Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Theses/Dissertations

Discipline
Institution
Keyword
Publication

Articles 1 - 25 of 25

Full-Text Articles in Other Computer Engineering

Data Exploration Interface For Digital Forensics, Varun Dontula Dec 2011

Data Exploration Interface For Digital Forensics, Varun Dontula

University of New Orleans Theses and Dissertations

The fast capacity growth of cheap storage devices presents an ever-growing problem of scale for digital forensic investigations. One aspect of scale problem in the forensic process is the need for new approaches to visually presenting and analyzing large amounts of data. Current generation of tools universally employ three basic GUI components—trees, tables, and viewers—to present all relevant information. This approach is not scalable as increasing the size of the input data leads to a proportional increase in the amount of data presented to the analyst.

We present an alternative approach, which leverages data visualization techniques to provide a more …


Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …


Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson Dec 2011

Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson

Mechanical Engineering

Creation of a mounted wireless self-powered thermal imaging camera system.


Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams Dec 2011

Historic Calculator Project, Will Harris, Dan Marioni, Kevin Webb, Chad Williams

Mechanical Engineering

The Deutsches Museum of Munich, Germany requested add-on components to their mechanical calculator exhibit. The end-goal is to produce an interactive 3D model in software to demonstrate the functions of the Braun-Vayringe Machine (BVM). There will be four students working on this project at California Polytechnic State University, San Luis Obispo: two mechanical engineers (Dan Marioni and Will Harris) and two computer engineers (Chad Williams and Kevin Webb).This project involves the coordination of three facilities; the Deutsches Museum, and the Mechanical and Computer Science Departments of Cal Poly. The name of the project is known as the Historic Calculator Project …


Automated Visual Monitoring Of Machining Equipment, Timothy Wayne Ragland Dec 2011

Automated Visual Monitoring Of Machining Equipment, Timothy Wayne Ragland

Masters Theses

Metalworking equipment is designed to modify a sheet, rod, or block of metal material in order to shape it for a specific application. This equipment can operate on the metal by bending it, drilling through it, or by cutting it. For small-scale operations, many tools require a significant amount of manual input. Unless the operator has extensive training and experience, the manual input may not be precise enough for fine details that may be needed in some applications. For example, with a bending brake, obtaining an accurate angle for the bend may be quite difficult. For a particular application, an …


Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans Dec 2011

Determining The Validity Of The Nintendo Wii Balance Board As An Assessment Tool For Balance, Sabrina Mae Deans

UNLV Theses, Dissertations, Professional Papers, and Capstones

Context. Application of the Nintendo Wii-fit balance board and its games have been used in Physical Therapy clinics, showing success in individuals with neurological disorders, and has been recommended as a minimum baseline assessment of a symptoms checklist and standardized cognitive and balance assessments for concussion management by the NCAA. However, it still faces challenges of being considered a reliable and consistent tool for producing normative data in the allied healthcare. Because there is little to no evidence for the Wii-fit balance board as a valid balance assessment tool for clinical and/or research usage, the significance of this study is …


Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya Aug 2011

Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya

Doctoral Dissertations

Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions.

In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among …


Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic Jun 2011

Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

Theses and Dissertations

Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a post-quantum era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called Error Reconciliation, a clear-text classical-channel discussion between legitimate …


Myrrrrr's Dice Game Android Application, Craig Leitterman Jun 2011

Myrrrrr's Dice Game Android Application, Craig Leitterman

Computer Engineering

Smartphones are one the newest and fastest growing hardware platforms in recent years. The number of users playing and downloading games on the Android and iPhone application markets are growing rapidly. A majority of users including myself have been known to play common retro games such as solitaire as well as newer flash games like Angry Birds. These titles are usually “pick up and play” and provide quick entertainment while you’re waiting for the bus or in between a work break. Given the huge popularity of these applications I decided to create a dice game that I used to play …


Cp7 And Datalogger Design And Implementation, Hoang (Mike) Tran Jun 2011

Cp7 And Datalogger Design And Implementation, Hoang (Mike) Tran

Computer Engineering

No abstract provided.


Auto Fall Detector, Nhut Thanh Ho Jun 2011

Auto Fall Detector, Nhut Thanh Ho

Computer Engineering

This device is named Cardea, the goddess of health in roman Mythology. The Cardea will be attached to the waist of the individual’s body to detect any falls, and will send out alarm signals to people in the surrounding area. The end goal of this project is to provide a helpful and friendly device for the elderly and their families. It is easy to maintain and dependable for long term use.


