Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

875 Full-Text Articles 1,177 Authors 1,039,766 Downloads 111 Institutions

All Articles in Systems Architecture

Faceted Search

875 full-text articles. Page 25 of 33.

A Constrained, Possibilistic Logical Approach For Software System Survivability Evaluation, Yanjun Zuo 2014 University of North Dakota

A Constrained, Possibilistic Logical Approach For Software System Survivability Evaluation, Yanjun Zuo

Accountancy Faculty Publications

In this paper, we present a logical framework to facilitate users in assessing a software system in terms of the required survivability features. Survivability evaluation is essential in linking foreign software components to an existing system or obtaining software systems from external sources. It is important to make sure that any foreign components/systems will not compromise the current system’s survivability properties. Given the increasing large scope and complexity of modern software systems, there is a need for an evaluation framework to accommodate uncertain, vague, or even ill-known knowledge for a robust evaluation based on multi-dimensional criteria. Our framework incorporates user-defined …


Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam A M Capretz, M. Beatriz F. Toledo 2014 Western University

Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam A M Capretz, M. Beatriz F. Toledo

Electrical and Computer Engineering Publications

The problem of scheduling independent users’ jobs to resources in Grid Computing systems is of paramount importance. This problem is known to be NP-hard, and many techniques have been proposed to solve it, such as heuristics, genetic algorithms (GA), and, more recently, particle swarm optimization (PSO). This article aims to use PSO to solve grid scheduling problems, and compare it with other techniques. It is shown that many often-overlooked implementation details can have a huge impact on the performance of the method. In addition, experiments also show that the PSO has a tendency to stagnate around local minima in high-dimensional …


Coffee: Context Observer For Fast Enthralling Entertainment, Anthony M. Lenz 2014 California Polytechnic State University, San Luis Obispo

Coffee: Context Observer For Fast Enthralling Entertainment, Anthony M. Lenz

Master's Theses

Desktops, laptops, smartphones, tablets, and the Kinect, oh my! With so many devices available to the average consumer, the limitations and pitfalls of each interface are becoming more apparent. Swimming in devices, users often have to stop and think about how to interact with each device to accomplish the current tasks at hand. The goal of this thesis is to minimize user cognitive effort in handling multiple devices by creating a context aware hybrid interface. The context aware system will be explored through the hybridization of gesture and touch interfaces using a multi-touch coffee table and the next-generation Microsoft Kinect. …


Digital Circuit Projects: An Overview Of Digital Circuits Through Implementing Integrated Circuits - Second Edition, Charles W. Kann 2014 Gettysburg College

Digital Circuit Projects: An Overview Of Digital Circuits Through Implementing Integrated Circuits - Second Edition, Charles W. Kann

Open Educational Resources

Digital circuits, often called Integrated Circuits or ICs, are the central building blocks of a Central Processing Unit (CPU). To understand how a computer works, it is essential to understand the digital circuits which make up the CPU. This text introduces the most important of these digital circuits; adders, decoders, multiplexers, D flip-flops, and simple state machines.

What makes this textbook unique is that it puts the ability to understand these circuits into the hands of anyone, from hobbyists to students studying Computer Science. This text is designed to teach digital circuits using simple projects the reader can implement. But …


Capturing And Analyzing Network Traffic From Common Mobile Devices For Security And Privacy, Billy Overton 2014 East Tennessee State University

Capturing And Analyzing Network Traffic From Common Mobile Devices For Security And Privacy, Billy Overton

Undergraduate Honors Theses

Mobile devices such as tablets and smartphones are becoming more common, and they are holding more information. This includes private information such as contacts, financial data, and passwords. At the same time these devices have network capability with access to the Internet being a prime feature. Little research has been done in observing the network traffic produced by these mobile devices. To determine if private information was being transmitted without user knowledge, the mobile capture lab and a set of procedures have been created to observe, capture and analyze the network traffic produced by mobile devices. The effectiveness of the …


Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra 2014 SelectedWorks

Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.

There are many input/output devices like mouse, keyboard, pointers, and touch screens …


Porting The Embedded Xinu Operating System To The Raspberry Pi, Eric Biggers 2014 Macalester College

Porting The Embedded Xinu Operating System To The Raspberry Pi, Eric Biggers

Mathematics, Statistics, and Computer Science Honors Projects

This thesis presents a port of a lightweight instructional operating system called Embedded Xinu to the Raspberry Pi. The Raspberry Pi, an inexpensive credit-card-sized computer, has attracted a large community of hobbyists, researchers, and educators since its release in 2012. However, the system-level software running on the Raspberry Pi has been restricted to two ends of a spectrum: complex modern operating systems such as Linux at one end, and very simple hobbyist operating systems or simple “bare-metal” programs at the other end. This project bridges this gap by porting the Embedded Xinu operating system to the Raspberry Pi. Although simple …


Automatic Objects Removal For Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, Ju Shen 2014 University of North Georgia

Automatic Objects Removal For Scene Completion, Jianjun Yang, Yin Wang, Honggang Wang, Kun Hua, Wei Wang, Ju Shen

Computer Science Faculty Publications

With the explosive growth of Web-based cameras and mobile devices, billions of photographs are uploaded to the Internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion of unexpected foreground objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image completion algorithm for object removal that produces visually …


Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo 2014 Universidade Federal de Ouro Preto

Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo

Electrical and Computer Engineering Publications

Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. This paper focuses on the areas of service description and discovery. The problems in these areas are that currently it is not possible to describe how a service provider deals with information received from a service consumer as well as discover a service that satisfies the privacy preferences of a consumer. There is currently no framework which offers a solution that supports a rich description of privacy policies and their integration in the process of service discovery. Thus, the main goal of this paper is to propose a privacy preservation …


Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan 2014 Florida International University

Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan

FIU Electronic Theses and Dissertations

For the past several decades, we have experienced the tremendous growth, in both scale and scope, of real-time embedded systems, thanks largely to the advances in IC technology. However, the traditional approach to get performance boost by increasing CPU frequency has been a way of past. Researchers from both industry and academia are turning their focus to multi-core architectures for continuous improvement of computing performance. In our research, we seek to develop efficient scheduling algorithms and analysis methods in the design of real-time embedded systems on multi-core platforms. Real-time systems are the ones with the response time as critical as …


Inequalities And Asymmetries, Tamara Kneese 2014 University of San Francisco

Inequalities And Asymmetries, Tamara Kneese

Media Studies

The availability of data is not evenly distributed. Some organizations, agencies, and sectors are better equipped to gather, use, and analyze data than others. If data is transformative, what are the consequences of defense and security agencies having greater capacity to leverage data than, say, education or social services? Financial wherewithal, technical capacity, and political determinants all affect where data is employed. As data and analytics emerge, who benefits and who doesn't, both at the individual level and the institutional level? What about the asymmetries between those who provide the data and those who collect it? How does uneven data …


Proton Computed Tomography: Matrix Data Generation Through General Purpose Graphics Processing Unit Reconstruction, micah witt 2014 California State University, San Bernardino

Proton Computed Tomography: Matrix Data Generation Through General Purpose Graphics Processing Unit Reconstruction, Micah Witt

Electronic Theses, Projects, and Dissertations

Proton computed tomography (pCT) is an image modality that will improve treatment planning for patients receiving proton radiation therapy compared with the current techniques, which are based on X-ray CT. Images are reconstructed in pCT by solving a large and sparse system of linear equations. The size of the system necessitates matrix-partitioning and parallel reconstruction algorithms to be implemented across some sort of cluster computing architecture. The prototypical algorithm to solve the pCT system is the algebraic reconstruction technique (ART) that has been modified into parallel versions called block-iterative-projection (BIP) methods and string-averaging-projection (SAP) methods. General purpose graphics processing units …


Focused Multi-Document Summarization: Human Summarization Activity Vs. Automated Systems Techniques, Quinsulon L. Israel, Hyoil Han, Il-Yeol Song 2014 Marshall University

Focused Multi-Document Summarization: Human Summarization Activity Vs. Automated Systems Techniques, Quinsulon L. Israel, Hyoil Han, Il-Yeol Song

Hyoil Han

Focused Multi-Document Summarization (MDS) is concerned with summarizing documents in a collection with a concentration toward a particular external request (i.e. query, question, topic, etc.), or focus. Although the current state-of-the-art provides somewhat decent performance for DUC/TAC-like evaluations (i.e. government and news concerns), other considerations need to be explored. This paper not only briefly explores the state-of-the-art in automatic systems techniques, but also a comparison with human summarization activity.


Providing Flexible File-Level Data Filtering For Big Data Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, David Swanson 2014 University of Nebraska-Lincoln

Providing Flexible File-Level Data Filtering For Big Data Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, David Swanson

CSE Technical Reports

The enormous amount of big data datasets impose the needs for effective data filtering technique to accelerate the analytics process. We propose a Versatile Searchable File System, VSFS, which provides a transparent, flexible and near real-time file-level data filtering service by searching files directly through the file system. Therefore, big data analytics applications can transparently utilize this filtering service without application modifications. A versatile index scheme is designed to adapt to the exploratory and ad-hoc nature of the big data analytics activities. Moreover, VSFS uses a RAM-based distributed architecture to perform file indexing. The evaluations driven by three real-world analytics …


Cybersecurity Strategy In Developing Nations: A Jamaica Case Study, Kevin Patrick Newmeyer 2014 Walden University

Cybersecurity Strategy In Developing Nations: A Jamaica Case Study, Kevin Patrick Newmeyer

2010-2016 Archived Posters

Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security. This qualitative case study examined how the government and private sector in Jamaica viewed the state of cybersecurity in the country, and how the country was developing policy to respond to cyber threats.


Retrospective Case Study And Potential Solutions In Regard To The Object Oriented Design Of Charger Through Various Modeling And Analysis Techniques, Jesse Moore 2014 University of Alabama in Huntsville

Retrospective Case Study And Potential Solutions In Regard To The Object Oriented Design Of Charger Through Various Modeling And Analysis Techniques, Jesse Moore

Summer Community of Scholars Posters (RCEU and HCR Combined Programs)

No abstract provided.


Design And Implementation Of E-Commerce Site For Online Shopping, Sidhartha Reddy Vatrapu 2014 Governors State University

Design And Implementation Of E-Commerce Site For Online Shopping, Sidhartha Reddy Vatrapu

All Capstone Projects

In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.

Online Shopping is a lifestyle e-commerce web application, which retails various fashion and lifestyle products (Currently Men’s Wear). This project allows viewing various products available enables registered users to purchase desired products instantly using PayPal payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to …


Virtualization-Based System Hardening Against Untrusted Kernels, Yueqiang CHENG 2014 Singapore Management University

Virtualization-Based System Hardening Against Untrusted Kernels, Yueqiang Cheng

Dissertations and Theses Collection (Open Access)

Applications are integral to our daily lives to help us processing sensitive I/O data, such as individual passwords and camera streams, and private application data, such as financial information and medical reports. However, applications and sensitive data all surfer from the attacks from kernel rootkits in the traditional architecture, where the commodity OS that is supposed to be the secure foothold of the system is routinely compromised due to the large code base and the broad attack surface. Fortunately, the virtualization technology has significantly reshaped the landscape of the modern computer system, and provides a variety of new opportunities for …


Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Efstratios Skafidas, Kamal Alameh 2014 Edith Cowan University

Free-Space 120 Gb/S Reconfigurable Card-To-Card Optical Wireless Interconnects With 16-Cap Modulation, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Efstratios Skafidas, Kamal Alameh

Research outputs 2014 to 2021

In this paper, we propose and experimentally demonstrate reconfigurable card-to-card optical wireless interconnects architecture with 16-Carrierless-Amplitude/Phase modulation. Results show that 3×40 Gb/s interconnection is achieved with 2 mW transmission power.


Using Acl2 To Verify Loop Pipelining In Behavioral Synthesis, Disha Puri, Sandip Ray, Kecheng Hao, Fei Xie 2014 Portland State University

Using Acl2 To Verify Loop Pipelining In Behavioral Synthesis, Disha Puri, Sandip Ray, Kecheng Hao, Fei Xie

Civil and Environmental Engineering Faculty Publications and Presentations

Behavioral synthesis involves compiling an Electronic System-Level (ESL) design into its RegisterTransfer Level (RTL) implementation. Loop pipelining is one of the most critical and complex transformations employed in behavioral synthesis. Certifying the loop pipelining algorithm is challenging because there is a huge semantic gap between the input sequential design and the output pipelined implementation making it infeasible to verify their equivalence with automated sequential equivalence checking techniques. We discuss our ongoing effort using ACL2 to certify loop pipelining transformation. The completion of the proof is work in progress. However, some of the insights developed so far may already be of …


Digital Commons powered by bepress