Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 103

Full-Text Articles in Computer Engineering

Raspberry Pi Enterprise Network Wifi Bridge, Dylan Halland, Riley Barrett Jun 2019

Raspberry Pi Enterprise Network Wifi Bridge, Dylan Halland, Riley Barrett

Computer Engineering

The goal of this project is to allow an IoT device, such as a Weemo Smart Plug, Amazon Echo, Gaming Console, or any other Wi-Fi enabled device to connect to a WPA_EAP Enterprise Network by using a Raspberry Pi Zero W as a packet forwarding device. Extra configuration steps are required for devices connecting to an enterprise network, and many devices are not compatible at all. By using a Wi-Fi Bridge, any device can easily obtain internet access by connecting to the Pi.

The system can be implemented on either one wireless card or two separate cards depending on the ...


Planr.: Planar Learning Autonomous Navigation Robot, Gabrielle S. Santamorena, Daniel Kasman, Jesus Mercado, Ben Klave, Andrew Weisman, Anthony Fortner Jun 2019

Planr.: Planar Learning Autonomous Navigation Robot, Gabrielle S. Santamorena, Daniel Kasman, Jesus Mercado, Ben Klave, Andrew Weisman, Anthony Fortner

Computer Engineering

PLANR is a self-contained robot capable of mapping a space and generating 2D floor plans of a building while identifying objects of interest. It runs Robot Operating System (ROS) and houses four main hardware components. An Arduino Mega board handles the navigation, while an NVIDIA Jetson TX2, holds most of the processing power and runs ROS. An Orbbec Astra Pro stereoscopic camera is used for recognition of doors, windows and outlets and the RPLiDAR A3 laser scanner is able to give depth for wall detection and dimension measurements. The robot is intended to operate autonomously and without constant human monitoring ...


Don't Trip! A Quicker Way To Plan Your Trip, Jose Cruz Arinaga, Ryan Wong Jun 2019

Don't Trip! A Quicker Way To Plan Your Trip, Jose Cruz Arinaga, Ryan Wong

Computer Engineering

Currently, Google Maps does not provide users with a way to find the optimal path for a user to travel given a list of points. Given a list of destinations you may want to visit, our web application will do all of the difficult planning for you and ultimately find the most optimal path for you to take to visit all of your destinations in a timely manner. The people who will benefit most from this application are tourists or people who travel often and want to explore an unfamiliar city. Even locals running their weekly errands could save time ...


Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist Dec 2018

Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist

Architectural Engineering

Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic ...


A Survey Of Virtual Network Architectures, Lenoy Avidan Dec 2018

A Survey Of Virtual Network Architectures, Lenoy Avidan

Computer Science and Software Engineering

With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures ...


Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris Dec 2018

Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris

Master's Theses and Project Reports

Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to ...


Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball Jun 2018

Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball

Computer Engineering

The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work ...


Learning Management Website, Brendan A. Baronia Jun 2018

Learning Management Website, Brendan A. Baronia

Computer Engineering

The following system was developed as a basic course management system for use by teachers and students. The project started as an alternative to existing platforms, such as Moodle, though because of a two quarter time constraint the complexity of the system was reduced to a more reasonable level. The resulting system requirements included a simple course creation/enrollment system, with separate sections, topics, and resources including videos, files, and a basic graph problem.


Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang Jun 2018

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang

Computer Engineering

After Cal Poly Racing’s electrical team began to hit the technical limits of the ADC and other I/O features of the current 8-bit Atmel AT90 microcontroller unit, it became clear that an upgrade was due. This replatforming project takes the functionalities of the old, 8-bit architecture, and aims to provide a 32-bit version using the ARM MKE1xF MCU. With the idea of having a working PCB as a stretch goal, the scope of the library development was limited to enable base functionality. Thus, the only libraries developed were for the Timer, ADC, SPI, UART, and CAN. Additionally, this ...


Delegation Application, Erik Matthew Phillips Jun 2018

Delegation Application, Erik Matthew Phillips

Computer Science and Software Engineering

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh Jun 2018

A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh

Computer Science and Software Engineering

No abstract provided.


Dynamic Routing And Network Monitoring For The Polywog Protocol, Josh Pfeffer, Ryan Lawrence Jun 2018

Dynamic Routing And Network Monitoring For The Polywog Protocol, Josh Pfeffer, Ryan Lawrence

Computer Science and Software Engineering

This document analyzes the implementation of dynamic routing for router nodes in a mesh network. It examines the algorithm used to populate both the minimum-distance and the routing tables. Furthermore, it describes the node configurations used for testing and applications for mesh networks.

Additionally, this document describes the implementation and testing of network monitoring in a mesh network. It discusses the steps used to forward active nodes in the network between router nodes, a gateway node, and a network monitor.

Lastly, this paper details our future plans for implementing additional features for a network monitor.


Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette Jun 2018

The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette

Master's Theses and Project Reports

As wireless protocols become easier to implement, more products come with wireless connectivity. This latest push for wireless connectivity has left a gap in the development of the security and the reliability of some protocols. These wireless protocols can be used in the growing field of IoT where wireless sensors are used to share information throughout a network. IoT is being implemented in homes, agriculture, manufactory, and in the medical field. Disrupting a wireless device from proper communication could potentially result in production loss, security issues, and bodily harm. The 802.15.4/ZigBee protocol is used in low power ...


Wifi Gate Guard: A Captive Portal Implementation For Home Networks, Ben Blumenberg May 2018

Wifi Gate Guard: A Captive Portal Implementation For Home Networks, Ben Blumenberg

Computer Science and Software Engineering

WiFi Gate Guard aims to improve the user experience for authentication on home wireless networks, by alleviating some of the hardships causes by passwords and by offering a platform on which further security enhancements could be built. It accomplishes this by using captive portal technology, making it extremely easy for guests to authenticate without needing to ask for a password. Home network administrators can approve or deny access using a simple iOS app. WiFi Gate Guard is built to run on basic home routers, with minimal other hardware requirements. Once it’s up and running, passwords never need to be ...


Skylux Smartphone Controlled Skylight, James A. Green Vi Mar 2018

Skylux Smartphone Controlled Skylight, James A. Green Vi

Computer Engineering

There are numerous electric skylight openers available for purchase for home-use, but the majority of them are remote based, or operated by a wall-unit. Furthermore, these devices are in hard to reach places, so if one were to lose the remote on a remote operated system, the only option is to contact the manufacturer for a new device. As such, my senior project, in collaboration with Colton Sundstrom’s senior project, build upon our existing capstone project in order to allow operation of the Internet of Things (IoT) device over the internet. Our client, Richard Murray, was unsatisfied with the ...


Cru Android App, Dylan Sun Mar 2018

Cru Android App, Dylan Sun

Computer Science and Software Engineering

The Cru app is focused on connecting students and faculty to one of the many Cru ministries here in San Luis Obispo. The app is capable of connecting individuals to a specific community group and ministry teams, gathering information about upcoming Cru events and gatherings, and direct rideshare capabilities. The Cru Android App utilizes Java and other industry standard technologies to fully deliver a well-rounded user experience and to be connected with Cru. In this project, I increased Cru app’s access control abilities and updated the app overall to be ready for an alpha release.


Modeling Adversarial Insider Vehicles In Mix Zones, Nicholas Plewtong Mar 2018

Modeling Adversarial Insider Vehicles In Mix Zones, Nicholas Plewtong

Master's Theses and Project Reports

Security is a necessity when dealing with new forms of technology that may not have been analyzed from a security perspective. One of the latest growing technological advances are Vehicular Ad-Hoc Networks (VANETs). VANETs allow vehicles to communicate information to each other wirelessly which allows for an increase in safety and efficiency for vehicles. However, with this new type of computerized system comes the need to maintain security on top of it.

In order to try to protect location privacy of the vehicles in the system, vehicles change pseudonyms or identifiers at areas known as mix zones. This thesis implements ...


Pubwc Bathroom Review App, Clay Jacobs Dec 2017

Pubwc Bathroom Review App, Clay Jacobs

Computer Science and Software Engineering

For my senior project, I developed an iOS application to allow

users to find, rate, and review nearby public restrooms. The app takes

advantage of crowdsourced data to collect bathroom and review

information. I also created a REST API to interface with the backend

database that could be used to port the application to other platforms.


Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo Dec 2017

Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo

Master's Theses and Project Reports

Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches ...


Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari Jun 2017

Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari

Mechanical Engineering

This project was proposed by Dr. Brian Paavo through a desire to more easily study the benthic sediment layers of the ocean. To do so, he asked us to build a simple and compact machine for use in sediment profile imagery (SPI). Although devices like this already exist, they are all large scale devices that require a ship with a crane to deploy, which is expensive and time consuming. Instead, he desired a “micro” SPI, which is capable of being deployed from a small vessel that can easily navigate shallow waters. Our interpretation of these requirements was as follows: a ...


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell Jun 2017

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was ...


Smartgarden, Samuel S. Lees, Matthew T. Lindly Jun 2017

Smartgarden, Samuel S. Lees, Matthew T. Lindly

Computer Engineering

The problem that the SmartGarden project seeks to solve is the challenge of watering succulents correctly and maintaining consistent plant health. Too much water can cause root rot and drowning while too little water can cause dehydration and starvation.
The SmartGarden solves this common problem by configuring a Raspberry Pi to measure soil moisture, store the data to an AWS server in the cloud, and water the succulent when necessary, informing the user by providing both a web-interface and a variety of notifications.


Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren Jun 2017

Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren

Mechanical Engineering

No abstract provided.


Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips Jun 2017

Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips

Electrical Engineering

The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless ...


An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper Jun 2017

An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper

Computer Science and Software Engineering

This project presents information on the architecture of most modern cloud-hosting platforms, and gives a cost-benefit analysis of two common Platform-as-a-Service (PaaS) companies: Heroku and AWS.


Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan May 2017

Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan

Computer Engineering

A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy ...


Rules Based Analysis Engine For Application Layer Ids, David Scrobonia May 2017

Rules Based Analysis Engine For Application Layer Ids, David Scrobonia

Master's Theses and Project Reports

Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional ...


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez Dec 2016

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT application ...


Rocket Stats, Kyle Cornelison Dec 2016

Rocket Stats, Kyle Cornelison

Computer Science and Software Engineering

An Android application to allow Rocket League players to view their stats and track progress.