Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computational Engineering (10)
- Electrical and Computer Engineering (10)
- Computer and Systems Architecture (7)
- Other Electrical and Computer Engineering (7)
- Arts and Humanities (3)
-
- Data Storage Systems (3)
- Digital Communications and Networking (3)
- Education (3)
- Business (2)
- Computer Sciences (2)
- Controls and Control Theory (2)
- Educational Methods (2)
- Engineering Education (2)
- Life Sciences (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
- Aerospace Engineering (1)
- Animal Sciences (1)
- Aquaculture and Fisheries (1)
- Art and Design (1)
- Automotive Engineering (1)
- Bioresource and Agricultural Engineering (1)
- Business Analytics (1)
- Communication (1)
- Composition (1)
- Computer-Aided Engineering and Design (1)
- Curriculum and Instruction (1)
- Keyword
-
- Machine Learning (5)
- Computer Vision (3)
- Natural Language Processing (3)
- Security (3)
- AI (2)
-
- Autonomy (2)
- Data Science (2)
- Education (2)
- Game (2)
- Image Classification (2)
- Linux (2)
- Neuroscience (2)
- Panoptyk (2)
- Static analysis (2)
- Visualization (2)
- Web (2)
- AI4Reporters (1)
- ARTIST DRIVEN FRACTURE POLYHEDRAL MESHES DESTRUCTIBLE (1)
- AUV (1)
- Active (1)
- Affine invariance (1)
- Ai (1)
- Algorithm (1)
- Arguing online (1)
- Argumentation (1)
- Artificial Intelligence (1)
- Artificial intelligence (1)
- Augmented reality (1)
- Authentication (1)
- Automated Discourse Analysis (1)
Articles 31 - 60 of 64
Full-Text Articles in Other Computer Engineering
Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt
Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt
Master's Theses
Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …
Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney
Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney
Master's Theses
The convenience of mobile applications combined with the efficiency and effectiveness provided by technology has contributed to an increased interest in mobile applications. Local groups and non-profit organizations often utilize outdated, manual processes and don’t have the resources or time to look into improving these systems. For Cal Poly students and other members of the community, this means there is an opportunity to apply technical skills and school projects to address these inefficiencies. This work explores whether a better system can be developed to provide the functionality of the existing system and enhance the experience of users through technology, data …
Inducing Emotional Response In Interactive Media, Keenan M. Reimer
Inducing Emotional Response In Interactive Media, Keenan M. Reimer
Master's Theses
Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects. …
Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet
Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet
Master's Theses
Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing …
Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan
Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan
Master's Theses
Virtual reality is currently in the spotlight, attracting intense scrutiny by the press, technology companies, and consumers. After twenty years of dormancy, the technology has experienced a renaissance following advancements in both hardware and software. Most of these developments, and thus press attention, have been centered on entertainment. However, if the technology is going to continue to grow, it must be useful in a wide variety of situations. This paper explores the effectiveness of visualizing data in virtual reality in comparison to traditional presentations.
In this thesis, we present an approach to displaying data in a virtual reality environment. We …
Polyfs Visualizer, Paul Martin Fallon
Polyfs Visualizer, Paul Martin Fallon
Master's Theses
One of the most important operating system topics, file systems, control how we store and access data and form a key point in a computer scientists understanding of the underlying mechanisms of a computer. However, file systems, with their abstract concepts and lack of concrete learning aids, is a confusing subjects for students. Historically at Cal Poly, the CPE 453 Introduction to Operating Systems has been on of the most failed classes in the computing majors, leading to the need for better teaching and learning tools. Tools allowing students to gain concrete examples of abstract concepts could be used to …
The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky
The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky
Master's Theses
Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.
This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time …
Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity
Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity
Master's Theses
Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …
Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed Signal Chips, David Marusiak
Master's Theses
Many modern digital systems use forms of CMOS logical implementation due to the straight forward design nature of CMOS logic and minimal device area since CMOS uses fewer transistors than other logic families. To achieve high-performance requirements in mixed-signal chip development and quiet, noiseless circuitry, this thesis provides an alternative toCMOSin the form of MOS Current Mode Logic (MCML). MCML dissipates constant current and does not produce noise during value changing in a circuit CMOS circuits do. CMOS logical networks switch during clock ticks and with every device switching, noise is created on the supply and ground to deal with …
Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling
Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling
Master's Theses
Recent growth in the commercial availability of consumer grade 3D user interface devices like the Microsoft Kinect and the Oculus Rift, coupled with the broad availability of high performance 3D graphics hardware, has put high quality 3D user interfaces firmly within the reach of consumer markets for the first time ever. However, these devices require custom integration with every application which wishes to use them, seriously limiting application support, and there is no established mechanism for multiple applications to use the same 3D interface hardware simultaneously. This thesis proposes that these problems can be solved in the same way that …
A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns
A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns
Master's Theses
Studies show that smartphone thefts are a significant problem in the United States. [30] With many upcoming proposals to decrease the theft-rate of such devices, investigating new techniques for preventing smartphone theft is an important area of research. The prevalence of new biometric identification techniques for smartphones has led some researchers to propose biometric anti-theft measures for such devices, similar to the current fingerprint authentication system for iOS. Gait identification, a relatively recent field of study, seems to be a good fit for anti-theft because of the non-intrusive nature of passive pattern recognition in walking. In this paper, we reproduce …
Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson
Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson
Master's Theses
News space is a relatively nebulous term that describes the general discourse concerning events that affect the populace. Past research has focused on qualitatively analyzing news space in an attempt to answer big questions about how the populace relates to the news and how they respond to it. We want to ask when do stories begin? What stories stand out among the noise? In order to answer the big questions about news space, we need to track the course of individual stories in the news. By analyzing the specific articles that comprise stories, we can synthesize the information gained from …
A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes
A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes
Master's Theses
Orchard fruits and vegetable crops are vulnerable to wild birds and animals. These wild birds and animals can cause critical damage to the produce. Traditional methods of scaring away birds such as scarecrows are not long-term solutions but short-term solutions. This is a huge problem especially near areas like San Luis Obispo where there are vineyards. Bird damage can be as high as 50% for grapes being grown in vineyards. The total estimated revenue lost annually in the 10 counties in California due to bird and rodent damage to 22 selected crops ranged from $168 million to $504 million (in …
Future Of Payment Platforms, Salim Benjamin Youssefzadeh
Future Of Payment Platforms, Salim Benjamin Youssefzadeh
Master's Theses
With the vast increase in smartphones, there have been an increasing number of opportunities growing in the app industry. One in particular is the way we deal with money. There are huge overheads in the current payment systems around the world particularly in the United States, many of which include large transaction fees. Many new businesses have grown to solve these inefficiencies and create a new platform that provides a new user experience, security, and convenience among many other things. However, many of these platforms are still centralized, making them more susceptible to attacks. This thesis goes over the various …
Parsing Of Natural Language Requirements, Jamie L. Patterson
Parsing Of Natural Language Requirements, Jamie L. Patterson
Master's Theses
The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.
A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin
A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin
Master's Theses
Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.
Despite this rise in availability and popularity, development for these devices …
Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia
Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia
Master's Theses
This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …
Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella
Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella
Master's Theses
This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.
The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …
Smarter Neat Nets, Ryan Swords Dehaven
Smarter Neat Nets, Ryan Swords Dehaven
Master's Theses
This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Master's Theses
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.
Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …
Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky
Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky
Master's Theses
Culling out non-visible portions of 3D scenes is important for rendering large complex worlds at an interactive frame rate. Past 3D engines used static prebaked visibility data which was generated using complex algorithms. Hardware Occlusion Queries are a modern feature that allows engines to determine if objects are invisible on the fly. This allows for fully dynamic destructible and editable environments as opposed to static prebaked environments of the past. This paper presents an algorithm that uses Hardware Occlusion Queries to cull fully dynamic scenes in real-time. This algorithm is relatively simple in comparison to other real-time occlusion culling techniques, …
Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero
Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero
Master's Theses
Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …
Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp
Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp
Master's Theses
This paper presents an implementation of a lottery scheduler, presented from design through debugging to performance testing. Desirable characteristics of a general purpose scheduler include low overhead, good overall system performance for a variety of process types, and fair scheduling behavior. Testing is performed, along with an analysis of the results measuring the lottery scheduler against these characteristics. Lottery scheduling is found to provide better than average control over the relative execution rates of processes. The results show that lottery scheduling functions as a good mechanism for sharing the CPU fairly between users that are competing for the resource. While …
An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri
An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri
Master's Theses
The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …
Active Pen Input And The Android Input Framework, Andrew S. Hughes
Active Pen Input And The Android Input Framework, Andrew S. Hughes
Master's Theses
User input has taken many forms since the conception of computers. In the past ten years, Tablet PCs have provided a natural writing experience for users with the advent of active pen input. Unfortunately, pen based input has yet to be adopted as an input method by any modern mobile operating system. This thesis investigates the addition of active pen based input to the Android mobile operating system.
The Android input framework was evaluated and modified to allow for active pen input events. Since active pens allow for their position to be detected without making contact with the screen, an …
Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak
Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak
Master's Theses
The CubeSat pico-satellite is gaining popularity in both the educational and aerospace industries. Due to a lack of experience and constrained hardware capabilities, most of the university missions have been educational in nature. Cal Poly's project, PolySat, has gained significant experience from the launch of five CubeSats and has designed an entirely new hardware platform based on the knowledge gained from these missions. This hardware is a significant upgrade from what the previous missions used and has greatly increased the capabilities of the software, including supporting the use of the open source operating system Linux.
Leveraging the previous PolySat experience, …
The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean
The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean
Master's Theses
IEEE-CS is pursuing licensing for software engineers, but ACM believes that software engineering is too immature, and regulating the profession would be premature. In 1996, Norman Gibbs and Gary Ford from Carnegie Mellon University performed a qualitative survey of the maturity of the software engineering profession. I apply this model to the present state of the art in software engineering and analyze the results for 2010. I analyze the maturity of software engineering to determine that the profession is not yet ready for licensure. This is not because the infrastructure of software engineering is too immature, but because we have …
Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter
Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter
Master's Theses
Computing complex lighting simulations such as global illumination is a computationally intensive task. Various real time solutions exist to approximate aspects of global illumination such as shadows, however, few of these methods offer single pass rendering solutions for soft shadows (self and other) and inter-reflections. In contrast, Precomputed Radiance Transfer (PRT) is a real-time computer graphics technique which pre-calculates an object's response to potential incident light. At run time, the actual incident light can be used to quickly illuminate the surface, rendering effects such as soft self-shadows and inter-reflections. In this thesis, we show that by calculating PRT lighting coefficients …
Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough
Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough
Master's Theses
For historical reasons, implementers of genetic algorithms often use a haploid binary primitive type for chromosome encoding. I will demonstrate that one can reduce development effort and achieve higher fitness by designing a genetic algorithm with an encoding scheme that closely matches the problem space. I will show that implicit parallelism does not result in binary encoded chromosomes obtaining higher fitness scores than other encodings. I will also show that Hamming distances should be understood as part of the relationship between the closeness of an encoding to the problem instead of assuming they should always be held constant. Closeness to …
Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon
Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon
Master's Theses
In most video games today that focus on a single story, scripting languages are used for controlling the artificial intelligence of the virtual actors. While scripting is a great tool for reliably performing a story, it has many disadvantages; mainly, it is limited by only being able to respond to those situations that were explicitly declared, causing unreliable responses to unknown situations, and the believability of the virtual actor is hindered by possible conflicts between scripted actions and appropriate responses as perceived by the viewer. This paper presents a novel method of storytelling by manipulating the environment, whether physically or …