Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Florida International University

Discipline
Keyword
Publication Year

Articles 1 - 30 of 31

Full-Text Articles in Computer and Systems Architecture

A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon Jun 2022

A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon

FIU Electronic Theses and Dissertations

With the recent developments of communication technologies surrounding vehicles, we witness the simultaneous availability of multiple onboard communication interfaces on vehicles. While most of the current interfaces already include Bluetooth, WiFi, and LTE, they are augmented further by IEEE 802.11p and the 5G interfaces, which will serve for safety, maintenance, and infotainment applications. However, dynamic management of interfaces depending on application needs becomes a significant issue that can be best addressed by Software Defined Networking (SDN) capabilities. While SDN-based vehicular networks have been promoted previously, none of these works deal with practical challenges. In this thesis, we propose and develop …


Thermal Aware Design Automation Of The Electronic Control System For Autonomous Vehicles, Ajinkya Bankar Mar 2022

Thermal Aware Design Automation Of The Electronic Control System For Autonomous Vehicles, Ajinkya Bankar

FIU Electronic Theses and Dissertations

The autonomous vehicle (AV) technology, due to its tremendous social and economical benefits, is transforming the entire world in the coming decades. However, significant technical challenges still need to be overcome until AVs can be safely, reliably, and massively deployed. Temperature plays a key role in the safety and reliability of an AV, not only because a vehicle is subjected to extreme operating temperatures but also because the increasing computations demand more powerful IC chips, which can lead to higher operating temperature and large thermal gradient. In particular, as the underpinning technology for AV, artificial intelligence (AI) requires substantially increased …


Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu Mar 2021

Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu

FIU Electronic Theses and Dissertations

The past few years have seen dramatic growth in the popularity of public clouds, such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Container-as-a-Service (CaaS). In both commercial and scientific fields, quick environment setup and application deployment become a mandatory requirement. As a result, more and more organizations choose cloud environments instead of setting up the environment by themselves from scratch. The cloud computing resources such as server engines, orchestration, and the underlying server resources are served to the users as a service from a cloud provider. Most of the applications that run in public clouds are the distributed applications, also called …


A Study Of Non-Datapath Cache Replacement Algorithms, Steven G. Lyons Jr. Mar 2021

A Study Of Non-Datapath Cache Replacement Algorithms, Steven G. Lyons Jr.

FIU Electronic Theses and Dissertations

Conventionally, caching algorithms have been designed for the datapath — the levels of memory that must contain the data before it gets made available to the CPU. Attaching a fast device (such as an SSD) as a cache to a host that runs the application workload are recent developments. These host-side caches open up possibilities for what are referred to as non-datapath caches to exist. Non-Datapath caches are referred to as such because the caches do not exist on the traditional datapath, instead being optional memory locations for data. As these caches are optional, a new capability is available to …


Understanding Event Structure In Text, Mohammed Aldawsari Oct 2020

Understanding Event Structure In Text, Mohammed Aldawsari

FIU Electronic Theses and Dissertations

Stories often appear in textual form, for example, news stories are found in the form of newspaper articles, blogs, or broadcast transcripts, and so forth. These contain descriptions of current, past, or future events. Automatically extracting knowledge from these events descriptions is an important natural language processing (NLP) task, and understanding event structure aids in this knowledge extraction. Event structure is the fact that events may have relationships or internal structure, for example, be in a co-reference relationship with another event mention, or composed of subevents.

Understanding event structure has received less attention in NLP than is due. This work …


Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre Oct 2020

Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre

FIU Electronic Theses and Dissertations

Teachers that are equipped with the skills to manage and prevent disruptive behaviors increase the potential for their students to achieve academically and socially. Student success increases when prevention strategies and effective classroom behavior management (CBM) are implemented in the classroom. However, teachers with less than 5 years of experience, early career teachers (ECTs), are ill equipped to handle disruptive students. ECTs describe disruptive behaviors as a major factor for stress given their limited training in CBM. As a result, disruptive behaviors are reported by ECTs as one of the main reasons for leaving the field.

