Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2015

Discipline
Institution
Keyword
Publication

Articles 1 - 28 of 28

Full-Text Articles in Systems Architecture

Pthreads Profiler, Ryan Van Quinlan Dec 2015

Pthreads Profiler, Ryan Van Quinlan

Computer Science and Software Engineering

The goal of this senior project was to design and implement a program which would allow users to profile programs that utilize the Pthreads library. This profiler allows users to measure load balance and lock contention between threads as well as discover deadlocks. These tools can be essential to developers of multi-threaded applications, which are notoriously difficult to debug. Additionally, this tool can help find vital performance benefits by providing relative execution measurements. The profiler is written in C++ and utilizes the standard template library as well as glibc extensions.


Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista Dec 2015

Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista

Electronic Theses and Dissertations

PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry.

PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as …


Content Placement As A Key To A Content-Dominated, Highly Mobile Internet, Abhigyan Sharma Nov 2015

Content Placement As A Key To A Content-Dominated, Highly Mobile Internet, Abhigyan Sharma

Doctoral Dissertations

Most of the Internet traffic is content, and most of the Internet connected hosts are mobile. Our work focuses on the design of infrastructure services needed to support such a content-dominated, highly mobile Internet. In the design of these services, three sets of decisions arise frequently: (1) Content placment for selecting the locations where a content is placed, (2) request redirection for selecting the location where a particular request is served from and (3) network routing for selecting the physical path between clients and the services they are accessing. Our central thesis is that content placement is a powerful factor, …


Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula Oct 2015

Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula

All Capstone Projects

This project is aimed at developing an online search Portal for the Placement Department of the college. The system is an online application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an Online Job Portal for the Placement Department of the college to manage the student information with regards to placement. Students logging should be able to upload their information in the form of a CV. Visitors/Company representatives logging in may also access/search any information put up by Students.


Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity Oct 2015

Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity

All Capstone Projects

This project is Online Dorms Systems which allows users to book their room in the dorm from anywhere; this is an automated system where the user can search the availability of rooms in the dorm.

The search can be done based on the dates. The rooms that available are come with the status available, it will display all the rooms available as of that particular search date. Once the room has been booked the user can cancel the reservation within 48 hours. And there is concept of user login. As the user creates his own account with his email id, …


Online Learning Center For Java, Sravankumar Reddy Mukkonda, Gopichand Pallepati, Sandhya Vani Pasam, Kartheek Punna Oct 2015

Online Learning Center For Java, Sravankumar Reddy Mukkonda, Gopichand Pallepati, Sandhya Vani Pasam, Kartheek Punna

All Capstone Projects

In our project, we want to develop an online-tutorial which helps students to learn and practice basic program functions in Java. It includes learning the major features in Java language and practicing developing programs by online quizzes, code generating, debugging, executing, and verifying the result. In short our projects show a Java tutorial which includes learning materials and online Java compiler and interpreter to execute Java programs.


Digital Study Plan, Preethika Chanda, Sowjanya Chittabathini, Bhavana Reddy Gunamgari Oct 2015

Digital Study Plan, Preethika Chanda, Sowjanya Chittabathini, Bhavana Reddy Gunamgari

All Capstone Projects

Digital Study Plan is an online application, built as a web enabled project in ASP.net programming language. Its main purpose is to allow students to browse study plan anytime and anywhere reducing a lot of paper work. This application provides information about courses to the students who are joining the institution, students who are already studying in the institution and also to transfer students. This Digital Study Plan enables a student to check his remaining courses to be completed at any time as this application is online. The main goal is to enlighten the student about the available/remaining courses and …


Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi Oct 2015

Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi

All Capstone Projects

Smart Inventory Management System is an online software application which fulfills the requirement of a typical Stock Analysis in various godowns. It provides the interface to users in a graphical way to manage the daily transactions as well as historical data. Also provides the management reports like monthly inwards, monthly deliveries and monthly returns. This application maintains the centralized database so that any changes done at a location reflects immediately. This is an online tool so more than one user can login into system and use the tool simultaneously. The aim of this application is to reduce the manual effort …


E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana Oct 2015

E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana

All Capstone Projects

The E-Class Room system is a web based project. An educational institution in India is understaffed and has limited interaction among faculty, student and industry experts. The project is to provide an online platform for the students and faculty of the institution to enhance their educational needs and to share their learning with their fellow students, faculty or industrial experts. It aims to provide a platform for mutual cooperation between different kinds of learning. The new system will provide directional way for online learning between faculty, student and industrial experts.


