Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 62

Full-Text Articles in Systems Architecture

Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal Aug 2018

Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal

Dissertations and Theses Collection (Open Access)

Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).


Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred Jan 2018

Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred

Williams Honors College, Honors Research Projects

Mikyla Wilfred

Major: Computer Science

Project Sponsor: Dr. Collard

Number of Project Credits: 3

Smart-Teleprompter

The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang Dec 2016

Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang

University of New Orleans Theses and Dissertations

Nowadays, many applications are continuously generating large-scale geospatial data. Vehicle GPS tracking data, aerial surveillance drones, LiDAR (Light Detection and Ranging), world-wide spatial networks, and high resolution optical or Synthetic Aperture Radar imagery data all generate a huge amount of geospatial data. However, as data collection increases our ability to process this large-scale geospatial data in a flexible fashion is still limited. We propose a framework for processing and analyzing large-scale geospatial and environmental data using a “Big Data” infrastructure. Existing Big Data solutions do not include a specific mechanism to analyze large-scale geospatial data. In this work, we extend …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi Oct 2015

Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi

All Capstone Projects

Smart Inventory Management System is an online software application which fulfills the requirement of a typical Stock Analysis in various godowns. It provides the interface to users in a graphical way to manage the daily transactions as well as historical data. Also provides the management reports like monthly inwards, monthly deliveries and monthly returns. This application maintains the centralized database so that any changes done at a location reflects immediately. This is an online tool so more than one user can login into system and use the tool simultaneously. The aim of this application is to reduce the manual effort …


Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity Oct 2015

Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity

All Capstone Projects

This project is Online Dorms Systems which allows users to book their room in the dorm from anywhere; this is an automated system where the user can search the availability of rooms in the dorm.

The search can be done based on the dates. The rooms that available are come with the status available, it will display all the rooms available as of that particular search date. Once the room has been booked the user can cancel the reservation within 48 hours. And there is concept of user login. As the user creates his own account with his email id, …


E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana Oct 2015

E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana

All Capstone Projects

The E-Class Room system is a web based project. An educational institution in India is understaffed and has limited interaction among faculty, student and industry experts. The project is to provide an online platform for the students and faculty of the institution to enhance their educational needs and to share their learning with their fellow students, faculty or industrial experts. It aims to provide a platform for mutual cooperation between different kinds of learning. The new system will provide directional way for online learning between faculty, student and industrial experts.


A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li Aug 2015

A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li

Doctoral Dissertations

Today, the ability to process "big data" has become crucial to the information needs of many enterprise businesses, scientific applications, and governments. Recently, there have been increasing needs of processing data that is not only "big" but also "fast". Here "fast data" refers to high-speed real-time and near real-time data streams, such as Twitter feeds, search query streams, click streams, impressions, and system logs. To handle both historical data and real-time data, many companies have to maintain multiple systems. However, recent real-world case studies show that maintaining multiple systems cause not only code duplication, but also intensive manual work to …


Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang Jul 2015

Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang

Masters Theses

The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.


Index Strategies For Efficient And Effective Entity Search, Huy T. Vu May 2015

Index Strategies For Efficient And Effective Entity Search, Huy T. Vu

Master's Projects

The volume of structured data has rapidly grown in recent years, when data-entity emerged as an abstraction that captures almost every data pieces. As a result, searching for a desired piece of information on the web could be a challenge in term of time and relevancy because the number of matching entities could be very large for a given query. This project concerns with the efficiency and effectiveness of such entity queries. The work contains two major parts: implement inverted indexing strategies so that queries can be searched in minimal time, and rank results based on features that are independent …


A Scalable Search Engine Aggregator, Pooja Mishra May 2015

A Scalable Search Engine Aggregator, Pooja Mishra

Master's Projects

The ability to display different media sources in an appropriate way is an integral part of search engines such as Google, Yahoo, and Bing, as well as social networking sites like Facebook, etc. This project explores and implements various media-updating features of the open source search engine Yioop [1]. These include news aggregation, video conversion and email distribution. An older, preexisting news update feature of Yioop was modified and scaled so that it can work on many machines. We redesigned and modified the user interface associated with a distributed news updater feature in Yioop. This project also introduced a video …


An Open Source Advertisement Server, Pushkar Umaranikar May 2015

An Open Source Advertisement Server, Pushkar Umaranikar

Master's Projects

This report describes a new online advertisement system and its implementation for the Yioop open source search engine. This system was implemented for my CS298 project. It supports both selling advertisements and displaying them within search results. The selling of advertisement is done using a novel auction system, which we describe in this paper. With this auction system, it is possible to create an advertisement, attach keywords to it, and add it to the advertisement inventory. An advertisement is displayed on a search results page if the search keyword matches the keywords attached to the advertisement. Display of advertisements is …


Instamapp, Andrew Dicosmo, Preethi Reddy, Venkat Nischey Apr 2015

Instamapp, Andrew Dicosmo, Preethi Reddy, Venkat Nischey

All Capstone Projects

InstaMapp is a web application we started building in fall 2014. This application is intended for anyone who wants to locate a product from a department store. Anyone who would like to print or view a shopping list with aisle or department locations. Currently there isn’t a reliable application out that that exist in the technology space. InstaMapp currently integrates with Walmart’s API and supports a responsive design for mobile devices.

During fall 2014, we built a proof of concept on Microsoft Windows Azure websites integrating with Intel Mashery Services for the API. We used the following Languages: PHP, JQuery, …


Big Data Analytics By Using Hadoop, Chaitanya Arava, Sudharshan Bandaru, Saradhi Bhargava Reddy Tiyyagura Apr 2015

Big Data Analytics By Using Hadoop, Chaitanya Arava, Sudharshan Bandaru, Saradhi Bhargava Reddy Tiyyagura

All Capstone Projects

Data is large and vast, with more data coming into the system every day. Summarization analytics are all about grouping similar data together and then performing an operation such as calculating a statistic, building an index, or just simply counting.

Filtering is more about understanding a smaller piece of your data, such as all records generated from a particular user, or the top ten most used verbs in a corpus of text. In short, filtering allows you to apply a microscope to your data. It can also be considered a form of search.

Hadoop allows us to modify the way …


Hadoop "The Emerging Tool In The Present Scenario For Accessing The Large Sets Of Data", Chandra Kiran Movva, Tejaswi Sura, Ranjith Reddy Thipparthi Apr 2015

Hadoop "The Emerging Tool In The Present Scenario For Accessing The Large Sets Of Data", Chandra Kiran Movva, Tejaswi Sura, Ranjith Reddy Thipparthi

All Capstone Projects

Hadoop is one of the tools designed to handle big data. Hadoop and other software products work to interpret or parse the results of big data searches through specific proprietary algorithms and methods. Hadoop is an open-source program under the Apache license that is maintained by a global community of users. It includes various main components, including a MapReduce set of functions and a Hadoop distributed file system (HDFS). The idea behind MapReduce is that Hadoop can first map a large data set, and then perform a reduction on that content for specific results. A reduce function can be thought …


A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio Mar 2015

A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio

Electronic Theses, Projects, and Dissertations

In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.

The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …


Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan Jan 2015

Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan

CCE Theses and Dissertations

The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …


An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns Jan 2015

An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns

Computational and Data Sciences Theses

In the age of online courses and digital textbooks, several areas of academia, such as special education, are far behind in the technological revolution. Some teachers use long unstructured digital documents, while others maintain large physical files for students containing every piece of information or coursework they have ever received. Could these extremely unstructured approaches to data collection and aggregation be streamlined with a software platform built specifically for this purpose? Could this platform also be built to accommodate multiple integrations and practical new features? Most importantly, in terms of usability, would this software be enjoyable to use? The Autism …


Design And Implementation Of E-Commerce Site For Online Shopping, Sidhartha Reddy Vatrapu Jan 2014

Design And Implementation Of E-Commerce Site For Online Shopping, Sidhartha Reddy Vatrapu

All Capstone Projects

In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.

Online Shopping is a lifestyle e-commerce web application, which retails various fashion and lifestyle products (Currently Men’s Wear). This project allows viewing various products available enables registered users to purchase desired products instantly using PayPal payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to …


Virtualization-Based System Hardening Against Untrusted Kernels, Yueqiang Cheng Jan 2014

Virtualization-Based System Hardening Against Untrusted Kernels, Yueqiang Cheng

Dissertations and Theses Collection (Open Access)

Applications are integral to our daily lives to help us processing sensitive I/O data, such as individual passwords and camera streams, and private application data, such as financial information and medical reports. However, applications and sensitive data all surfer from the attacks from kernel rootkits in the traditional architecture, where the commodity OS that is supposed to be the secure foothold of the system is routinely compromised due to the large code base and the broad attack surface. Fortunately, the virtualization technology has significantly reshaped the landscape of the modern computer system, and provides a variety of new opportunities for …


Accelerated Data Delivery Architecture, Michael L. Grecol Jan 2013

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …


A Software Framework For Augmentative And Alternative Communication, Adam Loup May 2012

