Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2015

Other Computer Engineering

Institution
Keyword
Publication
File Type

Articles 31 - 60 of 61

Full-Text Articles in Engineering

Ascendance: A Platformer For Computers, Philip Scott Beauchamp, Joseph Grant Plaster Jun 2015

Ascendance: A Platformer For Computers, Philip Scott Beauchamp, Joseph Grant Plaster

Computer Science and Software Engineering

Ascendance is a 2.5D platformer adventure game for computers, developed in the Unity development environment over two quarters to apply computer graphics and software engineering principles to the programming and iterative development of a game. Players encounter enemies which they must defeat or avoid while they explore the level for the required objects that lead them to victory. Testing of Ascendance required several iterations of play testing and surveys by various testers with and without gaming backgrounds, and was followed by rapid refinement of game mechanics and aesthetics. The result is a fully functional demo that features a sophisticated start …


The Struggle Of The Rubiniumite Wars, Timothy Mendez, Evan Peterson, Darren Huang, Kyle Lozier Jun 2015

The Struggle Of The Rubiniumite Wars, Timothy Mendez, Evan Peterson, Darren Huang, Kyle Lozier

Computer Science and Software Engineering

The Struggle of the Rubiniumite Warsis a browser-based, one- to two-player, simultaneous turn-based strategy game set amongst the stars. It uses WebGL and Three.js for 3D graphics in the browser, Node.js for game engine and artificial intelligence design on the backend, and Socket.io for networking using websockets. The development group’s inspiration, motivation, and reflections are discussed. Additionally, details on the development of the game engine, database integration with Parse, user registration with Nodemailer, graphics with Three.js and HTML/CSS, and audio with HTML5.


Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz Jun 2015

Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz

Liberal Arts and Engineering Studies

This research paper introduces a prototype of a feature for Robert E. Kennedy’s maps web application. The feature visualizes population density based off wifi router location and network usage within the building. The significance of the feature is noted by documenting the library’s transition into a hub for student life and campus culture, which increases the space’s occupancy and visitor retention for a longer time. The feature is based off a Voronoi diagram map distribution which strongly affects its technical and visual implementation. The end product is user tested by Cal Poly students and received a 93.5% satisfaction rate.


Project Llama: Making A Cappella Arranging Easier, Jason Lu Jun 2015

Project Llama: Making A Cappella Arranging Easier, Jason Lu

Liberal Arts and Engineering Studies

This project was intended to improve the current state of a cappella arranging. It explains the problems with current tools and explores other options.


Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong Jun 2015

Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong

Liberal Arts and Engineering Studies

Music has been an integral part of video games in its contribution to users' gameplay experiences. Varying from simple sound effects to elaborate scores, music helps shape the reactive environment of each video game. In particular, video games that generate unique levels and scenarios based on music has become more popular as its own genre. Games such as Audiosurf take this further, with having the game revolve entirely around levels generated to custom tracks. The aim of this study is to analyze the impact of such games, when it allows a user to select his or her own music.


Customer Tracking Through An Affordable Consumer Device Array, Daniel Nishi Jun 2015

Customer Tracking Through An Affordable Consumer Device Array, Daniel Nishi

Computer Science and Software Engineering

Commercial person tracking systems that use wifi packet analysis is currently very costly. In order to reduce the barrier of entry and allow small businesses to reap the benefits of indoor trilateration systems and monitor consumer traffic patterns, I am building out a system that will run on low-cost hardware and be deployable without a monthly service fee. By using consumer hardware, we are able to collect and analyze wifi management packets from smartphone sources and use it to extract actionable business information.


Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom Jun 2015

Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom

Computer Science and Software Engineering

Custom Keys is an app that consists of a server and an app which communicate through the network. This project explored a way to improve numeric keystroke input for users who do not have numeric keypads on their laptops or computers. I discuss many features and designs I used in Custom Keys to create the app and server. I also discuss some of the drawbacks to the design. Custom Keys was successfully created but more testing and research is needed to determine if it improves individual numeric keystroke's per minute.


The Ground Is Lava!, Aaron Jacobs Jun 2015

The Ground Is Lava!, Aaron Jacobs

Computer Science and Software Engineering

The Ground Is Lava! is a three dimensional video game written in C++ that uses OpenGL as its graphics API. The game is competitive, with two to four players controlling characters from a first-person perspective. The project implements multiple graphics technologies in order to achieve a consistent, pleasing visual style, including shadow mapping, sky rendering, and procedural animation. The engine built to power the game was developed in a flexible manner, allowing the code to be reused for future projects.


The Lecturescribe Platform, Kevin Backers, Kevin Feutz, Erik Owen Jun 2015

The Lecturescribe Platform, Kevin Backers, Kevin Feutz, Erik Owen

Computer Science and Software Engineering

The LectureScribe platform is a free classroom transcription service that is deployed as a website. The platform allows professors to talk into a microphone, and deaf or hard of hearing students have the ability to see what the professor is saying in real time on their personal device. LectureScribe was created by three Cal Poly Software Engineering students. This document details the platform itself, as well as the developers’ process of creating this software system over the span of two academic quarters.


G Boots: A Real-Time 3d Puzzle Video Game Graphics Senior Project, Zachary Glazer Jun 2015

G Boots: A Real-Time 3d Puzzle Video Game Graphics Senior Project, Zachary Glazer

Computer Science and Software Engineering

G Boots is a real-time 3D puzzle video game. It uses OpenGL, using GLSL for shaders, in order to implement cross platform support of advanced rendering and shading techniques. A level editing system was implemented so that anyone can make or edit levels that can then be played in the game. At the end of two quarters of development by a single developer, one polished proof of concept level was created using the level editing system in order to show the feasibility of the project.


Configuration-Driven Table Library, Torrin Smith Jun 2015

Configuration-Driven Table Library, Torrin Smith

Computer Science and Software Engineering

No abstract provided.


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …


Antics: A Cross-Platform Mobile Game, Gerren D. Willis Jun 2015

Antics: A Cross-Platform Mobile Game, Gerren D. Willis

Electronic Theses, Projects, and Dissertations

Recent technologies have made it increasingly easier for independent developers to build and deploy gaming applications for mobile devices. The focus of this master's project is to investigate one such set of technologies, which include Adobe AIR, Starling and Feathers, that allow games to be written in ActionScript and run on both Android and iOS devices. For this purpose, I chose to use these technologies to design and implement the game ANTics proposed by Whim Independent Studios, a start up game studio in San Bernardino. ANTics is written in ActionScript and runs on Adobe AIR. It can be deployed on …


A Balanced Secondary Structure Predictor, Md Nasrul Islam May 2015

A Balanced Secondary Structure Predictor, Md Nasrul Islam

University of New Orleans Theses and Dissertations

Secondary structure (SS) refers to the local spatial organization of the polypeptide backbone atoms of a protein. Accurate prediction of SS is a vital clue to resolve the 3D structure of protein. SS has three different components- helix (H), beta (E) and coil (C). Most SS predictors are imbalanced as their accuracy in predicting helix and coil are high, however significantly low in the beta. The objective of this thesis is to develop a balanced SS predictor which achieves good accuracies in all three SS components. We proposed a novel approach to solve this problem by combining a genetic algorithm …


A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie May 2015

A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie

Electronic Thesis and Dissertation Repository

It is difficult to objectively measure performance of complex tasks such as a surgical operation and surgical simulators require the ability to evaluate performance whether to predict surgical outcome, determine competence, provide learning feedback, etc. With no standard software framework for collecting, analyzing and evaluating performance data for complex tasks in simulations, it is investigated whether a solution can be implemented that allows for custom data collection schemes, all while being general enough to be used across many simulation platforms and can be used in a simple simulator.It is also investigated whether the implemented framework can perform its functionality while …


