Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku Jan 2022

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku

Williams Honors College, Honors Research Projects

Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …


Dripline: A Distributed Experiment Control System, Eric Gonzalez, Ben Laroque, Noah Oblath Aug 2019

Dripline: A Distributed Experiment Control System, Eric Gonzalez, Ben Laroque, Noah Oblath

STAR Program Research Presentations

Project 8 is a nuclear physics experiment which seeks to measure the mass of neutrinos. The experiment requires the use of various pieces of hardware which need to be controlled, and from this need, a software system named Dripline is being developed. Because most researchers have some knowledge in Python and it is easier to understand the syntax of Python as opposed to C++, a Python application programming interface (API) is being created to allow any researcher working with Dripline ease of use. As development progresses, features may be added or removed as needed which requires constant testing, debugging, and …


Automated Compilation Test System For Embedded System, Mohamad Khairi Ishak, Ooi Jun Hwan, Teh Jiashen, Nor Ashidi Mat Isa Dec 2018

Automated Compilation Test System For Embedded System, Mohamad Khairi Ishak, Ooi Jun Hwan, Teh Jiashen, Nor Ashidi Mat Isa

Makara Journal of Technology

Embedded system testing involves testing an integration of software and hardware. It is increasingly difficult to evaluate the functionality of each module within a short time because of the increasing number of tests required. In this paper, a novel stepwise methodology involving the use of an automated compilation test system (ACTS) is proposed, to improve the quality of testing and optimize the testing time using automation. Using the proposed method, the testing coverage can be maximized, while minimizing the manual work and testing time required. This ACTS was used to automate the test code compilation and execution for different hardware …


Poly Drop, Zachary T. Scott, Lilly J. Paul Jun 2017

Poly Drop, Zachary T. Scott, Lilly J. Paul

Computer Engineering

Poly Drop is a software interface to control an Open Drop digital micro-fluidics system. We obtained a hardware system from Gaudi labs. Our task was to create a Graphical User Interface that made the control of the device easier and more automated for better testing. We created software that had 3 parts: a control GUI, arduino code to control the hardware, and Image Analysis that gives the user information such as location and color of liquid drops as they move across the electrode grid of the Open Drop system. The GUI was developed using Java Swing. The communication between the …


Is Tech M&A Value-Additive?, Ani Deshmukh Nov 2012

Is Tech M&A Value-Additive?, Ani Deshmukh

Undergraduate Economic Review

Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman Jan 2012

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …