Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Systems Architecture

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani Jun 2023

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani

Electronic Thesis and Dissertation Repository

In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …


Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte Apr 2022

Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte

Electronic Thesis and Dissertation Repository

The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.

The synchronization protocol …


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh May 2020

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki Jan 2020

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …


Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal Apr 2017

Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal

Electronic Thesis and Dissertation Repository

Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …