Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

PDF

2015

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 87

Full-Text Articles in Computer Engineering

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo Dec 2015

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo

Research Collection School Of Computing and Information Systems

Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …


Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin Dec 2015

Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin

Research Collection School Of Computing and Information Systems

Model checking suffers from the infamous state space explosion problem. In this paper, we propose an approach, named GPURC, to utilize the Graphics Processing Units (GPUs) to speed up the reachability verification. The key idea is to achieve a dynamic load balancing so that the many cores in GPUs are fully utilized during the state space exploration.To this end, we firstly construct a compact data encoding of the input transition systems to reduce the memory cost and fit the calculation in GPUs. To support a large number of concurrent components, we propose a multi-integer encoding with conflict-release accessing approach. We …


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …


Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez Dec 2015

Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez

Honors Theses

Business contracts represent a main source of income for Architects. Acquiring these contracts requires the latest and most immersive technology that improves their sales against competitors. Virtual reality provides an in-depth experience that allows clients to have a reasonable assurance that the building meets their physical expectations. Videos and photos are detached and mundane; while they provide some visual representation they will not allow the user to compare his physical characteristics (height, length, width) with a 3D model. In this paper, I describe a procedure for automatically importing 3D models from Revit into Unreal4. I also describe the workflow required …


Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang Dec 2015

Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang

Doctoral Dissertations

Modern central processing units (CPUs) employ arithmetic logic units (ALUs) that support statically defined precisions, often adhering to industry standards. Although CPU manufacturers highly optimize their ALUs, industry standard precisions embody accuracy and performance compromises for general purpose deployment. Hence, optimizing ALU precision holds great potential for improving speed and energy efficiency. Previous research on multiple precision ALUs focused on predefined, static precisions. Little previous work addressed ALU architectures with customized, dynamically defined precision. This dissertation presents approaches for developing dynamic precision ALU architectures for both fixed-point and floating-point to enable better performance, energy efficiency, and numeric accuracy. These new …


Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer Dec 2015

Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer

Computer Engineering

No abstract provided.


Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan Dec 2015

Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan

Innovative Research Publications IRP India

Most of the approaches to solve the unmixing problem are based on the Linear Mixing Model (LMM) which is questionable. Therefore, nonlinear spectral model is generally used to study the effects of multiple scattering in the complex surfaces. In this paper, we have demonstrated the application of Radiative Transform Equation (RTE) based Hapke multi scattering model. The Hapke model based non-linear spectral unmixing is carried out on a Moon Mineralogy Mapper (M3 ) data. The values of six non-linear Hapke's model parameters are estimated using a MATLAB based algorithm after optimizing the Hapke corrected M3-Endmembers and modeled spectra through minimum …


Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch Dec 2015

Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch

Research Collection School Of Computing and Information Systems

The large scale and complex nature of social media data raises the need to scale clustering techniques to big data and make them capable of automatically identifying data clusters with few empirical settings. In this paper, we present our investigation and three algorithms based on the fuzzy adaptive resonance theory (Fuzzy ART) that have linear computational complexity, use a single parameter, i.e., the vigilance parameter to identify data clusters, and are robust to modest parameter settings. The contribution of this paper lies in two aspects. First, we theoretically demonstrate how complement coding, commonly known as a normalization method, changes the …


Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins Dec 2015

Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins

Masters Theses

The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …


Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher Dec 2015

Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher

Electrical and Computer Engineering Faculty Publications and Presentations

Resistive switches are a class of emerging nanoelectronics devices that exhibit a wide variety of switching characteristics closely resembling behaviors of biological synapses. Assembled into random networks, such resistive switches produce emerging behaviors far more complex than that of individual devices. This was previously demonstrated in simulations that exploit information processing within these random networks to solve tasks that require nonlinear computation as well as memory. Physical assemblies of such networks manifest complex spatial structures and basic processing capabilities often related to biologically-inspired computing. We model and simulate random resistive switch networks and analyze their computational capacities. We provide a …


Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …


Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan Dec 2015

Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan

Masters Theses

Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.


Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang Nov 2015

Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Huang (Benjamin) Huang on November 20, 2015.


Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan Nov 2015

Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan

The ITB Journal

One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core of any AI movement system. This report will highlight pathfinding algorithms used presently in games and their shortcomings especially when dealing with real-time pathfinding. With the advances being made in other components, such as physics engines, it is AI that is impeding the next generation of computer games. This report will focus on how machine learning techniques such as Artificial Neural Networks and Genetic Algorithms can be used to enhance an agents ability …


Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor Nov 2015

Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor

The ITB Journal

Web Services using eXtensible Markup Language (XML) based standards are becoming the new archetype for enabling business to business collaborations. This paper describes the conceptual architecture and semantics of constructing and consuming Web Services. It describes how Web Services fit into the enterprise application environment. It discusses Web Services security. Finally, it outlines the flaws of Web Services in their current state.


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.


An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian Nov 2015

An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

Relentless Itemset Exhuming (RIE) is a archetypal data Exhuming topic with many authentic world applications such as market basket analysis. In authentic world the dataset size grows, researchers have prophesied Map Reduce version of RIE contrivance to meet the immensely colossal data challenge. Subsisting relentless itemset contrivance cannot distribute data equipollent among all the nodes and MR Apriori contrivance paper utilize manifold map/reduce procedures and engender an inordinate extent of key-value pairs with value. In this paper present a novel collateral, distributed contrivance which addresses these quandaries. We prophesis an ameliorated collateral contrivance and discuss its applications in this paper. …


Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali Nov 2015

Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali

Innovative Research Publications IRP India

A design of reading recommendation method based on user preference for online learning namely, RMUP is proposed. The aim of this study is to design an online learning recommendation system to support automatic information extract, dynamic user preference analysis and conduct an accurate recommendation of reading materials to relevant users.


Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng Nov 2015

Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng

Innovative Research Publications IRP India

This study aims to incorporate a new service into existing Moodle Core Services for student's usage data retrieval. This service can ease the pre-processing in EDM and provide a generic mechanism for data portability. The proposed method expects to reduce the data pre-processing time and enhance the interoperability in Moodle.


An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian Nov 2015

An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

The furthermost eco-amicable challenge nowadays is ecumenical warming. Energy disaster conveys green computing. Dynamic voltage scaling (DVS) has been a crucial procedure in exploiting the hardware characteristics of cloud datacenters to preserve energy by lowering the supply voltage and operating frequency. The study presents modified power consumption can be reduced by live migration of the virtual machines (VM) as required and by switching off idle machines. So, proposed a dynamic threshold predicated approach DMM CPU utilization for host at data center. This consolidation will work on dynamic and capricious workload evading nonessential power consumption. It will meet energy efficiency requisite …


An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker Nov 2015

An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker

Theses

Computer programming is an essential skill that all computing students must master and is increasingly important in many diverse disciplines. It is also difficult to learn. One of the many challenges novice programmers face from the start are notoriously cryptic compiler error messages. These report details on errors made by students and are essential as the primary source of information used to rectify those errors. However these difficult to understand messages are often a barrier to progress and a source of discouragement. A high number of student errors, and in particular a high frequency of repeated errors – when a …


Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson Oct 2015

Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson

Faculty Publications

Information-theoretic principles can be applied to the study of complex adaptive supply networks (CASN). Previous modeling efforts of CASN were impeded by the complex, dynamic nature of the systems. However, information theory provides a model-free approach to the problem removing many of those barriers. Understanding how principles such as transfer entropy, excess entropy/predictive information, information storage, and separable information apply in the context of supply networks opens up new ways of studying these complex systems. Additionally, these principles provide the potential for new business analytics which give managers of CASN new insights into the system's health, behavior, and eventual control …


Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros Oct 2015

Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros

Business Analytics and Information Systems

This paper explores the support for more comprehensive modeling of service systems than that possible through modeling methods developed through partial perspectives, with uncertainties about their wider suitability and need for integration with other methods in this domain. It responds to a Dual Call for Papers from INFORMS Service Science and IEEE Transactions on Service Computing requesting contributions that address the barely explored challenge of establishing links between business views of service systems and more technical views from service computing. Competing definitions of service reveal that most business views of service emphasize acts or outcomes produced for others, whereas a …


Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N Oct 2015

Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N

Innovative Research Publications IRP India

Information explosion has resulted in the need for more advanced methods for managing the information. Text stream mining, is very important as people and organizations are trying to process and understand as much of information as possible. Generalised suffix tree is a data structure which is capable of solving a number of text stream mining tasks like detecting changes in the text stream, identifying reuse of text and detecting events by identifying when the frequencies of phrases change in a statistically significant way. An efficient method with polynomial time complexity that uses suffix trees to analyse streams of data in …


M-Learning System Based On Ontology, Dr Leelavathi Rajamanickam,, Chen Woon Choong Oct 2015

M-Learning System Based On Ontology, Dr Leelavathi Rajamanickam,, Chen Woon Choong

Innovative Research Publications IRP India

Information and communication Technology is a gateway through which large population of students has been addressed. Mobile learning technology the latest arrival highly changing the way the students learn, interact, access up to data information. It mainly satisfies the current and future generation which needs information at the earliest rather than later few touches. The World Wide Web acts as an interface in E- learning as well as in mobile learning (Mlearning) environments. It supports and facilitates the delivery of teaching and learning materials. M - l e a r n i n g provides quality educational content with the …


Gsu Alumni Portal, Vemuri Vinusha Chowdary, Sairam Dasu, Siva Machineni Oct 2015

Gsu Alumni Portal, Vemuri Vinusha Chowdary, Sairam Dasu, Siva Machineni

All Capstone Projects

The main objective of GSU alumni portal web application is to allow old and new students of a university to communicate with each other. The application allows students to register and then search the data based on different criteria. Also it has the benefit of having a centralized database and up to date information. A user can easily obtain information about other registered users. This application is deployed using Cloud computing (Microsoft Azure) and nothing is managed locally. The administrator is responsible for maintaining information of students. When a student submits the registration form, administrator will complete the verification process …


Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar Sep 2015

Relaxing Weighted Clustering Algorithm For Reduction Of Clusters And Cluster Head, Vijayanand Kumar

Innovative Research Publications IRP India

Adhoc clustering in MANET is to divide mobile nodes into different virtual groups. Mobile nodes are allocated geographically adjacent in the cluster. Clustering is done by some rule specific in the network. In this paper, we have concentrated to modify weight based clustering algorithm to improve the performance in this wireless technology. By slight improvement in existing weight based clustering algorithm [1] reduction in cluster as well as cluster head can be observed through experiment. Proposed Algorithm specifies relaxing the weight criteria for isolated cluster head nodes in range of other cluster head as well as reconsidering the nodes in …


An Investigation Into Partitioning Algorithms For Automatic Heterogeneous Compilers, Antonio M. Leija Sep 2015

An Investigation Into Partitioning Algorithms For Automatic Heterogeneous Compilers, Antonio M. Leija

Master's Theses

Automatic Heterogeneous Compilers allows blended hardware-software solutions to be explored without the cost of a full-fledged design team, but limited research exists on current partitioning algorithms responsible for separating hardware and software. The purpose of this thesis is to implement various partitioning algorithms onto the same automatic heterogeneous compiler platform to create an apples to apples comparison for AHC partitioning algorithms. Both estimated outcomes and actual outcomes for the solutions generated are studied and scored. The platform used to implement the algorithms is Cal Poly’s own Twill compiler, created by Doug Gallatin last year. Twill’s original partitioning algorithm is chosen …


Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang Aug 2015

Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang

FIU Electronic Theses and Dissertations

Thanks to the advanced technologies and social networks that allow the data to be widely shared among the Internet, there is an explosion of pervasive multimedia data, generating high demands of multimedia services and applications in various areas for people to easily access and manage multimedia data. Towards such demands, multimedia big data analysis has become an emerging hot topic in both industry and academia, which ranges from basic infrastructure, management, search, and mining to security, privacy, and applications. Within the scope of this dissertation, a multimedia big data analysis framework is proposed for semantic information management and retrieval with …


Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis Aug 2015

Detailed Low-Cost Energy And Power Monitoring Of Computing Systems, Chad M. Paradis

Electronic Theses and Dissertations

Power and energy are increasingly important metrics in modern computing systems. Large supercomputers utilize millions of cores and can consume as much power as a small town; monitoring and reducing power consumption is an important task. At the other extreme, power usage of embedded and mobile devices is also critically important. Battery life is a key concern in such devices; having detailed power measurement allows optimizing these devices for power as well. Current systems are not set up to allow easy power measurement. There has been much work in this area, but obtaining power readings is often expensive, intrusive, and …