2,030 research outputs found
Spartan Daily, February 10, 1982
Volume 78, Issue 6https://scholarworks.sjsu.edu/spartandaily/6849/thumbnail.jp
Recommended from our members
Design Space Exploration in Cyber-Physical Systems
Cyber physical systems (CPS) integrate a variety of engineering areas such as control, mechanical and computer engineering in a holistic design effort. While interdependencies between the different disciplines are key attributes of CPS design science, little is known about the impact of design decisions of the cyber part on the overall system qualities. To investigate these interdependencies, this paper proposes a simulation-based Design Space Exploration (DSE) framework that considers detailed cyber system parameters such as cache size, bus width, and voltage levels in addition to physical and control parameters of the CPS. We propose an exploration algorithm that surfs the parameter configurations in the cyber physical sub-systems, in order to approximate the Pareto-optimal design points with regards to the trade-os among the design objectives, such as energy consumption and control stability. We apply the proposed framework to a network control system for an inverted-pendulum application. The presented holistic evaluation of the identified Pareto-points reveals the presence of non-trivial trade-os, which are imposed by the control, physical, and detailed cyber parameters. For instance the identified energy and control optimal design points comprise configurations with a wide range of CPU speeds, sample times and cache configuration following non-trivial zig-zag patterns. The proposed framework could identify and manage those trade-os and, as a result, is an imperative rst step to automate the search for superior CSP configurations
Evaluation of a Field Programmable Gate Array Circuit Reconfiguration System
This research implements a circuit reconfiguration system (CRS) to reconfigure a field programmable gate array (FPGA) in response to a faulty configurable logic block (CLB). It is assumed that the location of the fault is known and the CLB is moved according to one of four replacement methods: column left, column right, row up, and row down. Partial reconfiguration of the FPGA is done through the Joint Test Action Group (JTAG) port to produce the desired logic block movement. The time required to accomplish the reconfiguration is measured for each method in both clear and congested areas of the FPGA. The measured data indicate that there is no consistently better replacement method, regardless of the circuit congestion or location within the FPGA. Thus, given a specific location in the FPGA, there is no preferred replacement method that will result in the lowest reconfiguration time
Interim research assessment 2003-2005 - Computer Science
This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities
The Effects of a Videoconferencing Implementation Project on Educators\u27 Level of Concern in Southwest Michigan Schools
Problem. Two-way, interactive videoconferencing is emerging as an important technology tool for K-12 educators. The challenge is to identify and describe successful implementation. Educator concerns related to implementation may inhibit success. The focus of this study of a federally funded videoconferencing project is to address the factors that influence educators\u27 level of concern.
Method. The Concerns-Based Adoption Model (CBAM) Stages of Concern (SoC) instrument was administered to measure the level of concern of two cohorts of participants. Data related to project, including number of connections, district and building technical support, professional development, and equipment reliability were also collected. One-way repeated measures of analysis of variance was used to determine if change took place in the Stages of Concern responses while canonical correlation and multiple regression were used to examine the relationship between level of concern and factors thought to be related to project implementation (e.g. number of connections, equipment reliability, etc.).
Results. Overall, approximately 86% of the participants were at levels 1-3 on the measure of levels of concern at the beginning of the project. At the end of the project implementation period (at posttest), about 84% were at levels 4-5. Canonical correlation analysis indicated that level of concern and number of connections were significantly associated with professional development hours, building tech support and equipment reliability ( rc = 0.81, p = 0.001). Higher levels of concern (-0.88) and a larger number of connections (-0.71) are associated with higher professional development hours (-0.60), better building tech support (-0.42), and higher equipment reliability (-0.69). However, equipment reliability (β = 0.59) is the best predictor of participants\u27 level of concern. By itself, equipment reliability accounted for 42% ( r = 0 .65) of the variance in participants\u27 levels of concern.
Conclusions. The activities in the project in this study resulted in improved levels of concernfor the project participants. Improved levels of concern and increased number of connections result from higher levels of equipment reliability, adequate building-level technical support, and a high level of professional development with equipment reliability having the most impact. It is essential that as videoconferencing projects are implemented, leaders at all levels address these factors
Profile Analysis of Mobile Application Security
ABSTRACT
This thesis conducts profile analysis on the mobile application security using peer-review articles that were published from 2010 to 2018. From the analysis, we will identify prolific authors, intuitions, and geographic regions as well as the topics addressed by the articles. The profile analysis will reveal most frequently used research methods, research approaches (quantitative, qualitative and mixed), and theories used to study the field. This thesis reveals that none of the researchers have made significant contributions to the field, and researches are not collaborating to solve their research problems. The profile analysis shows that surveys and experiments are the most utilized research methods, and most researchers studied the field at a higher level, i.e., security was the focus of the research but did not go deeper into various aspects of security such as privacy, security vulnerabilities, and mobile application security best practices
- …