Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

614 Full-Text Articles 565 Authors 121744 Downloads 52 Institutions

All Articles in Systems Architecture

Faceted Search

614 full-text articles. Page 1 of 15.

Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro 2016 The University of Western Ontario

Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro

Electronic Thesis and Dissertation Repository

More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models ...


Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan 2016 University of Tennessee, Knoxville

Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan

Doctoral Dissertations

With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.

First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience ...


Implementing A One Address Cpu In Logisim, Charles W. Kann III 2016 Gettysburg College

Implementing A One Address Cpu In Logisim, Charles W. Kann Iii

Gettysburg College Open Educational Resources

Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, behavior.

This magic computer does not actually exist. In reality computer are machines, and every action a computer performs reduces to a set of mechanical operations. In fact the first complete definition of a working computer was ...


Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, Daniel Jose Campello 2016 Florida International University

Optimizing Main Memory Usage In Modern Computing Systems To Improve Overall System Performance, Daniel Jose Campello

FIU Electronic Theses and Dissertations

Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies of persistent data stored in slower block-based storage devices. However, the use of this faster memory comes at a high cost. Therefore, several techniques have been implemented to use main memory more efficiently in the literature. In this dissertation we introduce three distinct approaches to improve overall system performance by optimizing main memory usage.

First, DRAM and host-side caching of file system data are used for speeding up virtual machine performance in today’s virtualized data centers. The clustering ...


Prosense, Johnny Favazza II, Casey Glasgow, Matt Epperson 2016 California Polytechnic State University, San Luis Obispo

Prosense, Johnny Favazza Ii, Casey Glasgow, Matt Epperson

Computer Engineering

This project aims to gather advanced data sets from MEMS sensors and GPS and deliver it to the user, who can capitalize on the data. The once negligible half-degree difference of your board barreling down a wave can be recorded from a gyro and exploited for the perfect turn. The exact speed dreaded by longboarders where speed wobbles turn into a road rash can be analysed and consequently avoided. Ascertaining the summit of your flight using combined GPS sensors from the ski ramp allows for the correct timing of tricks. When it comes to pursuing excellence in professional sports, amateur ...


Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish 2016 California State University, San Bernardino

Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish

Electronic Theses, Projects, and Dissertations

Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories ...


The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson 2016 Western University

The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson

Political Science Publications

Game theory is used to rationally and dispassionately examine the strategic behaviour of nations, especially superpower behaviour. This article explains how basic game theory - at its simplest level - was used by Anatol Rapoport to generate ideas about how to enhance world peace. Rapoport was at the forefront of the game theoreticians who sought to conceptualize strategies that could promote international cooperation. Accordingly, the basic logic of game theory is explained using the game models of ‘Chicken’ and ‘Prisoner’s Dilemma’. These models were used by Rapoport in his books and lectures in simple and complex ways. Then Rapoport’s revolutionary ...


Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov 2016 Kennesaw State University

Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov

Master of Science in Computer Science Theses

Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom ...


Hpc Made Easy: Using Docker To Distribute And Test Trilinos, Sean J. Deal 2016 College of Saint Benedict/Saint John's University

Hpc Made Easy: Using Docker To Distribute And Test Trilinos, Sean J. Deal

All College Thesis Program

Virtualization is an enticing option for computer science research given its ability to provide repeatable, standardized environments, but traditional virtual machines have too much overhead cost to be practical. Docker, a Linux-based tool for operating-system level virtualization, has been quickly gaining popularity throughout the computer science field by touting a virtualization solution that is easily distributable and more lightweight than virtual machines. This thesis aims to explore if Docker is a viable option for conducting virtualized research by evaluating the results of parallel performance tests using the Trilinos project.


Securing The Integrity Of The Power Distribution System For Smart Grid Applications, Hosam Yousef Hittini 2016 United Arab Emirates University

Securing The Integrity Of The Power Distribution System For Smart Grid Applications, Hosam Yousef Hittini

Theses

The distribution system is one of the main components in a smart grid, readings are transferred from the distribution substations to the control center. Compromising transferred system data will result in drawing wrong conclusions about current operation status at the control center. Which leads to sending wrong operational commands that may result in very serious consequences.

Firstly, we propose a scalable communications architecture for future smart grid distribution systems (i.e. Security Aware Distribution System Architecture - SADSA). The architecture is adaptable to use Wi-Fi or other technologies to transfer smart grid information. The architecture is studied from various angles. Both ...


Social-Context Middleware For At-Risk Veterans, Nadiyah Frances Johnson 2016 Marquette University

Social-Context Middleware For At-Risk Veterans, Nadiyah Frances Johnson

Master's Theses (2009 -)

Many veterans undergo challenges when reintegrating into civilian society. These challenges include readapting to their communities and families. During the reintegration process veterans have difficulties finding employment, education or resources that aid veteran health. Research suggests that these challenges often result in veterans encountering serious mental illness. Post-Traumatic Stress Disorder (PTSD) is a common mental disease that veterans often develop. This disease impacts between 15-20% of veterans. PTSD increases the likelihood of veterans engaging in high risk behaviors which may consist of impulsivity, substance abuse, and angry outbursts. These behaviors raise the veterans’ risk of becoming violent and lashing out ...


The Future Of Patient Engagement In The Governance Of Shared Data, Carolyn Petersen 2016 Mayo Clinic

The Future Of Patient Engagement In The Governance Of Shared Data, Carolyn Petersen

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Background: The emerging health care system increasingly values patient engagement and shared decision-making between patients and their providers. The practice of these values is gaining importance as the patient-centered medical home model and personalized medicine come into greater use.

Opportunity for Improvement: Exploration of patient preferences about personal health data use for research and quality improvement is a fundamental element of the provider-patient relationship. Giving patients an explicit opportunity to discuss their options about use of their data and implementing a process that allows patients to receive desired communications about how their information is used can help build patient trust ...


Movement Path Tortuosity In Free Ambulation: Relationships To Age And Brain Disease, William Kearns, James Fozard, Vilis Nams 2016 University of South Florida

Movement Path Tortuosity In Free Ambulation: Relationships To Age And Brain Disease, William Kearns, James Fozard, Vilis Nams

William D. Kearns, PhD

Ambulation is defined by duration, distance traversed, number and size of directional changes and the interval separating successive movement episodes; more complex measures of ambulation can be created by aggregating these features. This review article of published findings defines random changes in direction during movement as “movement path tortuosity”, and relates tortuosity to the understanding of cognitive impairments of persons of all ages. Path tortuosity is quantified by subjecting tracking data to fractal analysis, specifically Fractal Dimension (Fractal D), which ranges from a value of 1 when the movement path is perfectly straight to a value of 2 when the ...


Archive - A Data Management Program, James Devilbiss, C. Steven Whisnant, Yasmeen Shorish 2016 James Madison University

Archive - A Data Management Program, James Devilbiss, C. Steven Whisnant, Yasmeen Shorish

Yasmeen Shorish

To meet funding agency requirements, a portable data management solution is presented for small research groups. The database created is simple, searchable, robust, and can reside across multiple hard drives. Employing a standard metadata schema for all data, the database ensures a high level of standardization, findability, and organization. The software is written in Perl, runs on UNIX, and presents a web-based user interface. It uses a fast, portable log-in scheme, making it easy to export to other locations. As research continues to move towards more open data sharing and reproducibility, this database solution is agile enough to accommodate external ...


The Online Minimum Matching Problem On The Line, Maximilan Bender 2016 Connecticut College

The Online Minimum Matching Problem On The Line, Maximilan Bender

Computer Science Honors Papers

No abstract provided.


Pthreads Profiler, Ryan Van Quinlan 2015 California Polytechnic State University, San Luis Obispo

Pthreads Profiler, Ryan Van Quinlan

Computer Science

The goal of this senior project was to design and implement a program which would allow users to profile programs that utilize the Pthreads library. This profiler allows users to measure load balance and lock contention between threads as well as discover deadlocks. These tools can be essential to developers of multi-threaded applications, which are notoriously difficult to debug. Additionally, this tool can help find vital performance benefits by providing relative execution measurements. The profiler is written in C++ and utilizes the standard template library as well as glibc extensions.


Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista 2015 East Tennessee State University

Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista

Electronic Theses and Dissertations

PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry.

PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as ...


An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang 2015 University of Dayton

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang

Computer Science Faculty Publications

We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The ...


Data Verifications For Online Social Networks, Mahmudur Rahman 2015 Florida International University

Data Verifications For Online Social Networks, Mahmudur Rahman

FIU Electronic Theses and Dissertations

Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their users, often reported from mobile devices. The value and impact of social media makes it however an attractive attack target. In this thesis, we focus on the following social media vulnerabilities. First, review centered social networks such as Yelp and Google Play have been shown to be the targets of significant search rank and malware proliferation attacks. Detecting fraudulent behaviors is thus paramount to prevent not only public opinion bias, but also to curb the distribution of malware. Second, the ...


Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam AM Capretz 2015 Western University

Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz

Electrical and Computer Engineering Publications

The demand for knowledge extraction has been increasing. With the growing amount of data being generated by global data sources (e.g., social media and mobile apps) and the popularization of context-specific data (e.g., the Internet of Things), companies and researchers need to connect all these data and extract valuable information. Machine learning has been gaining much attention in data mining, leveraging the birth of new solutions. This paper proposes an architecture to create a flexible and scalable machine learning as a service. An open source solution was implemented and presented. As a case study, a forecast of electricity ...


Digital Commons powered by bepress