Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Storage Systems

PDF

Theses/Dissertations

2021

Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Computer Engineering

Graph Based Management Of Temporal Data, Alex Fotso Dec 2021

Graph Based Management Of Temporal Data, Alex Fotso

Master of Science in Computer Science Theses

In recent decades, there has been a significant increase in the use of smart devices and sensors that led to high-volume temporal data generation. Temporal modeling and querying of this huge data have been essential for effective querying and retrieval. However, custom temporal models have the problem of generalizability, whereas the extended temporal models require users to adapt to new querying languages. In this thesis, we propose a method to improve the modeling and retrieval of temporal data using an existing graph database system (i.e., Neo4j) without extending with additional operators. Our work focuses on temporal data represented as intervals …


Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally Dec 2021

Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally

All Theses

Floods are among the most destructive natural hazards that affect millions of people across the world leading to severe loss of life and damage to property, critical infrastructure, and the environment. Deep learning algorithms are exceptionally valuable tools for collecting and analyzing the catastrophic readiness and countless actionable flood data. Convolutional neural networks (CNNs) are one form of deep learning algorithms widely used in computer vision which can be used to study flood images and assign learnable weights and biases to various objects in the image. Here, we leveraged and discussed how connected vision systems can be used to embed …


Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir Dec 2021

Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir

Graduate Theses and Dissertations

Chip and packaging industries are making significant progress in 2.5D design as a result of increasing popularity of their application. In advanced high-density 2.5D packages, package redistribution layers become similar to chip Back-End-of-Line routing layers, and the gap between them scales down with pin density improvement. Chiplet-package interactions become significant and severely affect system performance and reliability. Moreover, 2.5D integration offers opportunities to apply novel design techniques. The traditional die-by-die design approach neither carefully considers these interactions nor fully exploits the cross-boundary design opportunities.

This thesis presents chiplet-package cross-boundary design, extraction, analysis, and optimization tool flows and methodologies for high-density …


Multilateration Index., Chip Lynch Aug 2021

Multilateration Index., Chip Lynch

Electronic Theses and Dissertations

We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …


Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao Jul 2021

Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao

Graduate Theses and Dissertations

Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.

Cloud computing has become more and more popular in …


A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii Jun 2021

A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii

Master's Theses

The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …


Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu Jun 2021

Data Mining Of Unstructured Textual Information In Transportation Safety Domain: Exploring Methods, Opportunities And Limitations, Keneth Morgan Kwayu

Dissertations

The unprecedented increase in volume and influx of structured and unstructured data has overwhelmed conventional data management system capabilities in organizing, analyzing, and procuring useful information in a timely fashion. Structured data sources have a pre-defined pattern that makes data preprocessing and information retrieval tasks relatively easy for the current technologies that have been designed to handle structured and repeatable data. Unlike structured data, unstructured data usually exists in an unorganized format that offers no or little insight unless indexed and stored in an organized fashion. The inherent format of unstructured data exacerbates difficulties in data preprocessing and information extraction. …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre Jun 2021

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi May 2021

Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi

Computer Science and Computer Engineering Undergraduate Honors Theses

Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …


Performance Implications Of Memory Affinity On Filesystem Caches In A Non-Uniform Memory Access Environment, Jacob Adams May 2021

Performance Implications Of Memory Affinity On Filesystem Caches In A Non-Uniform Memory Access Environment, Jacob Adams

Undergraduate Honors Theses

Non-Uniform Memory Access imposes unique challenges on every component of an operating system and the applications that run on it. One such component is the filesystem which, while not directly impacted by NUMA in most cases, typically has some form of cache whose performance is constrained by the latency and bandwidth of the memory that it is stored in. One such filesystem is ZFS, which contains its own custom caching system, known as the Adaptive Replacement Cache. This work looks at the impact of NUMA on this cache via sequential read operations, shows how current solutions intended to reduce this …


Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri May 2021

Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri

Graduate Theses and Dissertations

As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …


Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn Mar 2021

Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn

Theses and Dissertations

New forms of malware, namely xC;leless malware and rootkits, pose a threat to traditional anti-malware. In particular, Rootkits have the capacity to obscure the present state of memory from the user space of a target machine. If thishappens, anti-malware running in the user space of an axB;ected machine cannot be trusted to operate properly. To combat this threat, this research proposes the remote monitoring of memory from a second, secure processor runningOpenBMC, serving as a baseboard management controller for a POWER9 processor, which is assumed vulnerable to exploitation. The baseboard management controller includes an application called pdbg, used for debugging …


Desarrollo De Una Herramienta Computacional Como Apoyo A Pequeños Y Grandes Productores A Través De La Orientación Y Seguimiento De Cultivos., Angie Paola Botello Espitia, Juan Pablo Moya Cárdenas Jan 2021

Desarrollo De Una Herramienta Computacional Como Apoyo A Pequeños Y Grandes Productores A Través De La Orientación Y Seguimiento De Cultivos., Angie Paola Botello Espitia, Juan Pablo Moya Cárdenas