A Survey Paper On Service Oriented Architecture Approach And Modern Web Services, Kamala Manasa Dhara, Madhuri Dharmala, Chamma Krishan Sharma Oct 2015

A Survey Paper On Service Oriented Architecture Approach And Modern Web Services, Kamala Manasa Dhara, Madhuri Dharmala, Chamma Krishan Sharma

All Capstone Projects

Service-Oriented Architecture is an architectural design pattern based on distinct pieces of software providing application functionality as services to other applications via a protocol. It is a collection of micro-services which are self-contained and provides unit functionality. The architectural style has the following essential core features which are inter-operability, service abstraction, service discovery, service autonomy, service statelessness re-usability, loose coupling. Service-oriented architectures are not a new thing. The first service-oriented architecture for many people in the past was with the use DCOM (uses RPC – Remote Procedural Calls) and CORBA (uses IIOP protocol) but because of the lack of standards …


An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena Sep 2015

An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena

Theses and Dissertations

The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …


A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li Aug 2015

A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li

Doctoral Dissertations

Today, the ability to process "big data" has become crucial to the information needs of many enterprise businesses, scientific applications, and governments. Recently, there have been increasing needs of processing data that is not only "big" but also "fast". Here "fast data" refers to high-speed real-time and near real-time data streams, such as Twitter feeds, search query streams, click streams, impressions, and system logs. To handle both historical data and real-time data, many companies have to maintain multiple systems. However, recent real-world case studies show that maintaining multiple systems cause not only code duplication, but also intensive manual work to …


Robust Mobile Data Transport: Modeling, Measurements, And Implementation, Yung-Chih Chen Aug 2015

Robust Mobile Data Transport: Modeling, Measurements, And Implementation, Yung-Chih Chen

Doctoral Dissertations

Advances in wireless technologies and the pervasive influence of multi-homed devices have significantly changed the way people use the Internet. These changes of user behavior and the evolution of multi-homing technologies have brought a huge impact to today's network study and provided new opportunities to improve mobile data transport. In this thesis, we investigate challenges related to human mobility, with emphases on network performance at both system level and user level. More specifically, we seek to answer the following two questions: 1) How to model user mobility in the networks and use the model for network provisioning? 2) Is it …


Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang Jul 2015

Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang

Masters Theses

The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.


Hardware/Software Interface Assurance With Conformance Checking, Li Lei Jun 2015

Hardware/Software Interface Assurance With Conformance Checking, Li Lei

Dissertations and Theses

Hardware/Software (HW/SW) interfaces are pervasive in modern computer systems. Most of HW/SW interfaces are implemented by devices and their device drivers. Unfortunately, HW/SW interfaces are unreliable and insecure due to their intrinsic complexity and error-prone nature. Moreover, assuring HW/SW interface reliability and security is challenging. First, at the post-silicon validation stage, HW/SW integration validation is largely an ad-hoc and time-consuming process. Second, at the system deployment stage, transient hardware failures and malicious attacks make HW/SW interfaces vulnerable even after intensive testing and validation. In this dissertation, we present a comprehensive solution for HW/SW interface assurance over the system life cycle. …


A Scalable Search Engine Aggregator, Pooja Mishra May 2015

A Scalable Search Engine Aggregator, Pooja Mishra

Master's Projects

The ability to display different media sources in an appropriate way is an integral part of search engines such as Google, Yahoo, and Bing, as well as social networking sites like Facebook, etc. This project explores and implements various media-updating features of the open source search engine Yioop [1]. These include news aggregation, video conversion and email distribution. An older, preexisting news update feature of Yioop was modified and scaled so that it can work on many machines. We redesigned and modified the user interface associated with a distributed news updater feature in Yioop. This project also introduced a video …


Index Strategies For Efficient And Effective Entity Search, Huy T. Vu May 2015

Index Strategies For Efficient And Effective Entity Search, Huy T. Vu

Master's Projects

The volume of structured data has rapidly grown in recent years, when data-entity emerged as an abstraction that captures almost every data pieces. As a result, searching for a desired piece of information on the web could be a challenge in term of time and relevancy because the number of matching entities could be very large for a given query. This project concerns with the efficiency and effectiveness of such entity queries. The work contains two major parts: implement inverted indexing strategies so that queries can be searched in minimal time, and rank results based on features that are independent …


An Open Source Advertisement Server, Pushkar Umaranikar May 2015

An Open Source Advertisement Server, Pushkar Umaranikar

Master's Projects

This report describes a new online advertisement system and its implementation for the Yioop open source search engine. This system was implemented for my CS298 project. It supports both selling advertisements and displaying them within search results. The selling of advertisement is done using a novel auction system, which we describe in this paper. With this auction system, it is possible to create an advertisement, attach keywords to it, and add it to the advertisement inventory. An advertisement is displayed on a search results page if the search keyword matches the keywords attached to the advertisement. Display of advertisements is …


Enabling Trustworthy Service Evaluation In Service-Oriented Mobile Social Network, Krishna Chaitanya Devabhakthini, Karthik Konda, Shravan Sydugari Apr 2015

