Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Computer Engineering

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …


Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans Dec 2011

Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans

UNLV Theses, Dissertations, Professional Papers, and Capstones

Context. Application of the Nintendo Wii-fit balance board and its games have been used in Physical Therapy clinics, showing success in individuals with neurological disorders, and has been recommended as a minimum baseline assessment of a symptoms checklist and standardized cognitive and balance assessments for concussion management by the NCAA. However, it still faces challenges of being considered a reliable and consistent tool for producing normative data in the allied healthcare. Because there is little to no evidence for the Wii-fit balance board as a valid balance assessment tool for clinical and/or research usage, the significance of this study is …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Construction Of A Mobile Spectrophotometer For Mapping Plant Health: Combining Crop Circle™ And Gps Technology, Gregory Keith Bartley Jr., Brandon J. Horvath Sep 2011

Construction Of A Mobile Spectrophotometer For Mapping Plant Health: Combining Crop Circle™ And Gps Technology, Gregory Keith Bartley Jr., Brandon J. Horvath

Gregory Keith Bartley Jr.

With the introduction of GPS technology, came the ability to produce maps of plant cover and health over large areas. By correlating the reflectance values of a plant with its respective GPS coordinates, we can form a bird’s eye view of relative plant health using different colors. The commercialization of high precision GPS receivers has allowed researchers to plot these maps with increased accuracy, limiting error to less than 1 inch.


Apple Ipad Cart, Gregory Keith Bartley Jr., Brandon J. Horvath Sep 2011

Apple Ipad Cart, Gregory Keith Bartley Jr., Brandon J. Horvath

Gregory Keith Bartley Jr.

Utilizing a Pelican Accessories Case, I was able to construct a power efficient, mobile iPad charging station cart capable of safely charging and transporting up to 10 iPads and 10 iPad Keyboards with additional compartments to accommodate any additional cords and/or devices. The introduction of WiFi Sync in Apple's iOS 5 Update allowed me to more efficiently compartmentalize any cords from being exposed. Compared to commercially-available iPad Sync and Cart Charging Systems which charge $1000+, this unit cost me around $100. It also uses far less power, due to no longer needing a powered USB hub network in order to …


Extracting Forensic Artifacts From Windows O/S Memory, James S. Okolica, Gilbert L. Peterson Aug 2011

Extracting Forensic Artifacts From Windows O/S Memory, James S. Okolica, Gilbert L. Peterson

AFIT Documents

Memory analysis is a rapidly growing area in both digital forensics and cyber situational awareness (SA). Memory provides the most accurate snapshot of what is occurring on a computer at a moment in time. By combining it with event and network logs as well as the files present on the filesystem, an analyst can re-create much of what has occurred and is occuring on a computer. The Compiled Memory Analysis Tool (CMAT) takes either a disk image of memory from a Windows operating system or an interface into a virtual machine running a Windows operating system and extracts forensic artifacts …


Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani Jun 2011

Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani

Electronic Thesis and Dissertation Repository

The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficient hardware implementations.

In this thesis, first, we investigate the AES algorithm from the concurrent fault detection point of view. We note that in addition to the efficiency requirements of the AES, it must be reliable against transient and permanent internal faults or …


Detection Of Breathing And Infant Sleep Apnea, Brian Berg Jun 2011

Detection Of Breathing And Infant Sleep Apnea, Brian Berg

Computer Engineering

Sleep apnea is a condition where people pause while breathing in their sleep; this can be of great concern for infants and premature babies. Current monitoring systems either require physical attachment to a user or may be unreliable. This project is meant to develop a device that can accurately detect breathing through sound and issue appropriate warnings upon its cessation. The device produced is meant to be a standalone device and thus was developed as an embedded systems project on a Xilinx Spartan 6 FPGA.


Project 308: Augmented Reality Mario Kart, Joseph Abad, David Allender, Joryl Calizo, Ryan Gaspar, Gavin Lee Jun 2011

Project 308: Augmented Reality Mario Kart, Joseph Abad, David Allender, Joryl Calizo, Ryan Gaspar, Gavin Lee

Computer Engineering

Mario Kart is a popular go-kart racing game developed by Nintendo. The premise of the game is simple: drive a go-kart along a racetrack and reach the finish line before the other players. What makes this game unique, however, is the inclusion of weapons, traps, and other projectiles that a player can use to gain an advantage in the race. We have taken on the challenge of not only recreating this amazing game, but using the art of Augmented Reality to fully immerse the player in the full experience. Rather than play the game on a television screen with a …


Discrete Alarm Clock, Travis Moore, Collin Barth Jun 2011

Discrete Alarm Clock, Travis Moore, Collin Barth

Electrical Engineering

The standard alarm clock, as used daily by millions worldwide, has clear room for modification and improvement. This paper documents an implementation that rectifies many of these flaws. Improvements include adjustable snooze length, an IR remote for ease of use, and an RF headset for discrete alarm use or potential incorporation into a device much like a hearing aid. The processes involved in creating a digital alarm clock, as well as the obstacles met in the implementation of the enhanced design, are detailed within.


Optical Network-On-Chip Architectures And Designs, Lei Zhang May 2011

Optical Network-On-Chip Architectures And Designs, Lei Zhang

UNLV Theses, Dissertations, Professional Papers, and Capstones

As indicated in the latest version of ITRS roadmap, optical wiring is a viable interconnection technology for future SoC/SiC/SiP designs that can provide broad band data transfer rates unmatchable by the existing metal/low-k dielectric interconnects. In this dissertation study, a set of different optical interconnection architectures are presented for future on-chip optical micro-networks.

Three Optical Network-on-Chip (ONoC) architectures, i.e., Wavelength Routing Optical Network-on-Chip (WRON), Redundant Wavelength Routed Optical Network (RDWRON) and Recursive Wavelength Routed Optical Network (RCWRON) are proposed. They are fully connected networks designed based on passive switching Microring Resonator (MRR) optical switches. Given enough different routing optical wavelengths, …


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


Reconfigurable Systems: A Potential Solution To The Von Neumann Bottleneck, Damian L. Miller Apr 2011

Reconfigurable Systems: A Potential Solution To The Von Neumann Bottleneck, Damian L. Miller

Senior Honors Theses

The difficulty of overcoming the disparity between processor speeds and data access speeds, a condition known as the von Neumann bottleneck, has been a source of consternation for computer hardware developers for many years. Although a number of temporary solutions have been proposed and implemented in modern machines, these solutions have only managed to treat the major symptoms, rather than solve the root problem. As the number of transistors on a chip roughly doubles every two years, the von Neumann bottleneck has continued to tighten in spite of these solutions, prompting some computer hardware professionals to advocate a paradigm shift …


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Automated Analysis Of Arm Binaries Using The Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott Mar 2011

Automated Analysis Of Arm Binaries Using The Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott

Theses and Dissertations

Binary program analysis is a critical capability for offensive and defensive operations in Cyberspace. However, many current techniques are ineffective or time-consuming and few tools can analyze code compiled for embedded processors such as those used in network interface cards, control systems and mobile phones. This research designs and implements a binary analysis system, called the Architecture-independent Binary Abstracting Code Analysis System (ABACAS), which reverses the normal program compilation process, lifting binary machine code to the Low-Level Virtual Machine (LLVM) compiler's intermediate representation, thereby enabling existing security-related analyses to be applied to binary programs. The prototype targets ARM binaries but …


Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg Mar 2011

Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg

Theses and Dissertations

Today's society has become more dependent on the integrity and protection of digital information used in daily transactions resulting in an ever increasing need for information security. Additionally, the need for faster and more secure cryptographic algorithms to provide this information security has become paramount. Hardware implementations of cryptographic algorithms provide the necessary increase in throughput, but at a cost of leaking critical information. Side Channel Analysis (SCA) attacks allow an attacker to exploit the regular and predictable power signatures leaked by cryptographic functions used in algorithms such as RSA. In this research the focus on a means to counteract …


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey Jan 2011

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss Jan 2011

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which …


Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss Jan 2011

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss

Martin L Griss

"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also …


Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss Jan 2011

Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss

Martin L Griss

"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across …


Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss Jan 2011

Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss

Martin L Griss

Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled and the …


Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss Jan 2011

Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss

Martin L Griss

Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. In this paper we report on our experience using an existing Wi-Fi infrastructure without specialized hardware added to support location tracking. There are several approaches to track the location of Wi-Fi enabled devices within a building such as signal propagation models and signature matching. We found signature matching most effective in our environment. Signature matching is accomplished …


Parallel Mesh Adaptation And Graph Analysis Using Graphics Processing Units, Timothy P. Mcguiness Jan 2011

Parallel Mesh Adaptation And Graph Analysis Using Graphics Processing Units, Timothy P. Mcguiness

Masters Theses 1911 - February 2014

In the field of Computational Fluid Dynamics, several types of mesh adaptation strategies are used to enhance a mesh’s quality, thereby improving simulation speed and accuracy. Mesh smoothing (r-refinement) is a simple and effective technique, where nodes are repositioned to increase or decrease local mesh resolution. Mesh partitioning divides a mesh into sections, for use on distributed-memory parallel machines. As a more abstract form of modeling, graph theory can be used to simulate many real-world problems, and has applications in the fields of computer science, sociology, engineering and transportation, to name a few. One of the more important graph analysis …


Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson Jan 2011

Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson

Masters Theses 1911 - February 2014

An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node mobility. In this thesis, we argue that the pairing of two complementary radios with heterogeneous range characteristics enables greater range and interference diversity at lower energy cost than a single radio. We make three contributions towards the design of such multi-radio mobile sensor systems. First, we present the design of a novel reinforcement learning-based link layer algorithm that continually learns channel characteristics and dynamically decides when to switch between radios. Second, we describe a …


Video Stabilization Using Sift Features, Fuzzy Clustering, And Kalman Filtering, Kevin Veon Jan 2011

Video Stabilization Using Sift Features, Fuzzy Clustering, And Kalman Filtering, Kevin Veon

Electronic Theses and Dissertations

Video stabilization removes unwanted motion from video sequences, often caused by vibrations or other instabilities. This improves video viewability and can aid in detection and tracking in computer vision algorithms. We have developed a digital video stabilization process using scale-invariant feature transform (SIFT) features for tracking motion between frames. These features provide information about location and orientation in each frame. The orientation information is generally not available with other features, so we employ this knowledge directly in motion estimation. We use a fuzzy clustering scheme to separate the SIFT features representing camera motion from those representing the motion of moving …


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss Dec 2010

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss

Ray Bareiss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.