Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Hardware Systems (4)
- Computer and Systems Architecture (2)
- Electrical and Computer Engineering (2)
- Computational Engineering (1)
- Computer Sciences (1)
-
- Data Storage Systems (1)
- Digital Circuits (1)
- Digital Communications and Networking (1)
- Graphics and Human Computer Interfaces (1)
- Other Electrical and Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Robotics (1)
- Signal Processing (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Institution
- Keyword
-
- 3D Display (1)
- AI (1)
- AUV (1)
- Android Development (1)
- Arduino (1)
-
- Artificial Intelligence (1)
- Artificial intelligence (1)
- Autonomy (1)
- BeagleBoard (1)
- Bicycle (1)
- Boolean algebra (1)
- Bulletin (1)
- CP7 satellite software (1)
- CTIS (1)
- CUDA (1)
- Code injection (1)
- Computer Graphics (1)
- Customizable Environment (1)
- Daniel Felix Ritchie School of Engineering and Computer Science (1)
- Data mining (1)
- Design by contract (1)
- Digital storytelling (1)
- Dynamic sensors (1)
- Embedded systems (1)
- Empirical study (1)
- Fingerprint (1)
- GPU (1)
- Genetic Algorithms (1)
- Gps (1)
- Head Tracking (1)
Articles 1 - 17 of 17
Full-Text Articles in Other Computer Engineering
Development Of A Cubesat Payload To Model Particle Dampening In Space: Design And Implementation Of Software For Cp7, Daniel Walker
Development Of A Cubesat Payload To Model Particle Dampening In Space: Design And Implementation Of Software For Cp7, Daniel Walker
Computer Engineering
The California Polytechnic State University CubeSat student research & development group, PolySat, is currently in a mature development stage of a single unit CubeSat designated CP7. The CP7 mission implements a scientific payload designed to characterize particle dampers in microgravity conditions. When subjected to vibration, the momentum exchanges and frictional forces of the particles create a damping effect that can be optimized to suit a number of applications over a broad frequency and amplitude range. In space based applications, particle dampers would serve as a robust and simple device to eliminate jitter in optical assemblies and other sensitive instrumentation. This …
A Reconfigurable Pattern Matching Hardware Implementation Using On-Chip Ram-Based Fsm, Indrawati Gauba
A Reconfigurable Pattern Matching Hardware Implementation Using On-Chip Ram-Based Fsm, Indrawati Gauba
Boise State University Theses and Dissertations
The use of synthesizable reconfigurable IP cores has increasingly become a trend in System on Chip (SOC) designs. Such domain-special cores are being used for their flexibility and powerful functionality. The market introduction of multi-featured platform FPGAs equipped with on-chip memory and embedded processor blocks has further extended the possibility of utilizing dynamic reconfiguration to improve overall system adaptability to meet varying product requirements. A dynamically reconfigurable Finite State Machine (FSM) can be implemented using on-chip memory and an embedded processor. Since FSMs are the vital part of sequential hardware designs, the reconfiguration can be achieved in all designs containing …
Use Of Negation In Search, Kristen M. Lancaster
Use Of Negation In Search, Kristen M. Lancaster
Theses and Dissertations
Boolean algebra was developed in the 1840s. Since that time, negation, one of the three basic concepts in Boolean algebra, has influenced the fields of information science and information retrieval, particularly in the modern computer era. In Web search engines, one of the present manifestations of information retrieval, little use is being made of this functionality and so little attention is given to it in the literature. This study aims to bolster the understanding of the use and usefulness of negation. Specifically, an Internet search task was developed for which negation was the most appropriate search strategy. This search task …
Ultrasonic Shark-Tag Locator System For Iver2 Auv, Nathaniel Garcia
Ultrasonic Shark-Tag Locator System For Iver2 Auv, Nathaniel Garcia
Computer Engineering
The purpose of this project is to develop a system for tracking an ultrasonic underwater transmitter that can be integrated into an IVER2 AUV to allow it to follow and monitor tagged sharks in the ocean for scientific research.
