Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 96

Full-Text Articles in Computer Engineering

Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin Dec 2015

Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin

Research Collection School Of Computing and Information Systems

Model checking suffers from the infamous state space explosion problem. In this paper, we propose an approach, named GPURC, to utilize the Graphics Processing Units (GPUs) to speed up the reachability verification. The key idea is to achieve a dynamic load balancing so that the many cores in GPUs are fully utilized during the state space exploration.To this end, we firstly construct a compact data encoding of the input transition systems to reduce the memory cost and fit the calculation in GPUs. To support a large number of concurrent components, we propose a multi-integer encoding with conflict-release accessing approach. We …


All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo Dec 2015

All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo

Research Collection School Of Computing and Information Systems

Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …


Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez Dec 2015

Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez

Honors Theses

Business contracts represent a main source of income for Architects. Acquiring these contracts requires the latest and most immersive technology that improves their sales against competitors. Virtual reality provides an in-depth experience that allows clients to have a reasonable assurance that the building meets their physical expectations. Videos and photos are detached and mundane; while they provide some visual representation they will not allow the user to compare his physical characteristics (height, length, width) with a 3D model. In this paper, I describe a procedure for automatically importing 3D models from Revit into Unreal4. I also describe the workflow required …


Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang Dec 2015

Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang

Doctoral Dissertations

Modern central processing units (CPUs) employ arithmetic logic units (ALUs) that support statically defined precisions, often adhering to industry standards. Although CPU manufacturers highly optimize their ALUs, industry standard precisions embody accuracy and performance compromises for general purpose deployment. Hence, optimizing ALU precision holds great potential for improving speed and energy efficiency. Previous research on multiple precision ALUs focused on predefined, static precisions. Little previous work addressed ALU architectures with customized, dynamically defined precision. This dissertation presents approaches for developing dynamic precision ALU architectures for both fixed-point and floating-point to enable better performance, energy efficiency, and numeric accuracy. These new …


Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer Dec 2015

Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer

Computer Engineering

No abstract provided.


Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan Dec 2015

Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan

Innovative Research Publications IRP India

Most of the approaches to solve the unmixing problem are based on the Linear Mixing Model (LMM) which is questionable. Therefore, nonlinear spectral model is generally used to study the effects of multiple scattering in the complex surfaces. In this paper, we have demonstrated the application of Radiative Transform Equation (RTE) based Hapke multi scattering model. The Hapke model based non-linear spectral unmixing is carried out on a Moon Mineralogy Mapper (M3 ) data. The values of six non-linear Hapke's model parameters are estimated using a MATLAB based algorithm after optimizing the Hapke corrected M3-Endmembers and modeled spectra through minimum …


Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins Dec 2015

Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins

Masters Theses

The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …


Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher Dec 2015

Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher

Electrical and Computer Engineering Faculty Publications and Presentations

Resistive switches are a class of emerging nanoelectronics devices that exhibit a wide variety of switching characteristics closely resembling behaviors of biological synapses. Assembled into random networks, such resistive switches produce emerging behaviors far more complex than that of individual devices. This was previously demonstrated in simulations that exploit information processing within these random networks to solve tasks that require nonlinear computation as well as memory. Physical assemblies of such networks manifest complex spatial structures and basic processing capabilities often related to biologically-inspired computing. We model and simulate random resistive switch networks and analyze their computational capacities. We provide a …


Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan Dec 2015

Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan

Masters Theses

Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.


Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch Dec 2015

Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch

Research Collection School Of Computing and Information Systems

The large scale and complex nature of social media data raises the need to scale clustering techniques to big data and make them capable of automatically identifying data clusters with few empirical settings. In this paper, we present our investigation and three algorithms based on the fuzzy adaptive resonance theory (Fuzzy ART) that have linear computational complexity, use a single parameter, i.e., the vigilance parameter to identify data clusters, and are robust to modest parameter settings. The contribution of this paper lies in two aspects. First, we theoretically demonstrate how complement coding, commonly known as a normalization method, changes the …


Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …


Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang Nov 2015

Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang

Masters Theses

Traditional fault tolerant techniques such as hardware or time redundancy incur high overhead and are inefficient for checking arithmetic operations. Our objective is to study an alternative approach of adding new instructions to check arithmetic operations. These checking instructions either rely on error detecting code or calculate approximate results and consequently, consume much less execution time. To evaluate the effectiveness of such an approach we wish to modify several benchmarks to use checking instructions and run simulation experiments to find out their execution time and memory usage. However, the checking instructions are not included in the instruction set and as …


Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang Nov 2015

Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Huang (Benjamin) Huang on November 20, 2015.


Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan Nov 2015

Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan

The ITB Journal

One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core of any AI movement system. This report will highlight pathfinding algorithms used presently in games and their shortcomings especially when dealing with real-time pathfinding. With the advances being made in other components, such as physics engines, it is AI that is impeding the next generation of computer games. This report will focus on how machine learning techniques such as Artificial Neural Networks and Genetic Algorithms can be used to enhance an agents ability …


Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor Nov 2015

Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor

The ITB Journal

Web Services using eXtensible Markup Language (XML) based standards are becoming the new archetype for enabling business to business collaborations. This paper describes the conceptual architecture and semantics of constructing and consuming Web Services. It describes how Web Services fit into the enterprise application environment. It discusses Web Services security. Finally, it outlines the flaws of Web Services in their current state.


Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman Nov 2015

Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman

Doctoral Dissertations

Continuous scaling of CMOS has been the major catalyst in miniaturization of integrated circuits (ICs) and crucial for global socio-economic progress. However, continuing the traditional way of scaling to sub-20nm technologies is proving to be very difficult as MOSFETs are reaching their fundamental performance limits [1] and interconnection bottleneck is dominating IC operational power and performance [2]. Migrating to 3-D, as a way to advance scaling, has been elusive due to inherent customization and manufacturing requirements in CMOS architecture that are incompatible with 3-D organization. Partial attempts with die-die [3] and layer-layer [4] stacking have their own limitations [5]. We …


On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu Nov 2015

On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu

Doctoral Dissertations

The high power density of a many-core processor results in increased temperature which negatively impacts system reliability and performance. Dynamic thermal management applies thermal-aware techniques at run time to avoid overheating using temperature information collected from on-chip thermal sensors. Temperature sensing and thermal control schemes are two critical technologies for successfully maintaining thermal safety. In this dissertation, on-line thermal sensor calibration schemes are developed to provide accurate temperature information. Software-based dynamic thermal management techniques are proposed using calibrated thermal sensors. Due to process variation and silicon aging, on-chip thermal sensors require periodic calibration before use in DTM. However, the calibration …


Design And Implementation Of An Economy Plane For The Internet, Xinming Chen Nov 2015

Design And Implementation Of An Economy Plane For The Internet, Xinming Chen

Doctoral Dissertations

The Internet has been very successful in supporting many network applications. As the diversity of uses for the Internet has increased, many protocols and services have been developed by the industry and the research community. However, many of them failed to get deployed in the Internet. One challenge of deploying these novel ideas in operational network is that the network providers need to be involved in the process. Many novel network protocols and services, like multicast and end-to-end QoS, need the support from network providers. However, since network providers are typically driven by business reasons, if they can not get …


Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis Nov 2015

Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis

Doctoral Dissertations

Machines today lack the inherent ability to reason and make decisions, or operate in the presence of uncertainty. Machine-learning methods such as Bayesian Networks (BNs) are widely acknowledged for their ability to uncover relationships and generate causal models for complex interactions. However, their massive computational requirement, when implemented on conventional computers, hinders their usefulness in many critical problem areas e.g., genetic basis of diseases, macro finance, text classification, environment monitoring, etc. We propose a new non-von Neumann technology framework purposefully architected across all layers for solving these problems efficiently through physical equivalence, enabled by emerging nanotechnology. The architecture builds …


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.


