Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 68

Full-Text Articles in Systems Architecture

Pthreads Profiler, Ryan Van Quinlan Dec 2015

Pthreads Profiler, Ryan Van Quinlan

Computer Science and Software Engineering

The goal of this senior project was to design and implement a program which would allow users to profile programs that utilize the Pthreads library. This profiler allows users to measure load balance and lock contention between threads as well as discover deadlocks. These tools can be essential to developers of multi-threaded applications, which are notoriously difficult to debug. Additionally, this tool can help find vital performance benefits by providing relative execution measurements. The profiler is written in C++ and utilizes the standard template library as well as glibc extensions.


An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang Dec 2015

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang

Computer Science Faculty Publications

We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …


Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista Dec 2015

Assessing The Physical Security Of Idfs With Psatool: A Case Study, Sulabh Bista

Electronic Theses and Dissertations

PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry.

PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as …


Data Verifications For Online Social Networks, Mahmudur Rahman Nov 2015

Data Verifications For Online Social Networks, Mahmudur Rahman

FIU Electronic Theses and Dissertations

Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their users, often reported from mobile devices. The value and impact of social media makes it however an attractive attack target. In this thesis, we focus on the following social media vulnerabilities. First, review centered social networks such as Yelp and Google Play have been shown to be the targets of significant search rank and malware proliferation attacks. Detecting fraudulent behaviors is thus paramount to prevent not only public opinion bias, but also to curb the distribution of malware. Second, the …


Content Placement As A Key To A Content-Dominated, Highly Mobile Internet, Abhigyan Sharma Nov 2015

Content Placement As A Key To A Content-Dominated, Highly Mobile Internet, Abhigyan Sharma

Doctoral Dissertations

Most of the Internet traffic is content, and most of the Internet connected hosts are mobile. Our work focuses on the design of infrastructure services needed to support such a content-dominated, highly mobile Internet. In the design of these services, three sets of decisions arise frequently: (1) Content placment for selecting the locations where a content is placed, (2) request redirection for selecting the location where a particular request is served from and (3) network routing for selecting the physical path between clients and the services they are accessing. Our central thesis is that content placement is a powerful factor, …


Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz Nov 2015

Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz

Electrical and Computer Engineering Publications

The demand for knowledge extraction has been increasing. With the growing amount of data being generated by global data sources (e.g., social media and mobile apps) and the popularization of context-specific data (e.g., the Internet of Things), companies and researchers need to connect all these data and extract valuable information. Machine learning has been gaining much attention in data mining, leveraging the birth of new solutions. This paper proposes an architecture to create a flexible and scalable machine learning as a service. An open source solution was implemented and presented. As a case study, a forecast of electricity demand was …


Blackboard-Based Electronic Warfare System, Jeremy Straub Oct 2015

Blackboard-Based Electronic Warfare System, Jeremy Straub

Jeremy Straub

With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.


Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula Oct 2015

Secured Client Portal, Krishnakar Mogili, Rajitha Thippireddy, Shobhan Tula

All Capstone Projects

This project is aimed at developing an online search Portal for the Placement Department of the college. The system is an online application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an Online Job Portal for the Placement Department of the college to manage the student information with regards to placement. Students logging should be able to upload their information in the form of a CV. Visitors/Company representatives logging in may also access/search any information put up by Students.


Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity Oct 2015

Online Dormitory Reservation System, Adithya Mothe, Koushik Kumar Suragoni, Ramya Vakity

All Capstone Projects

This project is Online Dorms Systems which allows users to book their room in the dorm from anywhere; this is an automated system where the user can search the availability of rooms in the dorm.

The search can be done based on the dates. The rooms that available are come with the status available, it will display all the rooms available as of that particular search date. Once the room has been booked the user can cancel the reservation within 48 hours. And there is concept of user login. As the user creates his own account with his email id, …


E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana Oct 2015

E-Classroom For An Underserved Institution, Bhanuprakash Madupati, Kaleem Danish Mohammed, Dilipkumar Pampana

All Capstone Projects

The E-Class Room system is a web based project. An educational institution in India is understaffed and has limited interaction among faculty, student and industry experts. The project is to provide an online platform for the students and faculty of the institution to enhance their educational needs and to share their learning with their fellow students, faculty or industrial experts. It aims to provide a platform for mutual cooperation between different kinds of learning. The new system will provide directional way for online learning between faculty, student and industrial experts.


A Survey Paper On Service Oriented Architecture Approach And Modern Web Services, Kamala Manasa Dhara, Madhuri Dharmala, Chamma Krishan Sharma Oct 2015

A Survey Paper On Service Oriented Architecture Approach And Modern Web Services, Kamala Manasa Dhara, Madhuri Dharmala, Chamma Krishan Sharma

All Capstone Projects

Service-Oriented Architecture is an architectural design pattern based on distinct pieces of software providing application functionality as services to other applications via a protocol. It is a collection of micro-services which are self-contained and provides unit functionality. The architectural style has the following essential core features which are inter-operability, service abstraction, service discovery, service autonomy, service statelessness re-usability, loose coupling. Service-oriented architectures are not a new thing. The first service-oriented architecture for many people in the past was with the use DCOM (uses RPC – Remote Procedural Calls) and CORBA (uses IIOP protocol) but because of the lack of standards …


Online Learning Center For Java, Sravankumar Reddy Mukkonda, Gopichand Pallepati, Sandhya Vani Pasam, Kartheek Punna Oct 2015

Online Learning Center For Java, Sravankumar Reddy Mukkonda, Gopichand Pallepati, Sandhya Vani Pasam, Kartheek Punna

All Capstone Projects

In our project, we want to develop an online-tutorial which helps students to learn and practice basic program functions in Java. It includes learning the major features in Java language and practicing developing programs by online quizzes, code generating, debugging, executing, and verifying the result. In short our projects show a Java tutorial which includes learning materials and online Java compiler and interpreter to execute Java programs.


Digital Study Plan, Preethika Chanda, Sowjanya Chittabathini, Bhavana Reddy Gunamgari Oct 2015

Digital Study Plan, Preethika Chanda, Sowjanya Chittabathini, Bhavana Reddy Gunamgari

All Capstone Projects

Digital Study Plan is an online application, built as a web enabled project in ASP.net programming language. Its main purpose is to allow students to browse study plan anytime and anywhere reducing a lot of paper work. This application provides information about courses to the students who are joining the institution, students who are already studying in the institution and also to transfer students. This Digital Study Plan enables a student to check his remaining courses to be completed at any time as this application is online. The main goal is to enlighten the student about the available/remaining courses and …


Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi Oct 2015

Smart Inventory Management System, Ajay Akarapu, Chandrakanth Reddy Dasari, Nagaraju Deshini, Sushmita Mamidi

All Capstone Projects

Smart Inventory Management System is an online software application which fulfills the requirement of a typical Stock Analysis in various godowns. It provides the interface to users in a graphical way to manage the daily transactions as well as historical data. Also provides the management reports like monthly inwards, monthly deliveries and monthly returns. This application maintains the centralized database so that any changes done at a location reflects immediately. This is an online tool so more than one user can login into system and use the tool simultaneously. The aim of this application is to reduce the manual effort …


A Context-Aware Model To Improve Usability Of Information Display On Smartphone Apps For Emerging Users, Felix F. Ntawanga, Andre P. Calitz, Lynette Barnard Sep 2015

A Context-Aware Model To Improve Usability Of Information Display On Smartphone Apps For Emerging Users, Felix F. Ntawanga, Andre P. Calitz, Lynette Barnard

The African Journal of Information Systems

Smartphones have become a reliable technology for accessing information and services in rural communities. Mobile applications, such as social media and news apps running on smartphones, are no longer exclusively utilised by users in developed communities. Mobile applications are accessed in highly contextualised environments. This paper discusses a context-aware model that was implemented to improve the usability of information presented on smartphone applications for emerging users. User evaluation was conducted within a remote area in South Africa with a sample of users, most of whom did not have prior experience in using computer applications. The results of the evaluation present …


An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena Sep 2015

An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena

Theses and Dissertations

The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …


A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li Aug 2015

A Platform For Scalable Low-Latency Analytics Using Mapreduce, Boduo Li

Doctoral Dissertations

Today, the ability to process "big data" has become crucial to the information needs of many enterprise businesses, scientific applications, and governments. Recently, there have been increasing needs of processing data that is not only "big" but also "fast". Here "fast data" refers to high-speed real-time and near real-time data streams, such as Twitter feeds, search query streams, click streams, impressions, and system logs. To handle both historical data and real-time data, many companies have to maintain multiple systems. However, recent real-world case studies show that maintaining multiple systems cause not only code duplication, but also intensive manual work to …


Robust Mobile Data Transport: Modeling, Measurements, And Implementation, Yung-Chih Chen Aug 2015

Robust Mobile Data Transport: Modeling, Measurements, And Implementation, Yung-Chih Chen

Doctoral Dissertations

Advances in wireless technologies and the pervasive influence of multi-homed devices have significantly changed the way people use the Internet. These changes of user behavior and the evolution of multi-homing technologies have brought a huge impact to today's network study and provided new opportunities to improve mobile data transport. In this thesis, we investigate challenges related to human mobility, with emphases on network performance at both system level and user level. More specifically, we seek to answer the following two questions: 1) How to model user mobility in the networks and use the model for network provisioning? 2) Is it …


Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel Jul 2015

Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Campus research computing has evolved from many small decentralized resources, such as individual desktops, to fewer, larger centralized resources, such as clusters. This change has been necessitated by the increasing size of researcher's workloads, but this change has harmed the researcher's user experience. We propose to improve the user experience on the computational resources by creating an overlay cluster they are able to control. This overlay should transparently scale to national cyberinfrastructure as the user's demands increase.

We explore methods for improving the user experience when submitting jobs on a campus grid. To this end, we created a remote submission …


Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang Jul 2015

Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang

Masters Theses

The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.


Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel Jul 2015

Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel

Computer Science Faculty Publications

Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him- or herself. In the field of speech language pathology, the approach of VSM has been successfully used for treatment of language in children with Autism and in individuals with fluency disorder of stuttering. Technical challenges remain in creating VSM contents that depict previously unseen behaviors. In this paper, we propose a novel system that synthesizes new video sequences for VSM treatment of patients with voice disorders. Starting with a video recording of a voice-disorder patient, the proposed …


Metalogic Notes, Saverio Perugini Jun 2015

Metalogic Notes, Saverio Perugini

Saverio Perugini

A collection of notes, formulas, theorems, postulates and terminology in symbolic logic, syntactic notions, semantic notions, linkages between syntax and semantics, soundness and completeness, quantified logic, first-order theories, Goedel's First Incompleteness Theorem and more.


Statistics Notes, Saverio Perugini Jun 2015

Statistics Notes, Saverio Perugini

Saverio Perugini

A collection of terms, definitions, formulas and explanations about statistics.


Cooperative 3-D Map Generation Using Multiple Uavs, Andrew Erik Lawson Jun 2015

Cooperative 3-D Map Generation Using Multiple Uavs, Andrew Erik Lawson

University Scholar Projects

This report aims to demonstrate the feasibility of building a global 3-D map from multiple UAV robots in a GPS-denied, indoor environment. Presented are the design of each robot and the reasoning behind choosing its hardware and software components, the process in which a single robot obtains a individual 3-D map entirely onboard, and lastly how the mapping concept is extended to multiple robotic agents to form a global 3-D map using a centralized server. In the latter section, this report focuses on two algorithms, Online Mapping and Map Fusion, developed to facilitate the cooperative approach. A limited selection …


