Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 28 of 28

Full-Text Articles in Systems Architecture

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh Jan 2023

An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a constantly changing environment, which can make it challenging to distribute supplies effectively. The lack of accurate information about the required goods and potential bottlenecks in the distribution process can be detrimental. The success of a response network is dependent on collaboration, coordination, sovereignty, and equal distribution of relief resources. To facilitate these interactions and improve knowledge of supply chain operations, a reliable and dynamic logistic system is essential. This study proposes the integration of blockchain technology, the Internet of Things (IoT), and the Internet of Everything (IoE) into the disaster management structure. The proposed disaster …


Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis Jan 2023

Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis

Computer Science Faculty Publications

Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …


Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang Jan 2022

Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang

Computer Science Faculty Publications

Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu Jan 2021

A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu

Computer Science Faculty Publications

In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …


Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues Jan 2020

Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues

VMASC Publications

5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin Jan 2019

Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

As machine-learning algorithms continue to expand their scope and approach more ambiguous goals, they may be required to make decisions based on data that is often incomplete, imprecise, and uncertain. The capabilities of these models must, in turn, evolve to meet the increasingly complex challenges associated with the deployment and integration of intelligent systems into modern society. Historical variability in the performance of traditional machine-learning models in dynamic environments leads to ambiguity of trust in decisions made by such algorithms. Consequently, the objective of this work is to develop a novel computational model that effectively quantifies the reliability of autonomous …


A Framework For Executable Systems Modeling, Matthew Amissah Jul 2018

A Framework For Executable Systems Modeling, Matthew Amissah

Engineering Management & Systems Engineering Theses & Dissertations

Systems Modeling Language (SysML), like its parent language, the Unified Modeling Language (UML), consists of a number of independently derived model languages (i.e. state charts, activity models etc.) which have been co-opted into a single modeling framework. This, together with the lack of an overarching meta-model that supports uniform semantics across the various diagram types, has resulted in a large unwieldy and informal language schema. Additionally, SysML does not offer a built in framework for managing time and the scheduling of time based events in a simulation.

In response to these challenges, a number of auxiliary standards have been offered …


Efficient Core Utilization In A Hybrid Parallel Delaunay Meshing Algorithm On Distributed-Memory Cluster, Daming Feng, Andrey N. Chernikov, Nikos P. Chrisochoides Jan 2017

Efficient Core Utilization In A Hybrid Parallel Delaunay Meshing Algorithm On Distributed-Memory Cluster, Daming Feng, Andrey N. Chernikov, Nikos P. Chrisochoides

Computer Science Faculty Publications

Most of the current supercomputer architectures consist of clusters of nodes that are used by many clients (users). A user wants his/her job submitted in the job queue to be scheduled promptly. However, the resource sharing and job scheduling policies that are used in the scheduling system to manage the jobs are usually beyond the control of users. Therefore, in order to reduce the waiting time of their jobs, it is becoming more and more crucial for the users to consider how to implement the algorithms that are suitable to the system scheduling policies and are able to effectively and …


Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young Jan 2017

Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young

Computer Science Faculty Publications

This ResourceSync specification describes a synchronization framework for the web consisting of various capabilities that allow third-party systems to remain synchronized with a server’s evolving resources. The capabilities may be combined in a modular manner to meet local or community requirements. This specification also describes how a server should advertise the synchronization capabilities it supports and how third-party systems may discover this information. The specification repurposes the document formats defined by the Sitemap protocol and introduces extensions for them.


Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch Jan 2015

Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch

Electrical & Computer Engineering Faculty Publications

Future crisis management systems needresilient and trustworthy infrastructures to quickly develop reliable applications and processes, andensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information;crisis management systems tend to be highly vulnerable and subjectto unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides …


Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter Jan 2015

Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

In the ASEM-IAC 2014, Cotter (2014) explored the current state of engineering design, identified the dominate approaches to engineering design, discussed potential contributions from the new field of data analytics to engineering design, and proposed an Engineering Analytics framework that integrates the dominate engineering design approaches and data analytics within a human-intelligence/machine-intelligence (HI-MI) design architecture. This paper reports research applying ontological engineering to integrate the dominate engineering design methodologies into a systemic engineering design decision governance architecture.


