Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,659 Full-Text Articles 2,419 Authors 1,145,150 Downloads 140 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,659 full-text articles. Page 10 of 69.

Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall 2022 University of Arkansas, Fayetteville

Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall

Graduate Theses and Dissertations

Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide …


Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan 2022 University of Arkansas, Fayetteville

Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan

Graduate Theses and Dissertations

Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …


A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall 2022 University of Arkansas, Fayetteville

A Versatile Python Package For Simulating Dna Nanostructures With Oxdna, Kira Threlfall

Computer Science and Computer Engineering Undergraduate Honors Theses

The ability to synthesize custom DNA molecules has led to the feasibility of DNA nanotechnology. Synthesis is time-consuming and expensive, so simulations of proposed DNA designs are necessary. Open-source simulators, such as oxDNA, are available but often difficult to configure and interface with. Packages such as oxdna-tile-binding pro- vide an interface for oxDNA which allows for the ability to create scripts that automate the configuration process. This project works to improve the scripts in oxdna-tile-binding to improve integration with job scheduling systems commonly used in high-performance computing environments, improve ease-of-use and consistency within the scripts compos- ing oxdna-tile-binding, and move …


Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague 2022 University of Arkansas, Fayetteville

Side-Channel Analysis On Post-Quantum Cryptography Algorithms, Tristen Teague

Computer Science and Computer Engineering Undergraduate Honors Theses

The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor's Algorithm. NIST proposed a standardization effort in creating a new class of asymmetric cryptography named Post-Quantum Cryptography (PQC). These new algorithms will be resistant against both classical computers and sufficiently powerful quantum computers. Although the new algorithms seem mathematically secure, they can possibly be broken by a class of attacks known as side-channels attacks (SCA). Side-channel attacks involve exploiting the hardware that the algorithm runs on to figure out secret values that could break the security of the system. …


Benchmarking Library Recognition In Tweets, Ting ZHANG, Divya Prabha CHANDRASEKARAN, Ferdian THUNG, David LO 2022 Singapore Management University

Benchmarking Library Recognition In Tweets, Ting Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Software developers often use social media (such as Twitter) to shareprogramming knowledge such as new tools, sample code snippets,and tips on programming. One of the topics they talk about is thesoftware library. The tweets may contain useful information abouta library. A good understanding of this information, e.g., on thedeveloper’s views regarding a library can be beneficial to weigh thepros and cons of using the library as well as the general sentimentstowards the library. However, it is not trivial to recognize whethera word actually refers to a library or other meanings. For example,a tweet mentioning the word “pandas" may refer to …


Enter The Battleverse: China's Metaverse War, Josh Baughman 2022 University of South Florida

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Bias In Artificial Intelligence: The Morality And Motivation Behind The Algorithm, Avery Freeman 2022 William & Mary

Bias In Artificial Intelligence: The Morality And Motivation Behind The Algorithm, Avery Freeman

Undergraduate Honors Theses

More than 180 cognitive biases have been identified in humans, and these biases relate to feelings towards a person or a group based on perceived group membership (Dilmegani, 2020). The development of artificial intelligence has fallen into the hands of engineers and statisticians, people who work within fields that have well-established race and gender diversity disparities (Panch et al., 2019). Thus, it is no surprise that the aforementioned biases have made their way into the algorithms behind artificial intelligence. The current study explored how participants’ pre-existing biases and level of outgroup contact have the potential to affect their decision-making pertaining …


Unconventional Computation Including Quantum Computation, Bruce J. MacLennan 2022 University of Tennessee, Knoxville

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.


Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn 2022 Morehead State University

Design Of A Tracking Glove For Use In Virtual Reality Training Environments, Thomas A. Buteyn

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the degree Master of Science by Thomas A. Buteyn on April 25, 2022.


A Deep Reinforcement Learning Approach With Prioritized Experience Replay And Importance Factor For Makespan Minimization In Manufacturing, Jose Napoleon Martinez 2022 Louisiana State University and Agricultural and Mechanical College

A Deep Reinforcement Learning Approach With Prioritized Experience Replay And Importance Factor For Makespan Minimization In Manufacturing, Jose Napoleon Martinez

LSU Doctoral Dissertations

In this research, we investigated the application of deep reinforcement learning (DRL) to a common manufacturing scheduling optimization problem, max makespan minimization. In this application, tasks are scheduled to undergo processing in identical processing units (for instance, identical machines, machining centers, or cells). The optimization goal is to assign the jobs to be scheduled to units to minimize the maximum processing time (i.e., makespan) on any unit.

Machine learning methods have the potential to "learn" structures in the distribution of job times that could lead to improved optimization performance and time over traditional optimization methods, as well as to adapt …


Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore 2022 Kennesaw State University

Iot Clusters Platform For Data Collection, Analysis, And Visualization Use Case, Soin Abdoul Kassif Baba M Traore

Symposium of Student Scholars

Climate change is happening, and many countries are already facing devastating consequences. Populations worldwide are adapting to the season's unpredictability they relay to lands for agriculture. Our first research was to develop an IoT Clusters Platform for Data Collection, analysis, and visualization. The platform comprises hardware parts with Raspberry Pi and Arduino's clusters connected to multiple sensors. The clusters transmit data collected in real-time to microservices-based servers where the data can be accessed and processed. Our objectives in developing this platform were to create an efficient data collection system, relatively cheap to implement and easy to deploy in any part …


Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor 2022 University of South Carolina

Quadratic Neural Network Architecture As Evaluated Relative To Conventional Neural Network Architecture, Reid Taylor

Senior Theses

Current work in the field of deep learning and neural networks revolves around several variations of the same mathematical model for associative learning. These variations, while significant and exceptionally applicable in the real world, fail to push the limits of modern computational prowess. This research does just that: by leveraging high order tensors in place of 2nd order tensors, quadratic neural networks can be developed and can allow for substantially more complex machine learning models which allow for self-interactions of collected and analyzed data. This research shows the theorization and development of mathematical model necessary for such an idea to …


Seabem: An Artificial Intelligence Powered Web Application To Predict Cover Crop Biomass, Aime Christian Tuyishime, Andrea Basche 2022 University of Nebraska - Lincoln

Seabem: An Artificial Intelligence Powered Web Application To Predict Cover Crop Biomass, Aime Christian Tuyishime, Andrea Basche

Honors Theses

SEABEM, the Stacked Ensemble Algorithms Biomass Estimator Model, is a web application with a stacked ensemble of Machine Learning (ML) algorithms running on the backend to predict cover crop biomass for locations in Sub-Saharan. The SEABEM model was developed using a previously developed database of crop growth and yield that included site characteristics such as latitude, longitude, soil texture (sand, silt, and clay percentages), temperature, and precipitation. The goal of SEABEM is to provide global farmers, mainly small-scale African farmers, the knowledge they need before practicing and benefiting from cover crops while avoiding the expensive and time-consuming operations that come …


Thermal Aware Design Automation Of The Electronic Control System For Autonomous Vehicles, Ajinkya Bankar 2022 Florida International University

Thermal Aware Design Automation Of The Electronic Control System For Autonomous Vehicles, Ajinkya Bankar

FIU Electronic Theses and Dissertations

The autonomous vehicle (AV) technology, due to its tremendous social and economical benefits, is transforming the entire world in the coming decades. However, significant technical challenges still need to be overcome until AVs can be safely, reliably, and massively deployed. Temperature plays a key role in the safety and reliability of an AV, not only because a vehicle is subjected to extreme operating temperatures but also because the increasing computations demand more powerful IC chips, which can lead to higher operating temperature and large thermal gradient. In particular, as the underpinning technology for AV, artificial intelligence (AI) requires substantially increased …


Analyzing Offline Social Engagements: An Empirical Study Of Meetup Events Related To Software Development, Abhishek SHARMA, Gede Artha Azriadi PRANA, Anamika SAWHNEY, Nachiappan NAGAPPAN, David LO 2022 Singapore Management University

Analyzing Offline Social Engagements: An Empirical Study Of Meetup Events Related To Software Development, Abhishek Sharma, Gede Artha Azriadi Prana, Anamika Sawhney, Nachiappan Nagappan, David Lo

