (Cse 455) Course, Arturo Concepcion Feb 2020

A Mock Software Company: For Teaching Software Engineering (Cse 455) Course, Arturo Concepcion

Q2S Enhancing Pedagogy

This is a novel way of teaching software engineering as an upper-division course for senior computer science students. Teach the class as a mock software company where students play a role in the “software company” such as project managers, assistant project managers, team leads, software engineers, software designers, UI designers, QA engineers, etc. Then to make a realistic work environment, solicit software projects from real clients, not toy software projects that the instructors think of. It has been proven, pedagogically, that project-based learning is one of the most effective way of teaching. There are no quizzes, no mid-terms, and no ...


Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan Feb 2020

Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan

Other Student Works

Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.


Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore Feb 2020

Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore

Computer Engineering

The Tiny Disco is a WiFi based concert system, featuring improvements on popular “Silent Disco” concerts. Rather than being tied to compression and bandwidth restrictions present in traditional silent disco systems, the Tiny Disco system can deliver 320kbps+ audio quality, and allows listeners to bring their own headphones, further lending to the high quality audio experience.

Tiny Disco uses a Raspberry Pi as the audio server, and Espressif ESP32 microcontrollers as audio receivers/clients. The Tiny Disco is primarily geared toward smaller concerts and niche events where audio quality is valued, though due to its WiFi-based architecture, it can be ...


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki Jan 2020

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...


Terraria Server On A Raspberry Pi, Bradley Stoldt Jan 2020

Terraria Server On A Raspberry Pi, Bradley Stoldt

Williams Honors College, Honors Research Projects

My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.


Creature Care, Alexander Weber Jan 2020

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a ...


Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar Jan 2020

Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar

Theses and Dissertations

With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted ...


Evaluating The Impact Of Defeasible Argumentation As A Modelling Technique For Reasoning Under Uncertainty, Lucas Rizzo Jan 2020

Evaluating The Impact Of Defeasible Argumentation As A Modelling Technique For Reasoning Under Uncertainty, Lucas Rizzo

Doctoral

Limited work exists for the comparison across distinct knowledge-based approaches in ArtificialIntelligence(AI)fornon monotonicreasoning,andinparticularfortheexamination of their inferential and explanatory capacity. Non-monotonicity, or defeasibility, allows the retraction of a conclusion in the light of new information. It is a similar pattern to human reasoning, which draws conclusions in the absence of information, but allows them to be corrected once new pieces of evidence arise. Thus, this thesis focuses on a comparison of three approaches in AI for implementation of non-monotonic reasoning models of inference, namely: expert systems, fuzzy reasoning and defeasible argumentation. Three applications from the fields ofdecision-makinginhealthcareandknowledgerepresentationandreasoning were ...


Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong Dec 2019

Hardware-Entangled Software Execution Using Dynamic Pufs, Wenjie Xiong

Yale Day of Data

Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products. There is, however, much concern about sensitive data being processed on these low-end devices which have limited protection mechanisms in place. This paper proposes a Hardware-Entangled Software Protection (HESP) scheme that leverages hardware features to protect software code from malicious modification before or during run-time. It also enables implicit hardware authentication. Thus, the software will execute correctly only on an authorized device and if the timing of the software, e.g., control flow, was not changed through malicious modifications. The proposed ideas are based ...


Secure Two-Party Protocol For Privacy-Preserving Classification Via Differential Privacy, Manish Kumar Dec 2019

Secure Two-Party Protocol For Privacy-Preserving Classification Via Differential Privacy, Manish Kumar

Boise State University Theses and Dissertations

Privacy-preserving distributed data mining is the study of mining on distributed data—owned by multiple data owners—in a non-secure environment, where the mining protocol does not reveal any sensitive information to the data owners, the individual privacy is preserved, and the output mining model is practically useful. In this thesis, we propose a secure two-party protocol for building a privacy-preserving decision tree classifier over distributed data using differential privacy. We utilize secure multiparty computation to ensure that the protocol is privacy-preserving. Our algorithm also utilizes parallel and sequential compositions, and applies distributed exponential mechanism to ensure that the output ...


Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah Dec 2019

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah

Publications

Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual ...


Aspect And Opinion Aware Abstractive Review Summarization With Reinforced Hard Typed Decoder, Yufei Tian, Jianfei Yu, Jing Jiang Nov 2019

Aspect And Opinion Aware Abstractive Review Summarization With Reinforced Hard Typed Decoder, Yufei Tian, Jianfei Yu, Jing Jiang

Research Collection School Of Information Systems

In this paper, we study abstractive review summarization. Observing that review summaries often consist of aspect words, opinion words and context words, we propose a two-stage reinforcement learning approach, which first predicts the output word type from the three types, and then leverages the predicted word type to generate the final word distribution. Experimental results on two Amazon product review datasets demonstrate that our method can consistently outperform several strong baseline approaches based on ROUGE scores.


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the ...


Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang Nov 2019

Ridesourcing Systems: A Framework And Review, Hai Wang, Hai Yang

Research Collection School Of Information Systems

With the rapid development and popularization of mobile and wireless communication technologies, ridesourcing companies have been able to leverage internet-based platforms to operate e-hailing services in many cities around the world. These companies connect passengers and drivers in real time and are disruptively changing the transportation indus- try. As pioneers in a general sharing economy context, ridesourcing shared transportation platforms consist of a typical two-sided market. On the demand side, passengers are sensi- tive to the price and quality of the service. On the supply side, drivers, as freelancers, make working decisions flexibly based on their income from the platform ...


Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao Oct 2019

Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao

Posters-at-the-Capitol

Abstract

The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this ...


Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West Sep 2019

Centres Of Excellence And Roadmaps For Digital Transition: Lessons For Ireland’S Construction Industry, Barry Mcauley, Alan Hore, Roger West

Conference papers

Like most sectors in today’s working world, construction businesses are challenged to work in an increasingly digitised world with sophisticated demands from intelligent clients. So much has been written about the inefficiencies of the construction industry, its fragmentation, lack of collaboration, low margins, adversarial pricing, poor productivity, financial fragility, lack of research and development, poor industry image and relatively weak use of digital solutions. The Irish government recognises the importance of digital innovation to address many of the challenges the construction industry faces. With recent high profile reports of escalating spend on signature public sector projects and weak productivity ...


An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre Sep 2019

An Investigation Into Current Procurement Strategies That Promote Collaboration Through Early Contractor Involvement With Regards To Their Suitability For Irish Public Work Projects, Barry Mcauley, Frederic Lefebvre

Conference papers

Previous research has established that multi-disciplinary collaboration will benefit a construction project throughout its lifecycle. While Lean Construction, Building Information Modelling (BIM), and Integrated Project Delivery (IPD) can all be viewed as separate processes which add independent value to a project, they are more effective when used in partnership with each other. In order to ensure the high levels of collaboration expected for these processes to work in unison, the early involvement of the Contractor is paramount. Early contractor involvement within the design process can ensure a more focused integrated project team, improvement of both constructability and cost certainty, as ...