Virtual training environments (VTEs) …


Support Efficient, Scalable, And Online Social Spam Detection In System, Hailu Xu Jun 2020

Support Efficient, Scalable, And Online Social Spam Detection In System, Hailu Xu

FIU Electronic Theses and Dissertations

The broad success of online social networks (OSNs) has created fertile soil for the emergence and fast spread of social spam. Fake news, malicious URL links, fraudulent advertisements, fake reviews, and biased propaganda are bringing serious consequences for both virtual social networks and human life in the real world. Effectively detecting social spam is a hot topic in both academia and industry. However, traditional social spam detection techniques are limited to centralized processing on top of one specific data source but ignore the social spam correlations of distributed data sources. Moreover, a few research efforts are conducting in integrating the …


A System-Level Perspective Towards Efficient, Reliable And Secure Neural Network Computing, Tao Liu Mar 2020

A System-Level Perspective Towards Efficient, Reliable And Secure Neural Network Computing, Tao Liu

FIU Electronic Theses and Dissertations

The Digital Era is now evolving into the Intelligence Era, driven overwhelmingly by the revolution of Deep Neural Network (DNN), which opens the door for intelligent data interpretation, turning the data and information into actions that create new capabilities, richer experiences, and unprecedented economic opportunities, achieving game-changing outcomes spanning from image recognition, natural language processing, self-driving cars to biomedical analysis. Moreover, the emergence of deep learning accelerators and neuromorphic computing further pushes DNN computation from cloud to the edge devices for the low-latency scalable on-device neural network computing. However, such promising embedded neural network computing systems are subject to various …


Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes Mar 2020

Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes

FIU Electronic Theses and Dissertations

Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.

The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …


Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan Nov 2019

Data Analytics And Machine Learning To Enhance The Operational Visibility And Situation Awareness Of Smart Grid High Penetration Photovoltaic Systems, Aditya Sundararajan

FIU Electronic Theses and Dissertations

Electric utilities have limited operational visibility and situation awareness over grid-tied distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV penetration into a given feeder exceeds 60% of its peak or minimum daytime load. Third-party service providers offer only real-time monitoring but not accurate insights into system performance and prediction of productions. PV systems also increase the attack surface of distribution networks since they are not under the direct supervision and control of the utility security analysts.

Six key objectives were successfully achieved to enhance PV operational visibility and situation awareness: (1) conceptual cybersecurity …


A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay Oct 2019

A Privacy Framework For Decentralized Applications Using Blockchains And Zero Knowledge Proofs, David Gabay

FIU Electronic Theses and Dissertations

With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of electric vehicles (EVs) through their capabilities to communicate with the infrastructure and each other. However, charging EVs takes time and thus in-advance scheduling is needed. As this process is done frequently due to limited mileage of EVs, it may expose the locations and charging pattern of the EV to the service providers, raising privacy concerns for their users. Nevertheless, the EV still needs to be authenticated to charging providers, which means some information will need to be provided …


A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney Jun 2019

A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney

FIU Electronic Theses and Dissertations

Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …


Deep Learning For Learning Representation And Its Application To Natural Language Processing, Shekoofeh Mokhtari Nov 2018

Deep Learning For Learning Representation And Its Application To Natural Language Processing, Shekoofeh Mokhtari

FIU Electronic Theses and Dissertations

As the web evolves even faster than expected, the exponential growth of data becomes overwhelming. Textual data is being generated at an ever-increasing pace via emails, documents on the web, tweets, online user reviews, blogs, and so on. As the amount of unstructured text data grows, so does the need for intelligently processing and understanding it. The focus of this dissertation is on developing learning models that automatically induce representations of human language to solve higher level language tasks.

