Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad Jul 2016

Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad

Master's Theses (2009 -)

Mobile devices are increasing in an astronomical rate throughout the world. While it is bringing a lot of comfort to the users it is not coming without any hazards. Now a user is susceptible to mobile call interruptions wherever he is, whether he is in the middle of a very important discussion or in a very important task like performing a complicated emergency operation in a hospital. As a result researchers have been studying to find ways to minimize cost of mobile interruptions. In this thesis we have proposed a mobile interruption management system in which callers have been grouped …


Polyratings Website Update, Cody Sears, Connor Krier, Anil Thattayathu Jun 2016

Polyratings Website Update, Cody Sears, Connor Krier, Anil Thattayathu

Computer Science and Software Engineering

Polyratings is a well known website amongst Cal Poly students. Over the past 14 years it has been in existence the site has been viewed 2.5 million times. This is a drastic number because the average student population on campus every year nears 20,000. This being said, when class registration came around every quarter there was always talk about the Polyratings scores for professors. However, with this talk also came much negativity towards the site.

The problem that we found was that everyone needed Polyratings for help with class searching, but were also very dissatisfied with the website. The main …


Pre-R, Brian Carreon, Mariel Sanchez Mar 2016

Pre-R, Brian Carreon, Mariel Sanchez

Computer Science and Software Engineering

The project that PomTech worked on for Capstone is the Pre­R iOS Application for Dr. Sam Slishman. The main objective for this project was to create a functional prototype of the iOS application and deliver it to Dr. Slishman by the end of the 2016 Winter quarter. The prototype features the ability for patients to contact Dr. Slishman for consultation through a phone call, a Facetime video call, email, or a house call. In addition, the user of the prototype is able to see the proximity and availability of Dr. Slishman. Other features include a profile page of Dr. Slishman, …


Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar Jan 2016

Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar

Capstone Design Expo Posters

The demand for more workers in tech related fields has given students the opportunity of choosing between multiple job offers and students can now be more deliberate about the jobs that they accept. Because of this employers also need to set themselves apart from other companies. Many companies do this is by sending out brochures, PDFs, and other information that may be outdated by the time it goes out. Our solution to this problem was to make an application which would provide relevant data to the user as well as provide insight into the company. The end result is a …


Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca Jan 2016

Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca

Capstone Design Expo Posters

Capital One, a large US bank, is currently providing customers with a mobile servicing experience. One of the features of the mobile servicing app is easy and convenient access to account information. Capital One currently allows users to authenticate using a traditional username / password, their registered SureSwipe feature and even their finger on supported devices. The project's goal is to evaluate the viability of retinal recognition as a new method for biometric authentication.

By successfully developing this project, the application could offer retinal recognition as an additional biometric authentication option to customers. This can be used to help eliminate …


Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


Context Aware Application Using Beacons, Abdullah Nasim Jan 2016

Context Aware Application Using Beacons, Abdullah Nasim

Senior Projects Spring 2016

With the growing popularity of mobile computing, as well as the increasing demand for location-based services, this paper introduces a design and implementation of a location-aware system using Beacons. This project comprises three parts: a web application, backend server and a mobile application client. The web application serves as a content management system by allowing users to manage projects, input data and create associations between Beacons and data. The backend server contains application logic and a database. The mobile application client interacts with the Beacons and provides location-specific services.