Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

California State University, San Bernardino

Discipline
Keyword
Publication Year
Publication

Articles 1 - 8 of 8

Full-Text Articles in Systems Architecture

Extract Transform And Loading Tool For Email, Amit Rajiv Lawanghare Sep 2019

Extract Transform And Loading Tool For Email, Amit Rajiv Lawanghare

Electronic Theses, Projects, and Dissertations

This project focuses on applying Extract, Transform and Load (ETL) operations on the relational data exchanged via emails. An Email is an important form of communication by both personal and corporate means as it enables reliable and quick exchange. Many useful files are shared as a form of attachments which contains transactional/ relational data. This tool allows a user to write the filter conditions and lookup conditions on attachments; define the attribute map for attachments to the database table. The Data Cleansing for each attribute can be performed writing rules and their matching state. A user can add custom functions …


Custom T-Shirt Designs, Ranjan Khadka Jun 2017

Custom T-Shirt Designs, Ranjan Khadka

Electronic Theses, Projects, and Dissertations

Custom T-shirt Designs is a web-based application. The purpose of this project is to provide a website that would allow customers to be able to customize T-shirt and place an order of custom T-shirt. Customers can sign up, sign in, select T-shirt color, add text, choose Font, choose Font color, upload an image, apply filters to images, transform text or images, choose T-shirt size and save designs for future references. Customers would be able to add the design to a cart, manage cart and checkout with their credit card to purchase for the order and view their previous orders. The …


Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish Jun 2016

Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish

Electronic Theses, Projects, and Dissertations

Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …


A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio Mar 2015

A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio

Electronic Theses, Projects, and Dissertations

In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.

The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …


Proton Computed Tomography: Matrix Data Generation Through General Purpose Graphics Processing Unit Reconstruction, Micah Witt Mar 2014

Proton Computed Tomography: Matrix Data Generation Through General Purpose Graphics Processing Unit Reconstruction, Micah Witt

Electronic Theses, Projects, and Dissertations

Proton computed tomography (pCT) is an image modality that will improve treatment planning for patients receiving proton radiation therapy compared with the current techniques, which are based on X-ray CT. Images are reconstructed in pCT by solving a large and sparse system of linear equations. The size of the system necessitates matrix-partitioning and parallel reconstruction algorithms to be implemented across some sort of cluster computing architecture. The prototypical algorithm to solve the pCT system is the algebraic reconstruction technique (ART) that has been modified into parallel versions called block-iterative-projection (BIP) methods and string-averaging-projection (SAP) methods. General purpose graphics processing units …


Multi-Core Processors And The Future Of Parallelism In Software, Ryan Christopher Youngman Jan 2007

Multi-Core Processors And The Future Of Parallelism In Software, Ryan Christopher Youngman

Theses Digitization Project

The purpose of this thesis is to examine multi-core technology. Multi-core architecture provides benefits such as less power consumption, scalability, and improved application performance enabled by thread-level parallelism.


A Multi-Agent Architecture For Internet Distributed Computing System, Rodelyn Reyes Samson Jan 2003

A Multi-Agent Architecture For Internet Distributed Computing System, Rodelyn Reyes Samson

Theses Digitization Project

This thesis presents the developed taxonomy of the agent-based distributed computing systems. Based on this taxonomy, a design, implementation, analysis and distribution protocol of a multi-agent architecture for internet-based distributed computing system was developed. A prototype of the designed architecture was implemented on Spider III using the IBM Aglets software development kit (ASDK 2.0) and the language Java.


A Tabular Propositional Logic: And/Or Table Translator, Chen-Hsiu Lee Jan 2003

A Tabular Propositional Logic: And/Or Table Translator, Chen-Hsiu Lee

Theses Digitization Project

The goal of this project is to design a tool to help users translate any logic statement into Disjunctive Normal Form and present the result as an AND/OR TABLE, which makes the logic relation easier to express by using a two-dimensional grid of values or expressions. This tool is implemented through a web-based and Java-based application. Thus, the user can utilize this tool via World Wide Web.