Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Enterprise Smart Outlet: Android Development, Aaron Koeppel Jun 2015

Enterprise Smart Outlet: Android Development, Aaron Koeppel

Computer Science and Software Engineering

This project consists of one part of a larger multidisciplinary project, Enterprise Smart Outlet. The purpose of the Enterprise Smart Outlet is to create an electrical outlet which would allow enterprise users to monitor and change their power consumption habits on a large scale. The goal of this project is to allow consumers to see their power consumption per outlet in real time, and then use that information to inform their future habits, helping them conserve electrical energy and money. The Enterprise Smart Outlet Android application provides an interface to display the real time data of all smart outlets connected ...


Nutty Adventures, Tony Hsu, Mandy Chan Jun 2015

Nutty Adventures, Tony Hsu, Mandy Chan

Computer Engineering

Nutty Adventures is an Android game. The goal is to gather acorns for day-to-day survival, upgrades, and hoarding. Ultimately, the player must have enough acorns by the time Winter comes to fulfill the squirrel’s quest: providing enough acorns for his squirrel kingdom during the barren Winter season. Throughout the days, the player has to keep track of time and monsters, which might influence player decisions.


Pre-R: Making Healthcare Healthier, Timothy Acorda, Ryan Foletta, Winifred Lee, Thomas Nguyen, Isabella Sarmiento, Brian Truong, Marek Zhang Jun 2015

Pre-R: Making Healthcare Healthier, Timothy Acorda, Ryan Foletta, Winifred Lee, Thomas Nguyen, Isabella Sarmiento, Brian Truong, Marek Zhang

Computer Engineering

No abstract provided.


Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du May 2015

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du

Electrical Engineering and Computer Science

Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if ...


Grit Mobile: Data Collection App For The Grit Research Project, Ryan Chang Mar 2015

Grit Mobile: Data Collection App For The Grit Research Project, Ryan Chang

Computer Science and Software Engineering

This project consists of one part of a larger University research project aimed at determining if active learning builds the character trait of grit in students while they learn in the domain of mechanical engineering. The research project has three goals: the development of a mobile app to measure the quantity and quality of active learning, a model of student success using the quantity and quality of active learning, and a characterization of the relationship between active learning and grit growth. This senior project focuses on the mobile app as part of the larger research project. The mobile app will ...


Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig Jan 2015

Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig

William L Honig

Wi­Fi P2P , which complies with the Wi­Fi Alliance's Wi­Fi Direct™ certification

2 3

program, is a relatively new addition to wireless communications systems. It is now

supported in Android operating system (since version 4.0). In theory, Wi­Fi Direct offers

advantages for ad hoc communications between mobile apps. A key goal of this project

was to evaluate the ability of Wi­Fi P2P for interconnecting mobile apps by using a

common game suitable to mobile screens and devices.

The application allows the user to interconnect two devices using Wi­Fi P2P and

play the classic ...


Indoor And Outdoor Real Time Information Collection In Disaster Scenario, Dongyi Yang Jan 2015

Indoor And Outdoor Real Time Information Collection In Disaster Scenario, Dongyi Yang

Masters Theses

A disaster usually severely harms human health and property. After a disaster, great amount of information of a disaster area is needed urgently. The information not only indicates the severity of the disaster, but also is crucial for an efficient search and rescue process. In order to quickly and accurately collect real time information in a disaster scenario, a mobile platform is developed for an outdoor scenario and a localization and navigation system for responders is introduced for an indoor scenario.

The mobile platform has been integrated to the DIORAMA system. It is built with a 6-wheel robot chassis along ...


User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi Jan 2015

User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi

Masters Theses

In this thesis we introduces the user interface design and forensic analysis tool for DIORAMA system. With an Android device, DIORAMA provides emergency personnel the ability to collect information in real time, track the resources and manage them. It allows the responders and commanders to mange multiple incidents simultaneously. This thesis also describes the implementations of commander app and responder app, as well as two different communication strategies used in DIORAMA. Several trials and simulated mass casualty incidents were conducted to test the functionalities and performance of DIORAMA system. All responders that participated in all trials were very satisfied with ...


Man-Machine Partial Program Analysis For Malware Detection, Thomas Norman Deering Jan 2015

Man-Machine Partial Program Analysis For Malware Detection, Thomas Norman Deering

Graduate Theses and Dissertations

With the meteoric rise in popularity of the Android platform, there is an urgent need to combat the accompanying proliferation of malware. Existing work addresses the area of consumer malware detection, but cannot detect novel, sophisticated, domain-specific malware that is targeted specifically at one aspect of an organization (eg. ground operations of the US Military). Adversaries can exploit domain knowledge to camoflauge malice within the legitimate behaviors of an app and behind a domain-specific trigger, rendering traditional approaches such as signature-matching, machine learning, and dynamic monitoring ineffective. Manual code inspections are also inadequate, scaling poorly and introducing human error. Yet ...


Disc Golf Locator, Noah M. Sanor Jan 2015

Disc Golf Locator, Noah M. Sanor

Williams Honors College, Honors Research Projects

Noah Sanor

Major: Computer Engineering

Project Sponsor: The Department of Electrical and Computer Engineering

Number of Credits: 6

Disc Golf Locator

The purpose of this project was to develop a device that could help a player locate a disc used in disc golf. The device could attach to the disc and track the location and movement of the disc. In addition, the device could transfer this data to a smartphone application and emit a loud noise to aid in locating the disc. On this project, I developed the smartphone application to communicate with the device. The application transferred the saved ...


Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger Jan 2015

Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of ...