The system consists of a four main components including a shark-tag, two hydrophones, a filter/amplifier & threshold detector circuit, and a microcontroller.
This project, while not completing field testing and integration with the IVER2, is a proof of concept of a system that utilizes passive sonar to determine a bearing from the system to a shark-tag transmitter. Additionally, it devised several …
Memento: Personal Scrapbook Android Application, Ryan Joseph Rosete
Memento: Personal Scrapbook Android Application, Ryan Joseph Rosete
Computer Engineering
The Memento project focuses on providing Android phone users with a new alternative to capture memories. Its main purpose is to create an application that stores pictures and data on an Android phone. Users can view these saved entries for later use to recall what they have done in the past or show to others. The initial idea for this project stemmed from a personal interest in both scrapbooks and popular microblog services. The application aims to provide a new service that is currently not offered in the Android Market.
In order to create this application, there are two main …
A Low Power Touch Screen Document Viewer, Chris Perfetto
A Low Power Touch Screen Document Viewer, Chris Perfetto
Computer Engineering
This document will cover the requirements, design, implementation and testing of a low power touch screen document viewer to serve as a replacement bulletin board. It was Implemented using a BeagleBoard development board, a 4.3” touchscreen LCD and a SD card with a Ubuntu Linux OS installed. The testing of this device is primarily testing the power consumption. The device is not yet complete and will require further development for it to completely satisfy the requirements.
Wii-Mote Head Tracking: A Three Dimensional Virtual Reality Display, David Fairman
Wii-Mote Head Tracking: A Three Dimensional Virtual Reality Display, David Fairman
Computer Engineering
The goal of this project is to create a customizable three dimensional virtual reality display on a system available to any non-technical user. This System will use the infrared camera component of a standard Nintendo Wii-mote to track a user's head motions in all six major directions. The virtual reality will be a customizable image projected onto a screen or simply shown on a computer or TV monitor. In order to appear 3-dimensional, the image will continually change according to the position of the user's head. As the user moves their head to the left and right, portions of the …
Household Outlet Monitoring And Control System, Michael Young
Household Outlet Monitoring And Control System, Michael Young
Computer Engineering
No abstract provided.
Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter
Textured Hierarchical Precomputed Radiance Transfer, Harrison Lee Mckenzie Chapter
Master's Theses
Computing complex lighting simulations such as global illumination is a computationally intensive task. Various real time solutions exist to approximate aspects of global illumination such as shadows, however, few of these methods offer single pass rendering solutions for soft shadows (self and other) and inter-reflections. In contrast, Precomputed Radiance Transfer (PRT) is a real-time computer graphics technique which pre-calculates an object's response to potential incident light. At run time, the actual incident light can be used to quickly illuminate the surface, rendering effects such as soft self-shadows and inter-reflections. In this thesis, we show that by calculating PRT lighting coefficients …
A Novel Technique For Ctis Image-Reconstruction, Mitchel Dewayne Horton
A Novel Technique For Ctis Image-Reconstruction, Mitchel Dewayne Horton
Doctoral Dissertations
Computed tomography imaging spectrometer (CTIS) technology is introduced and its use is discussed. An iterative method is presented for CTIS image-reconstruction in the presence of both photon noise in the image and post-detection Gaussian system noise. The new algorithm assumes the transfer matrix of the system has a particular structure. Error analysis, performance evaluation, and parallelization of the algorithm is done. Complexity analysis is performed for the proof of concept code developed. Future work is discussed relating to potential improvements to the algorithm.
