Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Software Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 278

Full-Text Articles in Systems Architecture

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales Apr 2024

Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales

ATU Research Symposium

Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …


The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity Jan 2024

The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity

Arkansas Law Review

As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.


Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat Dec 2023

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat

Electronic Thesis and Dissertation Repository

This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …


Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li Aug 2023

Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li

Doctoral Dissertations

In the realm of distributed computing, collective operations involve coordinated communication and synchronization among multiple processing units, enabling efficient data exchange and collaboration. Scientific applications, such as simulations, computational fluid dynamics, and scalable deep learning, require complex computations that can be parallelized across multiple nodes in a distributed system. These applications often involve data-dependent communication patterns, where collective operations are critical for achieving high performance in data exchange. Optimizing collective operations for scientific applications and deep learning involves improving the algorithms, communication patterns, and data distribution strategies to minimize communication overhead and maximize computational efficiency.

Within the context of this …


Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb Jul 2023

Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb

Engineering Faculty Articles and Research

Pavement defects such as cracks, net cracks, and pit slots can cause potential traffic safety problems. The timely detection and identification play a key role in reducing the harm of various pavement defects. Particularly, the recent development in deep learning-based CNNs has shown competitive performance in image detection and classification. To detect pavement defects automatically and improve effects, a multi-scale mobile attention-based network, which we termed MANet, is proposed to perform the detection of pavement defects. The architecture of the encoder-decoder is used in MANet, where the encoder adopts the MobileNet as the backbone network to extract pavement defect features. …


Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani Jun 2023

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani

Electronic Thesis and Dissertation Repository

In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …


Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin Apr 2023

Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin

ATU Research Symposium

The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy Feb 2023

An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy

Theses and Dissertations

In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …


Fortifying The Seams Of Software Systems, Hong Jin Kang Jan 2023

Fortifying The Seams Of Software Systems, Hong Jin Kang

Dissertations and Theses Collection (Open Access)

A seam in software is a place where two components within a software system meet. There are more seams in software now than ever before as modern software systems rely extensively on third-party software components, e.g., libraries. Due to the increasing complexity of software systems, understanding and improving the reliability of these components and their use is crucial. While the use of software components eases the development process, it also introduces challenges due to the interaction between the components.

This dissertation tackles problems associated with software reliability when using third-party software components. Developers write programs that interact with libraries through …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Unoapi: Balancing Performance, Portability, And Productivity (P3) In Hpc Education, Konstantin Laufer, George K. Thiruvathukal Nov 2022

Unoapi: Balancing Performance, Portability, And Productivity (P3) In Hpc Education, Konstantin Laufer, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

oneAPI is a major initiative by Intel aimed at making it easier to program heterogeneous architectures used in high-performance computing using a unified application programming interface (API). While raising the abstraction level via a unified API represents a promising step for the current generation of students and practitioners to embrace high- performance computing, we argue that a curriculum of well- developed software engineering methods and well-crafted exem- plars will be necessary to ensure interest by this audience and those who teach them. We aim to bridge the gap by developing a curriculum—codenamed UnoAPI—that takes a more holistic approach by looking …


Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt Aug 2022

Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt

Theses and Dissertations

Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …


Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg Jun 2022

Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg

Computer Engineering

This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.


Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee May 2022

Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee

Masters Theses & Doctoral Dissertations

Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be …


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover May 2022

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …


Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Apr 2022

Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by limiting maintenance …


Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero Apr 2022

Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero

Symposium of Student Scholars

The higher education sector has been heavily impacted financially by the economic downturn caused by the pandemic that has resulted a decline in student enrollments. Finding cost-effective novel technology for storing and sharing student's credentials among academic institutions and potential employers is a demand. Within the current conventional approach, ensuring authentication of a candidate’s credentials is costly and time-consuming which gives burdens to thousands of prospective students and potential employees. As a result, candidates fail to secure opportunities for either delay or non-submission of credentials all over the world. Blockchain technology has the potential for students' control over their credentials; …


A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar Apr 2022

A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar

Symposium of Student Scholars

The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.