Experimental Boss Design And Testing, Joseph P. Mistretta May 2015

Experimental Boss Design And Testing, Joseph P. Mistretta

Undergraduate Honors Theses

Over the years, gaming has developed rapidly from simple pixel-based experiences to fully blown three-dimensional worlds. As developing technologies improve, so does the complexity and flexibility of what can be created. Encounters, along with all aspects of any gaming experience, have evolved along with the technologies that create them. These intense combat instances, often times referred to as “bosses”, represent a chance for the developer to challenge player skill, cooperation, and coordination. In addition to being major challenges, encounters also allow players to feel a sense of progression as they learn and adapt to mechanics incorporated within an encounter’s design. …


Novel Bioinformatic Approaches For Analyzing Next-Generation Sequencing Data, Yan Peng May 2015

Novel Bioinformatic Approaches For Analyzing Next-Generation Sequencing Data, Yan Peng

Dissertations

In general, DNA reconstruction is deemed as the key of molecular biology since it makes people realize how genotype affects phenotypes. The DNA sequencing technology emerged exactly towards this and has greatly promoted molecular biology’s development. The traditional method, "Sanger," is effective but extremely expensive on a cost-per-base basis. This shortcoming of Sanger method leads to the rapid development of next-generation sequencing technologies. The NGS technologies are widely used by virtue of their low-cost, high-throughput, and fast nature. However, they still face major drawbacks such as huge amounts of data as well as relatively short read length compared with traditional …


A Study Of Microwave Curing Of Underfill Using Open And Closed Microwave Ovens, Aditya Thakare Apr 2015

A Study Of Microwave Curing Of Underfill Using Open And Closed Microwave Ovens, Aditya Thakare

Dissertations and Theses

As the demand for microprocessors is increasing with more and more consumers using integrated circuits in their daily life, the demand on the industry is increasing to ramp up production.

In order to speed up the manufacturing processes, new and novel approaches are trying to change certain aspects of it. Microwaves have been tried as an alternative to conventional ovens in the curing of the polymers used as underfills and encapsulants in integrated circuits packages. Microwaves however being electromagnetic waves have non uniform energy distribution in different settings, causing burning or incomplete cure of polymers.

In this study, we compare …


Music Dynamic Animations, Thuy-Vy Do Mar 2015

Music Dynamic Animations, Thuy-Vy Do

Computer Engineering

Audio visualization gives a graphical representation to beats, intensity, and the fluctuating sounds heard in music. Music dynamic animation, deriving from this concept of audio visualizers, implements a hard coded range styled beat detection. This algorithm prioritizes graphical representations of classical and instrumental music. These graphical representations are intended to provide a sense of imagery.


Smart Solar Oven, Aaron Gragg Mar 2015

Smart Solar Oven, Aaron Gragg

Computer Engineering

Though solar oven technology provides a green and cost effective means of cooking, it is often not adopted because it fails to meet the demands of speed and reliability that are commonplace in our society. This project explores the modification of a traditional box solar to meet these demands by allowing the oven to report temperature to a user’s phone as well as orient itself towards the sun throughout the day.


Density Based Data Clustering, Rayan Albarakati Mar 2015

Density Based Data Clustering, Rayan Albarakati

Electronic Theses, Projects, and Dissertations

Data clustering is a data analysis technique that groups data based on a measure of similarity. When data is well clustered the similarities between the objects in the same group are high, while the similarities between objects in different groups are low. The data clustering technique is widely applied in a variety of areas such as bioinformatics, image segmentation and market research.

This project conducted an in-depth study on data clustering with focus on density-based clustering methods. The latest density-based (CFSFDP) algorithm is based on the idea that cluster centers are characterized by a higher density than their neighbors and …


Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin Jan 2015

Multilevel Ant Colony Optimization To Solve Constrained Forest Transportation Planning Problems, Pengpeng Lin

Theses and Dissertations--Computer Science

In this dissertation, we focus on solving forest transportation planning related problems, including constraints that consider negative environmental impacts and multi-objective optimizations that provide forest managers and road planers alternatives for making informed decisions. Along this line of study, several multilevel techniques and mataheuristic algorithms have been developed and investigated. The forest transportation planning problem is a fixed-charge problem and known to be NP-hard. The general idea of utilizing multilevel approach is to solve the original problem of which the computational cost maybe prohibitive by using a set of increasingly smaller problems of which the computational cost is cheaper.

