Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- SelectedWorks (12)
- California Polytechnic State University, San Luis Obispo (10)
- California State University, San Bernardino (9)
- Selected Works (9)
- University of Massachusetts Amherst (6)
-
- Singapore Management University (5)
- Technological University Dublin (4)
- University of Tennessee, Knoxville (4)
- Florida International University (3)
- Morehead State University (3)
- University of North Florida (3)
- Georgia Southern University (2)
- The University of Maine (2)
- Air Force Institute of Technology (1)
- Andrews University (1)
- Boise State University (1)
- DePaul University (1)
- Edith Cowan University (1)
- Gettysburg College (1)
- Governors State University (1)
- Liberty University (1)
- Old Dominion University (1)
- Portland State University (1)
- San Jose State University (1)
- Syracuse University (1)
- The University of San Francisco (1)
- The University of Southern Mississippi (1)
- Union College (1)
- University of Arkansas, Fayetteville (1)
- University of Central Florida (1)
- Keyword
-
- International Journal of Scientific Engineering and Technology (IJSET) (9)
- Security (6)
- Editor (4)
- Table (4)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (3)
-
- Android (3)
- Contents (3)
- Thesis; University of North Florida; UNF; Dissertations (3)
- Bayesian Networks (2)
- Cloud (2)
- Clustering (2)
- Compiler (2)
- Computer Architecture (2)
- FPGA (2)
- Information (2)
- Information Systems (2)
- Information theory (2)
- International (2)
- Journal (2)
- Management (2)
- Open Source Software (2)
- Open Source Software and Virtualization (2)
- Privacy (2)
- Project Management (2)
- Routing (2)
- Software Engineering (2)
- Technology (2)
- Virtualization (2)
- XML (2)
- 3D Architecture (1)
- Publication
-
- Innovative Research Publications IRP India (9)
- Journal of International Technology and Information Management (8)
- Doctoral Dissertations (5)
- Electronic Theses and Dissertations (5)
- Masters Theses (5)
-
- Research Collection School Of Computing and Information Systems (5)
- Computer Engineering (4)
- FIU Electronic Theses and Dissertations (3)
- Master's Theses (3)
- Maurice Dawson (3)
- Morehead State Theses and Dissertations (3)
- The ITB Journal (3)
- UNF Graduate Theses and Dissertations (3)
- Computer Science and Software Engineering (2)
- Faculty Publications (2)
- Honors Theses (2)
- All Capstone Projects (1)
- All Faculty Scholarship (1)
- Amean S Al_Safi (1)
- Boise State University Theses and Dissertations (1)
- Business Analytics and Information Systems (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- DePaul Magazine (1)
- Dissertations (1)
- Dr. Chen Ling (1)
- Electrical Engineering and Computer Science - All Scholarship (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electrical and Computer Engineering Faculty Publications and Presentations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Publication Type
- File Type
Articles 1 - 30 of 96
Full-Text Articles in Computer Engineering
Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin
Gpu Accelerated On-The-Fly Reachability Checking, Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin
Research Collection School Of Computing and Information Systems
Model checking suffers from the infamous state space explosion problem. In this paper, we propose an approach, named GPURC, to utilize the Graphics Processing Units (GPUs) to speed up the reachability verification. The key idea is to achieve a dynamic load balancing so that the many cores in GPUs are fully utilized during the state space exploration.To this end, we firstly construct a compact data encoding of the input transition systems to reduce the memory cost and fit the calculation in GPUs. To support a large number of concurrent components, we propose a multi-integer encoding with conflict-release accessing approach. We …
All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo
All Your Sessions Are Belong To Us: Investigating Authenticator Leakage Through Backup Channels On Android, Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo
Research Collection School Of Computing and Information Systems
Security of authentication protocols heavily relies on the confidentiality of credentials (or authenticators) like passwords and session IDs. However, unlike browser-based web applications for which highly evolved browsers manage the authenticators, Android apps have to construct their own management. We find that most apps simply locate their authenticators into the persistent storage and entrust underlying Android OS for mediation. Consequently, these authenticators can be leaked through compromised backup channels. In this work, we conduct the first systematic investigation on this previously overlooked attack vector. We find that nearly all backup apps on Google Play inadvertently expose backup data to any …
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Surbhi Dangi
In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …
Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez
Adapting Architectural Models For Visualization Using Virtual Reality Headsets, Bernardo Martinez
Honors Theses
Business contracts represent a main source of income for Architects. Acquiring these contracts requires the latest and most immersive technology that improves their sales against competitors. Virtual reality provides an in-depth experience that allows clients to have a reasonable assurance that the building meets their physical expectations. Videos and photos are detached and mundane; while they provide some visual representation they will not allow the user to compare his physical characteristics (height, length, width) with a 3D model. In this paper, I describe a procedure for automatically importing 3D models from Revit into Unreal4. I also describe the workflow required …
Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang
Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang
Doctoral Dissertations
Modern central processing units (CPUs) employ arithmetic logic units (ALUs) that support statically defined precisions, often adhering to industry standards. Although CPU manufacturers highly optimize their ALUs, industry standard precisions embody accuracy and performance compromises for general purpose deployment. Hence, optimizing ALU precision holds great potential for improving speed and energy efficiency. Previous research on multiple precision ALUs focused on predefined, static precisions. Little previous work addressed ALU architectures with customized, dynamically defined precision. This dissertation presents approaches for developing dynamic precision ALU architectures for both fixed-point and floating-point to enable better performance, energy efficiency, and numeric accuracy. These new …
Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer
Microcontroller Application For Linear And Rotational Motion Sensing, Zachary Mintzer
Computer Engineering
No abstract provided.
Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan
Non-Linear Spectral Unmixing Of Moon Mineralogy Mapper (M3 ) Data, Keshav Dev Singh, Ramakrishnan Desikan
Innovative Research Publications IRP India
Most of the approaches to solve the unmixing problem are based on the Linear Mixing Model (LMM) which is questionable. Therefore, nonlinear spectral model is generally used to study the effects of multiple scattering in the complex surfaces. In this paper, we have demonstrated the application of Radiative Transform Equation (RTE) based Hapke multi scattering model. The Hapke model based non-linear spectral unmixing is carried out on a Moon Mineralogy Mapper (M3 ) data. The values of six non-linear Hapke's model parameters are estimated using a MATLAB based algorithm after optimizing the Hapke corrected M3-Endmembers and modeled spectra through minimum …
Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins
Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins
Masters Theses
The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …
Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher
Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher
Electrical and Computer Engineering Faculty Publications and Presentations
Resistive switches are a class of emerging nanoelectronics devices that exhibit a wide variety of switching characteristics closely resembling behaviors of biological synapses. Assembled into random networks, such resistive switches produce emerging behaviors far more complex than that of individual devices. This was previously demonstrated in simulations that exploit information processing within these random networks to solve tasks that require nonlinear computation as well as memory. Physical assemblies of such networks manifest complex spatial structures and basic processing capabilities often related to biologically-inspired computing. We model and simulate random resistive switch networks and analyze their computational capacities. We provide a …
Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan
Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan
Masters Theses
Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.
Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Adaptive Scaling Of Cluster Boundaries For Large-Scale Social Media Data Clustering, Lei Meng, Ah-Hwee Tan, Donald C. Wunsch
Research Collection School Of Computing and Information Systems
The large scale and complex nature of social media data raises the need to scale clustering techniques to big data and make them capable of automatically identifying data clusters with few empirical settings. In this paper, we present our investigation and three algorithms based on the fuzzy adaptive resonance theory (Fuzzy ART) that have linear computational complexity, use a single parameter, i.e., the vigilance parameter to identify data clusters, and are robust to modest parameter settings. The contribution of this paper lies in two aspects. First, we theoretically demonstrate how complement coding, commonly known as a normalization method, changes the …
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Electronic Theses, Projects, and Dissertations
In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …
Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang
Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs, Chuan Zhang
Masters Theses
Traditional fault tolerant techniques such as hardware or time redundancy incur high overhead and are inefficient for checking arithmetic operations. Our objective is to study an alternative approach of adding new instructions to check arithmetic operations. These checking instructions either rely on error detecting code or calculate approximate results and consequently, consume much less execution time. To evaluate the effectiveness of such an approach we wish to modify several benchmarks to use checking instructions and run simulation experiments to find out their execution time and memory usage. However, the checking instructions are not included in the instruction set and as …
Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang
Communication Between Virtual Emulation System And Plc Modbus/Tcp Protocol, Huang Benjamin Huang
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Huang (Benjamin) Huang on November 20, 2015.
Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan
Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan
The ITB Journal
One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core of any AI movement system. This report will highlight pathfinding algorithms used presently in games and their shortcomings especially when dealing with real-time pathfinding. With the advances being made in other components, such as physics engines, it is AI that is impeding the next generation of computer games. This report will focus on how machine learning techniques such as Artificial Neural Networks and Genetic Algorithms can be used to enhance an agents ability …
Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor
Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor
The ITB Journal
Web Services using eXtensible Markup Language (XML) based standards are becoming the new archetype for enabling business to business collaborations. This paper describes the conceptual architecture and semantics of constructing and consuming Web Services. It describes how Web Services fit into the enterprise application environment. It discusses Web Services security. Finally, it outlines the flaws of Web Services in their current state.
Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman
Skybridge: A New Nanoscale 3-D Computing Framework For Future Integrated Circuits, Mostafizur Rahman
Doctoral Dissertations
Continuous scaling of CMOS has been the major catalyst in miniaturization of integrated circuits (ICs) and crucial for global socio-economic progress. However, continuing the traditional way of scaling to sub-20nm technologies is proving to be very difficult as MOSFETs are reaching their fundamental performance limits [1] and interconnection bottleneck is dominating IC operational power and performance [2]. Migrating to 3-D, as a way to advance scaling, has been elusive due to inherent customization and manufacturing requirements in CMOS architecture that are incompatible with 3-D organization. Partial attempts with die-die [3] and layer-layer [4] stacking have their own limitations [5]. We …
On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu
On Thermal Sensor Calibration And Software Techniques For Many-Core Thermal Management, Shiting Lu
Doctoral Dissertations
The high power density of a many-core processor results in increased temperature which negatively impacts system reliability and performance. Dynamic thermal management applies thermal-aware techniques at run time to avoid overheating using temperature information collected from on-chip thermal sensors. Temperature sensing and thermal control schemes are two critical technologies for successfully maintaining thermal safety. In this dissertation, on-line thermal sensor calibration schemes are developed to provide accurate temperature information. Software-based dynamic thermal management techniques are proposed using calibrated thermal sensors. Due to process variation and silicon aging, on-chip thermal sensors require periodic calibration before use in DTM. However, the calibration …
Design And Implementation Of An Economy Plane For The Internet, Xinming Chen
Design And Implementation Of An Economy Plane For The Internet, Xinming Chen
Doctoral Dissertations
The Internet has been very successful in supporting many network applications. As the diversity of uses for the Internet has increased, many protocols and services have been developed by the industry and the research community. However, many of them failed to get deployed in the Internet. One challenge of deploying these novel ideas in operational network is that the network providers need to be involved in the process. Many novel network protocols and services, like multicast and end-to-end QoS, need the support from network providers. However, since network providers are typically driven by business reasons, if they can not get …
Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis
Physically Equivalent Intelligent Systems For Reasoning Under Uncertainty At Nanoscale, Santosh Khasanvis
Doctoral Dissertations
Machines today lack the inherent ability to reason and make decisions, or operate in the presence of uncertainty. Machine-learning methods such as Bayesian Networks (BNs) are widely acknowledged for their ability to uncover relationships and generate causal models for complex interactions. However, their massive computational requirement, when implemented on conventional computers, hinders their usefulness in many critical problem areas e.g., genetic basis of diseases, macro finance, text classification, environment monitoring, etc. We propose a new non-von Neumann technology framework purposefully architected across all layers for solving these problems efficiently through physical equivalence, enabled by emerging nanotechnology. The architecture builds …
Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick
Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick
The ITB Journal
This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.
An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian
An Effectual Breakthrough For Concord Relentless Itemset Exhuming Based On Map Reduce, Ahilandeeswari G.,, Dr. R. Manicka Chezian
Innovative Research Publications IRP India
Relentless Itemset Exhuming (RIE) is a archetypal data Exhuming topic with many authentic world applications such as market basket analysis. In authentic world the dataset size grows, researchers have prophesied Map Reduce version of RIE contrivance to meet the immensely colossal data challenge. Subsisting relentless itemset contrivance cannot distribute data equipollent among all the nodes and MR Apriori contrivance paper utilize manifold map/reduce procedures and engender an inordinate extent of key-value pairs with value. In this paper present a novel collateral, distributed contrivance which addresses these quandaries. We prophesis an ameliorated collateral contrivance and discuss its applications in this paper. …
Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali
Design Of A Reading Recommendation Method Based On User Preference For Online Learning, Yanling Li,, S. C. Ng,, Felermino M. D. A. Ali
Innovative Research Publications IRP India
A design of reading recommendation method based on user preference for online learning namely, RMUP is proposed. The aim of this study is to design an online learning recommendation system to support automatic information extract, dynamic user preference analysis and conduct an accurate recommendation of reading materials to relevant users.
Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng
Moodle Data Retrieval For Educational Data Mining, Felermino M. D. A. Ali, S. C. Ng
Innovative Research Publications IRP India
This study aims to incorporate a new service into existing Moodle Core Services for student's usage data retrieval. This service can ease the pre-processing in EDM and provide a generic mechanism for data portability. The proposed method expects to reduce the data pre-processing time and enhance the interoperability in Moodle.
An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian
An Energy Proficiency Positioned Dynamic Threshold Approach To The Migration Of Virtual Machines In Dvs Empowered Green Cloud Data Centers, C. Saranya.,, Dr. R. Manicka Chezian
Innovative Research Publications IRP India
The furthermost eco-amicable challenge nowadays is ecumenical warming. Energy disaster conveys green computing. Dynamic voltage scaling (DVS) has been a crucial procedure in exploiting the hardware characteristics of cloud datacenters to preserve energy by lowering the supply voltage and operating frequency. The study presents modified power consumption can be reduced by live migration of the virtual machines (VM) as required and by switching off idle machines. So, proposed a dynamic threshold predicated approach DMM CPU utilization for host at data center. This consolidation will work on dynamic and capricious workload evading nonessential power consumption. It will meet energy efficiency requisite …
An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker
An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker
Theses
Computer programming is an essential skill that all computing students must master and is increasingly important in many diverse disciplines. It is also difficult to learn. One of the many challenges novice programmers face from the start are notoriously cryptic compiler error messages. These report details on errors made by students and are essential as the primary source of information used to rectify those errors. However these difficult to understand messages are often a barrier to progress and a source of discouragement. A high number of student errors, and in particular a high frequency of repeated errors – when a …
Bridging Researchers’ Active Data Storage Needs, Matt Schultz
Bridging Researchers’ Active Data Storage Needs, Matt Schultz
Matt Schultz
Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson
Using Information-Theoretic Principles To Analyze And Evaluate Complex Adaptive Supply Network Architectures, Joshua V. Rodewald, John M. Colombi, Kyle F. Oyama, Alan W. Johnson
Faculty Publications
Information-theoretic principles can be applied to the study of complex adaptive supply networks (CASN). Previous modeling efforts of CASN were impeded by the complex, dynamic nature of the systems. However, information theory provides a model-free approach to the problem removing many of those barriers. Understanding how principles such as transfer entropy, excess entropy/predictive information, information storage, and separable information apply in the context of supply networks opens up new ways of studying these complex systems. Additionally, these principles provide the potential for new business analytics which give managers of CASN new insights into the system's health, behavior, and eventual control …
Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros
Using A Work System Metamodel And Usdl To Build A Bridge Between Business Service Systems And Service Computing, Steven Alter, Alistair Barros
Business Analytics and Information Systems
This paper explores the support for more comprehensive modeling of service systems than that possible through modeling methods developed through partial perspectives, with uncertainties about their wider suitability and need for integration with other methods in this domain. It responds to a Dual Call for Papers from INFORMS Service Science and IEEE Transactions on Service Computing requesting contributions that address the barely explored challenge of establishing links between business views of service systems and more technical views from service computing. Competing definitions of service reveal that most business views of service emphasize acts or outcomes produced for others, whereas a …
Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N
Text Stream Mining Using Suffix Trees, Pamela Vinitha Eric,, Kusum Rajput,, Veda .N
Innovative Research Publications IRP India
Information explosion has resulted in the need for more advanced methods for managing the information. Text stream mining, is very important as people and organizations are trying to process and understand as much of information as possible. Generalised suffix tree is a data structure which is capable of solving a number of text stream mining tasks like detecting changes in the text stream, identifying reuse of text and detecting events by identifying when the frequencies of phrases change in a statistically significant way. An efficient method with polynomial time complexity that uses suffix trees to analyse streams of data in …