Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 89

Full-Text Articles in Engineering

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar Dec 2022

The Metaverse: A Virtual World In The Palm Of Your Hand, Ziad Doughan, Hadi Al Mubasher, Mustafa El Bizri, Ali Haidar

BAU Journal - Science and Technology

This paper explores the actual and future impact of the Metaverse as a virtual space. Thus, it focuses the probe on the technical challenges that face this everlasting emerging technology. Today, the Metaverse presents a digital environment to build collective architecture and historical heritage in a virtual space. In this digital world, the modeling and design methodology is based on individual archetypes that can puzzle new elements. Currently, traditional methods require change and adaptation in both the education and work market, especially due to the remote-work integration in the last few years. For example, many components are required to build …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak Dec 2022

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li Dec 2022

A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li

Master of Science in Software Engineering Theses

Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …


Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson Dec 2022

Development Of Directed Randomization For Discussing A Minimal Security Architecture, Henrique Oyama, Dominic Messina, Keshav Kasturi Rangan, Akkarakaran Francis Leonard, Kip Nieman, Helen Durand, Katie Tyrrell, Katrina Hinzman, Michael Williamson

Chemical Engineering and Materials Science Faculty Research Publications

Strategies for mitigating the impacts of cyberattacks on control systems using a control-oriented perspective have become of greater interest in recent years. Our group has contributed to this trend by developing several methods for detecting cyberattacks on process sensors, actuators, or both sensors and actuators simultaneously using an advanced optimization-based control strategy known as Lyapunov-based economic model predictive control (LEMPC). However, each technique comes with benefits and limitations, both with respect to one another and with respect to traditional information technology and computer science-type approaches to cybersecurity. An important question to ask, therefore, is what the goal should be of …


Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst Dec 2022

Applying Hls To Fpga Data Preprocessing In The Advanced Particle-Astrophysics Telescope, Meagan Konst

McKelvey School of Engineering Theses & Dissertations

The Advanced Particle-astrophysics Telescope (APT) and its preliminary iteration the Antarctic Demonstrator for APT (ADAPT) are highly collaborative projects that seek to capture gamma-ray emissions. Along with dark matter and ultra-heavy cosmic ray nuclei measurements, APT will provide sub-degree localization and polarization measurements for gamma-ray transients. This will allow for devices on Earth to point to the direction from which the gamma-ray transients originated in order to collect additional data. The data collection process is as follows. A scintillation occurs and is detected by the wavelength-shifting fibers. This signal is then read by an ASIC and stored in an ADC …


Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal Dec 2022

Benchmarking Of Embedded Object Detection In Optical And Radar Scenes, Vijaysrinivas Rajagopal

Masters Theses

A portable, real-time vital sign estimation protoype is developed using neural network- based localization, multi-object tracking, and embedded processing optimizations. The system estimates heart and respiration rates of multiple subjects using directional of arrival techniques on RADAR data. This system is useful in many civilian and military applications including search and rescue.

The primary contribution from this work is the implementation and benchmarking of neural networks for real time detection and localization on various systems including the testing of eight neural networks on a discrete GPU and Jetson Xavier devices. Mean average precision (mAP) and inference speed benchmarks were performed. …


A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen Dec 2022

A Design Of A Digital Lockout Tagout System With Machine Learning, Brandon H. Chen

Master's Theses

Lockout Tagout (LOTO) is a safety procedure instated by the Occupational Safety and Health Administration (OSHA) when doing maintenance on dangerous machinery and hazardous power sources. In this procedure, authorized workers shut off the machinery and use physical locks and tags to prevent operation during maintenance. LOTO has been the industry standard for 32 years since it was instantiated, being used in many different industries such as industrial work, mining, and agriculture. However, LOTO is not without its issues. The LOTO procedure requires employees to be trained and is prone to human error. As well, there is a clash between …


Scalable Data-Driven Predictive Modeling And Analytics For Cho Process Development Optimization, Sarah Mbiki Dec 2022

Scalable Data-Driven Predictive Modeling And Analytics For Cho Process Development Optimization, Sarah Mbiki

All Dissertations

In 1982, the FDA approved the first recombinant therapeutic protein, and since then, the biopharmaceutical industry has continued to develop innovative and highly effective biological drugs for various illnesses1. These drugs are produced using host organisms that are modified to hold the genetic encoding of the targeted protein1. Of the many host organisms, Chinese hamster ovary (CHO) cells are often used due to capability to perform posttranslational modification (PTM): which allows human-like synthesis of proteins unlikely to invoke immunogenicity in humans 1,2.

Despite all the positive attributes, many challenges are associated with CHO cell cultures, …


Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss Nov 2022

Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss

KSU Proceedings on Cybersecurity Education, Research and Practice

Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …


Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte Nov 2022

Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte

LSU Doctoral Dissertations

Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …


Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus Oct 2022

Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus

World Maritime University Dissertations

No abstract provided.


Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu Oct 2022

Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu

World Maritime University Dissertations

No abstract provided.


The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga Oct 2022

The Determination Of Port Automation Levels Using An Analytic Hierarchical Process : A Case Study For The Port Of Colombo, Waruna Lasantha De Silva Amarathunga

World Maritime University Dissertations

No abstract provided.


The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu Oct 2022

The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu

World Maritime University Dissertations

No abstract provided.


Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti Oct 2022

Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti

Engineering Faculty Articles and Research

Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …


Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang Sep 2022

Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang

Publications

Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.


Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt Sep 2022

Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt

Judicature International

No abstract provided.


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet Aug 2022

Using Design Science Research To Create A Virtual Environment For Nursing Students, Benjamin Botha, Lizette De Wet

African Conference on Information Systems and Technology

This paper aims to provide insight into the design science research approach followed during a transdisciplinary research study between computer scientists and professional nurses. The researchers used a design science research approach to create a virtual environment where nursing students could practice managing a patient with a foreign object in the right lung. The virtual environment underwent multiple changes as it progressed through the different cycles of design science research. Within these cycles, namely the relevance, design, and rigor cycle, various iterations of each of the cycles took place. Presented in this paper the design science approach followed will be …


Evaluating Serverless Computing, Charitra Maharjan Aug 2022

Evaluating Serverless Computing, Charitra Maharjan

LSU Master's Theses

Function as a Service (FaaS) is gaining admiration because of its way of deploying the computations to serverless backends in the different clouds. It transfers the complexity of provisioning and allocating the necessary resources for an application to the cloud providers. The cloud providers also give an illusion of always availability of resources to the users. Among the cloud providers, AWS serverless platform offers a new paradigm for developing cloud applications without worrying about the underlying hardware infrastructure. It manages not only the resource provisioning and scaling of an application but also provides an opportunity to reimagine the cloud infrastructure …


A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi Aug 2022

A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi

Graduate Theses and Dissertations

Low latency inferencing is of paramount importance to a wide range of real time and userfacing Machine Learning (ML) applications. Field Programmable Gate Arrays (FPGAs) offer unique advantages in delivering low latency as well as energy efficient accelertors for low latency inferencing. Unfortunately, creating machine learning accelerators in FPGAs is not easy, requiring the use of vendor specific CAD tools and low level digital and hardware microarchitecture design knowledge that the majority of ML researchers do not possess. The continued refinement of High Level Synthesis (HLS) tools can reduce but not eliminate the need for hardware-specific design knowledge. The designs …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar Aug 2022

Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar

University of New Orleans Theses and Dissertations

Parallel computing plays a crucial role in processing large-scale graph data. Complex network analysis is an exciting area of research for many applications in different scientific domains e.g., sociology, biology, online media, recommendation systems and many more. Graph mining is an area of interest with diverse problems from different domains of our daily life. Due to the advancement of data and computing technologies, graph data is growing at an enormous rate, for example, the number of links in social networks is growing every millisecond. Machine/Deep learning plays a significant role for technological accomplishments to work with big data in modern …


The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan Jul 2022

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2022

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon Jun 2022

A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon

FIU Electronic Theses and Dissertations

With the recent developments of communication technologies surrounding vehicles, we witness the simultaneous availability of multiple onboard communication interfaces on vehicles. While most of the current interfaces already include Bluetooth, WiFi, and LTE, they are augmented further by IEEE 802.11p and the 5G interfaces, which will serve for safety, maintenance, and infotainment applications. However, dynamic management of interfaces depending on application needs becomes a significant issue that can be best addressed by Software Defined Networking (SDN) capabilities. While SDN-based vehicular networks have been promoted previously, none of these works deal with practical challenges. In this thesis, we propose and develop …


Improving The Programmability Of Networked Energy Systems, Noman Bashir Jun 2022

Improving The Programmability Of Networked Energy Systems, Noman Bashir

Doctoral Dissertations

Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …


Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg Jun 2022

Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg

Computer Engineering

This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.


Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers, Nicholas O'Toole Jun 2022

Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers, Nicholas O'Toole

Honors Theses

My research looks into the use of ”presets” in digital synthesizers, which alter the timbre (quality) of the synthesizer’s sound by loading in pre-selected configurations of settings. My study compares imagery- based and feelings-based preset names – for example, Cloud City Keys and Mellow lead, respectively – in an attempt to see which better predicts the sound it represents. Through my results, I will then explain how the wording of these preset names affected my subjects’ perception of certain sounds. The results I found lead me to believe that imagery-based preset names could be representative of their respective presets’ sounds.