Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Autonomous (2)
- Computer vision (2)
- Drone (2)
- Internet of things (2)
- Iot (2)
-
- Network (2)
- Android (1)
- Apple TV App Video Game Micronaut (1)
- Applied sciences (1)
- Arduino (1)
- Automatic (1)
- Aws (1)
- Battery Exchange (1)
- Ble (1)
- Bluetooth (1)
- Brute force (1)
- Business (1)
- CAN (1)
- CT (1)
- Cal Poly Rose Float (1)
- Cloud (1)
- Compute platform (1)
- Digital (1)
- Distributed (1)
- Distributive computing (1)
- Drone Security (1)
- EVEC (1)
- Electric Vehicle (1)
- Electronic Fuel Injection (1)
- Embedded systems (1)
Articles 1 - 24 of 24
Full-Text Articles in Computer Engineering
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Electronic Thesis and Dissertation Repository
Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …
Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor
Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor
Computer Engineering
No abstract provided.
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell
Computer Engineering
The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez
Computer Engineering
“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2
In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …
Autonomous Golf Cart Firmware, Gerik Kubiak
Autonomous Golf Cart Firmware, Gerik Kubiak
Computer Engineering
The Autonomous Golf Cart Project is a project sponsored by the Cal Poly Robotics Club. The multidisciplinary team is adding sensors and electronics to a regular golf cart with the goal to drive the golf cart around campus without and human input. This task requires a plethora of hardware and firmware to control that hardware. The firmware provides an interface for higher level software to then control the hardware and therefore drive the golf cart. This report is focused on the hardware modifications and the firmware used in order to drive the golf cart from a computer.
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Doctoral Dissertations
A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …
Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas
Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas
Masters Theses
With the importance of data security at its peak today, many reconfigurable systems are used to provide security. This protection is often provided by FPGA-based encrypt/decrypt cores secured with secret keys. Physical unclonable functions (PUFs) use random manufacturing variations to generate outputs that can be used in keys. These outputs are specific to a chip and can be used to create device-tied secret keys. Due to reliability issues with PUFs, key generation with PUFs typically requires error correction techniques. This can result in substantial hardware costs. Thus, the total cost of a $n$-bit key far exceeds just the cost of …
Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford
Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford
Computer Engineering
This paper presents Duck Watch, a proof of concept for a smart swimming pool. With our system, a swimmer will be able to log on to our website prior to leaving his or her house to help them decide if the conditions are favorable to go to a public lap swimming pool. Our system will inform the user of a number of environmental factors such as water temperature, exterior temperature, and humidity, as well as whether or not there are any open lanes currently.
Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch
Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch
Computer Engineering
Oluso is a new startup offering affordable, inexpensive technology to empower the individual. Our product is designed to keep the user in contact with someone close to them in emergency situations. Over the course of the past several months we have performed interviews with both individuals who may be interested in this product as well as organizations who may be interested in purchasing this product for their members. Our product is nearing completion and all of the companies we have interviewed have displayed a significant amount of interest in our product. The combination of easy communication and peace of mind …
El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian
El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian
Computer Engineering
In today’s world of smartphones, self-driving cars, and internet-connected coffee makers, it seems as if computers are contained in everything around us. These “embedded systems” have become critical components of our lives, improving everything about the things they control, from cost, to speed, to simplicity. One area that embedded systems has hardly gained a foothold is in the world of floatbuilding. Most of the floats in the Tournament of Roses Parade, including the one built jointly by Cal Poly San Luis Obispo and Cal Poly Pomona, are technologically very simple, using mostly analog components and rudimentary discrete digital logic to …
Senior Project: Control System For An Underwater Remotely Operated Vehicle, Tyler Mau, Joseph Mahoney
Senior Project: Control System For An Underwater Remotely Operated Vehicle, Tyler Mau, Joseph Mahoney
Computer Engineering
No abstract provided.
Pet Food Monitor Using The Raspberry Pi, Kimberly Aguero
Pet Food Monitor Using The Raspberry Pi, Kimberly Aguero
Computer Engineering
Computer system built on a Raspberry Pi that will monitor the levels of food in a pet food bowl. If it detects that there is no food in the bowl, it will notify the user via email or text.
Rapid Battery Exchange Automation, Andrea Everson
Rapid Battery Exchange Automation, Andrea Everson
Computer Engineering
With the drastic threat of exhausting the world’s fossil fuels, society has been scrambling to find alternative forms of energy for transportation. One of these viable options is an electric vehicle powered by batteries. While this idea is fairly viable, consumers are looking to have the same experience with an electric car than they would with a gas-powered vehicle. One of their major concerns is the lack of range in an electric vehicle.
This project aims to present a solution that would extend the range by allowing users to quickly go from low battery to fully charged battery by performing …
Pinpoint: Location Beacon And Tracking, Ezequiel Lopez Iii
Pinpoint: Location Beacon And Tracking, Ezequiel Lopez Iii
Computer Engineering
The purpose of Pinpoint was to create a device that can collect and transmit location information for multiple users on a wireless network. The device would be used to keep track of and communicate with other users nearby. The final design includes a touchscreen display as a graphical user interface (GUI), an XBee RF module for wireless networking, a GPS receiver for location tracking, and a Programmable System on a Chip (PSoC) to control the modules.
Stand, Lisa Yip
Stand, Lisa Yip
Computer Engineering
With busy lives, people sometimes forget to take breaks for multiple hours at a time. The purpose of this project is to remind the user to move around every hour if they have not already. To do so, stand will be a light weight fitness tracker that will detect the number of steps made within an hour. If the step count, dependent on goals, is not met then a vibration motor will gently remind them to take a break and walk. The data throughout the day will be shown on an iOS application where the user will be able to …
Micronaut: A 2d Action Side Scrolling Platformer For The Apple Tv, Christopher Michael Williams
Micronaut: A 2d Action Side Scrolling Platformer For The Apple Tv, Christopher Michael Williams
Computer Science and Software Engineering
Micronaut is a 2D side scrolling platformer video game application developed for the Apple TV with the tvOS SDK version 9.1. It explores humancomputer interaction of platformer video games on the Apple TV and aims to give the player the most control to maximize enjoyment. Micronaut features five engaging levels with each level designed to focus on teaching the player the mechanics one at a time. Micronaut has been submitted and is undergoing submission for the Apple TV App Store at the time of this paper. Christopher Williams managed the software development and design, and Jacob Johannesen created the graphical …
Cal Poly Supermileage Electronic Fuel Injection, Alexander Pink
Cal Poly Supermileage Electronic Fuel Injection, Alexander Pink
Electrical Engineering
Cal Poly Supermileage is a student-run engineering club that builds prototype gasoline vehicles optimized maximum fuel-efficiency. To power their vehicles, the Supermileage team makes use of single-cylinder, 4-stroke, electronically fuel-injected (EFI) gasoline engines. This report details the development, iterative design & test cycles, and integration of an EFI system for the Supermileage club. This project develops an EFI system that interfaces to the most common types of sensors found in the low-power Supermileage-range of engines, including throttle-position sensors, manifold absolute pressure sensors, gear-tooth hall-effect sensors, variable-reluctance position sensors, engine coolant temperature sensors, intake air temperature sensors, and exhaust oxygen sensors. …
Wireless Authentication Of Smart Doors Using Rfid, Austin A. Hentrup, Deyi Lu, Peter R. Roldan
Wireless Authentication Of Smart Doors Using Rfid, Austin A. Hentrup, Deyi Lu, Peter R. Roldan
Honors Thesis
In an increasingly interconnected world, the traditional metal lock-and-key method of securing homes and businesses is becoming more outdated and inconvenient when compared to modern solutions. Modern systems are smarter, faster, lighter, more secure and more integrated than ever before. Though the costs of Radio Frequency Identification (RFID) are shrinking overall, professional solutions remain prohibitively expensive. The aim of this project is to develop an inexpensive, secure, and internet-enabled RFID door authentication system. This is to transparently investigate the design limitations for these systems and help determine the ultimate feasibility of RFID growing to define the modern door-authentication standard.
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Masters Theses, 2010-2019
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …
Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman
Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman
Computer Science and Computer Engineering Undergraduate Honors Theses
Bluetooth Low Energy provides a platform for many developers to implement low power communication for a wide range of applications. The Internet of Things (IoT) is an emerging concept that is gaining traction in the world of embedded systems. Bluetooth Low Energy is one of the latest enablers of this movement and the Simblee module improves BLE accessibility. This thesis provides an evaluation of the average power consumption the Simblee uses in different use cases. By leveraging one of the Simblee’s most notable features, the Ultra Low Power mode, very low power consumption can be achieved, potentially increasing battery life …
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Graduate Theses and Dissertations
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the issue of hardware security has risen to the forefront of computer engineering. Because of the miniscule size yet devastating effects of hardware Trojans, few detection methods have been presented that adequately address this problem facing the hardware industry. One such method with the ability to detect hardware Trojans is Structural Checking. This methodology analyzes a soft IP at the register-transfer level to discover malicious inclusions. An extension of this methodology is presented that expands the list of signal functionalities, termed assets, in addition to introducing …
Prevention Of Drone Jamming Using Hardware Sandboxing, Joshua Mead
Prevention Of Drone Jamming Using Hardware Sandboxing, Joshua Mead
Graduate Theses and Dissertations
In this thesis, we concern ourselves with the security of drone systems under jamming-based attacks. We explore a relatively new concept we previously devised, known as hardware sandboxing, to provide runtime monitoring of boundary signals and isolation through resource virtualization for non-trusted system-on-chip (SoC) components. The focus of this thesis is the synthesis of this design and structure with the anti-jamming, security needs of drone systems. We utilize Field Programmable Gate Array (FPGA) based development and target embedded Linux for our hardware sandbox and drone hardware/software system.
We design and implement our working concept on the Digilent Zybo FPGA, which …
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Electronic Thesis and Dissertation Repository
The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …
Mainframe Relevance In Modern It: How A 50+ Year Old Computing Platform Can Still Play A Key Role In Today’S Businesses, Ian Thomas Newcombe
Mainframe Relevance In Modern It: How A 50+ Year Old Computing Platform Can Still Play A Key Role In Today’S Businesses, Ian Thomas Newcombe
Honors Theses and Capstones
No abstract provided.