Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn Jan 2022

Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn

Williams Honors College, Honors Research Projects

Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …


Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola Jan 2022

Synthesizing Realistic Substitute Data For A Law Enforcement Database Using A Python Library, Anthony Carrola

Graduate Theses, Dissertations, and Problem Reports

In many databases, there is private or sensitive data that should not be accessible to any but a few individuals, such as HIPAA (Health Insurance Portability and Accountability Act) protected or LE (law enforcement) data. However, there is often a need to work with the data or change it for proper and thorough testing, especially for the developers . In some cases, the developers may be authorized to access and view the data, but it is rarely allowable for that data to be changed. Further, it is unlikely, especially on a large project, that all of the developers will have …


Multilateration Index., Chip Lynch Aug 2021

Multilateration Index., Chip Lynch

Electronic Theses and Dissertations

We present an alternative method for pre-processing and storing point data, particularly for Geospatial points, by storing multilateration distances to fixed points rather than coordinates such as Latitude and Longitude. We explore the use of this data to improve query performance for some distance related queries such as nearest neighbor and query-within-radius (i.e. “find all points in a set P within distance d of query point q”). Further, we discuss the problem of “Network Adequacy” common to medical and communications businesses, to analyze questions such as “are at least 90% of patients living within 50 miles of a covered emergency …


Guitar Store Inventory, Alexander Didonato Jan 2021

Guitar Store Inventory, Alexander Didonato

Williams Honors College, Honors Research Projects

This project displays my senior programming project for a made up Guitar store inventory.


Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil Oct 2020

Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil

Theses and Dissertations

Database integrity is crucial to organizations that rely on databases of important data. They suffer from the vulnerability to internal fraud. Database tampering by internal malicious employees with high technical authorization to their infrastructure or even compromised by externals is one of the important attack vectors.

This thesis addresses such challenge in a class of problems where data is appended only and is immutable. Examples of operations where data does not change is a) financial institutions (banks, accounting systems, stock market, etc., b) registries and notary systems where important data is kept but is never subject to change, and c) …


A Database For Indexable Carbide Inserts, Andrew Yoder Jun 2019

A Database For Indexable Carbide Inserts, Andrew Yoder

Computer Engineering

The indexable inserts project is a collaborative effort to aggregate into a single database as many indexable carbide inserts from as many manufacturers as possible. Inserts are generally labeled with a part number following a specific standard determined by shapes and measurements, however specifications for certain aspects of carbide inserts—such as which materials they can cut—can vary by manufacturer. There currently is not a way to search a comprehensive database containing tools from multiple manufacturers for a handful of inserts that would satisfy some necessary parameters, making finding the correct tool in a shop a much more time-consuming process than …


Improving And Understanding Data Quality In Large-Scale Data Systems, Xiaolan Wang Mar 2019

Improving And Understanding Data Quality In Large-Scale Data Systems, Xiaolan Wang

Doctoral Dissertations

Systems and applications rely heavily on data, which makes data quality a critical factor for their function. In turn, low quality data can be incredibly costly and disruptive, leading to loss of revenue, incorrect conclusions, and misguided policy decisions. Improving data quality is far more than purging datasets of errors; it is more important to improve the processes that produce the data, to collect good data sources that are used for generating the data, and to truly understand the quality of the data. Therefore, the objective of this thesis is to improve and understand data quality from the above aspects. …


An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz May 2018

An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz

Computer Science and Computer Engineering Undergraduate Honors Theses

It is fair to say that Pompeii is the most studied archaeological site in the world. Beyond the extensive remains of the city itself, the timing of its rediscovery and excavation place it in a unique historiographical position. The city has been continuously studied since the 18th century, with historians and archaeologists constantly reevaluating older sources as our knowledge of the ancient world expands. While several studies have approached the city from a data driven perspective, no studies of the city have taken a quantitative holistic approach on the scale of the VR Pompeii project. Hyper-specificity has been the order …


Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha Jan 2018

Chronic Risk And Disease Management Model Using Structured Query Language And Predictive Analysis, Mamata Ojha

Electronic Theses and Dissertations

Individuals with chronic conditions are the ones who use health care most frequently and more than 50% of top ten causes of death are chronic diseases in United States and these members always have health high risk scores. In the field of population health management, identifying high risk members is very important in terms of patient health care, disease management and cost management. Disease management program is very effective way of monitoring and preventing chronic disease and health related complications and risk management allows physicians and healthcare companies to reduce patient’s health risk, help identifying members for care/disease management along …


Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael Jun 2016

Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael

Computer Engineering

No abstract provided.


Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …


Jdiet: Footprint Reduction For Memory-Constrained Systems, Michael John Huffman Jun 2009

Jdiet: Footprint Reduction For Memory-Constrained Systems, Michael John Huffman

Master's Theses

Main memory remains a scarce computing resource. Even though main memory is becoming more abundant, software applications are inexorably engineered to consume as much memory as is available. For example, expert systems, scientific computing, data mining, and embedded systems commonly suffer from the lack of main memory availability.

This thesis introduces JDiet, an innovative memory management system for Java applications. The goal of JDiet is to provide the developer with a highly configurable framework to reduce the memory footprint of a memory-constrained system, enabling it to operate on much larger working sets. Inspired by buffer management techniques common in modern …