A Software Framework For Augmentative And Alternative Communication, Adam Loup

University of New Orleans Theses and Dissertations

By combining context awareness and analytical based relevance computing software, the proposed Augmentative and Alternative Communication (AAC) framework aims provide a foundation to create communication systems to dramatically increase the words available to AAC users. The framework will allow the lexicon available to the user to be dynamically updated by varying sources and to promote words based on contextual relevance. This level of customization enables the development of highly customizable AAC devices that evolve with use to become more personal while also broadening the expressiveness of the user. In order to maximize the efficient creation of conversation for AAC users, …


Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris Apr 2012

Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris

Doctoral Dissertations and Master's Theses

This study was conducted to investigate the effect of smart parking systems (SPS) on parking search times (PST) in large parking lots. SPSs are systems that disseminate real-time parking spot availability to drivers searching for parking. The literature review revealed discrete event simulation (DES) to be a suitable tool for studying the dynamic behavior in parking lots. The parking lot selected for data collection was a university parking lot with 234 spaces. The data collected included arrival rates, departure rates, the geometric properties of the parking lot, preferred parking search strategies, and driving speeds. Arena 13.9, by Rockwell Automation, Inc, …


A Data-Descriptive Feedback Framework For Data Stream Management Systems, Rafael J. Fernández Moctezuma Jan 2012

A Data-Descriptive Feedback Framework For Data Stream Management Systems, Rafael J. Fernández Moctezuma

Dissertations and Theses

Data Stream Management Systems (DSMSs) provide support for continuous query evaluation over data streams. Data streams provide processing challenges due to their unbounded nature and varying characteristics, such as rate and density fluctuations. DSMSs need to adapt stream processing to these changes within certain constraints, such as available computational resources and minimum latency requirements in producing results. The proposed research develops an inter-operator feedback framework, where opportunities for run-time adaptation of stream processing are expressed in terms of descriptions of substreams and actions applicable to the substreams, called feedback punctuations. Both the discovery of adaptation opportunities and the exploitation of …


Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave Dec 2011

Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis will discuss feature selection algorithms for text-categorization. Feature selection algorithms are very important, as they can make-or-break a categorization engine. The feature selection algorithms that will be discussed in this thesis are Document Frequency, Information Gain, Chi Squared, Mutual Information, NGL (Ng-Goh-Low) coefficient, and GSS (Galavotti-Sebastiani-Simi) coefficient . The general idea of any feature selection algorithm is to determine importance of words using some measure that can keep informative words, and remove non-informative words, which can then help the text-categorization engine categorize a document, D , into some category, C . These feature selection methods are explained, implemented, …


Consolidated Study On Query Expansion, Abhishek Biruduraju Dec 2011

Consolidated Study On Query Expansion, Abhishek Biruduraju

UNLV Theses, Dissertations, Professional Papers, and Capstones

A typical day of million web users all over the world starts with a simple query. The quest for information on a particular topic drives them to search for it, and in the pursuit of their info the terms they supply for queries varies from person to person depending on the knowledge they have. With a vast collection of documents available on the web universe it is the onus of the retrieval system to return only those documents that are relevant and satisfy the user’s search requirements. The document mismatch problem is resolved by appending extra query terms to the …


Arrow Symbols: Theory For Interpretation, Yohei Kurata May 2007

Arrow Symbols: Theory For Interpretation, Yohei Kurata

Electronic Theses and Dissertations

People often sketch diagrams when they communicate successfully among each other. Such an intuitive collaboration would also be possible with computers if the machines understood the meanings of the sketches. Arrow symbols are a frequent ingredient of such sketched diagrams. Due to the arrows’ versatility, however, it remains a challenging problem to make computers distinguish the various semantic roles of arrow symbols. The solution to this problem is highly desirable for more effective and user-friendly pen-based systems. This thesis, therefore, develops an algorithm for deducing the semantic roles of arrow symbols, called the arrow semantic interpreter (ASI). The …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


A Toolkit For Xml-Based And Process-Oriented Application Integration, Volker Münch Jan 2004

A Toolkit For Xml-Based And Process-Oriented Application Integration, Volker Münch

Theses

Systems integration is hard work; different architectures with different interfaces and an innumerable amount of Legacy applications with non-standard interfaces exist. However the needs to meet changing business requirements and to implement faster and optimised procedures within an enterprise and in cooperation with other external enterprises mean that there is a continuing demand for such integration strategies and products. Integration was often an activity separate from system development and could not be accomplished without re-involving system designers and developers. Such a process is therefore inefficient and costly. This thesis proposes a process-oriented integration strategy that combines the tasks of integration …