An intuitive explanation for the success of the new algorithm is that it reformulates the image reconstruction …
Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb
Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb
Masters Theses
The battle for cyber supremacy is a cat and mouse game: evolving threats from internal and external sources make it difficult to protect critical systems. With the diverse and high risk nature of these threats, there is a need for robust techniques that can quickly adapt and address this evolution. Existing tools such as Splunk, Snort, and Bro help IT administrators defend their networks by actively parsing through network traffic or system log data. These tools have been thoroughly developed and have proven to be a formidable defense against many cyberattacks. However, they are vulnerable to zero-day attacks, slow attacks, …
Gpu Implementation Of A Novel Approach To Cramer’S Algorithm For Solving Large Scale Linear Systems, Rosanne Lane West
Gpu Implementation Of A Novel Approach To Cramer’S Algorithm For Solving Large Scale Linear Systems, Rosanne Lane West
Masters Theses
Scientific computing often requires solving systems of linear equations. Most software pack- ages for solving large-scale linear systems use Gaussian elimination methods such as LU- decomposition. An alternative method, recently introduced by K. Habgood and I. Arel, involves an application of Cramer’s Rule and Chio’s condensation to achieve a better per- forming system for solving linear systems on parallel computing platforms. This thesis describes an implementation of this algorithm on an nVidia graphics processor card us- ing the CUDA language. Increased performance, relative to the serial implementation, is demonstrated, paving the way for future parallel realizations of the scheme.
Global Positioning Logger, Matthew Hall
Global Positioning Logger, Matthew Hall
Computer Engineering
The Global Positioning Logger (GPL) is a mobile embedded device that utilizes GPS technology. The GPS data is used to display current speed and past global locations.
Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon
Controlling The Uncontrollable: A New Approach To Digital Storytelling Using Autonomous Virtual Actors And Environmental Manipulation, Matthew J. Colon
Master's Theses
In most video games today that focus on a single story, scripting languages are used for controlling the artificial intelligence of the virtual actors. While scripting is a great tool for reliably performing a story, it has many disadvantages; mainly, it is limited by only being able to respond to those situations that were explicitly declared, causing unreliable responses to unknown situations, and the believability of the virtual actor is hindered by possible conflicts between scripted actions and appropriate responses as perceived by the viewer. This paper presents a novel method of storytelling by manipulating the environment, whether physically or …
Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough
Exploring The Relationship Of The Closeness Of A Genetic Algorithm's Chromosome Encoding To Its Problem Space, Kevin Mccullough
Master's Theses
For historical reasons, implementers of genetic algorithms often use a haploid binary primitive type for chromosome encoding. I will demonstrate that one can reduce development effort and achieve higher fitness by designing a genetic algorithm with an encoding scheme that closely matches the problem space. I will show that implicit parallelism does not result in binary encoded chromosomes obtaining higher fitness scores than other encodings. I will also show that Hamming distances should be understood as part of the relationship between the closeness of an encoding to the problem instead of assuming they should always be held constant. Closeness to …
Wi-Fi Localization Using Rssi Fingerprinting, Michael Quan, Eduardo Navarro, Benjamin Peuker
Wi-Fi Localization Using Rssi Fingerprinting, Michael Quan, Eduardo Navarro, Benjamin Peuker
Computer Engineering
Wireless Local Area Networks using Wi-Fi is becoming more and more ubiquitous. As such, they provide a potential pre-built infrastructure for small area localization. This project serves as a proof of concept for a playground child tracking system to be deployed at Cal Poly's Child Development Playground Lab. The two main options for doing Wi-Fi localization are triangulation and fingerprinting. Triangulation involves mapping signal strength as a function of distance while fingerprinting creates a probability distribution of signal strengths at a given location and uses a map of these distributions to predict a location given signal strength samples. The triangulation …
An Empirical Evaluation Of The Effectiveness Of Jml Assertions As Test Oracles, Kavir Shrestha
An Empirical Evaluation Of The Effectiveness Of Jml Assertions As Test Oracles, Kavir Shrestha
Electronic Theses and Dissertations
Test oracles remain one of the least understood aspects of the modern testing process. An oracle is a mechanism used by software testers and software engineers for determining whether a test has passed or failed. One widely-supported approach to oracles is the use of runtime assertion checking during the testing activity. Method invariants,pre- and postconditions help detect bugs during runtime. While assertions are supported by virtually all programming environments, are used widely in practice, and are often assumed to be effective as test oracles, there are few empirical studies of their efficacy in this role. In this thesis, we present …