Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithm (1)
- Bluetooth (1)
- Comparison (1)
- E-ink (1)
- EDA Tool for Power Electronics (1)
-
- Heuristic (1)
- Inventory tracking (1)
- Low energy (1)
- NIDS (1)
- Performance (1)
- Power Module Layout Optimization (1)
- Power-CAD (1)
- PowerSynth (1)
- Project management (1)
- Quadratic Assignment Problem (1)
- Rules (1)
- Snort (1)
- Software engineering frameworks (1)
- Software engineering methodologies (1)
- Suricata (1)
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Constraint-Aware, Scalable, And Efficient Algorithms For Multi-Chip Power Module Layout Optimization, Imam Al Razi
Constraint-Aware, Scalable, And Efficient Algorithms For Multi-Chip Power Module Layout Optimization, Imam Al Razi
Graduate Theses and Dissertations
Moving towards an electrified world requires ultra high-density power converters. Electric vehicles, electrified aerospace, data centers, etc. are just a few fields among wide application areas of power electronic systems, where high-density power converters are essential. As a critical part of these power converters, power semiconductor modules and their layout optimization has been identified as a crucial step in achieving the maximum performance and density for wide bandgap technologies (i.e., GaN and SiC). New packaging technologies are also introduced to produce reliable and efficient multichip power module (MCPM) designs to push the current limits. The complexity of the emerging MCPM …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan
Computer Science and Computer Engineering Undergraduate Honors Theses
The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.
Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch
Implementing The Cms+ Sports Rankings Algorithm In A Javafx Environment, Luke Welch
Industrial Engineering Undergraduate Honors Theses
Every year, sports teams and athletes get cut from championship opportunities because of their rank. While this reality is easier to swallow if a team or athlete is distant from the cut, it is much harder when they are right on the edge. Many times, it leaves fans and athletes wondering, “Why wasn’t I ranked higher? What factors when into the ranking? Are the rankings based on opinion alone?” These are fair questions that deserve an answer. Many times, sports rankings are derived from opinion polls. Other times, they are derived from a combination of opinion polls and measured performance. …
A Study Of Software Development Methodologies, Kendra Risener
A Study Of Software Development Methodologies, Kendra Risener
Computer Science and Computer Engineering Undergraduate Honors Theses
Software development methodologies are often overlooked by software engineers as aspects of development that are handled by project managers alone. However, if every member of the team better understood the development methodology being used, it increases the likelihood that the method is properly implemented and ultimately used to complete the project more efficiently. Thus, this paper seeks to explore six common methodologies: the Waterfall Model, the Spiral Model, Agile, Scrum, Kanban, and Extreme Programming. These are discussed in two main sections in the paper. In the first section, the frameworks are isolated and viewed by themselves. The histories, unique features, …