Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2018

Discipline
Institution
Keyword
Publication

Articles 1 - 22 of 22

Full-Text Articles in Systems Architecture

Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez Dec 2018

Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez

Computer Science ETDs

Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai Dec 2018

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Graduate Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing between …


Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei Dec 2018

Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei

Dissertations and Theses Collection (Open Access)

The explosive growth of the ecosystem of personal and ambient computing de- vices coupled with the proliferation of high-speed connectivity has enabled ex- tremely powerful and varied mobile computing applications that are used every- where. While such applications have tremendous potential to improve the lives of impaired users, most mobile applications have impoverished designs to be inclusive– lacking support for users with specific disabilities. Mobile app designers today haveinadequate support to design existing classes of apps to support users with specific disabilities, and more so, lack the support to design apps that specifically target these users. One way to resolve …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen Oct 2018

Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen

Doctoral Dissertations

The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal Aug 2018

Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal

Dissertations and Theses Collection (Open Access)

Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).


A Framework For Executable Systems Modeling, Matthew Amissah Jul 2018

A Framework For Executable Systems Modeling, Matthew Amissah

Engineering Management & Systems Engineering Theses & Dissertations

Systems Modeling Language (SysML), like its parent language, the Unified Modeling Language (UML), consists of a number of independently derived model languages (i.e. state charts, activity models etc.) which have been co-opted into a single modeling framework. This, together with the lack of an overarching meta-model that supports uniform semantics across the various diagram types, has resulted in a large unwieldy and informal language schema. Additionally, SysML does not offer a built in framework for managing time and the scheduling of time based events in a simulation.

In response to these challenges, a number of auxiliary standards have been offered …


Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar Jun 2018

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science and Software Engineering

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


Compiler Optimization Effects On Register Collisions, Jonathan S. Tan Jun 2018

Compiler Optimization Effects On Register Collisions, Jonathan S. Tan

Master's Theses

We often want a compiler to generate executable code that runs as fast as possible. One consideration toward this goal is to keep values in fast registers to limit the number of slower memory accesses that occur. When there are not enough physical registers available for use, values are ``spilled'' to the runtime stack. The need for spills is discovered during register allocation wherein values in use are mapped to physical registers. One factor in the efficacy of register allocation is the number of values in use at one time (register collisions). Register collision is affected by compiler optimizations that …


Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda May 2018

Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda

Graduate Dissertations and Theses

As data centers continue to grow in scale, the resource management software needs to work closely with the hardware infrastructure to provide high utilization, performance, fault tolerance, and high availability. Apache Mesos has emerged as a leader in this space, providing an abstraction over the entire cluster, data center, or cloud to present a uniform view of all the resources. In addition, frameworks built on Mesos such as Apache Aurora, developed within Twitter and later contributed to the Apache Software Foundation, allow massive job submissions with heterogeneous resource requirements. The availability of such tools in the Open Source space, with …


Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson May 2018

Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson

Computer Science and Computer Engineering Undergraduate Honors Theses

The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent …


A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri Apr 2018

A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri

Masters Theses

Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it …


Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier Mar 2018

Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier

Theses and Dissertations

Air Force Installation Contracting Agency manages nearly 18 percent of total Air Force spend, equating to approximately 57 billion dollars. To improve strategic sourcing, the organization is beginning to categorize installation-support spend and assign accountable portfolio managers to respective spend categories. A critical task in this new strategic environment includes the appropriate categorization of Air Force contracts into newly created, manageable spend categories. It has been recognized that current composite categories have the opportunity to be further distinguished into sub-categories leveraging text analytics on the contract descriptions. Furthermore, upon establishing newly constructed categories, future contracts must be classified into these …


Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo Mar 2018

Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo

Theses and Dissertations

Every day, intrusion detection systems catalogue millions of unsupervised data entries. This represents a “big data” problem for research sponsors within the Department of Defense. In a first response to this issue, raw data capture was transformed into usable vectors and an array of multivariate techniques implemented to detect potential outliers. This research expands and refines these techniques by implementing a Chi-Square Q-Q plot-based classification criteria for outlier detection. This methodology has been implemented into an R-based programming solution that allows for a refined and semi-automated user experience for intelligence analysts. Moreover, two case analyses are performed that illustrate how …


A Novel Ieee 802.11 Power Save Mechanism For Energy Harvesting Motivated Networks, Yigitcan Celik Jan 2018

A Novel Ieee 802.11 Power Save Mechanism For Energy Harvesting Motivated Networks, Yigitcan Celik

Theses, Dissertations and Capstones

The spread of wirelessly connected computing sensors and devices and hybrid networks are leading to the emergence of an Internet of Things (IoT), where a myriad of multi-scale sensors and devices are seamlessly blended for ubiquitous computing and communication. However, the communication operations of wireless devices are often limited by the size and lifetime of the batteries because of the portability and mobility. To reduce energy consumption during wireless communication, the IEEE 802.11 standard specifies a power management scheme, called Power Saving Mechanism (PSM), for IEEE 802.11 devices. However, the PSM of IEEE 802.11 was originally designed for battery-supported devices …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang Jan 2018

Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang

Dissertations, Master's Theses and Master's Reports

A multi-core machine allows executing several applications simultaneously. Those jobs are scheduled on different cores and compete for shared resources such as the last level cache and memory bandwidth. Such competitions might cause performance degradation. Data centers often utilize virtualization to provide a certain level of performance isolation. However, some of the shared resources cannot be divided, even in a virtualized system, to ensure complete isolation. If the performance degradation of co-tenancy is not known to the cloud administrator, a data center often has to dedicate a whole machine for a latency-sensitive application to guarantee its quality of service. Co-run …


On The Effectiveness Of An Iot - Fog - Cloud Architecture For A Real-World Application, Nathan Wheeler Jan 2018

On The Effectiveness Of An Iot - Fog - Cloud Architecture For A Real-World Application, Nathan Wheeler

UNF Graduate Theses and Dissertations

Fog Computing is an emerging computing paradigm that shifts certain processing closer to the Edge of a network, generally within one network hop, where latency is minimized, and results can be obtained the quickest. However, not a lot of research has been done on the effectiveness of Fog in real-world applications. The aim of this research is to show the effectiveness of the Fog Computing paradigm as the middle layer in a 3-tier architecture between the Internet of Things (IoT) and the Cloud. Two applications were developed: one utilizing Fog in a 3-tier architecture and another application using IoT and …


Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred Jan 2018

Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred

Williams Honors College, Honors Research Projects

Mikyla Wilfred

Major: Computer Science

Project Sponsor: Dr. Collard

Number of Project Credits: 3

Smart-Teleprompter

The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …


Logic -> Proof -> Rest, Maxwell Taylor Jan 2018

Logic -> Proof -> Rest, Maxwell Taylor

Senior Independent Study Theses

REST is a common architecture for networked applications. Applications that adhere to the REST constraints enjoy significant scaling advantages over other architectures. But REST is not a panacea for the task of building correct software. Algebraic models of computation, particularly CSP, prove useful to describe the composition of applications using REST. CSP enables us to describe and verify the behavior of RESTful systems. The descriptions of each component can be used independently to verify that a system behaves as expected. This thesis demonstrates and develops CSP methodology to verify the behavior of RESTful applications.


Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour Jan 2018

Mobile Cloud Computing: A Comparison Study Of Cuckoo And Aiolos Offloading Frameworks, Inan Kaddour

UNF Graduate Theses and Dissertations

Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow …