Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,655 Full-Text Articles 2,415 Authors 1,145,150 Downloads 139 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,655 full-text articles. Page 7 of 69.

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas 2023 Zhengzhou University

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Comparative Analytics On Chilli Plant Disease Using Machine Learning Techniques, Sai Abhishta Roy Seelam 2023 Georgia Southern University

Comparative Analytics On Chilli Plant Disease Using Machine Learning Techniques, Sai Abhishta Roy Seelam

Electronic Theses and Dissertations

This thesis concerns the detection of diseases in chilli plants using machine learning techniques. Three algorithms, viz., Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), and Multi-Layer Perceptron (MLP), and their variants have been employed. Chilli-producing countries, India, Mexico, China, Indonesia, Spain, the United States, and Turkey. India has the world’s largest chilli production of about 49% (according to 2020). Andhra Pradesh (Guntur) is the largest market in India, where their varieties are more popular for pungency and color. This study classifies five kinds of diseases that affect the chilli, namely, leaf spot, whitefly, yellowish, healthy, and leaf curl. A …


Evaluation Of Different Machine Learning, Deep Learning And Text Processing Techniques For Hate Speech Detection, Nabil Shawkat 2023 Missouri State University

Evaluation Of Different Machine Learning, Deep Learning And Text Processing Techniques For Hate Speech Detection, Nabil Shawkat

MSU Graduate Theses

Social media has become a domain that involves a lot of hate speech. Some users feel entitled to engage in abusive conversations by sending abusive messages, tweets, or photos to other users. It is critical to detect hate speech and prevent innocent users from becoming victims. In this study, I explore the effectiveness and performance of various machine learning methods employing text processing techniques to create a robust system for hate speech identification. I assess the performance of Naïve Bayes, Support Vector Machines, Decision Trees, Random Forests, Logistic Regression, and K Nearest Neighbors using three distinct datasets sourced from social …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky 2023 California State University, Los Angeles

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Small Business Office Network, Michael Gerome 2023 The University of Akron

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi 2023 The University of Akron

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi

Williams Honors College, Honors Research Projects

Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …


Small Voip-Supported Network, Drina Hobson 2023 The University of Akron

Small Voip-Supported Network, Drina Hobson

Williams Honors College, Honors Research Projects

Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz 2023 The University of Akron

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari 2023 The Institute of Finance Management

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson 2023 Iona College

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Memory Optimizations For High-Throughput Computer Systems, Zhiyuan Lu 2023 Michigan Technological University

Memory Optimizations For High-Throughput Computer Systems, Zhiyuan Lu

Dissertations, Master's Theses and Master's Reports

The emergence of new non-volatile memory (NVM) technology and deep neural network (DNN) inferences bring challenges related to off-chip memory access. Ensuring crash consistency leads to additional memory operations and exposes memory update operations on the critical execution path. DNN inference execution on some accelerators suffers from intensive off-chip memory access. The focus of this dissertation is to tackle the issues related to off-chip memory in these high performance computing systems.

The logging operations, required by the crash consistency, impose a significant performance overhead due to the extra memory access. To mitigate the persistence time of log requests, we introduce …


Bilstm−Bigru: A Fusion Deep Neural Network For Predicting Air Pollutant Concentration, Prasanjit Dey, Soumyabrata Dev, Bianca Schoen-Phelan 2023 Technological University Dublin, Ireland

Bilstm−Bigru: A Fusion Deep Neural Network For Predicting Air Pollutant Concentration, Prasanjit Dey, Soumyabrata Dev, Bianca Schoen-Phelan

Conference papers

Predicting air pollutant concentrations is an efficient way to prevent incidents by providing early warnings of harmful air pollutants. A precise prediction of air pollutant concentrations is an important factor in controlling and preventing air pollution. In this paper, we develop a bidirectional long-short-term memory and a bidirectional gated recurrent unit (BiLSTM−BiGRU) to predict PM 2.5 concentrations in a target city for different lead times. The BiLSTM extracts preliminary features, and the BiGRU further extracts deep features from air pollutant and meteorological data. The fully connected (FC) layer receives the output and makes an accurate prediction of the PM 2.5 …


The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar 2022 Faculty of Engineering, Beirut Arab University

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar

BAU Journal - Science and Technology

This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn 2022 Grand Valley State University

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak 2022 Southern Methodist University

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li 2022 Kennesaw State University

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson 2022 Department of Chemical Engineering and Materials Science, Wayne State University, Detroit, MI

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst 2022 Washington University in St. Louis

Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst

McKelvey School of Engineering Theses & Dissertations

The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …


A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen 2022 California Polytechnic State University, San Luis Obispo

A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen

Master's Theses

Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …


Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal 2022 University of Tennessee, Knoxville

Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal

Masters Theses

A portable, real-time vital sign estimation protoype is developed using neural network- based localization, multi-object tracking, and embedded processing optimizations. The system estimates heart and respiration rates of multiple subjects using directional of arrival techniques on RADAR data. This system is useful in many civilian and military applications including search and rescue.

The primary contribution from this work is the implementation and benchmarking of neural networks for real time detection and localization on various systems including the testing of eight neural networks on a discrete GPU and Jetson Xavier devices. Mean average precision (mAP) and inference speed benchmarks were performed. …


Digital Commons powered by bepress