Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

784 Full-Text Articles 968 Authors 837,208 Downloads 101 Institutions

All Articles in Systems Architecture

Faceted Search

784 full-text articles. Page 4 of 29.

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul 2021 Dakota State University

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Masters Theses & Doctoral Dissertations

This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion ...


Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel AlOrbani 2021 The University of Western Ontario

Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel Alorbani

Electronic Thesis and Dissertation Repository

Today, smart city technology is being adopted by many municipal governments to improve their services and to adapt to growing and changing urban population. Implementing a smart city application can be one of the most challenging projects due to the complexity, requirements and constraints. Sensing devices and computing components can be numerous and heterogeneous. Increasingly, researchers working in the smart city arena are looking to leverage edge and cloud computing to support smart city development. This approach also brings a number of challenges. Two of the main challenges are resource allocation and load balancing of tasks associated with processing data ...


Hybrid Cloud Workload Monitoring As A Service, Shreya Kundu 2021 San Jose State University

Hybrid Cloud Workload Monitoring As A Service, Shreya Kundu

Master's Projects

Cloud computing and cloud-based hosting has become embedded in our daily lives. It is imperative for cloud providers to make sure all services used by both enterprises and consumers have high availability and elasticity to prevent any downtime, which impacts negatively for any business. To ensure cloud infrastructures are working reliably, cloud monitoring becomes an essential need for both businesses, the provider and the consumer. This thesis project reports on the need of efficient scalable monitoring, enumerating the necessary types of metrics of interest to be collected. Current understanding of various architectures designed to collect, store and process monitoring data ...


Neural Architecture Search As Sparse Supernet, Y. WU, A. LIU, Zhiwu HUANG, S. ZHANG, Gool L. VAN 2021 Singapore Management University

Neural Architecture Search As Sparse Supernet, Y. Wu, A. Liu, Zhiwu Huang, S. Zhang, Gool L. Van

Research Collection School Of Computing and Information Systems

This paper aims at enlarging the problem of Neural Architecture Search (NAS) from Single-Path and Multi-Path Search to automated Mixed-Path Search. In particular, we model the NAS problem as a sparse supernet using a new continuous architecture representation with a mixture of sparsity constraints. The sparse supernet enables us to automatically achieve sparsely-mixed paths upon a compact set of nodes. To optimize the proposed sparse supernet, we exploit a hierarchical accelerated proximal gradient algorithm within a bi-level optimization framework. Extensive experiments on Convolutional Neural Network and Recurrent Neural Network search demonstrate that the proposed method is capable of searching for ...


On Studying Distributed Machine Learning, Simeon Eberz 2021 Liberty University

On Studying Distributed Machine Learning, Simeon Eberz

Senior Honors Theses

The Internet of Things (IoT) is utilizing Deep Learning (DL) for applications such as voice or image recognition. Processing data for DL directly on IoT edge devices reduces latency and increases privacy. To overcome the resource constraints of IoT edge devices, the computation for DL inference is distributed between a cluster of several devices. This paper explores DL, IoT networks, and a novel framework for distributed processing of DL in IoT clusters. The aim is to facilitate and simplify deployment, testing, and study of a distributed DL system, even without physical devices. The contributions of this paper are a deployment ...


Secure Network Access Via Ldap, Nicholas Valaitis 2021 The University of Akron

Secure Network Access Via Ldap, Nicholas Valaitis

Williams Honors College, Honors Research Projects

Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices.


Improving Energy Efficiency Through Compiler Optimizations, Jack Beckitt-Marshall 2021 Bowdoin College

Improving Energy Efficiency Through Compiler Optimizations, Jack Beckitt-Marshall

Honors Projects

Abstract--- Energy efficiency is becoming increasingly important for computation, especially in the context of the current climate crisis. The aim of this experiment was to see if the compiler could reduce energy usage without rewriting programs themselves. The experimental setup consisted of compiling programs using the Clang compiler using a set of compiler flags, and then measuring energy usage and execution time on an AMD Ryzen processor. Three experiments were performed: a random exploration of compiler flags, utilization of SIMD, as well as benchmarking real world applications. It was found that the compiler was able to reduce execution time, especially ...


Occam Manual, Martin Zwick 2021 Portland State University

Occam Manual, Martin Zwick

Systems Science Faculty Publications and Presentations

Occam is a Discrete Multivariate Modeling (DMM) tool based on the methodology of Reconstructability Analysis (RA). Its typical usage is for analysis of problems involving large numbers of discrete variables. Models are developed which consist of one or more components, which are then evaluated for their fit and statistical significance. Occam can search the lattice of all possible models, or can do detailed analysis on a specific model.

In Variable-Based Modeling (VBM), model components are collections of variables. In State-Based Modeling (SBM), components identify one or more specific states or substates.

Occam provides a web-based interface, which allows uploading a ...


Efficient Modeling Of Random Sampling-Based Lru Cache, Junyao Yang 2021 Michigan Technological University

Efficient Modeling Of Random Sampling-Based Lru Cache, Junyao Yang

Dissertations, Master's Theses and Master's Reports

The Miss Ratio Curve (MRC) is an important metric and effective tool for caching system performance prediction and optimization. Since the Least Recently Used (LRU) replacement policy is the de facto policy for many existing caching systems, most previous studies on efficient MRC construction are predominantly focused on the LRU replacement policy. Recently, the random sampling-based replacement mechanism, as opposed to replacement relying on the rigid LRU data structure, gains more popularity due to its lightweight and flexibility. To approximate LRU, at replacement times, the system randomly selects K objects and replaces the least recently used object among the sample ...


Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan 2021 University of Arkansas, Fayetteville

Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan

Graduate Theses and Dissertations

The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks ...


A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu 2021 Old Dominion University

A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu

Computer Science Faculty Publications

In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this ...


Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff 2021 Minnesota State University, Mankato

Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff

All Graduate Theses, Dissertations, and Other Capstone Projects

Multiprocessor System-on-Chip (MPSoC) integrating heterogeneous processing elements (CPU, GPU, Accelerators, memory, I/O modules ,etc.) are the de-facto design choice to meet the ever-increasing performance/Watt requirements from modern computing machines. Although at consumer level the number of processing elements (PE) are limited to 8-16, for high end servers, the number of PEs can scale up to hundreds. A Network-on-Chip (NoC) is a microscale network that facilitates the packetized communication among the PEs in such complex computational systems. Due to the heterogeneous integration of the cores, execution of diverse (serial and parallel) applications on the PEs, application mapping strategies, and ...


Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva 2020 Bulletin of TUIT: Management and Communication Technologies

Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva

Bulletin of TUIT: Management and Communication Technologies

In this study, the reliability of mobile system base stations (BTS) is assessed by analyzing data obtained on faults in about 200 BTS over a six-month period. Five BTSs with the highest number of failures and duration of failure were selected in these BTSs. Based on the data obtained, reliability parameters were calculated and compared.

The study used Weibull’s dismissal process distribution method. The breakdown times of each BTS were sorted. In all five BTS, it was found that β(where the value of β is the approximate value obtained from the values of the smallest squares of the ...


A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm 2020 Dakota State University

A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm

Masters Theses & Doctoral Dissertations

The dark web is the hidden part of the internet that is not indexed by search engines and is only accessible with a specific browser like The Onion Router (Tor). Tor was originally developed as a means of secure communications and is still used worldwide for individuals seeking privacy or those wanting to circumvent restrictive regimes. The dark web has become synonymous with nefarious and illicit content which manifests itself in underground marketplaces containing illegal goods such as drugs, stolen credit cards, stolen user credentials, child pornography, and more (Kohen, 2017). Dark web marketplaces contribute both to illegal drug usage ...


Modular Neural Networks For Low-Power Image Classification On Embedded Devices, Abhinav Goel, Sara Aghajanzadeh, Caleb Tung, Shuo-Han Chen, George K. Thiruvathukal, Yung-Hisang Lu 2020 Purdue University

Modular Neural Networks For Low-Power Image Classification On Embedded Devices, Abhinav Goel, Sara Aghajanzadeh, Caleb Tung, Shuo-Han Chen, George K. Thiruvathukal, Yung-Hisang Lu

Computer Science: Faculty Publications and Other Works

Embedded devices are generally small, battery-powered computers with limited hardware resources. It is difficult to run deep neural networks (DNNs) on these devices, because DNNs perform millions of operations and consume significant amounts of energy. Prior research has shown that a considerable number of a DNN’s memory accesses and computation are redundant when performing tasks like image classification. To reduce this redundancy and thereby reduce the energy consumption of DNNs, we introduce the Modular Neural Network Tree architecture. Instead of using one large DNN for the classifier, this architecture uses multiple smaller DNNs (called modules) to progressively classify images ...


Tpr: Text-Aware Preference Ranking For Recommender Systems, Yu-Neng CHUANG, Chih-Ming CHEN, Chuan-Ju WANG, Ming-Feng TSAI, Yuan FANG, Ee-peng LIM 2020 Singapore Management University

Tpr: Text-Aware Preference Ranking For Recommender Systems, Yu-Neng Chuang, Chih-Ming Chen, Chuan-Ju Wang, Ming-Feng Tsai, Yuan Fang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Textual data is common and informative auxiliary information for recommender systems. Most prior art utilizes text for rating prediction, but rare work connects it to top-N recommendation. Moreover, although advanced recommendation models capable of incorporating auxiliary information have been developed, none of these are specifically designed to model textual information, yielding a limited usage scenario for typical user-to-item recommendation. In this work, we present a framework of text-aware preference ranking (TPR) for top-N recommendation, in which we comprehensively model the joint association of user-item interaction and relations between items and associated text. Using the TPR framework, we construct a joint ...


A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak 2020 Purdue University

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...


Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel 2020 Air Force Institute of Technology

Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel

Theses and Dissertations

In legacy Global Positioning System (GPS) Satellite Navigation (SatNav) payloads, the architecture does not provide the flexibility to adapt to changing circumstances and environments. GPS SatNav payloads have largely remained unchanged since the system became fully operational in April 1995. Since then, the use of GPS has become ubiquitous in our day-to-day lives. GPS availability is now a basic assumption for distributed infrastructure; it has become inextricably tied to our national power grids, cellular networks, and global financial systems. Emerging advancements of easy to use radio technologies, such as software-defined radios (SDRs), have greatly lowered the difficulty of discovery and ...


Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms, Costain Nachuma 2020 University of New Orleans

Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms, Costain Nachuma

University of New Orleans Theses and Dissertations

An algorithm designer working with parallel computing systems should know how the characteristics of their implemented algorithm affects various performance aspects of their parallel program. It would be beneficial to these designers if each algorithm came with a specific set of standards that identified which algorithms worked better for a specified system. Therefore, the goal of this paper is to take implementations of four graphing algorithms, extract their features such as memory consumption, scalability using profilers (Vtunes /Tau) to determine which algorithms work to their fullest potential in one of the three systems: GPU, shared memory system, or distributed memory ...


Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris 2020 Washington University in St. Louis

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris

McKelvey School of Engineering Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...


Digital Commons powered by bepress