Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (16)
- Computer Engineering (11)
- Computer and Systems Architecture (5)
- Social and Behavioral Sciences (5)
- Software Engineering (5)
-
- Digital Communications and Networking (4)
- Information Security (4)
- Programming Languages and Compilers (4)
- Artificial Intelligence and Robotics (3)
- Business (3)
- Databases and Information Systems (3)
- OS and Networks (3)
- Public Affairs, Public Policy and Public Administration (3)
- Theory and Algorithms (3)
- Data Storage Systems (2)
- Numerical Analysis and Scientific Computing (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Systems Engineering (2)
- Art and Design (1)
- Arts and Humanities (1)
- Data Science (1)
- Defense and Security Studies (1)
- E-Commerce (1)
- Electrical and Computer Engineering (1)
- Emergency and Disaster Management (1)
- Engineering Education (1)
- Game Design (1)
- Keyword
-
- Computer programs (3)
- Cloud computing (2)
- Crowdsourcing (2)
- Internet of things (2)
- IoT (2)
-
- Marketplace of services (2)
- Modeling and simulation (2)
- Resilience (2)
- Sensor networks (2)
- Smart communities (2)
- Society 5.0 (2)
- 5G mobile communication (1)
- AI technology (1)
- Access (1)
- Algorithm development (1)
- Architecture (1)
- Authorization (1)
- Automatic Differentiation (AD) (1)
- Big data analytics (1)
- Bisection method (1)
- Blockchain (1)
- Blockchain technology (1)
- Censorship (1)
- Cloud gaming (1)
- Command & control (1)
- Command and control (1)
- Common object request broker architecture (1)
- Component-based solutions (1)
- Computational modeling (1)
- Computer architecture (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Systems Architecture
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh
An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh
Engineering Management & Systems Engineering Faculty Publications
The disaster area is a constantly changing environment, which can make it challenging to distribute supplies effectively. The lack of accurate information about the required goods and potential bottlenecks in the distribution process can be detrimental. The success of a response network is dependent on collaboration, coordination, sovereignty, and equal distribution of relief resources. To facilitate these interactions and improve knowledge of supply chain operations, a reliable and dynamic logistic system is essential. This study proposes the integration of blockchain technology, the Internet of Things (IoT), and the Internet of Everything (IoE) into the disaster management structure. The proposed disaster …
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis
Computer Science Faculty Publications
Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Computer Science Faculty Publications
Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Engineering Management & Systems Engineering Faculty Publications
In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
Computer Science Faculty Publications
In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …
Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues
Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues
VMASC Publications
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, …
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Computer Science Faculty Publications
Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …
Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin
Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin
Electrical & Computer Engineering Faculty Publications
As machine-learning algorithms continue to expand their scope and approach more ambiguous goals, they may be required to make decisions based on data that is often incomplete, imprecise, and uncertain. The capabilities of these models must, in turn, evolve to meet the increasingly complex challenges associated with the deployment and integration of intelligent systems into modern society. Historical variability in the performance of traditional machine-learning models in dynamic environments leads to ambiguity of trust in decisions made by such algorithms. Consequently, the objective of this work is to develop a novel computational model that effectively quantifies the reliability of autonomous …
A Framework For Executable Systems Modeling, Matthew Amissah
A Framework For Executable Systems Modeling, Matthew Amissah
Engineering Management & Systems Engineering Theses & Dissertations
Systems Modeling Language (SysML), like its parent language, the Unified Modeling Language (UML), consists of a number of independently derived model languages (i.e. state charts, activity models etc.) which have been co-opted into a single modeling framework. This, together with the lack of an overarching meta-model that supports uniform semantics across the various diagram types, has resulted in a large unwieldy and informal language schema. Additionally, SysML does not offer a built in framework for managing time and the scheduling of time based events in a simulation.
In response to these challenges, a number of auxiliary standards have been offered …
Efficient Core Utilization In A Hybrid Parallel Delaunay Meshing Algorithm On Distributed-Memory Cluster, Daming Feng, Andrey N. Chernikov, Nikos P. Chrisochoides
Efficient Core Utilization In A Hybrid Parallel Delaunay Meshing Algorithm On Distributed-Memory Cluster, Daming Feng, Andrey N. Chernikov, Nikos P. Chrisochoides
Computer Science Faculty Publications
Most of the current supercomputer architectures consist of clusters of nodes that are used by many clients (users). A user wants his/her job submitted in the job queue to be scheduled promptly. However, the resource sharing and job scheduling policies that are used in the scheduling system to manage the jobs are usually beyond the control of users. Therefore, in order to reduce the waiting time of their jobs, it is becoming more and more crucial for the users to consider how to implement the algorithms that are suitable to the system scheduling policies and are able to effectively and …
Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young
Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young
Computer Science Faculty Publications
This ResourceSync specification describes a synchronization framework for the web consisting of various capabilities that allow third-party systems to remain synchronized with a server’s evolving resources. The capabilities may be combined in a modular manner to meet local or community requirements. This specification also describes how a server should advertise the synchronization capabilities it supports and how third-party systems may discover this information. The specification repurposes the document formats defined by the Sitemap protocol and introduces extensions for them.
Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch
Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch
Electrical & Computer Engineering Faculty Publications
Future crisis management systems needresilient and trustworthy infrastructures to quickly develop reliable applications and processes, andensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information;crisis management systems tend to be highly vulnerable and subjectto unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides …
Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter
Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter
Engineering Management & Systems Engineering Faculty Publications
In the ASEM-IAC 2014, Cotter (2014) explored the current state of engineering design, identified the dominate approaches to engineering design, discussed potential contributions from the new field of data analytics to engineering design, and proposed an Engineering Analytics framework that integrates the dominate engineering design approaches and data analytics within a human-intelligence/machine-intelligence (HI-MI) design architecture. This paper reports research applying ontological engineering to integrate the dominate engineering design methodologies into a systemic engineering design decision governance architecture.
Extreme-Scale Parallel Mesh Generation: Telescopic Approach, Nikos Chrisochoides, Andrey Chernikov, Daming Feng, Christos Tsolakis
Extreme-Scale Parallel Mesh Generation: Telescopic Approach, Nikos Chrisochoides, Andrey Chernikov, Daming Feng, Christos Tsolakis
Computer Science Faculty Publications
In this poster we focus and present our preliminary results pertinent to the integration of multiple parallel Delaunay mesh generation methods into a coherent hierarchical framework. The goal of this project is to study our telescopic approach and to develop Delaunay-based methods to explore concurrency at all hardware layers using abstractions at (a) medium-grain level for many cores within a single chip and (b) coarse-grain level, i.e., sub-domain level using proper error metric- and application-specific continuous decomposition methods.
How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa
How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa
Computational Modeling & Simulation Engineering Faculty Publications
During every standard workshop or event, the examples of working interoperability solutions are used to motivate for 'plug and play' standards for M&S as well, like standardized batteries for electronics, or the use of XML to exchange data between heterogeneous systems. While these are successful applications of standards, they are off the mark regarding M&S interoperability. The challenge of M&S is that the product that needs to be made interoperable is not the service or the system alone, but the model behind it as well. The paper shows that the alignment of conceptualizations is the real problem that is not …
Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman
Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman
Computational Modeling & Simulation Engineering Faculty Publications
Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …
Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger
Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger
Engineering Technology Faculty Publications
Using microprocessor/microcontroller in various control applications is not only one of the major topics in Engineering Technology curricula, but also of interest in industry applications. To accomplish it correctly the process of designing application programs starts from the individual module development through extensive testing, verification, and modification. Applying these developed modules in a useful manner requires the links and integrations that lead to the practical project implementation. Frequently, in students' senior project designs and faculty's research plans, the microprocessor/microcontroller resources become scarce or cause conflicts during the modules' integration stage. To accommodate the shortfall of the resources and resolve any …
Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk
Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
The distributed information technologies collectively known as Web services recently have demonstrated powerful capabilities for scalable interoperation of heterogeneous software across a wide variety of networked platforms. This approach supports a rapid integration cycle and shows promise for ultimately supporting automatic composability of services using discovery via registries. This paper presents a rationale for extending Web services to distributed simulation environments, including the High Level Architecture (HLA), together with a description and examples of the integration methodology used to develop significant prototype implementations. A logical next step is combining the power of Grid computing with Web services to facilitate rapid …
Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk
Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
"Study Report prepared for the U. S. Air Force, Joint Synthetic Battlespace Analysis of Technical Approaches (ATA) Studies & Prototyping"
Overview: This paper summarizes research work conducted by organizations concerned with interoperable distributed information technology (IT) applications, in particular the Naval Postgraduate School (NPS) and Old Dominion University (ODU). Although the application focus is distributed modeling & simulation (M&S) the results and findings are in general easily applicable to other distributed concepts as well, in particular the support of operations by M&S applications, such as distributed mission operations. The core idea of this work is to show the necessity of …
Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka
Extending Traditional Static Analysis Techniques To Support Development, Testing And Maintenance Of Component-Based Solutions, Robert David Cherinka
Computer Science Theses & Dissertations
Traditional static code analysis encompasses a mature set of techniques for helping understand and optimize programs, such as dead code elimination, program slicing, and partial evaluation (code specialization). It is well understood that compared to other program analysis techniques (e.g., dynamic analysis), static analysis techniques do a reasonable job for the cost associated with implementing them. Industry and government are moving away from more ‘traditional’ development approaches towards component-based approaches as ‘the norm.’ Component-based applications most often comprise a collection of distributed object-oriented components such as forms, code snippets, reports, modules, databases, objects, containers, and the like. These components are …
Two Approaches To Critical Path Scheduling For A Heterogeneous Environment, Guangxia Liu
Two Approaches To Critical Path Scheduling For A Heterogeneous Environment, Guangxia Liu
Computer Science Theses & Dissertations
Advances in computing and networking technologies are making large scale distributed heterogeneous computing a reality. Multi-Disciplinary Optimization (MDO) is a class of applications that is being addressed under this paradigm. It consists of multiple heterogeneous modules interacting with each other to solve an overall design problem. An efficient implementation of such an application requires scheduling heterogeneous modules (with different computing and disk 1/0 requirements) on a heterogeneous set of resources (with different CPU, memory, disk IO specifications).
Given a set of tasks and a set of resources, an optimal schedule of the tasks on the resources is very hard to …
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Computer Science Theses & Dissertations
This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …
Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota
Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota
Computer Science Theses & Dissertations
As new computer network technologies emerge, the application designers and the application users expect an increasing level of quality of service from them. Hence, it is a common practice in the newer technologies to provide more Quality of Service (QoS) components. Until now, these QoS solutions have been both network-technology specific and network-oriented solutions. In this thesis, we present an application-oriented approach to design a high quality network which is independent of the underlying communication technology. In this thesis, we propose a QoS architecture to "provide predictable performance to the end-to-end application users in a high quality networking environment." In …
Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.
Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.
Computer Science Theses & Dissertations
The discrimination of texture features in an image has many important applications: from detection of man-made objects from a surrounding natural background to identification of cancerous from healthy tissue in X-ray imagery. The fractal structure in an image has been used with success to identify these features but requires unacceptable processing time if executed sequentially.
The paradigm of data parallelism is presented as the best method for applying massively parallel processing to the computation of fractal dimension of an image. With this methodology, and sufficient numbers of processors, this computation can reach real time speeds necessary for many applications. A …
Reasoning By Analogy In A Multi-Level System Architecture For The Design Of Mechanisms, Ghassan F. Issa
Reasoning By Analogy In A Multi-Level System Architecture For The Design Of Mechanisms, Ghassan F. Issa
Computer Science Theses & Dissertations
Since the first attempts to integrate AI technology and engineering design nearly two decades ago, few expert systems have been shown to demonstrate sufficient reasoning capabilities to solve real-world design problems. The complex nature of design, the lack of understanding of the design process, and the limitations of current expert system technology have all been shown to have adverse effects on the maturity of this research area. Therefore, our direction in this research concentrates on understanding the design process, investigating a novel area of research focusing on creative design, and incorporating the results into a system model feasible for production …
A Case Study In Software Reuse: The Rntds Architecture, Barry J. Stevens
A Case Study In Software Reuse: The Rntds Architecture, Barry J. Stevens
Computer Science Theses & Dissertations
It has been asserted that the most significant gains in software productivity will come from increased levels of software reuse. Some economic models for predicting savings through software reuse exist, but none are based on actual project experience. This paper surveys those models and presents the results of a case study, the Restructured Naval Tactical Data Systems (RNTDS) architecture, in the light of those models. According to the models, software reuse via the RNTDS architecture has enabled the production of fourteen major computer programs at five to twenty-one percent of the cost to create them without software reuse. Organizational characteristics …
A Root Finding Algorithm For Parallel Architecture Machines, Stuti Moitra
A Root Finding Algorithm For Parallel Architecture Machines, Stuti Moitra
Computer Science Theses & Dissertations
In this thesis a parallel algorithm for determining the zeros of any given analytic function is described. Parallelism is achieved by modifying the traditional bisection algorithm for architecture machines.
Given any user supplied function f(X), continuous on the interval Ao ≤ x ≤ B0, and the tolerance of accuracy an algorithm of determining up to ten roots, with error of approximation less than or equal to tolerance, on parallel systems like Distributed Array Processor (OAP) and N-cube is considered.
A variation of the bisection method has been adapted for this purpose. At each level of iteration a …