Chinese To English Introductory Cover Letter Generator, Jason L. Stine Jun 2011

Chinese To English Introductory Cover Letter Generator, Jason L. Stine

Liberal Arts and Engineering Studies

The Chinese to English Introductory Cover Letter Generator allows Chinese computer users who know little to no English automatically generate a self-introductory cover letter in good English. As an example, professors in English-speaking countries are increasingly receiving emails from students abroad in countries like China, and these students often need to introduce themselves in order to support their reasons for their message. Unfortunately, more often than not these letters contain poorly written English. This software aims to help solve this issue. Using a combination of a “sentence template” system and intelligent natural language processing software, the program assembles each paragraph …


Active Pen Input And The Android Input Framework, Andrew S. Hughes Jun 2011

Active Pen Input And The Android Input Framework, Andrew S. Hughes

Master's Theses

User input has taken many forms since the conception of computers. In the past ten years, Tablet PCs have provided a natural writing experience for users with the advent of active pen input. Unfortunately, pen based input has yet to be adopted as an input method by any modern mobile operating system. This thesis investigates the addition of active pen based input to the Android mobile operating system.

The Android input framework was evaluated and modified to allow for active pen input events. Since active pens allow for their position to be detected without making contact with the screen, an …


Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak Jun 2011

Fault Tolerant And Flexible Cubesat Software Architecture, Greg D. Manyak

Master's Theses

The CubeSat pico-satellite is gaining popularity in both the educational and aerospace industries. Due to a lack of experience and constrained hardware capabilities, most of the university missions have been educational in nature. Cal Poly's project, PolySat, has gained significant experience from the launch of five CubeSats and has designed an entirely new hardware platform based on the knowledge gained from these missions. This hardware is a significant upgrade from what the previous missions used and has greatly increased the capabilities of the software, including supporting the use of the open source operating system Linux.

Leveraging the previous PolySat experience, …


Feature-Based Image Comparison And Its Application In Wireless Visual Sensor Networks, Yang Bai May 2011

Feature-Based Image Comparison And Its Application In Wireless Visual Sensor Networks, Yang Bai

Doctoral Dissertations

This dissertation studies the feature-based image comparison method and its application in Wireless Visual Sensor Networks.

Wireless Visual Sensor Networks (WVSNs), formed by a large number of low-cost, small-size visual sensor nodes, represent a new trend in surveillance and monitoring practices. Although each single sensor has very limited capability in sensing, processing and transmission, by working together they can achieve various high level tasks. Sensor collaboration is essential to WVSNs and normally performed among sensors having similar measurements, which are called neighbor sensors. The directional sensing characteristics of imagers and the presence of visual occlusion present unique challenges to neighborhood …


Flexible Tuning Software: Beyond Equal Temperament, Erica Sponsler May 2011

Flexible Tuning Software: Beyond Equal Temperament, Erica Sponsler

Honors Capstone Projects - All

The premise of this creative Capstone project was to develop a computer instrument that is capable of tuning itself flexibly in such a way as to not require a tempering of the Western scale, as is necessary for fixedly tuned instruments. The difficulty in creating such a system of tuning arises from the mathematical paradox of the musical harmonic series, which is the sequence of frequencies that sound naturally as overtones over a fundamental pitch. They follow a proportional pattern of 1:2, 2:3, 3:4, etc. These small-integer ratios of frequencies represent the consonant (in-tune) harmonic intervals. When an interval does …


Non-Blocking Hardware Coding For Embedded Systems, Derek Caleb Klein May 2011

Non-Blocking Hardware Coding For Embedded Systems, Derek Caleb Klein

Boise State University Theses and Dissertations

Embedded Systems can be found in devices that people use every day. In the pursuit of faster and smarter devices, more powerful processing units are needed in these embedded systems. A key component of powerful processing units is the supporting software. While the raw processing power of microcontroller has been continually advancing, the improvements in the supporting software for medium scale embedded systems have been lacking. This thesis focuses on improving the software on medium scale systems by discussing the practical application of non-blocking coding techniques. The basic concept of how non-blocking code improves the performance of a system is …


A Wireless Sensor Network For Monitoring Physical Activity, Physiological Response, And Environmental Conditions, Michael Leon Pook May 2011

A Wireless Sensor Network For Monitoring Physical Activity, Physiological Response, And Environmental Conditions, Michael Leon Pook