Extreme-Scale Parallel Mesh Generation: Telescopic Approach, Nikos Chrisochoides, Andrey Chernikov, Daming Feng, Christos Tsolakis Jan 2015

Extreme-Scale Parallel Mesh Generation: Telescopic Approach, Nikos Chrisochoides, Andrey Chernikov, Daming Feng, Christos Tsolakis

Computer Science Faculty Publications

In this poster we focus and present our preliminary results pertinent to the integration of multiple parallel Delaunay mesh generation methods into a coherent hierarchical framework. The goal of this project is to study our telescopic approach and to develop Delaunay-based methods to explore concurrency at all hardware layers using abstractions at (a) medium-grain level for many cores within a single chip and (b) coarse-grain level, i.e., sub-domain level using proper error metric- and application-specific continuous decomposition methods.


How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa Jan 2012

How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

During every standard workshop or event, the examples of working interoperability solutions are used to motivate for 'plug and play' standards for M&S as well, like standardized batteries for electronics, or the use of XML to exchange data between heterogeneous systems. While these are successful applications of standards, they are off the mark regarding M&S interoperability. The challenge of M&S is that the product that needs to be made interoperable is not the service or the system alone, but the model behind it as well. The paper shows that the alignment of conceptualizations is the real problem that is not …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger Jan 2005

Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger

Engineering Technology Faculty Publications

Using microprocessor/microcontroller in various control applications is not only one of the major topics in Engineering Technology curricula, but also of interest in industry applications. To accomplish it correctly the process of designing application programs starts from the individual module development through extensive testing, verification, and modification. Applying these developed modules in a useful manner requires the links and integrations that lead to the practical project implementation. Frequently, in students' senior project designs and faculty's research plans, the microprocessor/microcontroller resources become scarce or cause conflicts during the modules' integration stage. To accommodate the shortfall of the resources and resolve any …


Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk Jan 2004

Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The distributed information technologies collectively known as Web services recently have demonstrated powerful capabilities for scalable interoperation of heterogeneous software across a wide variety of networked platforms. This approach supports a rapid integration cycle and shows promise for ultimately supporting automatic composability of services using discovery via registries. This paper presents a rationale for extending Web services to distributed simulation environments, including the High Level Architecture (HLA), together with a description and examples of the integration methodology used to develop significant prototype implementations. A logical next step is combining the power of Grid computing with Web services to facilitate rapid …


Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk Jan 2003

Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

"Study Report prepared for the U. S. Air Force, Joint Synthetic Battlespace Analysis of Technical Approaches (ATA) Studies & Prototyping"

Overview: This paper summarizes research work conducted by organizations concerned with interoperable distributed information technology (IT) applications, in particular the Naval Postgraduate School (NPS) and Old Dominion University (ODU). Although the application focus is distributed modeling & simulation (M&S) the results and findings are in general easily applicable to other distributed concepts as well, in particular the support of operations by M&S applications, such as distributed mission operations. The core idea of this work is to show the necessity of …


Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka Jan 2000

Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka

Computer Science Theses & Dissertations

Traditional static code analysis encompasses a mature set of techniques for helping understand and optimize programs, such as dead code elimination, program slicing, and partial evaluation (code specialization). It is well understood that compared to other program analysis techniques (e.g., dynamic analysis), static analysis techniques do a reasonable job for the cost associated with implementing them. Industry and government are moving away from more ‘traditional’ development approaches towards component-based approaches as ‘the norm.’ Component-based applications most often comprise a collection of distributed object-oriented components such as forms, code snippets, reports, modules, databases, objects, containers, and the like. These components are …


Two Approaches To Critical Path Scheduling For A Heterogeneous Environment, Guangxia Liu May 1999

Two Approaches To Critical Path Scheduling For A Heterogeneous Environment, Guangxia Liu

Computer Science Theses & Dissertations

Advances in computing and networking technologies are making large scale distributed heterogeneous computing a reality. Multi-Disciplinary Optimization (MDO) is a class of applications that is being addressed under this paradigm. It consists of multiple heterogeneous modules interacting with each other to solve an overall design problem. An efficient implementation of such an application requires scheduling heterogeneous modules (with different computing and disk 1/0 requirements) on a heterogeneous set of resources (with different CPU, memory, disk IO specifications).

Given a set of tasks and a set of resources, an optimal schedule of the tasks on the resources is very hard to …


Architectural Optimization Of Digital Libraries, Aileen O. Biser Aug 1998

Architectural Optimization Of Digital Libraries, Aileen O. Biser

Computer Science Theses & Dissertations

This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …


Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota Apr 1997

Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota

Computer Science Theses & Dissertations

As new computer network technologies emerge, the application designers and the application users expect an increasing level of quality of service from them. Hence, it is a common practice in the newer technologies to provide more Quality of Service (QoS) components. Until now, these QoS solutions have been both network-technology specific and network-oriented solutions. In this thesis, we present an application-oriented approach to design a high quality network which is independent of the underlying communication technology. In this thesis, we propose a QoS architecture to "provide predictable performance to the end-to-end application users in a high quality networking environment." In …


Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr. Jul 1993

Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.

Computer Science Theses & Dissertations

The discrimination of texture features in an image has many important applications: from detection of man-made objects from a surrounding natural background to identification of cancerous from healthy tissue in X-ray imagery. The fractal structure in an image has been used with success to identify these features but requires unacceptable processing time if executed sequentially.

The paradigm of data parallelism is presented as the best method for applying massively parallel processing to the computation of fractal dimension of an image. With this methodology, and sufficient numbers of processors, this computation can reach real time speeds necessary for many applications. A …


Reasoning By Analogy In A Multi-Level System Architecture For The Design Of Mechanisms, Ghassan F. Issa Apr 1992

Reasoning By Analogy In A Multi-Level System Architecture For The Design Of Mechanisms, Ghassan F. Issa

Computer Science Theses & Dissertations

Since the first attempts to integrate AI technology and engineering design nearly two decades ago, few expert systems have been shown to demonstrate sufficient reasoning capabilities to solve real-world design problems. The complex nature of design, the lack of understanding of the design process, and the limitations of current expert system technology have all been shown to have adverse effects on the maturity of this research area. Therefore, our direction in this research concentrates on understanding the design process, investigating a novel area of research focusing on creative design, and incorporating the results into a system model feasible for production …


A Case Study In Software Reuse: The Rntds Architecture, Barry J. Stevens Dec 1991

A Case Study In Software Reuse: The Rntds Architecture, Barry J. Stevens

Computer Science Theses & Dissertations

It has been asserted that the most significant gains in software productivity will come from increased levels of software reuse. Some economic models for predicting savings through software reuse exist, but none are based on actual project experience. This paper surveys those models and presents the results of a case study, the Restructured Naval Tactical Data Systems (RNTDS) architecture, in the light of those models. According to the models, software reuse via the RNTDS architecture has enabled the production of fourteen major computer programs at five to twenty-one percent of the cost to create them without software reuse. Organizational characteristics …


A Root Finding Algorithm For Parallel Architecture Machines, Stuti Moitra May 1990

A Root Finding Algorithm For Parallel Architecture Machines, Stuti Moitra

Computer Science Theses & Dissertations

In this thesis a parallel algorithm for determining the zeros of any given analytic function is described. Parallelism is achieved by modifying the traditional bisection algorithm for architecture machines.

Given any user supplied function f(X), continuous on the interval Ao ≤ x ≤ B0, and the tolerance of accuracy an algorithm of determining up to ten roots, with error of approximation less than or equal to tolerance, on parallel systems like Distributed Array Processor (OAP) and N-cube is considered.

A variation of the bisection method has been adapted for this purpose. At each level of iteration a …