Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Improving The Security Of Mobile Devices Through Multi-Dimensional And Analog Authentication, Jonathan Gurary Jan 2018

Improving The Security Of Mobile Devices Through Multi-Dimensional And Analog Authentication, Jonathan Gurary

ETD Archive

Mobile devices are ubiquitous in today's society, and the usage of these devices for secure tasks like corporate email, banking, and stock trading grows by the day. The first, and often only, defense against attackers who get physical access to the device is the lock screen: the authentication task required to gain access to the device. To date mobile devices have languished under insecure authentication scheme offerings like PINs, Pattern Unlock, and biometrics-- or slow offerings like alphanumeric passwords. This work addresses the design and creation of five proof-of-concept authentication schemes that seek to increase the security of mobile authentication …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans Jan 2018

Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans

ETD Archive

In recent years, researchers had been inquisitive about the use of technology to enhance the healthcare and wellness of patients with dementia. Dementia symptoms are associated with the decline in thinking skills and memory severe enough to reduce a person’s ability to pay attention and perform daily activities. Progression of dementia can be assessed by monitoring the daily activities of the patients. This thesis encompasses continuous localization and behavioral analysis of patient’s motion pattern over a wide area indoor living space using multiple calibrated Kinect sensors connected over the network. The skeleton data from all the sensor is transferred to …


From Blockchain To Internet-Based Voting, Elham Akbari Jan 2018

From Blockchain To Internet-Based Voting, Elham Akbari

ETD Archive

Blockchain has been one of the hottest topics among the state-of-the-art technologies. As the enabling technology for Bitcoin, the pioneering cryptocurrency, blockchain is an append-only distributed ledger that is virtually impossible to attack. Hence, blockchain holds great promises as the fundamental technology to enable Internet-based electronic voting. However, Internet-based voting has additional requirements than what monetary transactions such as Bitcoin have to offer. In this thesis, we discuss the key differences of a blockchain-based voting system with digital currencies. In this context we also highlight the requirements, review existing proposed solutions, and outline possible improvements. Specifically, we propose several schemes …


Maintaining Parallel Realities In Cqrs And Event Sourcing, Ehren Thomas Eschmann Jan 2017

Maintaining Parallel Realities In Cqrs And Event Sourcing, Ehren Thomas Eschmann

ETD Archive

In today’s distributed software ecosystem, we have witnessed a broad exhibition of notable approaches to software architecture. Traditionally, these approaches have centered around persisting a system’s current state. Rather than adhere to these criteria, two modern architectures, Command Query Responsibility Segregation (CQRS) and Event Sourcing have inspired us to persist the interactions of the software actor as replayable events which describe the history of their input data.

While CQRS and Event Sourcing allow for considerable benefits in many types of
systems, maintaining parallel realities (multiple snapshots of history deriving from a single parent history) is generally regarded as too complex …


Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt Jan 2016

Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt

ETD Archive

This thesis presents the design of an original Intelligent Home Automation Architecture. My work was divided in two phases. The first portion was dedicated to acquiring a thorough understanding of the most successful and diffused Home-Automation commercial architectures. During this phase, I intended to gain a deep appreciation for the variety of organizations, capabilities, limitations, and potential areas of growth of the existing Home-Automation leading systems. In order to acquire this knowledge, I had to use a reverse engineering approach. The reason for using this methodology arises from the fact that all the products considered in this study are commercially …