In this work, we provide an overview of data mining and …


Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum Apr 2022

Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum

LSU Master's Theses

Online Professor Reputation (OPR) systems, such as RateMyProfessors.com (RMP), are frequently used by college students to post and access peer evaluations of their pro- fessors. However, recent evidence has shown that these platforms suffer from major bias problems. Failing to address bias in online professor ratings not only leads to negative expectations and experiences in class, but also poor performance on exams. To address these concerns, in this thesis, we study bias in OPR systems from a software design point of view. At the first phase of our analysis, we conduct a systematic literature review of 23 interdisciplinary studies on …


Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte Apr 2022

Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte

Electronic Thesis and Dissertation Repository

The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.

The synchronization protocol …


Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee Apr 2022

Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee

Masters Theses & Doctoral Dissertations

Along with the popularity of gamification, there has been increased interest in using leaderboards to promote engagement with online learning systems. The existing literature suggests that when leaderboards are designed well they have the potential to improve learning, but qualitative investigations are required in order to reveal design principles that will improve engagement. In order to address this gap, this qualitative study aims to explore students' overall perceptions of popular leaderboard designs in a gamified, online discussion. Using two leaderboards reflecting performance in an online discussion, this study evaluated multiple leaderboard designs from student interviews and other data sources regarding …


Improving Adversarial Attacks Against Malconv, Justin Burr Mar 2022

Improving Adversarial Attacks Against Malconv, Justin Burr

Masters Theses & Doctoral Dissertations

This dissertation proposes several improvements to existing adversarial attacks against MalConv, a raw-byte malware classifier for Windows PE files. The included contributions greatly improve the success rates and performance of gradient-based file overlay attacks. All improvements are included in a new open-source attack utility called BitCamo.

Several new payload initialization strategies for use with gradient-based attacks are proposed and evaluated as potential replacements for the randomized initialization method used by current attacks. An algorithm for determining the optimal payload size is also proposed. The resulting improvements achieve a 100% evasion rate against eligible target executables using an average payload size …


A Just Energy Transition Requires Research At The Intersection Of Policy And Technology, Erin Baker Jan 2022

A Just Energy Transition Requires Research At The Intersection Of Policy And Technology, Erin Baker

Publications

The current energy system, in the US and around the world, is rife with inequities. The coming energy transition to a low carbon world has the potential to right some of these; but, without intention, it is more likely to perpetuate the current inequities. Enabling a just energy transition will require multiple categories of action, including fair policies and regulations; data and metrics; and knowledge generation. I focus on this last point, and particularly research at intersection of energy technology and social equity.


Data-Driven Decarbonization Of Residential Heating Systems: An Equity Perspective., John Wamburu, Emma Grazier, David Irwin, Christine Crago, Prashant Shenoy Jan 2022

Data-Driven Decarbonization Of Residential Heating Systems: An Equity Perspective., John Wamburu, Emma Grazier, David Irwin, Christine Crago, Prashant Shenoy

Publications

Since heating buildings using natural gas, propane and oil makes up a significant proportion of the aggregate carbon emissions every year, there is a strong interest in decarbonizing residential heating systems using new technologies such as electric heat pumps. In this poster, we conduct a data-driven optimization study to analyze the potential of replacing gas heating with electric heat pumps to reduce carbon emissions in a city-wide distribution grid. We seek to not only reduce the carbon footprint of residential heating, but also show how to do so equitably. Our results show that lower income homes have an energy usage …


Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza Jan 2022

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza

Publications

The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …


Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein Jan 2022

Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein

Computer Science Faculty Research

We consider a power-down system with two states—“on” and “off”—and a continuous set of power states. The system has to respond to requests for service in the “on” state and, after service, the system can power off or switch to any of the intermediate power-saving states. The choice of states determines the cost to power on for subsequent requests. The protocol for requests is “online”, which means that the decision as to which intermediate state (or the off-state) the system will switch has to be made without knowledge of future requests. We model a linear and a non-linear system, and …


A New Way To Make Music: Processing Digital Audio In Virtual Reality, Gavin E. Payne Jan 2022

A New Way To Make Music: Processing Digital Audio In Virtual Reality, Gavin E. Payne

Senior Projects Spring 2022

The work of this project attempts to provide new methods of creating music with technology. The product, Fields, is a functional piece of virtual reality software, providing users an immersive and interactive set of tools used to build and design instruments in a modular manner. Each virtual tool is analogous to musical hardware such as guitar pedals, synthesizers, or samplers, and can be thought of as an effect or instrument on its own. Specific configurations of these virtual audio effects can then be played to produce music, and then even saved by the user to load up and play with …