Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (2)
- APIs (1)
- Amazon AWS (1)
- Cloud Computing (1)
- Cloud LAMP Stack (1)
-
- Cloud computing (1)
- Computer security (1)
- Convergent Encryption. (1)
- Curricular Analytics (1)
- DRAM (1)
- DRAM Access latency (1)
- Data Dictionary (1)
- Education (1)
- Emerging (1)
- Failure Prediction (1)
- Fault Tolerance (1)
- Fine-grained (1)
- Image data collecting (1)
- Mapping (1)
- Metadata (1)
- Mobile development (1)
- Monolithic 3D Integration (1)
- Multi-Objective (1)
- Network security (1)
- Ontology (1)
- Optimization (1)
- P2P (1)
- Partial-Reset (1)
- Phase Change Memory (1)
- Procure-to-pay (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang
Re-Designing Main Memory Subsystems With Emerging Monolithic 3d (M3d) Integration And Phase Change Memory Technologies, Chao-Hsuan Huang
Theses and Dissertations--Electrical and Computer Engineering
Over the past two decades, Dynamic Random-Access Memory (DRAM) has emerged as the dominant technology for implementing the main memory subsystems of all types of computing systems. However, inferring from several recent trends, computer architects in both the industry and academia have widely accepted that the density (memory capacity per chip area) and latency of DRAM based main memory subsystems cannot sufficiently scale in the future to meet the requirements of future data-centric workloads related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In fact, the achievable density and access latency in main memory subsystems presents a very fundamental …
Metadata Management For Clinical Data Integration, Ningzhou Zeng
Metadata Management For Clinical Data Integration, Ningzhou Zeng
Theses and Dissertations--Computer Science
Clinical data have been continuously collected and growing with the wide adoption of electronic health records (EHR). Clinical data have provided the foundation to facilitate state-of-art researches such as artificial intelligence in medicine. At the same time, it has become a challenge to integrate, access, and explore study-level patient data from large volumes of data from heterogeneous databases. Effective, fine-grained, cross-cohort data exploration, and semantically enabled approaches and systems are needed. To build semantically enabled systems, we need to leverage existing terminology systems and ontologies. Numerous ontologies have been developed recently and they play an important role in semantically enabled …
Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam
Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam
Theses and Dissertations--Computer Science
Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.
First, we perform a …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Theses and Dissertations--Electrical and Computer Engineering
Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.
Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Metadata-Based Image Collecting And Databasing For Sharing And Analysis, Xi Wu
Theses and Dissertations--Computer Science
Data collecting and preparing is generally considered a crucial process in data science projects. Especially for image data, adding semantic attributes when preparing image data provides much more insights for data scientists. In this project, we aim to implement a general-purpose central image data repository that allows image researchers to collect data with semantic properties as well as data query. One of our researchers has come up with the specific challenge of collecting images with weight data of infants in least developed countries with limited internet access. The rationale is to predict infant weights based on image data by applying …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …