Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse Jan 2022

Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse

Honors Program Theses

IoT (Internet of Things) devices have become increasingly popular in recent years while WiFi continues to serve as primary network provider indoors. With the advancements in technology, the networks of IoT devices continue to weave closely with indoor WiFi network deployments. Both kinds of these networks primarily operate in 2.4 GHz ISM Band (though latest WiFi standards can operate in 5 GHz and 60 GHz bands, too). With the multitude of tiny IoT sensors being deployed indoors alongside operational WiFi networks, severe interference scenarios cannot be ruled out. As a result of this interference, performance of WiFi networks is bound …


A Graphical File System Visualization Tool For Operating Systems, Jacob Bundt Jan 2018

A Graphical File System Visualization Tool For Operating Systems, Jacob Bundt

Honors Program Theses

Fileshark was developed for the primary purpose of aiding in the teaching of students in file system related courses, particularly at the undergraduate level, by providing a visual representation of often abstract file system ideas. Many teachers find it difficult to teach the file system in detail in a typical operating systems classroom environment due to its abstract nature and the inability to truly observe what is occurring within the file system. Fileshark provides an easy to use interface that can be used by both students and professors to visualize the internal workings of the file system and the processes …


The Efficient Recovery Of Deleted Data From Nand Flash Memory, Lisa Diercks Jan 2016

The Efficient Recovery Of Deleted Data From Nand Flash Memory, Lisa Diercks

Honors Program Theses

NAND flash memory is used in flash drives, smart phones, and memory cards for digital cameras. While there are ways to recover data from deleted memory, there are no universal or efficient ways to recover data from NAND flash memory. When a user clicks “delete” on a file in this type of memory, the file is not necessarily deleted, but may just be hidden. This means these files are still on the chip, but are inaccessible through normal means. The ability to recover this lost data could help computer forensic examiners during investigations and corporations working to use secure deletion …


An Analysis Of Use Of Automated Tools For Improving The Process Of Software Verification And Validation In A Midwestern Company, Darshak Dodiya Jan 2014

An Analysis Of Use Of Automated Tools For Improving The Process Of Software Verification And Validation In A Midwestern Company, Darshak Dodiya

Dissertations and Theses @ UNI

As the use of electronics and software in the modern off road vehicles tend to increase, there is a huge challenge of getting the electronics and software tested before making it available for customer use. There are a lot of interactions between the hardware and software for the vehicle to function. And with the amount of interactions in the hardware and software come a lot of problems in verifying the functionality of the vehicle. If proper verification is neglected, the customer might end up getting an unsafe vehicle which can lead to serious consequences. To make these vehicles safe and …


Robotic Manufacturing Cell: An Analysis Of Variables Affecting Performance, Elvis Alicic Jan 2012

Robotic Manufacturing Cell: An Analysis Of Variables Affecting Performance, Elvis Alicic

Dissertations and Theses @ UNI

Analyzing the performance of manufacturing cells is a well established concept. The justification for conducting thorough analyses of manufacturing cells comes from the known advantages it can provide, including performance improvement and production planning improvement, both current and future. This study focuses on assessing the variables affecting performance of a robotic manufacturing cell through the measure of throughput. Initially, simulation modeling is utilized to model an existing robotic cell and compare the output to actual production output from the same cell. Additionally, general regression modeling is employed to analyze the following variables and their effect on throughput: machine downtime, off-plan …


A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen Jan 2002

A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen

Dissertations and Theses @ UNI

Since computers came into existence, simulations have been associated with it as the two inseparable media, simulations and computers, have had a mutually beneficial effect. With the advent of the flexible microcomputer, simulation has been widely used. In recent years, computer technology has infiltrated every sector in society, especially the educational system and industrial operations where simulations are essential for satisfying both instructional and industrial needs. Simulation effectiveness research has been mixed in both the educational system and industries. Therefore, it is still necessary to evaluate how effective computer simulation is as an instructional method or strategy.

This study was …


Attitudes And Perceptions Regarding Internet-Based Electronic Data Interchange In A Public Organization In Saudi Arabia, Abdulrahman S. Al-Zumaia Jan 2001

Attitudes And Perceptions Regarding Internet-Based Electronic Data Interchange In A Public Organization In Saudi Arabia, Abdulrahman S. Al-Zumaia

Dissertations and Theses @ UNI

This study examined the attitudes and perceptions of staff members and administrators in the General Directorate for Private Institutes & Centers (GDPI&C), Training institutes, and Centers in Saudi Arabia toward Internet-based Electronic Data Interchange (I-EDI) in a public organization. A survey was conducted of a group of GDPI&C members and randomly selected Institutes and Centers. The 339 respondents participated anonymously by providing demographic information and completing the attitudes and perceptions section of I-EDI questionnaire. The survey response rate was 82.6%.

An attitude survey was distributed to staff members, administrators, and faculty members in the Saudi Arabian GDPI&C, Training Institutes, and …


Efficient Axis And Circle Detection Through Hough Transformation, Karissa E. Hobert Jan 1995

Efficient Axis And Circle Detection Through Hough Transformation, Karissa E. Hobert

Presidential Scholars Theses (1990 – 2006)

Computer vision and human vision are quite different. While a person can look at an object and easily recognize it, a computer is does not understand the the objects it is seeing. Finding axes and circles in an image is an intermediate step in designing a machine with the ability to recognize shapes and objects. Through the utilization of contour and smoothed local symmetry information, the main axes of an image are determined and may be used to facilitate shape and object analysis. A Hough transform algorithm detects the most popular lines from a set of candidate axis points. This …


An Examination Of The Relationships Among Learning Style, Attitudes, And Outcomes Of Computer-Assisted Instruction, Daniel Glen Wilson Jan 1994

An Examination Of The Relationships Among Learning Style, Attitudes, And Outcomes Of Computer-Assisted Instruction, Daniel Glen Wilson

Dissertations and Theses @ UNI

This research was based upon a hypothesized AptitudeTreatment Interaction (ATI). More specifically, the research investigated the relationships between student learning style (aptitude) and student outcomes with computer-assisted instruction (treatment). These outcomes included student achievement with computer-assisted instruction (CAI) and student attitude toward CAI.

To examine these relationships, a researcher-developed CAI program on light and color theory was validated and administered to 144 students in an educational media course at the University of Northern Iowa. Participants in the study were first asked to complete the Grasha-Riechmann Student Learning Style Scales (GRSLSS) inventory along with a demographic survey. Next, each participant completed …