Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

817 Full-Text Articles 972 Authors 626,673 Downloads 96 Institutions

All Articles in Systems Architecture

Faceted Search

817 full-text articles. Page 7 of 28.

Information Systems For Business And Beyond, David T. Bourgeois, James L. Smith, Shouhong Wang, Joseph Mortati 2019 Biola University

Information Systems For Business And Beyond, David T. Bourgeois, James L. Smith, Shouhong Wang, Joseph Mortati

Open Textbooks

This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a bit technical, every effort has been made to convey the information essential to understanding a topic while not getting overly focused in detailed terminology.

The text is organized around thirteen chapters divided into three major parts, as follows:

• Part 1: What Is an Information System?

◦ Chapter 1: What Is an Information System? – This chapter provides an overview of information systems, including the history of how information systems got to where it is ...


U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder 2019 The University of Akron

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral 2019 University of North Florida

A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral

UNF Graduate Theses and Dissertations

According to Sterling et al., a batch scheduler, also called workload management, is an application or set of services that provide a method to monitor and manage the flow of work through the system [Sterling01]. The purpose of this research was to develop a method to assess the execution speed of workloads that are submitted to a batch scheduler. While previous research exists, this research is different in that more complex jobs were devised that fully exercised the scheduler with established benchmarks. This research is important because the reduction of latency even if it is miniscule can lead to massive ...


Cloud Migration Of Rpat Tool, Tanmay Gore 2019 Iowa State University

Cloud Migration Of Rpat Tool, Tanmay Gore

Creative Components

Machine learning has recently gained popularity in many engineering, science, medical and other domains outside computer science. Therefore, many researchers, scientist, students and developers are developing machine learning based applications for various purposes. However, due to a large number of technologies and application deployment platforms, these professionals spend more time learning technologies than on developing and optimizing the core logic for their applications. This paper describes the design and implementation of a new cloud-based deployment platform suitable to deploy machine learning based applications across multiple platforms. This platform focuses heavily on security, privacy, and ease of deployment for developers. It ...


Occam Manual, Martin Zwick 2019 Portland State University

Occam Manual, Martin Zwick

Systems Science Faculty Publications and Presentations

Occam is a Discrete Multivariate Modeling (DMM) tool based on the methodology of Reconstructability Analysis (RA). Its typical usage is for analysis of problems involving large numbers of discrete variables. Models are developed which consist of one or more components, which are then evaluated for their fit and statistical significance. Occam can search the lattice of all possible models, or can do detailed analysis on a specific model.

In Variable-Based Modeling (VBM), model components are collections of variables. In State-Based Modeling (SBM), components identify one or more specific states or substates.

Occam provides a web-based interface, which allows uploading a ...


Digital Libraries For Open Science: Using A Socio-Technical Interaction Network Approach, Jennifer E. Beamer 2019 The Claremont Colleges Library

Digital Libraries For Open Science: Using A Socio-Technical Interaction Network Approach, Jennifer E. Beamer

Library Staff Publications and Research

This paper argues that using Socio-Technical Interaction Networks to build on extensively-used Digital Library infrastructures for supporting Open Science knowledge environments. Using a more social -technical approach could lead to an evolutionary reconceptualization of Digital Libraries. Digital Libraries being used as knowledge environments, built upon on the document repositories, will also emphasize the importance of user interaction and collaboration in carrying out those activities. That is to say, the primary goal of Digital Libraries is to help users convert information into knowledge; therefore, Digital Libraries examined in light of socio-technical interaction networks have the potential to shift Digital Libraries from ...


Traffic Incident Detection Using Inrix Data, Raviteja Raja Byna 2019 Iowa State University

Traffic Incident Detection Using Inrix Data, Raviteja Raja Byna

Creative Components

Over the last decade, it is estimated that 25% of the congestion on the US roads is due to traffic incidents such as crash, overturned trucks or stalled vehicles. Currently available software based intelligent transportation systems does not provide comprehensive decision support to minimize the impact of traffic incidents and do not detect the incidents on time. The aim of the TIMELI project is to develop a robust and fast incident detection on the road. Lambda architecture is used to design the architecture of TIMELI project. Different technologies are explored to finalize the best design to accomodate the given functional ...


Contextual Bandit Modeling For Dynamic Runtime Control In Computer Systems, Jason Hiebel 2019 Michigan Technological University

Contextual Bandit Modeling For Dynamic Runtime Control In Computer Systems, Jason Hiebel

Dissertations, Master's Theses and Master's Reports

Modern operating systems and microarchitectures provide a myriad of mechanisms for monitoring and affecting system operation and resource utilization at runtime. Dynamic runtime control of these mechanisms can tailor system operation to the characteristics and behavior of the current workload, resulting in improved performance. However, developing effective models for system control can be challenging. Existing methods often require extensive manual effort, computation time, and domain knowledge to identify relevant low-level performance metrics, relate low-level performance metrics and high-level control decisions to workload performance, and to evaluate the resulting control models.

This dissertation develops a general framework, based on the contextual ...


Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi 2019 University of Jordan

Big Data Investment And Knowledge Integration In Academic Libraries, Saher Manaseer, Afnan R. Alawneh, Dua Asoudi

Copyright, Fair Use, Scholarly Communication, etc.

