Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Drone (2)
- Mobile Application (2)
- Android (1)
- Autonomous (1)
- CA (1)
-
- Cetificate Authority (1)
- Chrome (1)
- Cloud (1)
- Computer Science (1)
- Computer Vision (1)
- Convergence (1)
- Detection (1)
- Distributed System (1)
- Extension (1)
- Growing Grounds (1)
- Homepage (1)
- IOS (1)
- Inventory (1)
- Inventory System (1)
- Javascript (1)
- Local Nursery (1)
- MITM (1)
- Man-in-the-Middle (1)
- Music (1)
- Parse (1)
- Plants (1)
- RFID (1)
- Robot Roborodentia (1)
- Robotics (1)
- Swift (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Chrome Extension To Explore Modular Homepage, Griffin T. Cloonan, Landon E. Woollard, Nick A. Ponce
Chrome Extension To Explore Modular Homepage, Griffin T. Cloonan, Landon E. Woollard, Nick A. Ponce
Computer Science and Software Engineering
This was an exploratory project, intended to develop skills developing extension based web applications. We spent our time building a modular, customizable homepage extension for google chrome. The bulk of our work was focused towards structure and function, as a result, the project is not highly appealing visually. We worked with foreign concepts in a foreign environment in an attempt to learn new skills on the fly.
Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan
Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan
Computer Engineering
A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy …
Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor
Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor
Computer Engineering
No abstract provided.
Red Piston (Roborodentia), Gabriel Lee Hernandez, Davie Sy
Red Piston (Roborodentia), Gabriel Lee Hernandez, Davie Sy
Computer Science and Software Engineering
Roborodentia is an annual robotics competition held during Cal Poly’s Open House showcase. Teams of one to three people come together to build an autonomous robot to typically collect rings for points. The specifications of the competition will be detailed in the problem statement. For Roborodentia 2016, we built a machine dubbed Red Piston to tackle on this year’s competition. The following report will detail the design process and implementation of our robot.
Slaps Music Sharing App, Maximillian L. Parelius
Slaps Music Sharing App, Maximillian L. Parelius
Computer Engineering
Slaps is a fun way to share new songs with friends. Users can simply select songs from their personal library of music, select a short sample of the song to share, and then select which friends to share it with. If a user loves a song that he/she receives, they can link directly to iTunes through the app to download the full song.
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Computer Engineering
SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.
One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …
Growing Grounds Inventory Senior Project Application, Javier Balandran
Growing Grounds Inventory Senior Project Application, Javier Balandran
Computer Engineering
No abstract provided.