Enabling Trustworthy Service Evaluation In Service-Oriented Mobile Social Network, Krishna Chaitanya Devabhakthini, Karthik Konda, Shravan Sydugari

All Capstone Projects

We propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews inservice-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects andstores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available tointerested users in making wise service selection decisions. It identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basicTSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an …


Instamapp, Andrew Dicosmo, Preethi Reddy, Venkat Nischey Apr 2015

Instamapp, Andrew Dicosmo, Preethi Reddy, Venkat Nischey

All Capstone Projects

InstaMapp is a web application we started building in fall 2014. This application is intended for anyone who wants to locate a product from a department store. Anyone who would like to print or view a shopping list with aisle or department locations. Currently there isn’t a reliable application out that that exist in the technology space. InstaMapp currently integrates with Walmart’s API and supports a responsive design for mobile devices.

During fall 2014, we built a proof of concept on Microsoft Windows Azure websites integrating with Intel Mashery Services for the API. We used the following Languages: PHP, JQuery, …


Big Data Analytics By Using Hadoop, Chaitanya Arava, Sudharshan Bandaru, Saradhi Bhargava Reddy Tiyyagura Apr 2015

Big Data Analytics By Using Hadoop, Chaitanya Arava, Sudharshan Bandaru, Saradhi Bhargava Reddy Tiyyagura

All Capstone Projects

Data is large and vast, with more data coming into the system every day. Summarization analytics are all about grouping similar data together and then performing an operation such as calculating a statistic, building an index, or just simply counting.

Filtering is more about understanding a smaller piece of your data, such as all records generated from a particular user, or the top ten most used verbs in a corpus of text. In short, filtering allows you to apply a microscope to your data. It can also be considered a form of search.

Hadoop allows us to modify the way …


Hadoop "The Emerging Tool In The Present Scenario For Accessing The Large Sets Of Data", Chandra Kiran Movva, Tejaswi Sura, Ranjith Reddy Thipparthi Apr 2015

Hadoop "The Emerging Tool In The Present Scenario For Accessing The Large Sets Of Data", Chandra Kiran Movva, Tejaswi Sura, Ranjith Reddy Thipparthi

All Capstone Projects

Hadoop is one of the tools designed to handle big data. Hadoop and other software products work to interpret or parse the results of big data searches through specific proprietary algorithms and methods. Hadoop is an open-source program under the Apache license that is maintained by a global community of users. It includes various main components, including a MapReduce set of functions and a Hadoop distributed file system (HDFS). The idea behind MapReduce is that Hadoop can first map a large data set, and then perform a reduction on that content for specific results. A reduce function can be thought …


Click Stream Data Analysis Using Hadoop, Krishna Chand Reddy Gaddam, Sivakrishna Thumati Apr 2015

Click Stream Data Analysis Using Hadoop, Krishna Chand Reddy Gaddam, Sivakrishna Thumati

All Capstone Projects

The objective of this project is to collect Click Stream data of USA Government websites which is high in volume and velocity, and store it for analysis in a cost effective manner for enhanced insight and decision making. I expect to learn how to process this data in an engineer’s way. I have plenty of tools in my hand like map reduce, pig, streaming and many more. But for a given business case it is very important to know which tools should be used to achieve the objective. In brief this is what I expect to learn.

The Hadoop-ecosystem, State-of-the-art …


Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran Mar 2015

Trust Based Privacy Policy Enforcement In Cloud Computing, Karthick Ramachandran

Electronic Thesis and Dissertation Repository

Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by cloud computing paradigm, organizations are still wary of delegating their computation and storage to a cloud service provider due to trust concerns. The trust issues with the cloud can be addressed by a combination of regulatory frameworks and supporting technologies. Privacy Enhancing Technologies (PET) and remote attestation provide the technologies for addressing the trust concerns. PET provides proactive measures through cryptography and selective dissemination of data to the client. Remote attestation mechanisms provides reactive measures …


A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio Mar 2015

A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio

Electronic Theses, Projects, and Dissertations

In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.

The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …


Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan Jan 2015

Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan

CCE Theses and Dissertations

The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …


An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns Jan 2015

An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns

Computational and Data Sciences Theses

In the age of online courses and digital textbooks, several areas of academia, such as special education, are far behind in the technological revolution. Some teachers use long unstructured digital documents, while others maintain large physical files for students containing every piece of information or coursework they have ever received. Could these extremely unstructured approaches to data collection and aggregation be streamlined with a software platform built specifically for this purpose? Could this platform also be built to accommodate multiple integrations and practical new features? Most importantly, in terms of usability, would this software be enjoyable to use? The Autism …


Security Frameworks For Machine-To-Machine Devices And Networks, Michael Demblewski Jan 2015

Security Frameworks For Machine-To-Machine Devices And Networks, Michael Demblewski

CCE Theses and Dissertations

Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and …