Exploratory Data Modeling Of Traumatic Brain Injury, Martin Zwick Jun 2015

Exploratory Data Modeling Of Traumatic Brain Injury, Martin Zwick

Systems Science Faculty Publications and Presentations

A short presentation of an analysis of data from Dr. Megan Preece on traumatic brain injury, the first in a series of planned secondary analyses of multiple TBI data sets. The analysis employs the systems methodology of reconstructability analysis (RA), utilizing both variable- and state-based and both neutral and directed models. The presentation explains RA and illustrates the results it can obtain. Unlike the confirmatory approach standard to most data analyses, this methodology is designed for exploratory modeling. It thus allows the discovery of unanticipated associations among variables, including multi-variable interaction effects of unknown form. It offers the opportunity for …


Learning Cooperative Games, Maria-Florina Balcan, Ariel D. Procaccia, Yair Zick Jun 2015

Learning Cooperative Games, Maria-Florina Balcan, Ariel D. Procaccia, Yair Zick

Yair Zick

This paper explores a PAC (probably approximately correct) learning model in cooperative games. Specifically, we are given m random samples of coalitions and their values, taken from some unknown cooperative game; can we predict the values of unseen coalitions? We study the PAC learnability of several well-known classes of cooperative games, such as network flow games, threshold task games, and induced subgraph games. We also establish a novel connection between PAC learnability and core stability: for games that are efficiently learnable, it is possible to find payoff divisions that are likely to be stable using a polynomial number of samples


Hardware/Software Interface Assurance With Conformance Checking, Li Lei Jun 2015

Hardware/Software Interface Assurance With Conformance Checking, Li Lei

Dissertations and Theses

Hardware/Software (HW/SW) interfaces are pervasive in modern computer systems. Most of HW/SW interfaces are implemented by devices and their device drivers. Unfortunately, HW/SW interfaces are unreliable and insecure due to their intrinsic complexity and error-prone nature. Moreover, assuring HW/SW interface reliability and security is challenging. First, at the post-silicon validation stage, HW/SW integration validation is largely an ad-hoc and time-consuming process. Second, at the system deployment stage, transient hardware failures and malicious attacks make HW/SW interfaces vulnerable even after intensive testing and validation. In this dissertation, we present a comprehensive solution for HW/SW interface assurance over the system life cycle. …


A Scalable Search Engine Aggregator, Pooja Mishra May 2015

A Scalable Search Engine Aggregator, Pooja Mishra

Master's Projects

The ability to display different media sources in an appropriate way is an integral part of search engines such as Google, Yahoo, and Bing, as well as social networking sites like Facebook, etc. This project explores and implements various media-updating features of the open source search engine Yioop [1]. These include news aggregation, video conversion and email distribution. An older, preexisting news update feature of Yioop was modified and scaled so that it can work on many machines. We redesigned and modified the user interface associated with a distributed news updater feature in Yioop. This project also introduced a video …


An Open Source Advertisement Server, Pushkar Umaranikar May 2015

An Open Source Advertisement Server, Pushkar Umaranikar

Master's Projects

This report describes a new online advertisement system and its implementation for the Yioop open source search engine. This system was implemented for my CS298 project. It supports both selling advertisements and displaying them within search results. The selling of advertisement is done using a novel auction system, which we describe in this paper. With this auction system, it is possible to create an advertisement, attach keywords to it, and add it to the advertisement inventory. An advertisement is displayed on a search results page if the search keyword matches the keywords attached to the advertisement. Display of advertisements is …


Index Strategies For Efficient And Effective Entity Search, Huy T. Vu May 2015

Index Strategies For Efficient And Effective Entity Search, Huy T. Vu

Master's Projects

The volume of structured data has rapidly grown in recent years, when data-entity emerged as an abstraction that captures almost every data pieces. As a result, searching for a desired piece of information on the web could be a challenge in term of time and relevancy because the number of matching entities could be very large for a given query. This project concerns with the efficiency and effectiveness of such entity queries. The work contains two major parts: implement inverted indexing strategies so that queries can be searched in minimal time, and rank results based on features that are independent …