In contrast to most conventional learning techniques, which employ certain shallow-structured learning architectures, deep learning is a newly developed machine learning …


Secure Large Scale Penetration Of Electric Vehicles In The Power Grid, Abla Hariri Nov 2018

Secure Large Scale Penetration Of Electric Vehicles In The Power Grid, Abla Hariri

FIU Electronic Theses and Dissertations

As part of the approaches used to meet climate goals set by international environmental agreements, policies are being applied worldwide for promoting the uptake of Electric Vehicles (EV)s. The resulting increase in EV sales and the accompanying expansion in the EV charging infrastructure carry along many challenges, mostly infrastructure-related. A pressing need arises to strengthen the power grid to handle and better manage the electricity demand by this mobile and geo-distributed load. Because the levels of penetration of EVs in the power grid have recently started increasing with the increase in EV sales, the real-time management of en-route EVs, before …


A Neuroimaging Web Interface For Data Acquisition, Processing And Visualization Of Multimodal Brain Images, Gabriel M. Lizarraga Oct 2018

A Neuroimaging Web Interface For Data Acquisition, Processing And Visualization Of Multimodal Brain Images, Gabriel M. Lizarraga

FIU Electronic Theses and Dissertations

Structural and functional brain images are generated as essential modalities for medical experts to learn about the different functions of the brain. These images are typically visually inspected by experts. Many software packages are available to process medical images, but they are complex and difficult to use. The software packages are also hardware intensive. As a consequence, this dissertation proposes a novel Neuroimaging Web Services Interface (NWSI) as a series of processing pipelines for a common platform to store, process, visualize and share data. The NWSI system is made up of password-protected interconnected servers accessible through a web interface. The …


Rethinking The I/O Stack For Persistent Memory, Mohammad Ataur Rahman Chowdhury Mar 2018

Rethinking The I/O Stack For Persistent Memory, Mohammad Ataur Rahman Chowdhury

FIU Electronic Theses and Dissertations

Modern operating systems have been designed around the hypotheses that (a) memory is both byte-addressable and volatile and (b) storage is block addressable and persistent. The arrival of new Persistent Memory (PM) technologies, has made these assumptions obsolete. Despite much of the recent work in this space, the need for consistently sharing PM data across multiple applications remains an urgent, unsolved problem. Furthermore, the availability of simple yet powerful operating system support remains elusive.

In this dissertation, we propose and build The Region System – a high-performance operating system stack for PM that implements usable consistency and persistence for application …


Memory-Aware Scheduling For Fixed Priority Hard Real-Time Computing Systems, Gustavo A. Chaparro-Baquero Mar 2018

Memory-Aware Scheduling For Fixed Priority Hard Real-Time Computing Systems, Gustavo A. Chaparro-Baquero

FIU Electronic Theses and Dissertations

As a major component of a computing system, memory has been a key performance and power consumption bottleneck in computer system design. While processor speeds have been kept rising dramatically, the overall computing performance improvement of the entire system is limited by how fast the memory can feed instructions/data to processing units (i.e. so-called memory wall problem). The increasing transistor density and surging access demands from a rapidly growing number of processing cores also significantly elevated the power consumption of the memory system. In addition, the interference of memory access from different applications and processing cores significantly degrade the …


The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, Shi Sha Mar 2018

The Thermal-Constrained Real-Time Systems Design On Multi-Core Platforms -- An Analytical Approach, Shi Sha

FIU Electronic Theses and Dissertations

Over the past decades, the shrinking transistor size enabled more transistors to be integrated into an IC chip, to achieve higher and higher computing performances. However, the semiconductor industry is now reaching a saturation point of Moore’s Law largely due to soaring power consumption and heat dissipation, among other factors. High chip temperature not only significantly increases packing/cooling cost, degrades system performance and reliability, but also increases the energy consumption and even damages the chip permanently. Although designing 2D and even 3D multi-core processors helps to lower the power/thermal barrier for single-core architectures by exploring the thread/process level parallelism, the …


Sustainable Resource Management For Cloud Data Centers, A. S. M. Hasan Mahmud Jun 2016