Recently, big data investment has become important for organizations, especially with the fast growth of data following the huge expansion in the usage of social media applications, and websites. Many organizations depend on extracting and reaching the needed reports and statistics. As the investments on big data and its storage have become major challenges for organizations, many technologies and methods have been developed to tackle those challenges.

One of such technologies is Hadoop, a framework that is used to divide big data into packages and distribute those packages through nodes to be processed, consuming less cost than the traditional storage ...


Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin 2019 Old Dominion University

Computational Modeling Of Trust Factors Using Reinforcement Learning, C. M. Kuzio, A. Dinh, C. Stone, L. Vidyaratne, K. M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

As machine-learning algorithms continue to expand their scope and approach more ambiguous goals, they may be required to make decisions based on data that is often incomplete, imprecise, and uncertain. The capabilities of these models must, in turn, evolve to meet the increasingly complex challenges associated with the deployment and integration of intelligent systems into modern society. Historical variability in the performance of traditional machine-learning models in dynamic environments leads to ambiguity of trust in decisions made by such algorithms. Consequently, the objective of this work is to develop a novel computational model that effectively quantifies the reliability of autonomous ...


D3s: A Framework For Enabling Unmanned Aerial Vehicles As A Service, Farid Naït-Abdesselam, Ahmad Alsharoa, Mohamed Y. Selim, Daji Qiao, Ahmed Kamal 2019 University of Missouri-Kansas City

D3s: A Framework For Enabling Unmanned Aerial Vehicles As A Service, Farid Naït-Abdesselam, Ahmad Alsharoa, Mohamed Y. Selim, Daji Qiao, Ahmed Kamal

Electrical and Computer Engineering Publications

In this paper, we consider the use of UAVs to provide wireless connectivity services, for example after failures of wireless network components or to simply provide additional bandwidth on demand, and introduce the concept of UAVs as a service (UaaS). To facilitate UaaS, we introduce a novel framework, dubbed D3S, which consists of four phases: demand, decision, deployment, and service. The main objective of this framework is to develop efficient and realistic solutions to implement these four phases. The technical problems include determining the type and number of UAVs to be deployed, and also their final locations (e.g., hovering ...


Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal 2019 Purdue University

Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Hundreds of millions of network cameras have been installed throughout the world. Each is capable of providing a vast amount of real-time data. Analyzing the massive data generated by these cameras requires significant computational resources and the demands may vary over time. Cloud computing shows the most promise to provide the needed resources on demand. In this article, we investigate how to allocate cloud resources when analyzing real-time data streams from network cameras. A resource manager considers many factors that affect its decisions, including the types of analysis, the number of data streams, and the locations of the cameras. The ...


A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen 2019 South Dakota State University

A Dynamic Fault Tolerance Model For Microservices Architecture, Hajar Hameed Addeen

Electronic Theses and Dissertations

Microservices architecture is popular for its distributive system styles due to the independent character of each of the services in the architecture. Microservices are built to be single and each service has its running process and interconnecting with a lightweight mechanism that called application programming interface (API). The interaction through microservices needs to communicate internally. Microservices are a service that is likely to become unreachable to its consumers because, in any distributed setup, communication will fail on occasions due to the number of messages passing between services. Failures can occur when the networks are unreliable, and thus the connections can ...


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot 2018 Norwich University

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by ...


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo 2018 University of Pennsylvania Carey Law School

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

Faculty Scholarship at Penn Law

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the ...


Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht 2018 CUNY Hunter College

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools ...


Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez 2018 University of New Mexico

Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez

Computer Science ETDs

Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In ...


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai 2018 University of Arkansas, Fayetteville

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Graduate Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing ...


Empathetic Computing For Inclusive Application Design, Kenny CHOO TSU WEI 2018 Singapore Management University

Empathetic Computing For Inclusive Application Design, Kenny Choo Tsu Wei

Dissertations and Theses Collection (Open Access)

The explosive growth of the ecosystem of personal and ambient computing de- vices coupled with the proliferation of high-speed connectivity has enabled ex- tremely powerful and varied mobile computing applications that are used every- where. While such applications have tremendous potential to improve the lives of impaired users, most mobile applications have impoverished designs to be inclusive– lacking support for users with specific disabilities. Mobile app designers today haveinadequate support to design existing classes of apps to support users with specific disabilities, and more so, lack the support to design apps that specifically target these users. One way to resolve ...


Enhancing Value-Based Healthcare With Reconstructability Analysis: Predicting Cost Of Care In Total Hip Replacement, Cecily Corrine Froemke, Martin Zwick 2018 Portland State University

Enhancing Value-Based Healthcare With Reconstructability Analysis: Predicting Cost Of Care In Total Hip Replacement, Cecily Corrine Froemke, Martin Zwick

Systems Science Faculty Publications and Presentations

Legislative reforms aimed at slowing growth of US healthcare costs are focused on achieving greater value per dollar. To increase value healthcare providers must not only provide high quality care, but deliver this care at a sustainable cost. Predicting risks that may lead to poor outcomes and higher costs enable providers to augment decision making for optimizing patient care and inform the risk stratification necessary in emerging reimbursement models. Healthcare delivery systems are looking at their high volume service lines and identifying variation in cost and outcomes in order to determine the patient factors that are driving this variation and ...


Digital Commons powered by bepress