Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Entire DC Network

Ai: Capturing Core Processes In The Us-China Hegemonic Cycle, Connor Murphy Aug 2022

Ai: Capturing Core Processes In The Us-China Hegemonic Cycle, Connor Murphy

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

World systems analysis is a historically based framework that makes looking at the world easier with trends and patterns. Using this framework and the concepts inside of it, the reader will be able to see the potential that artificial intelligence has in regard to the social, political and economic changes that will come about in the United States and China from the adoption of this technology.


Efficient And Secure Resource Allocation In Mobile Edge Computing Enabled Wireless Networks, Qun Wang May 2022

Efficient And Secure Resource Allocation In Mobile Edge Computing Enabled Wireless Networks, Qun Wang

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

To support emerging applications such as autonomous vehicles and smart homes and to build an intelligent society, the next-generation internet of things (IoT) is calling for up to 50 billion devices connected world wide. Massive devices connection, explosive data circulation, and colossal data processing demand are driving both the industry and academia to explore new solutions.

Uploading this vast amount of data to the cloud center for processing will significantly increase the load on backbone networks and cause relatively long latency to time-sensitive applications. A practical solution is to deploy the computing resource closer to end-users to process the distributed …


Deep Learning Data And Indexes In A Database, Vishal Sharma Aug 2021

Deep Learning Data And Indexes In A Database, Vishal Sharma

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

A database is used to store and retrieve data, which is a critical component for any software application. Databases requires configuration for efficiency, however, there are tens of configuration parameters. It is a challenging task to manually configure a database. Furthermore, a database must be reconfigured on a regular basis to keep up with newer data and workload. The goal of this thesis is to use the query workload history to autonomously configure the database and improve its performance. We achieve proposed work in four stages: (i) we develop an index recommender using deep reinforcement learning for a standalone database. …


Spectral, Energy And Computation Efficiency In Future 5g Wireless Networks, Haijian Sun Aug 2019

Spectral, Energy And Computation Efficiency In Future 5g Wireless Networks, Haijian Sun

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Wireless technology has revolutionized the way people communicate. From first generation, or 1G, in the 1980s to current, largely deployed 4G in the 2010s, we have witnessed not only a technological leap, but also the reformation of associated applications. It is expected that 5G will become commercially available in 2020. 5G is driven by ever-increasing demands for high mobile traffic, low transmission delay, and massive numbers of connected devices. Today, with the popularity of smart phones, intelligent appliances, autonomous cars, and tablets, communication demands are higher than ever, especially when it comes to low-cost and easy-access solutions.

Existing communication architecture …


Understanding Security Threats Of Emerging Computing Architectures And Mitigating Performance Bottlenecks Of On-Chip Interconnects In Manycore Ntc System, Chidhambaranathan Rajamanikkam May 2019

Understanding Security Threats Of Emerging Computing Architectures And Mitigating Performance Bottlenecks Of On-Chip Interconnects In Manycore Ntc System, Chidhambaranathan Rajamanikkam

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Emerging computing architectures such as, neuromorphic computing and third party intellectual property (3PIP) cores, have attracted significant attention in the recent past. Neuromorphic Computing introduces an unorthodox non-von neumann architecture that mimics the abstract behavior of neuron activity of the human brain. They can execute more complex applications, such as image processing, object recognition, more efficiently in terms of performance and energy than the traditional microprocessors. However, focus on the hardware security aspects of the neuromorphic computing at its nascent stage. 3PIP core, on the other hand, have covertly inserted malicious functional behavior that can inflict range of harms at …


Universal Mobile Service Execution Framework For Device-To-Device Collaborations, Minh Le May 2018

Universal Mobile Service Execution Framework For Device-To-Device Collaborations, Minh Le

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

There are high demands of effective and high-performance of collaborations between mobile devices in the places where traditional Internet connections are unavailable, unreliable, or significantly overburdened, such as on a battlefield, disaster zones, isolated rural areas, or crowded public venues. To enable collaboration among the devices in opportunistic networks, code offloading and Remote Method Invocation are the two major mechanisms to ensure code portions of applications are successfully transmitted to and executed on the remote platforms. Although these domains are highly enjoyed in research for a decade, the limitations of multi-device connectivity, system error handling or cross platform compatibility prohibit …


Optimizing Bioengineered Vascular Systems: A Genetic Algorithm Approach, Sima Mehri Kochaki Dec 2017

Optimizing Bioengineered Vascular Systems: A Genetic Algorithm Approach, Sima Mehri Kochaki

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Efficiency of current cell cultures producing biological products is limited due to accumulation of the product and waste on the cells. A previous work aims at assisting bioengineers in solving this problem by introducing a new set of cells which possess the ability to connect to one another and thus form a network. Once created, the network of cells can help the initial cellules by removing their waste and product as well as nourishing them. Our project explores a technique to be able to create the best network of such cells; hence maximizing the amount of metabolic product in the …


A Pattern Language For Designing Application-Level Communication Protocols And The Improvement Of Computer Science Education Through Cloud Computing, Jorge Edison Lascano May 2017

A Pattern Language For Designing Application-Level Communication Protocols And The Improvement Of Computer Science Education Through Cloud Computing, Jorge Edison Lascano

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Enterprises that develop software use current technology because of its proven advantages and to accelerate and improve the software development process. Nevertheless, it is difficult to be up-to-date for most professionals in the area. Although students from higher academic institutions need to learn these new tools, and their main purpose is to learn how learn; colleges still need to prepare students for modern enterprise requirements, so they teach new technologies to improve students’ skills. Ubiquitous computing is software and services available everywhere, for example in mobile devices, in different locations, in different networks. This computing requires good communication protocols so …


Optimizing The Advanced Metering Infrastructure Architecture In Smart Grid, Alireza Ghasempour May 2016

Optimizing The Advanced Metering Infrastructure Architecture In Smart Grid, Alireza Ghasempour

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The gathered data from smart meters in current advanced metering infrastructure (AMI) of smart grid is huge. This much data causes serious challenges for reliability, performance, and scalability of smart grid. Therefore, we have investigated the scalability of different AMI architectures and proposed a scalable hybrid AMI architecture. We formulated deployment cost of different AMI architecture and used a genetic-based algorithm to minimize the deployment cost for the proposed architecture. We simulated different AMI architectures for five demographic regions and the results proved that our proposed AMI hybrid architecture has a better scalability compared to other AMI architectures.


Vision Based Extraction Of Nutrition Information From Skewed Nutrition Labels, Tanwir Zaman May 2016

Vision Based Extraction Of Nutrition Information From Skewed Nutrition Labels, Tanwir Zaman

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Vision-based extraction of nutritional information from nutrition labels (NLs) available on most product packages is critical to proactive nutrition management, because it improves the user’s ability to engage in continuous nutritional data collection and analysis. However, even users who are health conscious find it difficult to keep track of their nutrition intake due to lack of time, motivation, or training. In order to make nutrition management more proactive we present a Proactive NUTrition Management System (PNUTS), which aims to make nutrition management more user friendly and proactive using computer vision techniques running on smartphones which are ubiquitous and powerful computers …


Exploiting Self-Organization In Bioengineered Systems: A Computational Approach, Delin Davis May 2016

Exploiting Self-Organization In Bioengineered Systems: A Computational Approach, Delin Davis

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Bio-reactors, also known as microbial factories are used extensively to produce various industrially valuable products. However, scalability and stability of these factories are limited as it is difficult to deliver nutrients and extract product and waste from a large system. Current solution approaches explore changes in the physical configuration of the bio-reactors. Inspired from the nutrient delivery mechanisms of large organisms in nature, this work studies the possibilities of exploiting self-organizing bio-engineered cells which are capable of organizing into a vessel network to support the producer cells in the factory.

Primary goal of this dissertation is to design a proof-of-concept …


A Vision-Based Bee Counting Algorithm For Electronic Monitoring Of Langsthroth Beehives, Sai Kiran Reka May 2016

A Vision-Based Bee Counting Algorithm For Electronic Monitoring Of Langsthroth Beehives, Sai Kiran Reka

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Forager traffic is the number of bees entering or exiting the bee hive over a given period of time. To estimate forager traffic, beekeepers typically take a stopwatch and count the number of bees manually over a set period of time. Forager traffic is an important health indicator of the hive. Sudden changes in forager traffic levels show that there may be an anomaly inside the hive or in the environment. There have been several attempts to automate the estimation of forager traffic in Langsthroth hives with custombuilt hardware devices. In this thesis, we argue that bee counting can be …


Improving The Scalability And Usability Of The Public Information Officer Monitoring Application, Rohan D. Shah Aug 2015

Improving The Scalability And Usability Of The Public Information Officer Monitoring Application, Rohan D. Shah

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis work addresses the limitations of a web application called the Public Information Officer Monitoring Application (PMA). This application helps Public Information Officers (PIOs) to gather, monitor, sort, store, and report social media data during a crisis event. Before this work, PMA was unable to handle large data sets and as a result, it had not been adequately tested with potential users of the application.

This thesis describes changes made to PMA to improve its ability to handle large data sets. After these changes were made, the application was then tested with target users. All test participants found the …


Design Of Reliable And Secure Network-On-Chip Architectures, Dean Michael B Ancajas May 2015

Design Of Reliable And Secure Network-On-Chip Architectures, Dean Michael B Ancajas

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The trend towards massive parallel computing has necessitated the need for an On-Chip communication framework that can scale well with the increasing number of cores. At the same time, technology scaling has made transistors susceptible to a multitude of reliability issues. This dissertation demonstrates design techniques that address both reliability and security issues facing modern NoC architectures. The reliability and security problem is tackled at different abstraction levels using a series of schemes that combine information from the architecture-level as well as hardware-level in order to combat aging effects and meet secure design stipulations while maintaining modest power-performance overheads.


Parasitic Layer-Based Reconfigurable Antenna And Array For Wireless Applications, Zhouyuan Li May 2014

Parasitic Layer-Based Reconfigurable Antenna And Array For Wireless Applications, Zhouyuan Li

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Antenna is one of the most important components in wireless systems since signal transmission and reception are conducted through the antenna interface. Therefore, the signal quality is highly affected by the properties of the antenna. Traditional antennas integrated in devices such as laptops or cell phones have fixed radiation properties and can not be changed to adapt to different environments. Thus the performance of thefwhole system will be negatively affected since the antenna will not operate in the optimum status in different environments. To solve this problem, reconfigurable antenna, which can dynamically change its operation frequency, radiation pattern, and polarization, …


"Idilemmas" And Humanities Education: Redefining Technology Literacy Pedagogy And Practice, Steven Richard Watts May 2013

"Idilemmas" And Humanities Education: Redefining Technology Literacy Pedagogy And Practice, Steven Richard Watts

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Humanities educators at U.S. colleges and universities face sustained challenges in building effective technology literacy practices. As theories of technology literacy evolve, humanities topics are increasingly relevant in technology discussions, as rhetorical and critical analysis, textual analysis, and student learning theory are deeply embedded in current definitions of technology literacy. As such, humanities scholars have dramatic opportunities to become more involved in technology studies generally, and have a voice in technology policies that affect their institutions and students.

However, critical research, classroom teaching methods, and curricula in ICT literacy have fallen behind current needs, and many institutions struggle to define …


Peer-To-Peer Simulation Of Massive Virtual Environments, James Dean Mathias May 2012

Peer-To-Peer Simulation Of Massive Virtual Environments, James Dean Mathias

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Massively multiplayer games make up a large and growing segment of the computer game industry. One of the best known examples of these games is World of Warcraft, developed and published by Activision Blizzard. World of Warcraft boasts a subscriber base of over eleven million active subscribers, earning an estimated $1 billion dollars in 2010.

Some of the core issues for companies that publish these games are the cost of the computers, Internet bandwidth usage, and supporting technical staff. These costs easily reach hundreds of thousands of dollars each month, and in the case of World of Warcraft, millions of …