Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 4 of 4
Full-Text Articles in OS and Networks
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Computer Science and Software Engineering
Consumers are increasingly relying on public wireless hotspots to access the internet from a growing number of devices. Usage of these hotspots has expanded from just laptops to everything from iPhones to tablets, which are expected to be internet-connected for full functionality. It has become common for one to check if there’s an open wireless hotspot connection available at places like coffee shops, hotels, restaurants, or even a doctor’s waiting room. The issue that arises is that these public connections present an inherent security risk, as anyone can connect and gain access to the network. For increased security, the use …
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson
Computer Science and Software Engineering
The paper consists of a detailed examination of malware broken down into three main sections.
- Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
- Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …
Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim
Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim
Master's Theses
Close to 1% of the world's electricity is consumed by computer servers. Given that the increased use of electricity raises costs and damages the environment, optimizing the world's computing infrastructure for power consumption is worthwhile. This thesis is one attempt at such an optimization. In particular, I began by building a cluster of 6 Intel Atom based low-power nodes to perform work analogous to data center clusters. Then, I installed a version of Hadoop modified with a novel power management system on the cluster. The power management system uses different algorithms to determine when to turn off idle nodes in …