The …


Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish Jan 2015

Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish

UNF Graduate Theses and Dissertations

In computer security, cryptographic algorithms and protocols are required to ensure security of data and applications. This research investigates techniques to reduce the energy consumed by cryptographic hash functions. The specific hash functions considered are Message Digest-2 (MD2), Message Digest-5 (MD5), Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2).

The discussion around energy conservation in handheld devices like laptops and mobile devices is gaining momentum. Research has been done at the hardware and operating system levels to reduce the energy consumed by these devices. However, research on conserving energy at the application level is a new approach. This research …


Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu Jan 2015

Application Of Random Indexing To Multi Label Classification Problems: A Case Study With Mesh Term Assignment And Diagnosis Code Extraction, Yuan Lu

Theses and Dissertations--Computer Science

Many manual biomedical annotation tasks can be categorized as instances of the typical multi-label classification problem where several categories or labels from a fixed set need to assigned to an input instance. MeSH term assignment to biomedical articles and diagnosis code extraction from medical records are two such tasks. To address this problem automatically, in this thesis, we present a way to utilize latent associations between labels based on output label sets. We used random indexing as a method to determine latent associations and use the associations as a novel feature in a learning-to-rank algorithm that reranks candidate labels selected …


An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni Jan 2015

An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni

UNF Graduate Theses and Dissertations

Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and …


Automated Beverage Dispenser, Sonya Istocka Jan 2015

Automated Beverage Dispenser, Sonya Istocka

Williams Honors College, Honors Research Projects

The intention of this project is to define a new way of distributing liquor. The project will consist of a device which will measure and track liquor being poured and associate it with a person, either a bartender or a bar patron. The challenges will be controlling the flow of liquor and recording it in an extremely accurate manner as well as processing data quickly so that a pour can be initiated very soon after a person is identified. The liquor dispenser will open up the possibility of a person being able to dispense their own liquor in a controlled …


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …


Use Of Ibm Collaborative Lifecycle Management Solution To Demonstrate Traceability For Small, Real-World Software Development Project, Lovelesh Chawla Jan 2015

Use Of Ibm Collaborative Lifecycle Management Solution To Demonstrate Traceability For Small, Real-World Software Development Project, Lovelesh Chawla

UNF Graduate Theses and Dissertations

The Standish Group Study of 1994 showed that 53 percent of software projects failed outright and another 31 percent were challenged by extreme budget and/or time overrun. Since then different responses to the high rate of software project failures have been proposed. SEI’s CMMI, the ISO’s 9001:2000 for software development, and the IEEE’s JSTD-016 are some examples of such responses. Traceability is the one common feature that these software development standards impose.

Over the last decade, software and system engineering communities have been researching subjects such as developing more sophisticated tooling, applying information retrieval techniques capable of semi-automating the trace …


Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga Jan 2015

Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga

UNF Graduate Theses and Dissertations

In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …


Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar Jan 2015

Hadoop Based Data Intensive Computation On Iaas Cloud Platforms, Sruthi Vijayakumar

UNF Graduate Theses and Dissertations

Cloud computing is a relatively new form of computing which uses virtualized resources. It is dynamically scalable and is often provided as pay for use service over the Internet or Intranet or both. With increasing demand for data storage in the cloud, the study of data-intensive applications is becoming a primary focus. Data intensive applications are those which involve high CPU usage, processing large volumes of data typically in size of hundreds of gigabytes, terabytes or petabytes. The research in this thesis is focused on the Amazon’s Elastic Cloud Compute (EC2) and Amazon Elastic Map Reduce (EMR) using HiBench Hadoop …