Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

784 Full-Text Articles 968 Authors 837,208 Downloads 101 Institutions

All Articles in Systems Architecture

Faceted Search

784 full-text articles. Page 5 of 29.

A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou 2020 Western Michigan University

A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou

Masters Theses

Presently, cyber-physical systems are increasingly being integrated into societies, from the economic sector to the nuclear energy sector. Cyber-physical systems are systems that combine physical, digital, human, and other components, which operate through physical means and software. When system errors occur, the consequences of malfunction could negatively impact human life. Academic studies have relied on the MAPE-K feedback loop model to develop various system components to satisfy the self-adaptive features, such that violation of the safety requirements can be minimized. Assurance of system requirement satisfaction is argued through an industrial standard form, called an assurance case, which is usually applied ...


Off-Policy Reinforcement Learning For Efficient And Effective Gan Architecture Search, Tian YUAN, Wang QIN, Zhiwu HUANG, Wen LI, Dengxin DAI, Minghao YANG, Jun WANG, Olga FINK 2020 Singapore Management University

Off-Policy Reinforcement Learning For Efficient And Effective Gan Architecture Search, Tian Yuan, Wang Qin, Zhiwu Huang, Wen Li, Dengxin Dai, Minghao Yang, Jun Wang, Olga Fink

Research Collection School Of Computing and Information Systems

In this paper, we introduce a new reinforcement learning (RL) based neural architecture search (NAS) methodology for effective and efficient generative adversarial network (GAN) architecture search. The key idea is to formulate the GAN architecture search problem as a Markov decision process (MDP) for smoother architecture sampling, which enables a more effective RL-based search algorithm by targeting the potential global optimal architecture. To improve efficiency, we exploit an off-policy GAN architecture search algorithm that makes efficient use of the samples generated by previous policies. Evaluation on two standard benchmark datasets (i.e., CIFAR-10 and STL-10) demonstrates that the proposed method ...


Joint Lattice Of Reconstructability Analysis And Bayesian Network General Graphs, Marcus Harris, Martin Zwick 2020 Portland State University

Joint Lattice Of Reconstructability Analysis And Bayesian Network General Graphs, Marcus Harris, Martin Zwick

Systems Science Faculty Publications and Presentations

This paper integrates the structures considered in Reconstructability Analysis (RA) and those considered in Bayesian Networks (BN) into a joint lattice of probabilistic graphical models. This integration and associated lattice visualizations are done in this paper for four variables, but the approach can easily be expanded to more variables. The work builds on the RA work of Klir (1985), Krippendorff (1986), and Zwick (2001), and the BN work of Pearl (1985, 1987, 1988, 2000), Verma (1990), Heckerman (1994), Chickering (1995), Andersson (1997), and others. The RA four variable lattice and the BN four variable lattice partially overlap: there are ten ...


Reconstructability Analysis & Its Occam Implementation, Martin Zwick 2020 Portland State University

Reconstructability Analysis & Its Occam Implementation, Martin Zwick

Systems Science Faculty Publications and Presentations

This talk will describe Reconstructability Analysis (RA), a probabilistic graphical modeling methodology deriving from the 1960s work of Ross Ashby and developed in the systems community in the 1980s and afterwards. RA, based on information theory and graph theory, resembles and partially overlaps Bayesian networks (BN) and log-linear techniques, but also has some unique capabilities. (A paper explaining the relationship between RA and BN will be given in this special session.) RA is designed for exploratory modeling although it can also be used for confirmatory hypothesis testing. In RA modeling, one either predicts some DV from a set of IVs ...


Real-Time Counting Of Vehicles Stopped At A Traffic Light Using Vehicular Network Technology, Manuel Contreras, Eric Gamess 2020 Central University of Venezuela

Real-Time Counting Of Vehicles Stopped At A Traffic Light Using Vehicular Network Technology, Manuel Contreras, Eric Gamess

Research, Publications & Creative Work

Vehicular Adhoc NETworks (VANETs) is a new and emerging technology for wireless communications that has attracted considerable attention in the last years from the academic, scientific, industrial and governmental communities, due to the improvements and the new features that it brings to the Intelligent Transportation Systems (ITSs). In this paper, we present an algorithm that uses VANET technology to determine the total number of vehicles that are stopped at a traffic light at an intersection. To facilitate an efficient counting, we divide the road into fixed-size road regions and through a leader election mechanism, we designate one vehicle in each ...


Towards A Cyber-Physical Manufacturing Cloud Through Operable Digital Twins And Virtual Production Lines, Md Rakib Shahriar 2020 University of Arkansas, Fayetteville

Towards A Cyber-Physical Manufacturing Cloud Through Operable Digital Twins And Virtual Production Lines, Md Rakib Shahriar

Graduate Theses and Dissertations

In last decade, the paradigm of Cyber-Physical Systems (CPS) has integrated industrial manufacturing systems with Cloud Computing technologies for Cloud Manufacturing. Up to 2015, there were many CPS-based manufacturing systems that collected real-time machining data to perform remote monitoring, prognostics and health management, and predictive maintenance. However, these CPS-integrated and network ready machines were not directly connected to the elements of Cloud Manufacturing and required human-in-the-loop. Addressing this gap, we introduced a new paradigm of Cyber-Physical Manufacturing Cloud (CPMC) that bridges a gap between physical machines and virtual space in 2017. CPMC virtualizes machine tools in cloud through web services ...


Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison 2020 Portland State University

Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison

University Honors Theses

Programming in a baremetal environment, directly on top of hardware with very little to help manage memory or ensure safety, can be dangerous even for experienced programmers. Programming languages can ease the burden on developers and sometimes take care of entire sets of errors. This is not the case for a language like C that will do almost anything you want, for better or worse. To operate in a baremetal environment often requires direct control over memory, but it would be nice to have that capability without sacrificing safety guarantees. Rust is a new language that aims to fit this ...


Scalable Multi-Agent Reinforcement Learning For Aggregation Systems, Tanvi VERMA 2020 Singapore Management University

Scalable Multi-Agent Reinforcement Learning For Aggregation Systems, Tanvi Verma

Dissertations and Theses Collection (Open Access)

Efficient sequential matching of supply and demand is a problem of interest in many online to offline services. For instance, Uber, Lyft, Grab for matching taxis to customers; Ubereats, Deliveroo, FoodPanda etc. for matching restaurants to customers. In these systems, a centralized entity (e.g., Uber) aggregates supply and assigns them to demand so as to optimize a central metric such as profit, number of requests, delay etc. However, individuals (e.g., drivers, delivery boys) in the system are self interested and they try to maximize their own long term profit. The central entity has the full view of the ...


Online Spatio - Temporal Demand Supply Matching, Meghna LOWALEKAR 2020 Singapore Management University

Online Spatio - Temporal Demand Supply Matching, Meghna Lowalekar

Dissertations and Theses Collection (Open Access)

The rapid growth of cities in developing world coupled with the increase in rural to urban migration have led to cities being identified as the key actor for any nation's economy. Shared mobility has become an integral part of life of people in cities as it improves efficiency and enhances transportation accessibility. As a result, the mismatch between the demand and supply of shared mobility resources has a direct impact on people's life. Thus, the goal of my dissertation is to develop solution strategies for these real-time (online) spatio-temporal demand supply matching problems for shared mobility resources which ...


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh 2020 The University of Western Ontario

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for ...


Load Balancing In Cloud Computing, Snehal Dhumal 2020 San Jose State University

Load Balancing In Cloud Computing, Snehal Dhumal

Master's Projects

Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time ...


Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin 2020 University of Arkansas, Fayetteville

Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin

Graduate Theses and Dissertations

The present work shows a secure-by-design process, defense-in-depth method, and security techniques for a secure distributed energy resource. The distributed energy resource is a cybersecure, solar inverter and battery energy storage system prototype, collectively called the Cybersecure Power Router. Consideration is given to the use of the Smart Green Power Node for a foundation of the present work. Metrics for controller security are investigated to evaluate firmware security techniques. The prototype's ability to mitigate, respond to, and recover from firmware integrity degradation is examined. The prototype shows many working security techniques within the context of a grid-connected, distributed energy ...


Stay-At-Home Motor Rehabilitation: Optimizing Spatiotemporal Learning On Low-Cost Capacitive Sensor Arrays, Reid Sutherland 2020 University of Arkansas, Fayetteville

Stay-At-Home Motor Rehabilitation: Optimizing Spatiotemporal Learning On Low-Cost Capacitive Sensor Arrays, Reid Sutherland

Graduate Theses and Dissertations

Repeated, consistent, and precise gesture performance is a key part of recovery for stroke and other motor-impaired patients. Close professional supervision to these exercises is also essential to ensure proper neuromotor repair, which consumes a large amount of medical resources. Gesture recognition systems are emerging as stay-at-home solutions to this problem, but the best solutions are expensive, and the inexpensive solutions are not universal enough to tackle patient-to-patient variability. While many methods have been studied and implemented, the gesture recognition system designer does not have a strategy to effectively predict the right method to fit the needs of a patient ...


Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann 2020 University of New Mexico

Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann

Mathematics & Statistics ETDs

This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements ...


Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell 2020 Liberty University

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell

Senior Honors Theses

With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age. There is no such thing as safe computing, and it is inevitable that security breaches will occur. Thus, security professionals and practices focus on two areas: security, preventing a breach from occurring, and resiliency, minimizing the damages once a breach has occurred. One of the most important practices for adding resiliency to source code is through obfuscation, a method of re-writing the code to a form that is virtually unreadable. This makes the ...


Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng 2020 Jilin University

Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng

Department of Computer Science Faculty Scholarship and Creative Works

In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to ...


A Distributed Model-View-Controller Design Pattern For A Graphical Remote Control Of A Multi-User Application, Dale E. Parson 2020 Kutztown University

A Distributed Model-View-Controller Design Pattern For A Graphical Remote Control Of A Multi-User Application, Dale E. Parson

Computer Science and Information Technology Faculty

The Model-View-Controller (MVC) is a design pattern for architecting the interactions among human users of graphical computing systems with the software Controller that manages user input, the Model that houses system state, and the View that projects the Model state into intelligible graphical form. The present work examines extending MVC into a Distributed Model-View-Controller pattern, starting with a stand-alone MVC system that is amenable to distribution over a local area network (LAN). Distribution takes the form of cloning a stand-alone MVC application into distinct client and server programs, and then altering each for its purpose while maintaining the initial graphical ...


Csci 49378: Lecture 2: Distributed Systems - Key Concepts & Techniques, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 2: Distributed Systems - Key Concepts & Techniques, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Distributed Systems - Key Concepts & Techniques" (Week Two) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 1: Overview, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 1: Overview, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Overview" (Week One) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 3: Synchronization, Consistency And Replication, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 3: Synchronization, Consistency And Replication, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Synchronization, Consistency and Replication" (Week Three) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Digital Commons powered by bepress