Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Mobile

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 113

Full-Text Articles in Engineering

Deeptype: A Deep Neural Network Approach To Keyboard-Free Typing, Joshua V. Broekhuijsen Feb 2023

Deeptype: A Deep Neural Network Approach To Keyboard-Free Typing, Joshua V. Broekhuijsen

Theses and Dissertations

Textual data entry is an increasingly-important part of Human-Computer Interaction (HCI), but there is room for improvement in this domain. First, the keyboard -- a foundational text-entry device -- presents ergonomic challenges in terms of comfort and accuracy for even well-trained typists. Second, touch-screen smartphones -- some of the most ubiquitous mobile devices -- lack the physical space required to implement a full-size physical keyboard, and settle for a reduced input that can be slow and inaccurate. This thesis proposes and examines "DeepType" to begin addressing both of these problems in the form of a fully-virtual keyboard, realized through a …


Autonomous Navigator Mobile Robot Upgrade, David Sansoucy Apr 2022

Autonomous Navigator Mobile Robot Upgrade, David Sansoucy

Thinking Matters Symposium

The mobile robot platform has been developed over the course of 10 years at USM. In Spring 2020, Belle-Isle and Werner updated the previous framework by rewriting the software to use the ROS framework running on an on-board Raspberry Pi 3. They also implemented navigation using an A* motion planning algorithm and image processing. In Summer 2021, Ames incorporated Lidar and Kinect sensors onto the robot to improve its real-time navigation capabilities. He also made improvements to the power distribution systems. This project aimed to build on the ROS frameworks developed by the previous 2 teams with the main goal …


Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci Jan 2021

Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci

CCE Theses and Dissertations

Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.

Kahneman introduced the concepts of …


Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz Dec 2019

Image-Driven Automated End-To-End Testing For Mobile Applications, Caleb Fritz

Computer Science and Computer Engineering Undergraduate Honors Theses

The increasing complexity and demand of software systems and the greater availability of test automation software is quickly rendering manual end-to-end (E2E) testing techniques for mobile platforms obsolete. This research seeks to explore the potential increase in automated test efficacy and maintainability through the use of computer vision algorithms when applied with Appium, a leading cross-platform mobile test automation framework. A testing framework written in a Node.js environment was created to support the development of E2E test scripts that examine and report the functional capabilities of a mobile test app. The test framework provides a suite of functions that connect …


Mnews: A Study Of Multilingual News Search Interfaces, Chenjun Ling Sep 2019

Mnews: A Study Of Multilingual News Search Interfaces, Chenjun Ling

Engineering Ph.D. Theses

With the global expansion of the Internet and the World Wide Web, users are becoming increasingly diverse, particularly in terms of languages. In fact, the number of polyglot Web users across the globe has increased dramatically.

However, even such multilingual users often continue to suffer from unbalanced and fragmented news information, as traditional news access systems seldom allow users to simultaneously search for and/or compare news in different languages, even though prior research results have shown that multilingual users make significant use of each of their languages when searching for information online.

Relatively little human-centered research has been conducted to …


Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh Jun 2019

Investigating Consumer Satisfaction Towards Mobile Marketing, Dr Surabhi Singh

Journal of International Technology and Information Management

The extensive applications of mobile phones are visible in global companies for the marketing of their products. The popularity of mobile marketing is increasing considerably. This paper has provided insights into the perspectives of consumer attitude towards mobile marketing in India. The companies will develop an understanding of how mobile marketing influence consumer attitudes. The scale of measurement used for Attitudes was Likert scale and explained the consumer's behavior towards mobile marketing. The factors identified through the study will provide insights into Consumer buying behavior via mobile platforms. The analytical tool SPSS has been used for analysis by using methods …


House Calls Mobile Virtual Stethoscope, Abigail Lindquist, Abigael Donohue, Trey Nahhas Jun 2019

House Calls Mobile Virtual Stethoscope, Abigail Lindquist, Abigael Donohue, Trey Nahhas

Biomedical Engineering

The purpose of this scope of work is to outline the progress of the Virtual Stethoscope design and development project as sponsored by House Calls Mobile. This device looks to provide accessible at-home care for patients all over the country through the mobile phone stethoscope attachment. With the virtual stethoscope technology, patients will be able to perform high-quality, in-home observation of heart, stomach, and lung sounds to be transmitted to a physician in real time. Eliminating the need to travel to a doctor’s office encourages patients to perform more regular checkups, increasing their likelihood potentially of life-saving early diagnoses. This …


