Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Theses/Dissertations

Other Computer Engineering

Institution
Keyword
Publication

Articles 1 - 30 of 49

Full-Text Articles in Computer Engineering

Tascked: The Sanity Promoting Task Manager, Jake Tobin Dec 2013

Tascked: The Sanity Promoting Task Manager, Jake Tobin

Computer Science and Software Engineering

Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system …


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin Dec 2013

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices …


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella Dec 2013

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …


Parsing Of Natural Language Requirements, Jamie L. Patterson Dec 2013

Parsing Of Natural Language Requirements, Jamie L. Patterson

Master's Theses

The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.


Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia Dec 2013

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver Nov 2013

Improving Deaf Accessibility To Web-Based Multimedia, Brent N. Shiver

College of Computing and Digital Media Dissertations

Internet technologies have expanded rapidly over the past two decades, making information of all sorts more readily available. Not only are they more cost-effective than traditional media, these new media have contributed to quality and convenience. However, proliferation of video and audio media on the internet creates an inadvertent disadvantage for deaf Internet users. Despite technological and legislative milestones in recent decades in making television and movies more accessible, there has been little progress with online access. A major obstacle to providing captions for internet media is the high cost of captioning and transcribing services.

To respond to this problem, …


Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola Sep 2013

Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola

Electronic Thesis and Dissertation Repository

With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …


Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy Sep 2013

Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy

Theses and Dissertations

Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone Sep 2013

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Reliability Models Applied To Smartphone Applications, Sonia Meskini Aug 2013

Reliability Models Applied To Smartphone Applications, Sonia Meskini

Electronic Thesis and Dissertation Repository

Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose Aug 2013

Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose

Doctoral Dissertations

Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …


Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp Aug 2013

Segmentation And Model Generation For Large-Scale Cyber Attacks, Steven E. Strapp

Theses

Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets are relevant and what attack behaviors are present. Many existing works in Host or Flow Clustering attempt to group similar behaviors to expedite analysis; these works often phrase the problem directly as offline unsupervised machine learning. This work proposes online processing to simultaneously model coordinating actors and segment traffic that is relevant to a target of interest, all while it is being received. The goal is not just to aggregate similar attack behaviors, but to provide …


Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise Aug 2013

Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise

Masters Theses

An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.


Smarter Neat Nets, Ryan Swords Dehaven Aug 2013

Smarter Neat Nets, Ryan Swords Dehaven

Master's Theses

This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …


Applied Hypergame Theory For Network Defense, Alan S. Gibson Jun 2013

Applied Hypergame Theory For Network Defense, Alan S. Gibson

Theses and Dissertations

Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …


Growing Grounds Inventory Application, Courtney Schenkl Jun 2013

Growing Grounds Inventory Application, Courtney Schenkl

Computer Engineering

No abstract provided.


Obd2 Pid Reader, Andrew Fong Jun 2013

Obd2 Pid Reader, Andrew Fong

Computer Engineering

The most current standard on automobiles for monitoring data is OBD-II. Using On board diagnostic Parameter ID (OBD PID) codes hobbyists and mechanics have the ability to monitor, chart, and obtain data on cars by communicating to the ECU. The OBD-II connector is often located under the driver’s side inside of the car. The hardware will consist of a generic Bluetooth OBD2 connector and a laptop running windows. The software will be an program exe created by visual basic. The software created in visual basic will allow the user to examine PID codes in order to record and discover new …


Bruno The Robotic Bear, Aaron Brauner, Ian Panzer Jun 2013

Bruno The Robotic Bear, Aaron Brauner, Ian Panzer

Computer Engineering

Creating homemade robots are becoming a popular hobby among engineers. With the dramatic reduction in costs over the past few decades, it is finally possible to build a personal automated mailbox. Microcontrollers needed to function as the brains of the robot are also becoming powerful enough that relatively complicated instructions could be programmed into the robot to handle a plethora of sensors and peripherals. In order to demonstrate how the Computer Engineering department models the synthesis of computer science and electrical engineering, the topic chosen was robotics, specifically, a stuffed bear robot.

The microcontroller chosen was the Arduino Mega 2560 …


Automatic Text Analysis Using Drupal, Herman Chai Jun 2013

Automatic Text Analysis Using Drupal, Herman Chai

Computer Engineering

Natural language processing (NLP) is a field of computer science that is concerned with the interpretation of human language by computers. NLP has a multitude of different applications in the fields of computer science, artificial intelligence, and linguistics. The Automatic Text Analysis Using Drupal project is intended to increase the availability of NLP tools that can be easily used by the general public. By integrating a front-end content management system like Drupal with different back-end NLP applications, users can receive automatic analysis of their text without knowledge of the system.


Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee Jun 2013

Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee

Computer Engineering

For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.


Real Time Rendering Engine, Kevin Ubay-Ubay Jun 2013

Real Time Rendering Engine, Kevin Ubay-Ubay

Computer Engineering

Entertaining and playable content in computer graphics requires real time rendering. Real time rendering essentially demands that frames need to be rendered within milliseconds in order to deliver an interactive experience for the client. Video games are an example of such a medium that needs real time rendering. Without frame rates in the realm of real time, video games cannot deliver an enjoyable experience. Behind virtually every video game is an engine. The architecture of video game engines usually comprises of sub engines that are specifically designed to handle physics, audio, user input and rendering. The purpose of this project …


Pictshare, Josh Beeston, Eddie Bell Jun 2013

Pictshare, Josh Beeston, Eddie Bell

Computer Engineering

No abstract provided.


Human Powered Vehicle Bike Computer, Eric Yaklin, Bradley Shellnut Jun 2013

Human Powered Vehicle Bike Computer, Eric Yaklin, Bradley Shellnut

Computer Engineering

This project is a bike computer system built for Cal Poly’s Human Powered Vehicle Team. It was designed and built using Arduino and Android programming tools. The project consists of an Arduino Uno used to collect bike data (such as speed, temperature and GPS location) and an Android Application used to display this data in real time and save it to user profiles within the application. Although many bike computers already exist, this project was specifically designed to be used in a team racing environment rather than for individual use.


Insight - A Virtual Reality, Svyatoslav Markeyev, Brian Spence Jun 2013

Insight - A Virtual Reality, Svyatoslav Markeyev, Brian Spence

Computer Engineering

This is a project about extending the capabilities of current consumer virtual reality systems. The goal of the project was to extend the capabilities of the Oculus Rift Headset in order to create a system which would allow a user to explore a virtual environment in an immersive way just as they would explore reality. The system created would allow a user to explore a virtual environment by walking around in a familiar immersive manner. This was accomplished using the Unreal Development Kit, a state of the art GPS system, and industry proven IMU. The user’s movements are tracked as …


Sifteo Spice, Ikenga Kenneth Ugo Jun 2013

Sifteo Spice, Ikenga Kenneth Ugo

Computer Engineering

Sifteo SPICE is an application built on the Sifteo platform with the purpose of aiding in the learning of basic circuits. Traditionally, circuit theory is taught to students in two different methods, lectures and laboratory exercises. Lectures focus on auditory and visual learning and are largely passive learning. Lab experiments allow students to physically interact with the circuits, and learn visually through viewing output waveforms from simulators or on measurement devices.[3] The goal of the Sifteo SPICE project is to develop a physical system for virtual, real-time SPICE simulation that mimics the laboratory experience. In Sifteo SPICE, each individual Sifteo …


/Usr/Sbin/Clksync - Leo Nano-Statellite Clock Synchronization Software, Matt Zimmerer Jun 2013

/Usr/Sbin/Clksync - Leo Nano-Statellite Clock Synchronization Software, Matt Zimmerer

Computer Engineering

A CalPoly Student Based Organization called Polysat takes mission contracts regarding the development and production of nano-satellites designed to fulfill specific mission requirements. Nano-satellites themselves are very complex and dense electronic devices. Polysat Satellites have recently switched to a new version of the main system board. This system board hosts an ARM AT91SAM92G0 processor, and enough hardware to comfortably run an embedded version of the Linux kernel. Each mission requires specific configuration for the system image, and specialized software. I've spent much of the last two years developing software, and recently debugging both my software, and the software system as …


Aurora: Experience Music Like Never Before, Jason Dreisbach Jun 2013

Aurora: Experience Music Like Never Before, Jason Dreisbach

Computer Engineering

Choreographing musical light shows has previously required expensive professional equipment and experienced personnel. A Mac application, Aurora, was developed to control Phillips Hue Light LED light bulbs to emulate the effects of more complex professional lighting systems. Aurora makes it possible to choreograph dazzling lighting effects to musical tracks.


Small Bear Project Shield, Janice A. Gelacio Jun 2013

Small Bear Project Shield, Janice A. Gelacio

Computer Engineering

The Small Bear Project Shield is an upgrade of the Power Control Board used in the Small Bear Project class, which utilizes the printed circuit board technology for a smaller structure. It has a connector that receives a 9V power through a wall wart, converted to 5V with a voltage regulator. It also has a connector to plug in a computer power supply. The power source is selected with a switch. The assembled board is used to power a stuffed animal bear that is built and programmed in the class.


More Like This, Geoffrey Lawson Jun 2013

More Like This, Geoffrey Lawson

Computer Science and Software Engineering

No abstract provided.