An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian Nov 2015

An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

Relentless Itemset Exhuming (RIE) is a archetypal data Exhuming topic with many authentic world applications such as market basket analysis. In authentic world the dataset size grows, researchers have prophesied Map Reduce version of RIE contrivance to meet the immensely colossal data challenge. Subsisting relentless itemset contrivance cannot distribute data equipollent among all the nodes and MR Apriori contrivance paper utilize manifold map/reduce procedures and engender an inordinate extent of key-value pairs with value. In this paper present a novel collateral, distributed contrivance which addresses these quandaries. We prophesis an ameliorated collateral contrivance and discuss its applications in this paper. …


Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali Nov 2015

Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali

Innovative Research Publications IRP India

A design of reading recommendation method based on user preference for online learning namely, RMUP is proposed. The aim of this study is to design an online learning recommendation system to support automatic information extract, dynamic user preference analysis and conduct an accurate recommendation of reading materials to relevant users.


Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng Nov 2015

Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng

Innovative Research Publications IRP India

This study aims to incorporate a new service into existing Moodle Core Services for student's usage data retrieval. This service can ease the pre-processing in EDM and provide a generic mechanism for data portability. The proposed method expects to reduce the data pre-processing time and enhance the interoperability in Moodle.


An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian Nov 2015

An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian

Innovative Research Publications IRP India

The furthermost eco-amicable challenge nowadays is ecumenical warming. Energy disaster conveys green computing. Dynamic voltage scaling (DVS) has been a crucial procedure in exploiting the hardware characteristics of cloud datacenters to preserve energy by lowering the supply voltage and operating frequency. The study presents modified power consumption can be reduced by live migration of the virtual machines (VM) as required and by switching off idle machines. So, proposed a dynamic threshold predicated approach DMM CPU utilization for host at data center. This consolidation will work on dynamic and capricious workload evading nonessential power consumption. It will meet energy efficiency requisite …


An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker Nov 2015

An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker

Theses

Computer programming is an essential skill that all computing students must master and is increasingly important in many diverse disciplines. It is also difficult to learn. One of the many challenges novice programmers face from the start are notoriously cryptic compiler error messages. These report details on errors made by students and are essential as the primary source of information used to rectify those errors. However these difficult to understand messages are often a barrier to progress and a source of discouragement. A high number of student errors, and in particular a high frequency of repeated errors – when a …


Bridging Researchers’ Active Data Storage Needs, Matt Schultz Oct 2015

Bridging Researchers’ Active Data Storage Needs, Matt Schultz

Matt Schultz

The 2015 Midwest Data Librarian Symposium was the inaugural launch of this now widely-attended un-conference series. Attendees were encouraged to submit lightning presentations on local developments in the area of data management support from within their Libraries. This brief presentation highlighted early work undertaken to develop a checklist that my role as Metadata & Digital Curation could make use of to navigate faculty researcher questions that arise when considering where to store and maintain research data during active stages of any given sponsored research project.


Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson Oct 2015

Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson

Faculty Publications

Information-theoretic principles can be applied to the study of complex adaptive supply networks (CASN). Previous modeling efforts of CASN were impeded by the complex, dynamic nature of the systems. However, information theory provides a model-free approach to the problem removing many of those barriers. Understanding how principles such as transfer entropy, excess entropy/predictive information, information storage, and separable information apply in the context of supply networks opens up new ways of studying these complex systems. Additionally, these principles provide the potential for new business analytics which give managers of CASN new insights into the system's health, behavior, and eventual control …


Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros Oct 2015

Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros

Business Analytics and Information Systems

This paper explores the support for more comprehensive modeling of service systems than that possible through modeling methods developed through partial perspectives, with uncertainties about their wider suitability and need for integration with other methods in this domain. It responds to a Dual Call for Papers from INFORMS Service Science and IEEE Transactions on Service Computing requesting contributions that address the barely explored challenge of establishing links between business views of service systems and more technical views from service computing. Competing definitions of service reveal that most business views of service emphasize acts or outcomes produced for others, whereas a …


Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N Oct 2015

Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N

Innovative Research Publications IRP India

Information explosion has resulted in the need for more advanced methods for managing the information. Text stream mining, is very important as people and organizations are trying to process and understand as much of information as possible. Generalised suffix tree is a data structure which is capable of solving a number of text stream mining tasks like detecting changes in the text stream, identifying reuse of text and detecting events by identifying when the frequencies of phrases change in a statistically significant way. An efficient method with polynomial time complexity that uses suffix trees to analyse streams of data in …