Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (12)
- Engineering (12)
- Systems Architecture (6)
- Computer and Systems Architecture (5)
- Digital Communications and Networking (5)
-
- Software Engineering (5)
- Other Computer Sciences (4)
- Information Security (3)
- Life Sciences (3)
- Robotics (3)
- Electrical and Computer Engineering (2)
- Graphics and Human Computer Interfaces (2)
- Hardware Systems (2)
- Mechanical Engineering (2)
- Other Computer Engineering (2)
- Programming Languages and Compilers (2)
- Aerospace Engineering (1)
- Agricultural Science (1)
- Applied Mathematics (1)
- Artificial Intelligence and Robotics (1)
- Biology (1)
- Climate (1)
- Controls and Control Theory (1)
- Databases and Information Systems (1)
- Dynamic Systems (1)
- Environmental Education (1)
- Environmental Health and Protection (1)
- Keyword
-
- Networks (3)
- Android (2)
- BGP (2)
- Raspberry Pi (2)
- Web (2)
-
- API (1)
- Android NDK (1)
- Anonymous messaging (1)
- Apache (1)
- Aquaponics (1)
- Arduino (1)
- Artificial neural network (1)
- Autonomous (1)
- Bandwidth aggregation (1)
- Boat (1)
- Border gateway protocol (1)
- CUDA (1)
- Cal Poly Pier (1)
- Citrix (1)
- Cluster (1)
- Computational Design (1)
- Computer crimes (1)
- Computer networks (1)
- Computer security (1)
- Cubesat (1)
- Cyber Attacks (1)
- Distributed Systems (1)
- Distributed computing (1)
- Distributed systems (1)
- Driver (1)
- Publication Year
Articles 1 - 24 of 24
Full-Text Articles in OS and Networks
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Pier Ocean Pier, Brandon J. Nowak
Pier Ocean Pier, Brandon J. Nowak
Computer Engineering
Pier Ocean Peer is a weatherproof box containing a Jetson Nano, connected to a cell modem and camera, and powered by a Lithium Iron Phosphate battery charged by a 50W solar panel. This system can currently provide photos to monitor the harbor seal population that likes to haul out at the base of the Cal Poly Pier, but more importantly it provides a platform for future expansion by other students either though adding new sensors directly to the Jetson Nano or by connecting to the jetson nano remotely through a wireless protocol of their choice.
Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan
Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan
Master's Theses
Computer networks were not designed with security in mind, making research into the subject of network security vital. Virtual Networks are similar to computer networks, except the components of a Virtual Network are in software rather than hardware. With the constant threat of attacks on networks, security is always a big concern, and Virtual Networks are no different. Virtual Networks have many potential attack vectors similar to physical networks, making research into Virtual Network security of great importance. Virtual Networks, since they are composed of virtualized network components, have the ability to dynamically change topologies. In this paper, we explore …
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Computer Science and Software Engineering
This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Computer Science and Software Engineering
Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Computer Engineering
The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Computer Science and Software Engineering
Consumers are increasingly relying on public wireless hotspots to access the internet from a growing number of devices. Usage of these hotspots has expanded from just laptops to everything from iPhones to tablets, which are expected to be internet-connected for full functionality. It has become common for one to check if there’s an open wireless hotspot connection available at places like coffee shops, hotels, restaurants, or even a doctor’s waiting room. The issue that arises is that these public connections present an inherent security risk, as anyone can connect and gain access to the network. For increased security, the use …
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen
Liberal Arts and Engineering Studies
Many users are now transitioning to small-scale hydroponics and aquaponics at home. There can be a barrier to entry with these systems as there is a delicate balance of chemicals, pH, etc. that must be maintained. There are sensors for these various components but they are either aimed at commercial production or are un-automated. Fresh Bytes is a microcomputer with sensors to detect all of these unseen components in a hydroponic system. A prototype of this microcomputer is produced along with CAD plans for more professional versions of it. The sensors are verified and future development is contemplated.
Dcamp: Distributed Common Api For Measuring Performance, Alexander Paul Sideropoulos
Dcamp: Distributed Common Api For Measuring Performance, Alexander Paul Sideropoulos
Master's Theses
Although the nearing end of Moore’s Law has been predicted numerous times in the past, it will eventually come to pass. In forethought of this, many modern computing systems have become increasingly complex, distributed, and parallel. As software is developed on and for these complex systems, a common API is necessary for gathering vital performance related metrics while remaining transparent to the user, both in terms of system impact and ease of use.
Several distributed performance monitoring and testing systems have been proposed and implemented by both research and commercial institutions. However, most of these systems do not meet several …
Modeler: Web Api Modeling Tool, Yegor Pomortsev
Modeler: Web Api Modeling Tool, Yegor Pomortsev
Computer Science and Software Engineering
This report presents the API Modeler system, a tool for creating and modifying web APIs models, within the context of the API modeling problem, and how it serves to solve several common use-cases and scenarios for interacting with web API models. The report describes the motivation for Modeler, its design and implementation, related tools, and possible future improvements to the system.
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Physics
The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.
Bandwidth Aggregation Across Multiple Smartphone Devices, Bradley R. Zeller
Bandwidth Aggregation Across Multiple Smartphone Devices, Bradley R. Zeller
Master's Theses
Smartphones now account for the majority of all cell phones in use today [23]. Ubiquitous Internet access is a valuable feature offered by these devices and the vast majority of smartphone applications make use of the Internet in one way or another. However, the bandwidth offered by these cellular networks is often much lower than we typically experience on our standard home networks, leading to a less-than-optimal user experience. This makes it very challenging and frustrating to access certain types of web content such as video streaming, large file downloads, loading large webpages, etc.
Given that most modern smartphones are …
Astrophobia: A 3d Multiplayer Space Combat Game With Linear Entity Interpolation, Luke Larson
Astrophobia: A 3d Multiplayer Space Combat Game With Linear Entity Interpolation, Luke Larson
Computer Science and Software Engineering
Astrophobia is a Descent-like 3D networked multiplayer space combat game with linear entity interpolation (client-side animation between game-state packets to give the illusion of continuous game updates) similar to entity interpolation implemented in Valve Software’s Source engine. Additionally, Astrophobia procedurally generates unique levels, has zero-gravity physics, ship and projectile wall bouncing, hit detection, OpenGL 3D graphics, Phong lighting, ship model and texture, and a simple HUD that provides visualization of health points, aiming crosshair, and player scoreboard.
In Perfect Xen, A Performance Study Of The Emerging Xen Scheduler, Ryan Hnarakis
In Perfect Xen, A Performance Study Of The Emerging Xen Scheduler, Ryan Hnarakis
Master's Theses
Fifty percent of Fortune 500 companies trust Xen, an open-source bare-metal hypervisor, to virtualize their websites and mission critical services in the cloud. Providing superior fault tolerance, scalability, and migration, virtualization allows these companies to run several isolated operating systems simultaneously on the same physical server. These isolated operating systems, called virtual machines, require a virtual traffic guard to cooperate with one another. This guard known as the Credit2 scheduler along with the newest Xen hypervisor was recently developed to supersede the older schedulers. Since wasted CPU cycles can be costly, the Credit2 prototype must undergo significant performance validation before …
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker
Master's Theses
Massively parallel programming is an increasingly growing field with the recent introduction of general purpose GPU computing. Modern graphics processors from NVIDIA and AMD have massively parallel architectures that can be used for such applications as 3D rendering, financial analysis, physics simulations, and biomedical analysis. These massively parallel systems are exposed to programmers through in- terfaces such as NVIDIAs CUDA, OpenCL, and Microsofts C++ AMP. These frame- works expose functionality using primarily either C or C++. In order to use these massively parallel frameworks, programs being implemented must be run on machines equipped with massively parallel hardware. These requirements limit …
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …
Reactive Routing In Hidra Networks, Scott Michael Marshall
Reactive Routing In Hidra Networks, Scott Michael Marshall
Computer Engineering
In recent years, the Internet has grown so large that the future scalability of the Internet has become a major concern. The two primary scalability concerns are the size of the forwarding table and the ability for BGP to converge while distributing hundreds of thousands of routes.
HIDRA is a new Internet routing architecture that is backwards-compatible with existing routing technologies and protocols that focuses on feasibility-of-implementation. HIDRA remedies the first Internet scalability concern by proposing a means to reduce the number of entries in the default-free zone (DFZ) forwarding table.
This project extends HIDRA by designing a complete reactive …
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson
Computer Science and Software Engineering
The paper consists of a detailed examination of malware broken down into three main sections.
- Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
- Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …
Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim
Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim
Master's Theses
Close to 1% of the world's electricity is consumed by computer servers. Given that the increased use of electricity raises costs and damages the environment, optimizing the world's computing infrastructure for power consumption is worthwhile. This thesis is one attempt at such an optimization. In particular, I began by building a cluster of 6 Intel Atom based low-power nodes to perform work analogous to data center clusters. Then, I installed a version of Hadoop modified with a novel power management system on the cluster. The power management system uses different algorithms to determine when to turn off idle nodes in …
Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger
Hidra: Hierarchical Inter-Domain Routing Architecture, Bryan Clevenger
Master's Theses
As the Internet continues to expand, the global default-free zone (DFZ) forwarding table has begun to grow faster than hardware can economically keep pace with. Various policies are in place to mitigate this growth rate, but current projections indicate policy alone is inadequate. As such, a number of technical solutions have been proposed. This work builds on many of these proposed solutions, and furthers the debate surrounding the resolution to this problem. It discusses several design decisions necessary to any proposed solution, and based on these tradeoffs it proposes a Hierarchical Inter-Domain Routing Architecture - HIDRA, a comprehensive architecture with …
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White
Master's Theses
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …
Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza
Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza
Master's Theses
Satellites are playing an increasingly important role in collecting scientific information, providing communication services, and revolutionizing navigation. Until recently satellites were large and very expensive, creating a high barrier to entry that only large corporations and government agencies could overcome. In the past few years the CubeSat project at California Polytechnic University in San Luis Obispo (Cal Poly) has worked to refine the design and launching of small, lightweight, and less expensive satellites called pico-satellites, opening space up to a wider audience. Now that Cal Poly has the launch logistics and hardware under control, a new problem has arisen. These …
Pipelined Apache Http Server, Kevin Le
Pipelined Apache Http Server, Kevin Le
Master's Theses
Web servers often become overloaded with irregular surges in web traffic. Several techniques have been explored to cope with these overloads such as distributing load throughout different servers. This thesis presents Pipelined Apache HTTP Server, a modified version of the Apache Software Foundation’s HTTP Server that utilizes a pipelined execution of Apache’s request cycle. We discuss Apache’s original architecture, the modifications necessary for implementation of pipelined execution, and analyze its run time. Ultimately, we hoped to increase throughput of Apache but fall short because of unbalanced request phases and pipelining overhead.
A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama
A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama
Master's Theses
The applicability of implementing Ratio-based SYN Flood Detection (RSD) on a network processor is explored, and initial results are presented.