Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Software Engineering (10)
- Other Computer Sciences (7)
- Engineering (6)
- Artificial Intelligence and Robotics (5)
- Computer Engineering (4)
-
- Computer and Systems Architecture (4)
- OS and Networks (4)
- Numerical Analysis and Scientific Computing (3)
- Theory and Algorithms (3)
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Information Security (2)
- Other Computer Engineering (2)
- Applied Mathematics (1)
- Biomedical Engineering and Bioengineering (1)
- Business (1)
- Business Analytics (1)
- Computational Engineering (1)
- Data Science (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Graphics and Human Computer Interfaces (1)
- Medical Education (1)
- Medicine and Health Sciences (1)
- Other Applied Mathematics (1)
- Power and Energy (1)
- Programming Languages and Compilers (1)
- Keyword
-
- Cloud Computing (3)
- Distributed Systems (3)
- Trust (2)
- Application scaling (1)
- Architecture (1)
-
- Autoencoders (1)
- Autonomic Management (1)
- Autonomic Smart City Management System (1)
- Belief (1)
- CUDA (1)
- Cloud Simulators (1)
- Cloud computing (1)
- Cloud management (1)
- Cloudlet (1)
- Collaborative Management (1)
- Compliance (1)
- Component-based architecture (1)
- Data Reduction (1)
- Data Synchronization (1)
- Data centre management (1)
- Deep Learning (1)
- Dependability analysis (1)
- Distribution Grids (1)
- Domain adaptation (1)
- Edge Computing (1)
- Edge computing (1)
- Electrical Grids (1)
- Energy consumption (1)
- Energy management (1)
- Experience (1)
Articles 1 - 18 of 18
Full-Text Articles in Systems Architecture
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat
Electronic Thesis and Dissertation Repository
This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Electronic Thesis and Dissertation Repository
In this thesis, we present KLARAPTOR (Kernel LAunch parameters RAtional Program estimaTOR), a freely available tool to dynamically determine the values of kernel launch parameters of a CUDA kernel. We describe a technique for building a helper program, at the compile-time of a CUDA program, that is used at run-time to determine near-optimal kernel launch parameters for the kernels of that CUDA program. This technique leverages the MWP-CWP performance prediction model, runtime data parameters, and runtime hardware parameters to dynamically determine the launch parameters for each kernel invocation. This technique is implemented within the KLARAPTOR tool, utilizing the LLVM Pass …
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Electronic Thesis and Dissertation Repository
The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.
The synchronization protocol …
Defining Service Level Agreements In Serverless Computing, Mohamed Elsakhawy
Defining Service Level Agreements In Serverless Computing, Mohamed Elsakhawy
Electronic Thesis and Dissertation Repository
The emergence of serverless computing has brought significant advancements to the delivery of computing resources to cloud users. With the abstraction of infrastructure, ecosystem, and execution environments, users could focus on their code while relying on the cloud provider to manage the abstracted layers. In addition, desirable features such as autoscaling and high availability became a provider’s responsibility and can be adopted by the user's application at no extra overhead.
Despite such advancements, significant challenges must be overcome as applications transition from monolithic stand-alone deployments to the ephemeral and stateless microservice model of serverless computing. These challenges pertain to the …
Westernaccelerator:Rapid Development Of Microservices, Haoran Wei
Westernaccelerator:Rapid Development Of Microservices, Haoran Wei
Electronic Thesis and Dissertation Repository
Context & Motivation/problem: In the context that cloud platforms are widely adopted, Microservice Architecture (MSA) has quickly become the new paradigm for modern software development due to its great modularity, scalability, and resiliency, which fits well in the cloud environment. However, to embrace the benefits of MSA, organizations must overcome the challenges of adopting new methodologies and processes to deal with the extra development complexities that microservices created, e.g., establishing interface-based communication between distributed services and managing the configurations and locations of services. Consequently, creating a microservice-based application is relatively complex and effortful. Research Question: How to create a tool …
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel Alorbani
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel Alorbani
Electronic Thesis and Dissertation Repository
Today, smart city technology is being adopted by many municipal governments to improve their services and to adapt to growing and changing urban population. Implementing a smart city application can be one of the most challenging projects due to the complexity, requirements and constraints. Sensing devices and computing components can be numerous and heterogeneous. Increasingly, researchers working in the smart city arena are looking to leverage edge and cloud computing to support smart city development. This approach also brings a number of challenges. Two of the main challenges are resource allocation and load balancing of tasks associated with processing data …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Electronic Thesis and Dissertation Repository
Internet of Things is a massively growing field where billions of devices are connected to the Internet using different protocols and produce an enormous amount of data. The produced data is consumed and processed by different applications to make operations more efficient. Application development is challenging, especially when applications access sensor data since IoT devices use different communication protocols.
