Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong Mar 2020

Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong

Computer Engineering

There are three main parts of this system: micro-controller, database, and website. Micro-controller detects motion of people walking in and out and It also measures room temperature and humidity in a confined space then updates collected data to the database. Our system’s database contains 6 main columns: room number, room capacity, number of students, temperature in Celsius, humidity in percent and date created. Finally, this database is queried by the website to display the information on the webpage. Users could also navigate on our site to check the most and least occupy rooms, and they can also search for a …


A Database For Indexable Carbide Inserts, Andrew Yoder Jun 2019

A Database For Indexable Carbide Inserts, Andrew Yoder

Computer Engineering

The indexable inserts project is a collaborative effort to aggregate into a single database as many indexable carbide inserts from as many manufacturers as possible. Inserts are generally labeled with a part number following a specific standard determined by shapes and measurements, however specifications for certain aspects of carbide inserts—such as which materials they can cut—can vary by manufacturer. There currently is not a way to search a comprehensive database containing tools from multiple manufacturers for a handful of inserts that would satisfy some necessary parameters, making finding the correct tool in a shop a much more time-consuming process than …


Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen Dec 2018

Logging, Visualization, And Analysis Of Network And Power Data Of Iot Devices, Neal Huynh Nguyen

Master's Theses

There are approximately 23.14 billion IoT(Internet of Things) devices currently in use worldwide. This number is projected to grow to over 75 billion by 2025. Despite their ubiquity little is known about the security and privacy implications of IoT devices. Several large-scale attacks against IoT devices have already been recorded.

To help address this knowledge gap, we have collected a year’s worth of network traffic and power data from 16 common IoT devices. From this data, we show that we can identify different smart speakers, like the Echo Dot, from analyzing one minute of power data on a shared power …


Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael Jun 2016

Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael

Computer Engineering

No abstract provided.


Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …


Jdiet: Footprint Reduction For Memory-Constrained Systems, Michael John Huffman Jun 2009

Jdiet: Footprint Reduction For Memory-Constrained Systems, Michael John Huffman

Master's Theses

Main memory remains a scarce computing resource. Even though main memory is becoming more abundant, software applications are inexorably engineered to consume as much memory as is available. For example, expert systems, scientific computing, data mining, and embedded systems commonly suffer from the lack of main memory availability.

This thesis introduces JDiet, an innovative memory management system for Java applications. The goal of JDiet is to provide the developer with a highly configurable framework to reduce the memory footprint of a memory-constrained system, enabling it to operate on much larger working sets. Inspired by buffer management techniques common in modern …