Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Computer architecture (2)
- Java (Computer program language) (2)
- Accidents (1)
- Algebraic Reconstruction Technique (1)
- Arduino Uno Temperature Sensor Project (1)
-
- Block Iterative Projection (1)
- CCTV (1)
- CNN (1)
- CSUSB Master Project (1)
- Computer Science Master Project (1)
- Computer Science and Engineering Master Project (1)
- Computer networks (1)
- Computer science -- Mathematics (1)
- Crash detection (1)
- Deep Learning (1)
- Denial-of-service (DoS). Internet Control Message Protocol (ICMP). User Datagram Protocol (UDP). Open Systems Interconnection Layers Attacks (OSI). Self-Organize-Map (SOM). Multilayer perceptron (MLP). (1)
- Distributed operating systems (Computers) (1)
- ETL (1)
- Electronic data processing -- Distributed processing (1)
- Exchange Web Service (1)
- Framework (1)
- General Purpose Graphics Processing Unit (1)
- High performance processors (1)
- Internet (1)
- Laravel (1)
- Logic programming (Computer science) (1)
- MVC (1)
- Object-oriented (1)
- PHP and MySQL Temperature Sensor Project (1)
- Parallel programming (Computer science) (1)
Articles 1 - 9 of 9
Full-Text Articles in Systems Architecture
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Electronic Theses, Projects, and Dissertations
Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.
CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …
Extract Transform And Loading Tool For Email, Amit Rajiv Lawanghare
Extract Transform And Loading Tool For Email, Amit Rajiv Lawanghare
Electronic Theses, Projects, and Dissertations
This project focuses on applying Extract, Transform and Load (ETL) operations on the relational data exchanged via emails. An Email is an important form of communication by both personal and corporate means as it enables reliable and quick exchange. Many useful files are shared as a form of attachments which contains transactional/ relational data. This tool allows a user to write the filter conditions and lookup conditions on attachments; define the attribute map for attachments to the database table. The Data Cleansing for each attribute can be performed writing rules and their matching state. A user can add custom functions …
Custom T-Shirt Designs, Ranjan Khadka
Custom T-Shirt Designs, Ranjan Khadka
Electronic Theses, Projects, and Dissertations
Custom T-shirt Designs is a web-based application. The purpose of this project is to provide a website that would allow customers to be able to customize T-shirt and place an order of custom T-shirt. Customers can sign up, sign in, select T-shirt color, add text, choose Font, choose Font color, upload an image, apply filters to images, transform text or images, choose T-shirt size and save designs for future references. Customers would be able to add the design to a cart, manage cart and checkout with their credit card to purchase for the order and view their previous orders. The …
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Electronic Theses, Projects, and Dissertations
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
Electronic Theses, Projects, and Dissertations
In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.
The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …
Proton Computed Tomography: Matrix Data Generation Through General Purpose Graphics Processing Unit Reconstruction, Micah Witt
Electronic Theses, Projects, and Dissertations
Proton computed tomography (pCT) is an image modality that will improve treatment planning for patients receiving proton radiation therapy compared with the current techniques, which are based on X-ray CT. Images are reconstructed in pCT by solving a large and sparse system of linear equations. The size of the system necessitates matrix-partitioning and parallel reconstruction algorithms to be implemented across some sort of cluster computing architecture. The prototypical algorithm to solve the pCT system is the algebraic reconstruction technique (ART) that has been modified into parallel versions called block-iterative-projection (BIP) methods and string-averaging-projection (SAP) methods. General purpose graphics processing units …
Multi-Core Processors And The Future Of Parallelism In Software, Ryan Christopher Youngman
Multi-Core Processors And The Future Of Parallelism In Software, Ryan Christopher Youngman
Theses Digitization Project
The purpose of this thesis is to examine multi-core technology. Multi-core architecture provides benefits such as less power consumption, scalability, and improved application performance enabled by thread-level parallelism.
A Multi-Agent Architecture For Internet Distributed Computing System, Rodelyn Reyes Samson
A Multi-Agent Architecture For Internet Distributed Computing System, Rodelyn Reyes Samson
Theses Digitization Project
This thesis presents the developed taxonomy of the agent-based distributed computing systems. Based on this taxonomy, a design, implementation, analysis and distribution protocol of a multi-agent architecture for internet-based distributed computing system was developed. A prototype of the designed architecture was implemented on Spider III using the IBM Aglets software development kit (ASDK 2.0) and the language Java.
A Tabular Propositional Logic: And/Or Table Translator, Chen-Hsiu Lee
A Tabular Propositional Logic: And/Or Table Translator, Chen-Hsiu Lee
Theses Digitization Project
The goal of this project is to design a tool to help users translate any logic statement into Disjunctive Normal Form and present the result as an AND/OR TABLE, which makes the logic relation easier to express by using a two-dimensional grid of values or expressions. This tool is implemented through a web-based and Java-based application. Thus, the user can utilize this tool via World Wide Web.