Boise State University Theses and Dissertations

Understanding movement is an important area of research for improving comfort and safety. Data collected from accelerometers and gyros attached to multiple parts of a body can be used to determine the type of physical activity in which an individual is engaging. Correlating this data with the individual's heart rate allows for the verification of the type of activity as well as observation of the amount of physical strain experienced during the activity. Additionally, data on environmental stimuli can be gathered in order to determine their effect on physical strain. Current research in the field has been limited by both …


Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay Mar 2011

Simultaneous Range/Velocity Detection With An Ultra-Wideband Random Noise Radar Through Fully Digital Cross-Correlation In The Time Domain, James R. Lievsay

Theses and Dissertations

This research effort examines the theory, application, and results of applying two-dimensional cross-correlation in the time domain to ultra-wideband (UWB) random noise waveforms for simultaneous range and velocity estimation. When applying common Doppler processing techniques to random noise waveforms for the purpose of velocity estimation, the velocity resolution degrades as the signal bandwidth or the target speed increase. To mitigate the degradation, the Doppler approximation is not utilized, and instead, wideband signal processing theory is applied in the time domain. The results show that by accurately interpolating each sample in the digitized reference signal, a target's velocity and range can …


Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer Mar 2011

Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer

Theses and Dissertations

This thesis provides a novel visualization method to analyze the impact that articulations in dismount pose and camera aspect angle have on histograms of oriented gradients (HOG) features and eventual detections. Insights from these relationships are used to identify limitations in a state of the art skin cued HOG dismount detector's ability to detect poses not in a standard upright stances. Improvements to detector performance are made by further leveraging available skin information, reducing false detections by an additional order of magnitude. In addition, a method is outlined for training supplemental support vector machines (SVMs) from computer generated data, for …


An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller Mar 2011

An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller

Theses and Dissertations

This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …


Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr. Mar 2011

Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr.

Theses and Dissertations

Military organizations need realistic training scenarios to ensure mission readiness. Developing the skills required to differentiate combatants from non-combatants is very important for ensuring the international law of armed conflict is upheld. In Simulated Training Environments, one of the open challenges is to correctly simulate the appearance and behavior of combatant and non-combatant agents in a realistic manner. This thesis outlines the construction of a data driven agent that is capable of imitating the behaviors of the Virtual BattleSpace 2 behavior classes while our agent is configured to advance to a geographically specific goal. The approach and the resulting agent …


The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean Mar 2011

The State Of Software Engineering Maturity And Licensure, Travis Lawrence Dean

Master's Theses

IEEE-CS is pursuing licensing for software engineers, but ACM believes that software engineering is too immature, and regulating the profession would be premature. In 1996, Norman Gibbs and Gary Ford from Carnegie Mellon University performed a qualitative survey of the maturity of the software engineering profession. I apply this model to the present state of the art in software engineering and analyze the results for 2010. I analyze the maturity of software engineering to determine that the profession is not yet ready for licensure. This is not because the infrastructure of software engineering is too immature, but because we have …


Sub Pixel Analysis And Processing Of Sensor Data For Mobile Target Intelligence Information And Verification, Theresa Allen Williams Jan 2011

Sub Pixel Analysis And Processing Of Sensor Data For Mobile Target Intelligence Information And Verification, Theresa Allen Williams

Doctoral Dissertations

This dissertation introduces a novel process to study and analyze sensor data in order to obtain information pertaining to mobile targets at the sub-pixel level. The process design is modular in nature and utilizes a set of algorithmic tools for change detection, target extraction and analysis, super-pixel processing and target refinement. The scope of this investigation is confined to a staring sensor that records data of sub-pixel vehicles traveling horizontally across the ground. Statistical models of the targets and background are developed with noise and jitter effects. Threshold Change Detection, Duration Change Detection and Fast Adaptive Power Iteration (FAPI) Detection …


Data Mining Based Learning Algorithms For Semi-Supervised Object Identification And Tracking, Michael P. Dessauer Jan 2011

Data Mining Based Learning Algorithms For Semi-Supervised Object Identification And Tracking, Michael P. Dessauer

Doctoral Dissertations

Sensor exploitation (SE) is the crucial step in surveillance applications such as airport security and search and rescue operations. It allows localization and identification of movement in urban settings and can significantly boost knowledge gathering, interpretation and action. Data mining techniques offer the promise of precise and accurate knowledge acquisition techniques in high-dimensional data domains (and diminishing the “curse of dimensionality” prevalent in such datasets), coupled by algorithmic design in feature extraction, discriminative ranking, feature fusion and supervised learning (classification). Consequently, data mining techniques and algorithms can be used to refine and process captured data and to detect, recognize, classify, …