Sustainable Resource Management For Cloud Data Centers, A. S. M. Hasan Mahmud

FIU Electronic Theses and Dissertations

In recent years, the demand for data center computing has increased significantly due to the growing popularity of cloud applications and Internet-based services. Today's large data centers host hundreds of thousands of servers and the peak power rating of a single data center may even exceed 100MW. The combined electricity consumption of global data centers accounts for about 3% of worldwide production, raising serious concerns about their carbon footprint. The utility providers and governments are consistently pressuring data center operators to reduce their carbon footprint and energy consumption. While these operators (e.g., Apple, Facebook, and Google) have taken steps to …


An Integrated Framework For Patent Analysis And Mining, Longhui Zhang Apr 2016

An Integrated Framework For Patent Analysis And Mining, Longhui Zhang

FIU Electronic Theses and Dissertations

Patent documents are important intellectual resources of protecting interests of individuals, organizations and companies. These patent documents have great research values, beneficial to the industry, business, law, and policy-making communities. Patent mining aims at assisting patent analysts in investigating, processing, and analyzing patent documents, which has attracted increasing interest in academia and industry. However, despite recent advances in patent mining, several critical issues in current patent mining systems have not been well explored in previous studies.

These issues include: 1) the query retrieval problem that assists patent analysts finding all relevant patent documents for a given patent application; 2) the …


A High Performance Advanced Encryption Standard (Aes) Encrypted On-Chip Bus Architecture For Internet-Of-Things (Iot) System-On-Chips (Soc), Xiaokun Yang Mar 2016

A High Performance Advanced Encryption Standard (Aes) Encrypted On-Chip Bus Architecture For Internet-Of-Things (Iot) System-On-Chips (Soc), Xiaokun Yang

FIU Electronic Theses and Dissertations

With industry expectations of billions of Internet-connected things, commonly referred to as the IoT, we see a growing demand for high-performance on-chip bus architectures with the following attributes: small scale, low energy, high security, and highly configurable structures for integration, verification, and performance estimation.

Our research thus mainly focuses on addressing these key problems and finding the balance among all these requirements that often work against each other. First of all, we proposed a low-cost and low-power System-on-Chips (SoCs) architecture (IBUS) that can frame data transfers differently. The IBUS protocol provides two novel transfer modes – the block and state …


Storage Management Of Data-Intensive Computing Systems, Yiqi Xu Mar 2016

Storage Management Of Data-Intensive Computing Systems, Yiqi Xu

FIU Electronic Theses and Dissertations

Computing systems are becoming increasingly data-intensive because of the explosion of data and the needs for processing the data, and storage management is critical to application performance in such data-intensive computing systems. However, existing resource management frameworks in these systems lack the support for storage management, which causes unpredictable performance degradations when applications are under I/O contention. Storage management of data-intensive systems is a challenging problem because I/O resources cannot be easily partitioned and distributed storage systems require scalable management. This dissertation presents the solutions to address these challenges for typical data-intensive systems including high-performance computing (HPC) systems and big-data …


Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang Aug 2015

Exploring Hidden Coherent Feature Groups And Temporal Semantics For Multimedia Big Data Analysis, Yimin Yang

FIU Electronic Theses and Dissertations

Thanks to the advanced technologies and social networks that allow the data to be widely shared among the Internet, there is an explosion of pervasive multimedia data, generating high demands of multimedia services and applications in various areas for people to easily access and manage multimedia data. Towards such demands, multimedia big data analysis has become an emerging hot topic in both industry and academia, which ranges from basic infrastructure, management, search, and mining to security, privacy, and applications. Within the scope of this dissertation, a multimedia big data analysis framework is proposed for semantic information management and retrieval with …


On The Design Of Real-Time Systems On Multi-Core Platforms Under Uncertainty, Tianyi Wang Jun 2015

On The Design Of Real-Time Systems On Multi-Core Platforms Under Uncertainty, Tianyi Wang