Research Collection School Of Computing and Information Systems

Software developers use a variety of social mediachannels and tools in order to keep themselves up to date,collaborate with other developers, and find projects to contributeto. Meetup is one of such social media used by softwaredevelopers to organize community gatherings. We in this work,investigate the dynamics of Meetup groups and events relatedto software development. Our work is different from previouswork as we focus on the actual event and group data that wascollected using Meetup API.In this work, we performed an empirical study of eventsand groups present on Meetup which are related to softwaredevelopment. First, we identified 6,327 Meetup groups related …


Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink 2022 University of Glasgow

Exploring 3d Data Reuse And Repurposing Through Procedural Modeling, Rachel Opitz, Heather Richards-Rissetto, Karin Dalziel, Jessica Dussault, Greg Tunink

Department of Anthropology: Faculty Publications

Most contemporary 3D data used in archaeological research and heritage management have been created through ‘reality capture,’ the recording of the physical features of extant archaeological objects, structures, and landscapes using technologies such as laser scanning and photogrammetry (Garstki 2020, ch.2; Magnani et al. 2020). A smaller quantity of data are generated by Computer Aided Design (CAD) and Building Information Modeling (BIM) projects, and even fewer data are generated through procedural modeling, the rapid prototyping of multi-component threedimensional (3D) models from a set of rules (Figure 8.1.). It is unsurprising therefore that in archaeology and heritage, efforts around digital 3D …


Choosing Wearable Internet Of Things Devices For Managing Safety In Construction Using Fuzzy Analytic Hierarchy Process As A Decision Support System, Sharique Khalid 2022 Marshall University

Choosing Wearable Internet Of Things Devices For Managing Safety In Construction Using Fuzzy Analytic Hierarchy Process As A Decision Support System, Sharique Khalid

Theses, Dissertations and Capstones

Many safety and health risks are faced daily by workers in the field of construction. There is unpredictability and risk embedded in the job and work environment. When compared with other industries, the construction industry has one of the highest numbers of worker injuries, illnesses, fatalities, and near-misses. To eliminate these risky events and make worker performance more predictable, new safety technologies such as the Internet of Things (IoT) and Wearable Sensing Devices (WSD) have been highlighted as effective safety systems. Some of these Wearable Internet of Things (WIoT) and sensory devices are already being used in other industries to …


A Trusted Platform For Unmanned Aerial Vehicle-Based Bridge Inspection Management System, Hwapyeong Song 2022 Marshall University

A Trusted Platform For Unmanned Aerial Vehicle-Based Bridge Inspection Management System, Hwapyeong Song

Theses, Dissertations and Capstones

Bridge inspection has a pivotal role in assuring the safety of critical structures constituting society. However, high cost, worker safety, and low objectivity of quality are classic problems in traditional visual inspection. Recent trends in bridge inspection have led to a proliferation of research utilizing Unmanned Aerial Vehicles (UAVs). This thesis proposes a Trusted Platform for Bridge Inspection Management System (Trusted-BIMS) for safe and efficient bridge inspection by proving the UAV-based inspection process and improving the prototype of the previous study. Designed based on a Zero-Trust (ZT) strategy, Trusted-BIMS consist of (1) a database-driven web framework with security features for …


Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette 2022 Marshall University

Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette

Theses, Dissertations and Capstones

Conventional sensors are rapidly approaching efficiency limitations at their current size. In designing more efficient sensors, low dimensional materials such as carbon nanotubes (CNTs), quantum dots, and DNA origami can be used to enable higher degrees of sensitivity. Because of the high atomic surface to core ratio, these materials can be used to detect slight changes in chemical composition, strain, and temperature. CNTs offer unique advantages in different types of sensors due to their electromechanical properties. In temperature sensing, the high responsiveness to temperature and durability can be used to produce an accurate, reliable sensor in even extreme temperatures. This …


Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane 2022 Old Dominion University

Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane

Engineering Management & Systems Engineering Faculty Publications

"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …


Digital Commons powered by bepress