Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (3)
- Computer and Systems Architecture (3)
- Engineering (3)
- Databases and Information Systems (2)
- Information Security (2)
-
- Theory and Algorithms (2)
- Business (1)
- Controls and Control Theory (1)
- Data Storage Systems (1)
- Electrical and Computer Engineering (1)
- Geographic Information Sciences (1)
- Geography (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Technology and Innovation (1)
- Institution
- Keyword
-
- 3-tier (1)
- Bombardment (1)
- CAP Theorem (1)
- CAmkES (1)
- Case study (1)
-
- Cluster (1)
- Containerization (1)
- Cyber security (1)
- Docker (1)
- ETD (1)
- Embedded simulation (1)
- HPC (1)
- High performance computing (1)
- Hybrid Database (1)
- IDF (1)
- Ice sheet model (1)
- Interpolation (1)
- J2ee (1)
- JMeter (1)
- Kubernetes (1)
- Memcache (1)
- Model checking (1)
- Mpi (1)
- Nginx (1)
- NoSQL (1)
- Openmp (1)
- Parallel performance (1)
- Physical security (1)
- RDBMS (1)
- Redis (1)
Articles 1 - 8 of 8
Full-Text Articles in Systems Architecture
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Electronic Theses and Dissertations
This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …
A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen
A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen
Electronic Theses and Dissertations
Microservices architecture is popular for its distributive system styles due to the independent character of each of the services in the architecture. Microservices are built to be single and each service has its running process and interconnecting with a lightweight mechanism that called application programming interface (API). The interaction through microservices needs to communicate internally. Microservices are a service that is likely to become unreachable to its consumers because, in any distributed setup, communication will fail on occasions due to the number of messages passing between services. Failures can occur when the networks are unreliable, and thus the connections can …
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour
Improving The Performance Of Ice Sheet Modeling Through Embedded Simulation, Christopher G. Dufour
Electronic Theses and Dissertations
Understanding the impact of global climate change is a critical concern for society at large. One important piece of the climate puzzle is how large-scale ice sheets, such as those covering Greenland and Antarctica, respond to a warming climate. Given such ice sheets are under constant change, developing models that can accurately capture their dynamics represents a significant challenge to researchers. The problem, however, is properly capturing the dynamics of an ice sheet model requires a high model resolution and simulating these models is intractable even for state-of-the-art supercomputers.
This thesis presents a revolutionary approach to accurately capture ice sheet …
Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista
Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista
Electronic Theses and Dissertations
PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry.
PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as …
Accelerated Data Delivery Architecture, Michael L. Grecol
Accelerated Data Delivery Architecture, Michael L. Grecol
Electronic Theses and Dissertations
This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …
A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker
A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker
Electronic Theses and Dissertations
This thesis involves a case study in the use of parallelism to improve the performance of an application for computational research on molecules. The application, VASP, was migrated from a machine with 4 nodes and 16 single-threaded processors to a machine with 60 nodes and 120 dual-threaded processors. When initially migrated, VASP's performance deteriorated after about 17 processing elements (PEs), due to network contention. Subsequent modifications that restrict communication amongst VASP processes, together with additional support for threading, allowed VASP to scale up to 112 PEs, the maximum number that was tested. Other performance-enhancing optimizations that were attempted included replacing …
Arrow Symbols: Theory For Interpretation, Yohei Kurata
Arrow Symbols: Theory For Interpretation, Yohei Kurata
Electronic Theses and Dissertations
People often sketch diagrams when they communicate successfully among each other. Such an intuitive collaboration would also be possible with computers if the machines understood the meanings of the sketches. Arrow symbols are a frequent ingredient of such sketched diagrams. Due to the arrows’ versatility, however, it remains a challenging problem to make computers distinguish the various semantic roles of arrow symbols. The solution to this problem is highly desirable for more effective and user-friendly pen-based systems. This thesis, therefore, develops an algorithm for deducing the semantic roles of arrow symbols, called the arrow semantic interpreter (ASI). The …