FIU Electronic Theses and Dissertations

Real-time systems are computing systems that demand the assurance of not only the logical correctness of computational results but also the timing of these results. To ensure timing constraints, traditional real-time system designs usually adopt a worst-case based deterministic approach. However, such an approach is becoming out of sync with the continuous evolution of IC technology and increased complexity of real-time applications. As IC technology continues to evolve into the deep sub-micron domain, process variation causes processor performance to vary from die to die, chip to chip, and even core to core. The extensive resource sharing on multi-core platforms also …


Fuzzy Modeling And Control Based Virtual Machine Resource Management, Lixi Wang Mar 2015

Fuzzy Modeling And Control Based Virtual Machine Resource Management, Lixi Wang

FIU Electronic Theses and Dissertations

Virtual machines (VMs) are powerful platforms for building agile datacenters and emerging cloud systems. However, resource management for a VM-based system is still a challenging task. First, the complexity of application workloads as well as the interference among competing workloads makes it difficult to understand their VMs’ resource demands for meeting their Quality of Service (QoS) targets; Second, the dynamics in the applications and system makes it also difficult to maintain the desired QoS target while the environment changes; Third, the transparency of virtualization presents a hurdle for guest-layer application and host-layer VM scheduler to cooperate and improve application QoS …


Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni Nov 2014

Design And Development Of Geographical Information System (Gis) Map For Nuclear Waste Streams, Sandhya Appunni

FIU Electronic Theses and Dissertations

A nuclear waste stream is the complete flow of waste material from origin to treatment facility to final disposal. The objective of this study was to design and develop a Geographic Information Systems (GIS) module using Google Application Programming Interface (API) for better visualization of nuclear waste streams that will identify and display various nuclear waste stream parameters. A proper display of parameters would enable managers at Department of Energy waste sites to visualize information for proper planning of waste transport. The study also developed an algorithm using quadratic Bézier curve to make the map more understandable and usable. Microsoft …


Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci Nov 2014

Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci

FIU Electronic Theses and Dissertations

Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …


Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan Mar 2014

Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan

FIU Electronic Theses and Dissertations

For the past several decades, we have experienced the tremendous growth, in both scale and scope, of real-time embedded systems, thanks largely to the advances in IC technology. However, the traditional approach to get performance boost by increasing CPU frequency has been a way of past. Researchers from both industry and academia are turning their focus to multi-core architectures for continuous improvement of computing performance. In our research, we seek to develop efficient scheduling algorithms and analysis methods in the design of real-time embedded systems on multi-core platforms. Real-time systems are the ones with the response time as critical as …


A Regression Approach To Execution Time Estimation For Programs Running On Multicore Systems, Mohammad Alshamlan Mar 2014

A Regression Approach To Execution Time Estimation For Programs Running On Multicore Systems, Mohammad Alshamlan

FIU Electronic Theses and Dissertations

Execution time estimation plays an important role in computer system design. It is particularly critical in real-time system design, where to meet a deadline can be as important as to ensure the logical correctness of a program. To accurately estimate the execution time of a program can be extremely challenging, since the execution time of a program varies with inputs, the underlying computer architectures, and run-time dynamics, among other factors. The problem becomes even more challenging as computing systems moving from single core to multi-core platforms, with more hardware resources shared by multiple processing cores.

The goal of this research …


System-On-A-Chip (Soc) Based Hardware Acceleration In Register Transfer Level (Rtl) Design, Xinwei Niu Nov 2012

System-On-A-Chip (Soc) Based Hardware Acceleration In Register Transfer Level (Rtl) Design, Xinwei Niu

FIU Electronic Theses and Dissertations

Today, modern System-on-a-Chip (SoC) systems have grown rapidly due to the increased processing power, while maintaining the size of the hardware circuit. The number of transistors on a chip continues to increase, but current SoC designs may not be able to exploit the potential performance, especially with energy consumption and chip area becoming two major concerns. Traditional SoC designs usually separate software and hardware. Thus, the process of improving the system performance is a complicated task for both software and hardware designers. The aim of this research is to develop hardware acceleration workflow for software applications. Thus, system performance can …