Mobile Opera Backdrop, Juan Villalobos, Robbie Behlman, Kevin Valencia Jun 2018

Mobile Opera Backdrop, Juan Villalobos, Robbie Behlman, Kevin Valencia

Mechanical Engineering

Opera San Luis Obispo requires an acoustically projecting stage backdrop for their future plan of deploying a mobile opera house. The custom stage backdrop must be low-cost, easy to assemble and must project the performance sound to outdoor audiences. Other design requirements include being transportable in a step van, the ability to be assembled quickly by a crew of two, resistance to various outdoor conditions, the ability to mount accessories from the walls, and should meet a budget of $5,000. With the scope of the project understood, the three-quarter project is outlined. During the first quarter, the main deliverables included …


Using Augmented Reality In Engineering Education, Juan Estrella May 2018

Using Augmented Reality In Engineering Education, Juan Estrella

Publications and Research

Augmented Reality is an interactive mixture between the real world and computerized images that capture the audience’s attention. Devices that support augmented reality improve the image of the real-world surroundings with simulated physical input such as sound, video, or graphics overlaid on top of the real-world view. In recent years, augmented reality has improved beyond expensive military applications and has now entered a wide variety of domains. In engineering education, AR technologies can serve as a learning aid as well as a basis for innovation. The technology provides 3-D visualizations that allow to: (i) observe flaws in designs before the …


Mlaas: A Cloud-Based System For Delivering Adapative Micro Learning In Mobile Mooc Learning, Geng Sun, Tingru Cui, Jianming Yong, Jun Shen, Shiping Chen Jan 2018

Mlaas: A Cloud-Based System For Delivering Adapative Micro Learning In Mobile Mooc Learning, Geng Sun, Tingru Cui, Jianming Yong, Jun Shen, Shiping Chen

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell Jun 2017

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …


Iota Pi Application For Ios, Deborah Newberry Mar 2017

Iota Pi Application For Ios, Deborah Newberry

Computer Science and Software Engineering

Kappa Kappa Psi is a national honorary fraternity for college band members. They meet every Sunday night, and during these meetings they plan events (both internal and external) that aim to meet our goal of making sure that the Cal Poly band programs have their social, financial, material, and educational needs satisfied. This paper details the steps I took to create an application for them to use internally to help ease organizational processes.


Hf Hauff Mobile Wind Turbine: Lateral Articulating Arm, Brett Ulrich Jan 2017

Hf Hauff Mobile Wind Turbine: Lateral Articulating Arm, Brett Ulrich

All Undergraduate Projects

The objective is to create a leveling system that will be incorporated onto a platform which houses a mobile wind turbine used in agricultural applications. There are two approaches that were tested to arrive at a solution that would extend two concentric steel beams outwards and retract them. The first method involved a centralized hydraulic reservoir and braided oil lines leading to a charged shock that will be attached to different parts of the beams allowing for lateral movement. The second method utilizes an altered design from the boom of a crane truck, using a cable driven extension system and …


Richmond Mural Tour, Matthew Mcgee, Paul Mcdonald Jan 2017

Richmond Mural Tour, Matthew Mcgee, Paul Mcdonald

Capstone Design Expo Posters

In the past years Richmond has been growing in popularity in the world of street art. This popularity is due in part to the many projects that brought in artists from around the world to create beautiful artwork. There is so much art outside in Richmond as a result of these projects, but no great way to navigate the streets of the city in an efficient manner to see all of it. Richmond Mural Tour is a mobile cross-platform application that allows users to explore all of the amazing outdoor artwork around the city.

This application is built on ionic …


Picshare, Kyle Crane, Emily Klein, Ben Wunschel Jan 2017

Picshare, Kyle Crane, Emily Klein, Ben Wunschel

Capstone Design Expo Posters

PicShare is an app that allows companies to easily manage their social media presence without having to dedicate large amounts of time to the process. Your social media department can now extend their reach with the help of all of your other employees.

Our platform allows users to upload images/text from a mobile application or directly from the web. Administrators have the ability to take their own or user's image/text uploads and prepare for a social media post.

Employees attending events can get content to your social media staff much faster and with more variety. Our application is a great …


Visual Authentication Based On Visual Cryptography Using Mobile Devices, Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi Jan 2017

Visual Authentication Based On Visual Cryptography Using Mobile Devices, Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi

Faculty of Engineering and Information Sciences - Papers: Part B

Authentication refers to the process of confirming the identity of the authenticating entity. The use of passwords for user authentication has become ubiquitous in our everyday lives. Despite its wide-spread usage, password-based authentication has numerous deficiencies. For instance, password theft is becoming a common occurrence due to a variety of security problems associated with passwords.As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single session. Nevertheless, various one-time password schemes also suffer from a number of drawbacks in terms of their method of generation or delivery. In this chapter, we …


Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren Jan 2017

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren

Senior Projects Spring 2017

With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form of a …


Sbar: A Conceptual Framework To Support Learning Path Adaptation In Mobile Learning, Alva Hendi Muhammad, Jun Shen, Ghassan Beydoun, Dongming Xu Jan 2017

Sbar: A Conceptual Framework To Support Learning Path Adaptation In Mobile Learning, Alva Hendi Muhammad, Jun Shen, Ghassan Beydoun, Dongming Xu

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


A Framework Of Mlaas For Facilitating Adaptive Micro Learning Through Open Education Resources In Mobile Environment, Geng Sun, Tingru Cui, Wanwu Guo, Shiping Chen, Jun Shen Jan 2017

A Framework Of Mlaas For Facilitating Adaptive Micro Learning Through Open Education Resources In Mobile Environment, Geng Sun, Tingru Cui, Wanwu Guo, Shiping Chen, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Forget-Me-Not, Daniel Barber-Cironi, Shawn Nicholson, Jake Kruse, Nicole Dent Jan 2017

Forget-Me-Not, Daniel Barber-Cironi, Shawn Nicholson, Jake Kruse, Nicole Dent

Williams Honors College, Honors Research Projects

The purpose of Forget-Me-Not is to provide another level of care and comfort to those suffering from mild dementia, as well as provide further assistance for a friend, family member, or caretaker who may look after them. Research shows that timely reminders and persistent information can greatly improve the quality of life for those afflicted with mild dementia (Mokhtari et al.). Forget-Me-Not’s persistent display and wearable smart-bracelet offer a customizable and well connected system to provide these reminders. For the caretaker, a mobile application is provided in order to maintain the display and notify them of emergencies or critical events …


Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad Jul 2016

Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad

Master's Theses (2009 -)

Mobile devices are increasing in an astronomical rate throughout the world. While it is bringing a lot of comfort to the users it is not coming without any hazards. Now a user is susceptible to mobile call interruptions wherever he is, whether he is in the middle of a very important discussion or in a very important task like performing a complicated emergency operation in a hospital. As a result researchers have been studying to find ways to minimize cost of mobile interruptions. In this thesis we have proposed a mobile interruption management system in which callers have been grouped …


Legends App, Varsha Roopreddy, Anusha Praturu Jun 2016

Legends App, Varsha Roopreddy, Anusha Praturu

Computer Science and Software Engineering

The purpose of this project is to create a location-based story archiving mobile application for the iOS platform. The application is aimed to be a social network with an emphasis on storytelling and location. It will have functionality similar to most popular social networks, such as following, liking, and commenting capabilities, among others. Stories themselves can be accompanied by photos, and can be discovered by users in a number of different ways. The application has a huge range for potential audiences, as it has no geographical or age-based bound for interest.


Polyratings Website Update, Cody Sears, Connor Krier, Anil Thattayathu Jun 2016

Polyratings Website Update, Cody Sears, Connor Krier, Anil Thattayathu

Computer Science and Software Engineering

Polyratings is a well known website amongst Cal Poly students. Over the past 14 years it has been in existence the site has been viewed 2.5 million times. This is a drastic number because the average student population on campus every year nears 20,000. This being said, when class registration came around every quarter there was always talk about the Polyratings scores for professors. However, with this talk also came much negativity towards the site.

The problem that we found was that everyone needed Polyratings for help with class searching, but were also very dissatisfied with the website. The main …


Wet Grain Delivery Advice: A Previously Impossible Extension Challenge Solved Through App Technology, Joseph S. Dvorak, Sam Mcneill, Clint Hardy Apr 2016

Wet Grain Delivery Advice: A Previously Impossible Extension Challenge Solved Through App Technology, Joseph S. Dvorak, Sam Mcneill, Clint Hardy

Biosystems and Agricultural Engineering Faculty Publications

The delivery of wet grain during harvest is a complex and constantly changing problem about which Extension professionals have been unable to offer more than general advice. By capitalizing on important characteristics of mobile devices, a new app enables producers to fully benefit from detailed information universities have generated on grain drying and costs associated with delivery of grain to different locales. Development of such an app demonstrates the power of apps and mobile devices in allowing Extension to deliver previously unattainable services to its clientele.


Pre-R, Brian Carreon, Mariel Sanchez Mar 2016

Pre-R, Brian Carreon, Mariel Sanchez

Computer Science and Software Engineering

The project that PomTech worked on for Capstone is the Pre­R iOS Application for Dr. Sam Slishman. The main objective for this project was to create a functional prototype of the iOS application and deliver it to Dr. Slishman by the end of the 2016 Winter quarter. The prototype features the ability for patients to contact Dr. Slishman for consultation through a phone call, a Facetime video call, email, or a house call. In addition, the user of the prototype is able to see the proximity and availability of Dr. Slishman. Other features include a profile page of Dr. Slishman, …


Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar Jan 2016

Welcome To Willowtree: Come Take A Closer Look, Shahim-Abdul Satar, Kent White, Ayesha Zafar

Capstone Design Expo Posters

The demand for more workers in tech related fields has given students the opportunity of choosing between multiple job offers and students can now be more deliberate about the jobs that they accept. Because of this employers also need to set themselves apart from other companies. Many companies do this is by sending out brochures, PDFs, and other information that may be outdated by the time it goes out. Our solution to this problem was to make an application which would provide relevant data to the user as well as provide insight into the company. The end result is a …


Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca Jan 2016

Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca

Capstone Design Expo Posters

Capital One, a large US bank, is currently providing customers with a mobile servicing experience. One of the features of the mobile servicing app is easy and convenient access to account information. Capital One currently allows users to authenticate using a traditional username / password, their registered SureSwipe feature and even their finger on supported devices. The project's goal is to evaluate the viability of retinal recognition as a new method for biometric authentication.

By successfully developing this project, the application could offer retinal recognition as an additional biometric authentication option to customers. This can be used to help eliminate …


Persuasive Technology In Mobile Applications Promoting Physical Activity: A Systematic Review, John Matthews, Khin Than Win, Harri Oinas-Kukkonen, Mark Freeman Jan 2016

Persuasive Technology In Mobile Applications Promoting Physical Activity: A Systematic Review, John Matthews, Khin Than Win, Harri Oinas-Kukkonen, Mark Freeman

Faculty of Engineering and Information Sciences - Papers: Part A

Persuasive technology in mobile applications can be used to influence the behaviour of users. A framework known as the Persuasive Systems Design model has been developed for designing and evaluating systems that influence the attitudes or behaviours of users. This paper reviews the current state of mobile applications for health behavioural change with an emphasis on applications that promote physical activity. The inbuilt persuasive features of mobile applications were evaluated using the Persuasive Systems Design model. A database search was conducted to identify relevant articles. Articles were then reviewed using the Persuasive Systems Design model as a framework for analysis. …


Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


Authentication And Transaction Verification Using Qr Codes With A Mobile Device, Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang Jan 2016

Authentication And Transaction Verification Using Qr Codes With A Mobile Device, Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang

Faculty of Engineering and Information Sciences - Papers: Part A

User authentication and the verification of online transactions that are performed on an untrusted computer or device is an important and challenging problem. This paper presents an approach to authentication and transaction verification using a trusted mobile device, equipped with a camera, in conjunction with QR codes. The mobile device does not require an active connection (e.g., Internet or cellular network), as the required information is obtained by the mobile device through its camera, i.e. solely via the visual channel. The proposed approach consists of an initial user authentication phase, which is followed by a transaction verification phase. The transaction …