Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

California Polytechnic State University, San Luis Obispo

Master's Theses

Discipline
Keyword
Publication Year

Articles 31 - 60 of 64

Full-Text Articles in Other Computer Engineering

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt Mar 2017

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt

Master's Theses

Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …


Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney Nov 2016

Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney

Master's Theses

The convenience of mobile applications combined with the efficiency and effectiveness provided by technology has contributed to an increased interest in mobile applications. Local groups and non-profit organizations often utilize outdated, manual processes and don’t have the resources or time to look into improving these systems. For Cal Poly students and other members of the community, this means there is an opportunity to apply technical skills and school projects to address these inefficiencies. This work explores whether a better system can be developed to provide the functionality of the existing system and enhance the experience of users through technology, data …


Inducing Emotional Response In Interactive Media, Keenan M. Reimer Aug 2016

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects. …


Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet Jun 2016

Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

Master's Theses

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing …


Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan Jun 2016

Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan

Master's Theses

Virtual reality is currently in the spotlight, attracting intense scrutiny by the press, technology companies, and consumers. After twenty years of dormancy, the technology has experienced a renaissance following advancements in both hardware and software. Most of these developments, and thus press attention, have been centered on entertainment. However, if the technology is going to continue to grow, it must be useful in a wide variety of situations. This paper explores the effectiveness of visualizing data in virtual reality in comparison to traditional presentations.

In this thesis, we present an approach to displaying data in a virtual reality environment. We …


Polyfs Visualizer, Paul Martin Fallon Jun 2016

Polyfs Visualizer, Paul Martin Fallon

Master's Theses

One of the most important operating system topics, file systems, control how we store and access data and form a key point in a computer scientists understanding of the underlying mechanisms of a computer. However, file systems, with their abstract concepts and lack of concrete learning aids, is a confusing subjects for students. Historically at Cal Poly, the CPE 453 Introduction to Operating Systems has been on of the most failed classes in the computing majors, leading to the need for better teaching and learning tools. Tools allowing students to gain concrete examples of abstract concepts could be used to …


The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky Jun 2016

The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

Master's Theses

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time …


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …


Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed Signal Chips, David Marusiak Jun 2014

Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed Signal Chips, David Marusiak

Master's Theses

Many modern digital systems use forms of CMOS logical implementation due to the straight forward design nature of CMOS logic and minimal device area since CMOS uses fewer transistors than other logic families. To achieve high-performance requirements in mixed-signal chip development and quiet, noiseless circuitry, this thesis provides an alternative toCMOSin the form of MOS Current Mode Logic (MCML). MCML dissipates constant current and does not produce noise during value changing in a circuit CMOS circuits do. CMOS logical networks switch during clock ticks and with every device switching, noise is created on the supply and ground to deal with …


Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling Jun 2014

Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling

Master's Theses

Recent growth in the commercial availability of consumer grade 3D user interface devices like the Microsoft Kinect and the Oculus Rift, coupled with the broad availability of high performance 3D graphics hardware, has put high quality 3D user interfaces firmly within the reach of consumer markets for the first time ever. However, these devices require custom integration with every application which wishes to use them, seriously limiting application support, and there is no established mechanism for multiple applications to use the same 3D interface hardware simultaneously. This thesis proposes that these problems can be solved in the same way that …


A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns Jun 2014

A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns

Master's Theses

Studies show that smartphone thefts are a significant problem in the United States. [30] With many upcoming proposals to decrease the theft-rate of such devices, investigating new techniques for preventing smartphone theft is an important area of research. The prevalence of new biometric identification techniques for smartphones has led some researchers to propose biometric anti-theft measures for such devices, similar to the current fingerprint authentication system for iOS. Gait identification, a relatively recent field of study, seems to be a good fit for anti-theft because of the non-intrusive nature of passive pattern recognition in walking. In this paper, we reproduce …


Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson Jun 2014

Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson

Master's Theses

News space is a relatively nebulous term that describes the general discourse concerning events that affect the populace. Past research has focused on qualitatively analyzing news space in an attempt to answer big questions about how the populace relates to the news and how they respond to it. We want to ask when do stories begin? What stories stand out among the noise? In order to answer the big questions about news space, we need to track the course of individual stories in the news. By analyzing the specific articles that comprise stories, we can synthesize the information gained from …


A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes Jun 2014

A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes

Master's Theses

Orchard fruits and vegetable crops are vulnerable to wild birds and animals. These wild birds and animals can cause critical damage to the produce. Traditional methods of scaring away birds such as scarecrows are not long-term solutions but short-term solutions. This is a huge problem especially near areas like San Luis Obispo where there are vineyards. Bird damage can be as high as 50% for grapes being grown in vineyards. The total estimated revenue lost annually in the 10 counties in California due to bird and rodent damage to 22 selected crops ranged from $168 million to $504 million (in …


Future Of Payment Platforms, Salim Benjamin Youssefzadeh Jun 2014

Future Of Payment Platforms, Salim Benjamin Youssefzadeh

Master's Theses

With the vast increase in smartphones, there have been an increasing number of opportunities growing in the app industry. One in particular is the way we deal with money. There are huge overheads in the current payment systems around the world particularly in the United States, many of which include large transaction fees. Many new businesses have grown to solve these inefficiencies and create a new platform that provides a new user experience, security, and convenience among many other things. However, many of these platforms are still centralized, making them more susceptible to attacks. This thesis goes over the various …


Parsing Of Natural Language Requirements, Jamie L. Patterson Dec 2013

Parsing Of Natural Language Requirements, Jamie L. Patterson

Master's Theses

The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin Dec 2013

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices …


Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia Dec 2013

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella Dec 2013

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …


Smarter Neat Nets, Ryan Swords Dehaven Aug 2013

Smarter Neat Nets, Ryan Swords Dehaven

Master's Theses

This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …


Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White Jun 2013

Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White

Master's Theses

Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.

Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …


Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky Jun 2013

Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky

Master's Theses

Culling out non-visible portions of 3D scenes is important for rendering large complex worlds at an interactive frame rate. Past 3D engines used static prebaked visibility data which was generated using complex algorithms. Hardware Occlusion Queries are a modern feature that allows engines to determine if objects are invisible on the fly. This allows for fully dynamic destructible and editable environments as opposed to static prebaked environments of the past. This paper presents an algorithm that uses Hardware Occlusion Queries to cull fully dynamic scenes in real-time. This algorithm is relatively simple in comparison to other real-time occlusion culling techniques, …


Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero Dec 2012

Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero

Master's Theses

Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …


Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp Jun 2012

Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp

Master's Theses

This paper presents an implementation of a lottery scheduler, presented from design through debugging to performance testing. Desirable characteristics of a general purpose scheduler include low overhead, good overall system performance for a variety of process types, and fair scheduling behavior. Testing is performed, along with an analysis of the results measuring the lottery scheduler against these characteristics. Lottery scheduling is found to provide better than average control over the relative execution rates of processes. The results show that lottery scheduling functions as a good mechanism for sharing the CPU fairly between users that are competing for the resource. While …


An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri Mar 2012

An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri

Master's Theses

The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …


Active Pen Input And The Android Input Framework, Andrew S. Hughes Jun 2011

Active Pen Input And The Android Input Framework, Andrew S. Hughes

Master's Theses

User input has taken many forms since the conception of computers. In the past ten years, Tablet PCs have provided a natural writing experience for users with the advent of active pen input. Unfortunately, pen based input has yet to be adopted as an input method by any modern mobile operating system. This thesis investigates the addition of active pen based input to the Android mobile operating system.

The Android input framework was evaluated and modified to allow for active pen input events. Since active pens allow for their position to be detected without making contact with the screen, an …


Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak Jun 2011

Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak

Master's Theses

The CubeSat pico-satellite is gaining popularity in both the educational and aerospace industries. Due to a lack of experience and constrained hardware capabilities, most of the university missions have been educational in nature. Cal Poly's project, PolySat, has gained significant experience from the launch of five CubeSats and has designed an entirely new hardware platform based on the knowledge gained from these missions. This hardware is a significant upgrade from what the previous missions used and has greatly increased the capabilities of the software, including supporting the use of the open source operating system Linux.

Leveraging the previous PolySat experience, …


The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean Mar 2011

The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean

Master's Theses

IEEE-CS is pursuing licensing for software engineers, but ACM believes that software engineering is too immature, and regulating the profession would be premature. In 1996, Norman Gibbs and Gary Ford from Carnegie Mellon University performed a qualitative survey of the maturity of the software engineering profession. I apply this model to the present state of the art in software engineering and analyze the results for 2010. I analyze the maturity of software engineering to determine that the profession is not yet ready for licensure. This is not because the infrastructure of software engineering is too immature, but because we have …


Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter Jun 2010

Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter

Master's Theses

Computing complex lighting simulations such as global illumination is a computationally intensive task. Various real time solutions exist to approximate aspects of global illumination such as shadows, however, few of these methods offer single pass rendering solutions for soft shadows (self and other) and inter-reflections. In contrast, Precomputed Radiance Transfer (PRT) is a real-time computer graphics technique which pre-calculates an object's response to potential incident light. At run time, the actual incident light can be used to quickly illuminate the surface, rendering effects such as soft self-shadows and inter-reflections. In this thesis, we show that by calculating PRT lighting coefficients …


Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough Mar 2010

Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough

Master's Theses

For historical reasons, implementers of genetic algorithms often use a haploid binary primitive type for chromosome encoding. I will demonstrate that one can reduce development effort and achieve higher fitness by designing a genetic algorithm with an encoding scheme that closely matches the problem space. I will show that implicit parallelism does not result in binary encoded chromosomes obtaining higher fitness scores than other encodings. I will also show that Hamming distances should be understood as part of the relationship between the closeness of an encoding to the problem instead of assuming they should always be held constant. Closeness to …


Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon Mar 2010

Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon

Master's Theses

In most video games today that focus on a single story, scripting languages are used for controlling the artificial intelligence of the virtual actors. While scripting is a great tool for reliably performing a story, it has many disadvantages; mainly, it is limited by only being able to respond to those situations that were explicitly declared, causing unreliable responses to unknown situations, and the believability of the virtual actor is hindered by possible conflicts between scripted actions and appropriate responses as perceived by the viewer. This paper presents a novel method of storytelling by manipulating the environment, whether physically or …