Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (9)
- Computer Engineering (7)
- Software Engineering (6)
- Computer and Systems Architecture (5)
- OS and Networks (5)
-
- Databases and Information Systems (3)
- Electrical and Computer Engineering (3)
- Information Security (3)
- Numerical Analysis and Scientific Computing (3)
- Power and Energy (3)
- Graphics and Human Computer Interfaces (2)
- Mathematics (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Other Computer Engineering (2)
- Other Mathematics (2)
- Social and Behavioral Sciences (2)
- Systems Engineering (2)
- Theory and Algorithms (2)
- Algebra (1)
- Applied Mathematics (1)
- Broadcast and Video Studies (1)
- Business (1)
- Civic and Community Engagement (1)
- Cognition and Perception (1)
- Communication (1)
- Communication Technology and New Media (1)
- Control Theory (1)
- Institution
-
- Air Force Institute of Technology (2)
- California Polytechnic State University, San Luis Obispo (2)
- Singapore Management University (2)
- University of Arkansas, Fayetteville (2)
- University of New Mexico (2)
-
- University of North Florida (2)
- Binghamton University (1)
- Kennesaw State University (1)
- Marshall University (1)
- Michigan Technological University (1)
- Old Dominion University (1)
- The College of Wooster (1)
- The University of Akron (1)
- University of Massachusetts Amherst (1)
- Virginia Commonwealth University (1)
- Western Michigan University (1)
- Keyword
-
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (2)
- Accessibility (2)
- Mobile computing (2)
- Profiling (2)
- Thesis; University of North Florida; UNF; Dissertations (2)
-
- <p>Energy harvesting.</p> <p>IEEE 802.11 (Standard)</p> (1)
- Academic -- UNF -- Computing; IoT; Fog; Cloud; Amazon Machine Learning; AWS Greengrass (1)
- Academic -- UNF -- Computing; offloading (1)
- Acceleration (1)
- Aiolos (1)
- Audio (1)
- Augmented reality (1)
- Augmented virtuality (1)
- Big Data (1)
- Big Data Analytics (1)
- CSP (1)
- Cache modeling (1)
- Category theory (1)
- Classification (1)
- Cloud computing (1)
- Communication protocol (1)
- Compiler Optimization (1)
- Computer Science (1)
- Contention-aware (1)
- Criticality (1)
- Cuckoo (1)
- Cyber-Physical Systems (1)
- Cybersecurity (1)
- Cyberterrorism (1)
- DNP3 SaV5 (1)
- Publication
-
- Theses and Dissertations (3)
- Computer Science ETDs (2)
- Dissertations and Theses Collection (Open Access) (2)
- UNF Graduate Theses and Dissertations (2)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
-
- Computer Science and Software Engineering (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Graduate Dissertations and Theses (1)
- Graduate Theses and Dissertations (1)
- Master of Science in Computer Science Theses (1)
- Master's Theses (1)
- Masters Theses (1)
- Senior Independent Study Theses (1)
- Theses, Dissertations and Capstones (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 22 of 22
Full-Text Articles in Systems Architecture
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Computer Science ETDs
Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Graduate Theses and Dissertations
Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing between …
Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei
Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei
Dissertations and Theses Collection (Open Access)
The explosive growth of the ecosystem of personal and ambient computing de- vices coupled with the proliferation of high-speed connectivity has enabled ex- tremely powerful and varied mobile computing applications that are used every- where. While such applications have tremendous potential to improve the lives of impaired users, most mobile applications have impoverished designs to be inclusive– lacking support for users with specific disabilities. Mobile app designers today haveinadequate support to design existing classes of apps to support users with specific disabilities, and more so, lack the support to design apps that specifically target these users. One way to resolve …
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Computer Science ETDs
Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.
In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Doctoral Dissertations
The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli
Master of Science in Computer Science Theses
With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …
Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal
Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal
Dissertations and Theses Collection (Open Access)
Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).
A Framework For Executable Systems Modeling, Matthew Amissah
A Framework For Executable Systems Modeling, Matthew Amissah
Engineering Management & Systems Engineering Theses & Dissertations
Systems Modeling Language (SysML), like its parent language, the Unified Modeling Language (UML), consists of a number of independently derived model languages (i.e. state charts, activity models etc.) which have been co-opted into a single modeling framework. This, together with the lack of an overarching meta-model that supports uniform semantics across the various diagram types, has resulted in a large unwieldy and informal language schema. Additionally, SysML does not offer a built in framework for managing time and the scheduling of time based events in a simulation.
In response to these challenges, a number of auxiliary standards have been offered …
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Computer Science and Software Engineering
This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.