Ingeniería en Automatización

El presente trabajo de grado se enmarca en el desarrollo de una herramienta computacional enfocada a las necesidades de los estudiantes de la Universidad de La Salle de la sede Utopía. Para establecer las necesidades o requerimientos de la herramienta, se realizó una investigación en el sector de las TIC y el papel que se desempeñan en el plan de Extensión Rural del Ministerio de Agricultura. Además, se realizaron entrevistas con docentes e ingenieros del programa de Ingeniería Agronómica, encargados del área de viveros de la sede; la información recolectada sirvió como base para realizar el levantamiento de requerimientos de …


Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa Jan 2021

Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa

Williams Honors College, Honors Research Projects

The objective of this project would be to design and prototype an automated, light and temperature sensing window blinds system. The device would detect temperature, both inside and outside, and incoming sunlight to determine proper window blind position for maximum energy savings. The user would also have the ability to change the settings of the blind from a remote device to a setting that they desire at any given time


Guitar Store Inventory, Alexander Didonato Jan 2021

Guitar Store Inventory, Alexander Didonato

Williams Honors College, Honors Research Projects

This project displays my senior programming project for a made up Guitar store inventory.


Análisis En Un Sistema De Almacenamiento De Energía Basado En Hidrogeno Para Una Agrupación De Pozos Petroleros Con Penetración De Energía Solar, Jostin Esteban Martinez Rodriguez, Guillermo Humberto Ramirez Camacho Jan 2021

Análisis En Un Sistema De Almacenamiento De Energía Basado En Hidrogeno Para Una Agrupación De Pozos Petroleros Con Penetración De Energía Solar, Jostin Esteban Martinez Rodriguez, Guillermo Humberto Ramirez Camacho

Ingeniería Eléctrica

El uso de las energías renovables hoy en día toma gran importancia, ya que estas permiten obtener energía de formas que se consideran limpias, a diferencia de las formas convencionales para realizar este mismo proceso, en las cuales se generan emisiones por el uso de combustibles fósiles. Un ejemplo de esto son las centrales termoeléctricas e hidroeléctricas, en donde la primera emite grandes cantidades de gases efecto invernadero, y la segunda produce problemáticas asociadas con la afectación en el ecosistema, ya que es necesario inundar grandes extensiones de terreno, afectando flora y fauna sin tener presente los cambios en el …


Sistema De Información Para El Monitoreo De Variables Ambientales En El Museo De La Salle, Bogotá, Jhoan Steven González Sánchez, Leonardo Fabio Fernández Díaz Jan 2021

Sistema De Información Para El Monitoreo De Variables Ambientales En El Museo De La Salle, Bogotá, Jhoan Steven González Sánchez, Leonardo Fabio Fernández Díaz

Ingeniería en Automatización

Este proyecto está enfocado al diseño e implementación de un sistema de información que permite el monitoreo de las condiciones ambientales dentro del museo Lasalle Bogotá, específicamente la temperatura y humedad relativa interna de las habitaciones usadas para almacenar las colecciones que no se encuentran expuestas al público. La arquitectura del sistema consta de 3 niveles: Uno inferior compuesto por los sensores DHT11 / DHT22 los cuales toman y envían las mediciones, un nivel intermedio de adquisición conformado por las Tarjetas Arduino y un nivel superior de gestión del cual se encargan las tarjetas Raspberry pi 3 B +, siendo …


Robust Acceleration Of Data-Centric Applications Using Resistive Computing Systems, Baogang Zhang Jan 2021

Robust Acceleration Of Data-Centric Applications Using Resistive Computing Systems, Baogang Zhang

Electronic Theses and Dissertations, 2020-2023

With the accessible data reaching zettabyte level, CMOS technology is reaching its limit for the data hungry applications. Moore's law has been reaching its depletion in recent studies. On the other hand, von Neumann architecture is approaching the bottleneck due to the data movement between the computing and memory units. With data movement and power budgets becoming the limiting factors of today's computing systems, in-memory computing using emerging non-volatile resistive devices has attracted an increasing amount of attention. A non-volatile resistive device may be realized using memristor, resistive random access memory (ReRAM), phase change memory (PCM), or spin-transfer torque magnetic …


Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang Jan 2021

Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang

Theses and Dissertations--Electrical and Computer Engineering

Over the past two decades, Dynamic Random-Access Memory (DRAM) has emerged as the dominant technology for implementing the main memory subsystems of all types of computing systems. However, inferring from several recent trends, computer architects in both the industry and academia have widely accepted that the density (memory capacity per chip area) and latency of DRAM based main memory subsystems cannot sufficiently scale in the future to meet the requirements of future data-centric workloads related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In fact, the achievable density and access latency in main memory subsystems presents a very fundamental …


Improving Performance And Flexibility Of Fabric-Attached Memory Systems, Vamsee Reddy Kommareddy Jan 2021

Improving Performance And Flexibility Of Fabric-Attached Memory Systems, Vamsee Reddy Kommareddy

Electronic Theses and Dissertations, 2020-2023

As demands for memory-intensive applications continue to grow, the memory capacity of each computing node is expected to grow at a similar pace. In high-performance computing (HPC) systems, the memory capacity per compute node is decided upon the most demanding application that would likely run on such a system, and hence the average capacity per node in future HPC systems is expected to grow significantly. However, diverse applications run on HPC systems with different memory requirements and memory utilization can fluctuate widely from one application to another. Since memory modules are private for a corresponding computing node, a large percentage …