The existing IoT architectures address some of these challenges. This thesis proposes an IoT Middleware that provides applications with the abstraction required of IoT devices while distributing the processing of sensor data to provide a real-time or near real-time response and …
Haptics-Enabled, Gpu Augmented Surgical Simulation Platform For Glenoid Reaming, Vlad Popa
Haptics-Enabled, Gpu Augmented Surgical Simulation Platform For Glenoid Reaming, Vlad Popa
Electronic Thesis and Dissertation Repository
Surgical simulators are technological platforms that provide virtual substitutes to the current cadaver-based medical training models. The advantages of exposure to these devices have been thoroughly studied, with enhanced surgical proficiency being one of the assets gained after extensive use. While simulators have already penetrated numerous medical domains, the field of orthopedics remains stagnant despite a demand for the ability to practice uncommon surgeries, such as total shoulder arthroplasty (TSA). Here we extrapolate the algorithms of an inhouse software engine revolving around glenoid reaming, a critical step of TSA. The project’s purpose is to provide efficient techniques for future simulators, …
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Electronic Thesis and Dissertation Repository
Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Electronic Thesis and Dissertation Repository
More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models being …
Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran
Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran
Electronic Thesis and Dissertation Repository
Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by cloud computing paradigm, organizations are still wary of delegating their computation and storage to a cloud service provider due to trust concerns. The trust issues with the cloud can be addressed by a combination of regulatory frameworks and supporting technologies. Privacy Enhancing Technologies (PET) and remote attestation provide the technologies for addressing the trust concerns. PET provides proactive measures through cryptography and selective dissemination of data to the client. Remote attestation mechanisms provides reactive measures …
Proxy-Based Mobile Computing Infrastructure, Azade Khalaj
Proxy-Based Mobile Computing Infrastructure, Azade Khalaj
Electronic Thesis and Dissertation Repository
In recent years, there has been a huge growth in mobile applications. More mobile users are able to access Internet services via their mobile devices e.g., smartphones ans tablets. Some of these applications are highly interactive and resource intensive. Mobile applications, with limited storage capacity, slow processors and limited battery life, could be connected to the remote servers in clouds for leveraging resources. For example, weather applications use a remote service that collects weather data and make this data available through a well-defined API. This represents a static partitioning of functionality between mobile devices and a remote server that is …
Advances In Dynamic Virtualized Cloud Management, Michael Tighe
Advances In Dynamic Virtualized Cloud Management, Michael Tighe
Electronic Thesis and Dissertation Repository
Cloud computing continues to gain in popularity, with more and more applications being deployed into public and private clouds. Deploying an application in the cloud allows application owners to provision computing resources on-demand, and scale quickly to meet demand. An Infrastructure as a Service (IaaS) cloud provides low-level resources, in the form of virtual machines (VMs), to clients on a pay-per-use basis. The cloud provider (owner) can reduce costs by lowering power consumption. As a typical server can consume 50% or more of its peak power consumption when idle, this can be accomplished by consolidating client VMs onto as few …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Architecture Supporting Computational Trust Formation, Chern Har Yew
Architecture Supporting Computational Trust Formation, Chern Har Yew
Electronic Thesis and Dissertation Repository
Trust is a concept that has been used in computing to support better decision making. For example, trust can be used in access control. Trust can also be used to support service selection. Although certain elements of trust such as reputation has gained widespread acceptance, a general model of trust has so far not seen widespread usage. This is due to the challenges of implementing a general trust model. In this thesis, a middleware based approach is proposed to address the implementation challenges.
The thesis proposes a general trust model known as computational trust. Computational trust is based on research …