Compiler Optimization Effects On Register Collisions, Jonathan S. Tan
Compiler Optimization Effects On Register Collisions, Jonathan S. Tan
Master's Theses
We often want a compiler to generate executable code that runs as fast as possible. One consideration toward this goal is to keep values in fast registers to limit the number of slower memory accesses that occur. When there are not enough physical registers available for use, values are ``spilled'' to the runtime stack. The need for spills is discovered during register allocation wherein values in use are mapped to physical registers. One factor in the efficacy of register allocation is the number of values in use at one time (register collisions). Register collision is affected by compiler optimizations that …
Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda
Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda
Graduate Dissertations and Theses
As data centers continue to grow in scale, the resource management software needs to work closely with the hardware infrastructure to provide high utilization, performance, fault tolerance, and high availability. Apache Mesos has emerged as a leader in this space, providing an abstraction over the entire cluster, data center, or cloud to present a uniform view of all the resources. In addition, frameworks built on Mesos such as Apache Aurora, developed within Twitter and later contributed to the Apache Software Foundation, allow massive job submissions with heterogeneous resource requirements. The availability of such tools in the Open Source space, with …
Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson
Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson
Computer Science and Computer Engineering Undergraduate Honors Theses
The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent …
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
Masters Theses
Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it …
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Theses and Dissertations
Air Force Installation Contracting Agency manages nearly 18 percent of total Air Force spend, equating to approximately 57 billion dollars. To improve strategic sourcing, the organization is beginning to categorize installation-support spend and assign accountable portfolio managers to respective spend categories. A critical task in this new strategic environment includes the appropriate categorization of Air Force contracts into newly created, manageable spend categories. It has been recognized that current composite categories have the opportunity to be further distinguished into sub-categories leveraging text analytics on the contract descriptions. Furthermore, upon establishing newly constructed categories, future contracts must be classified into these …
Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo
Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo
Theses and Dissertations
Every day, intrusion detection systems catalogue millions of unsupervised data entries. This represents a “big data” problem for research sponsors within the Department of Defense. In a first response to this issue, raw data capture was transformed into usable vectors and an array of multivariate techniques implemented to detect potential outliers. This research expands and refines these techniques by implementing a Chi-Square Q-Q plot-based classification criteria for outlier detection. This methodology has been implemented into an R-based programming solution that allows for a refined and semi-automated user experience for intelligence analysts. Moreover, two case analyses are performed that illustrate how …
A Novel Ieee 802.11 Power Save Mechanism For Energy Harvesting Motivated Networks, Yigitcan Celik
A Novel Ieee 802.11 Power Save Mechanism For Energy Harvesting Motivated Networks, Yigitcan Celik
Theses, Dissertations and Capstones
The spread of wirelessly connected computing sensors and devices and hybrid networks are leading to the emergence of an Internet of Things (IoT), where a myriad of multi-scale sensors and devices are seamlessly blended for ubiquitous computing and communication. However, the communication operations of wireless devices are often limited by the size and lifetime of the batteries because of the portability and mobility. To reduce energy consumption during wireless communication, the IEEE 802.11 standard specifies a power management scheme, called Power Saving Mechanism (PSM), for IEEE 802.11 devices. However, the PSM of IEEE 802.11 was originally designed for battery-supported devices …
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Theses and Dissertations
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang
Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang
Dissertations, Master's Theses and Master's Reports
A multi-core machine allows executing several applications simultaneously. Those jobs are scheduled on different cores and compete for shared resources such as the last level cache and memory bandwidth. Such competitions might cause performance degradation. Data centers often utilize virtualization to provide a certain level of performance isolation. However, some of the shared resources cannot be divided, even in a virtualized system, to ensure complete isolation. If the performance degradation of co-tenancy is not known to the cloud administrator, a data center often has to dedicate a whole machine for a latency-sensitive application to guarantee its quality of service. Co-run …
On The Effectiveness Of An Iot - Fog - Cloud Architecture For A Real-World Application, Nathan Wheeler
On The Effectiveness Of An Iot - Fog - Cloud Architecture For A Real-World Application, Nathan Wheeler
UNF Graduate Theses and Dissertations
Fog Computing is an emerging computing paradigm that shifts certain processing closer to the Edge of a network, generally within one network hop, where latency is minimized, and results can be obtained the quickest. However, not a lot of research has been done on the effectiveness of Fog in real-world applications. The aim of this research is to show the effectiveness of the Fog Computing paradigm as the middle layer in a 3-tier architecture between the Internet of Things (IoT) and the Cloud. Two applications were developed: one utilizing Fog in a 3-tier architecture and another application using IoT and …
Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred
Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred
Williams Honors College, Honors Research Projects
Mikyla Wilfred
Major: Computer Science
Project Sponsor: Dr. Collard
Number of Project Credits: 3
Smart-Teleprompter
The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …
Logic -> Proof -> Rest, Maxwell Taylor
Logic -> Proof -> Rest, Maxwell Taylor
Senior Independent Study Theses
REST is a common architecture for networked applications. Applications that adhere to the REST constraints enjoy significant scaling advantages over other architectures. But REST is not a panacea for the task of building correct software. Algebraic models of computation, particularly CSP, prove useful to describe the composition of applications using REST. CSP enables us to describe and verify the behavior of RESTful systems. The descriptions of each component can be used independently to verify that a system behaves as expected. This thesis demonstrates and develops CSP methodology to verify the behavior of RESTful applications.
Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour
Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour
UNF Graduate Theses and Dissertations
Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow …