Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (67)
- Physical Sciences and Mathematics (67)
- Engineering (55)
- Computer Engineering (38)
- Software Engineering (21)
-
- Other Computer Engineering (15)
- Computer and Systems Architecture (13)
- Other Computer Sciences (12)
- Databases and Information Systems (9)
- Digital Communications and Networking (8)
- Computational Engineering (7)
- Electrical and Computer Engineering (6)
- Graphics and Human Computer Interfaces (6)
- Hardware Systems (6)
- Data Storage Systems (5)
- Arts and Humanities (4)
- OS and Networks (4)
- Other Electrical and Computer Engineering (4)
- Medicine and Health Sciences (3)
- Other Engineering (3)
- Social and Behavioral Sciences (3)
- Systems Architecture (3)
- Theory and Algorithms (3)
- American Studies (2)
- Environmental Sciences (2)
- Information Security (2)
- Mechanical Engineering (2)
- Programming Languages and Compilers (2)
- Robotics (2)
- Systems and Communications (2)
- Institution
-
- California Polytechnic State University, San Luis Obispo (28)
- Rochester Institute of Technology (9)
- The University of Akron (8)
- California State University, San Bernardino (6)
- Governors State University (6)
-
- Bard College (5)
- Mississippi State University (5)
- Purdue University (5)
- Syracuse University (5)
- University of New Orleans (4)
- University of South Florida (4)
- University of Texas at Arlington (4)
- University of New Mexico (3)
- University of Tennessee, Knoxville (3)
- Air Force Institute of Technology (2)
- East Tennessee State University (2)
- Eastern Michigan University (2)
- Georgia Southern University (2)
- Louisiana State University (2)
- Marquette University (2)
- Missouri University of Science and Technology (2)
- Sheridan College (2)
- Singapore Management University (2)
- St. Cloud State University (2)
- University of Montana (2)
- University of Nevada, Las Vegas (2)
- Virginia Commonwealth University (2)
- Brigham Young University (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Publication Year
- Publication
-
- Theses (11)
- Theses and Dissertations (11)
- Computer Engineering (10)
- Computer Science and Software Engineering (10)
- Williams Honors College, Honors Research Projects (8)
-
- All Capstone Projects (6)
- Electronic Theses, Projects, and Dissertations (6)
- Dissertations - ALL (5)
- Master's Theses (5)
- Electronic Theses and Dissertations (4)
- Masters Theses (4)
- USF Tampa Graduate Theses and Dissertations (4)
- Computer Science and Engineering Theses (3)
- Honors Theses (3)
- Open Access Dissertations (3)
- Senior Projects Spring 2018 (3)
- University of New Orleans Theses and Dissertations (3)
- Chancellor’s Honors Program Projects (2)
- Culminating Projects in Information Assurance (2)
- Dissertations and Theses Collection (Open Access) (2)
- Graduate Student Theses, Dissertations, & Professional Papers (2)
- Master's Theses (2009 -) (2)
- Mechanical Engineering (2)
- Open Access Theses (2)
- Student Capstones (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- All Theses (1)
- Browse all Theses and Dissertations (1)
- CCE Theses and Dissertations (1)
Articles 1 - 30 of 148
Full-Text Articles in Entire DC Network
Shop & Speak: The Hottest Eye-Phone App On The Market, Angelo N. Ledonne
Shop & Speak: The Hottest Eye-Phone App On The Market, Angelo N. Ledonne
Honors Capstones
In the U.S, approximately 20 million individuals (8% of the population) are partly or completely visually impaired. This disability makes some everyday tasks such as reading, writing, shopping, traveling, etc., difficult. But, with the advancement of technology over the past few decades, design products and software have been created that help level the playing field for those in need. The only hurdle that still exists today is the cost and availability of these products, leaving many affected individuals with very little or no assistance in their everyday lives. This project was inspired by my grandmother’s disability. She was born with …
Finserv Android Application, Harsh Piyushkumar Shah
Finserv Android Application, Harsh Piyushkumar Shah
Electronic Theses, Projects, and Dissertations
The FINSERV Android application is a mobile tool designed for individuals to manage and track their finances. In financially complex world, many people struggle to maintain a clear overview of their income, expenses, and financial goals. This application aims to bridge that gap by providing users with a powerful and user-friendly platform to efficiently monitor and optimize their personal finances.
With the Personal Finance Tracking Android Application, users can effortlessly track their income and expenses, categorize transactions, and gain valuable insights into their spending patterns. The application offers features such as expense categorization and real-time expense tracking.
To enhance usability …
Reviews Of Applications For Smartphone-Connected Hearing Aids And Implications On Counseling, Rebecca Strong
Reviews Of Applications For Smartphone-Connected Hearing Aids And Implications On Counseling, Rebecca Strong
Dissertations, Theses, and Capstone Projects
With the recent rise of smartphone ownership, more applications have been created that connect user’s hearing aids to their smartphone. One type of application that has become popular is one that allows the user to control hearing aids using a smartphone. While these applications have many benefits for the user, there has been very little research on the experiences of individuals using these applications. In order for audiologists to best help their patients troubleshoot and prepare reasonable expectations for using smartphone-connected hearing aids, they need to understand the patient experience to create effective solutions. One technique that can be used …
Mankind Is Machine: A Monstrous Posthuman Reading Of Philip K. Dick’S Selected Works, Gabriel Davis
Mankind Is Machine: A Monstrous Posthuman Reading Of Philip K. Dick’S Selected Works, Gabriel Davis
Electronic Theses and Dissertations
The works of Philip K. Dick act as an ideal template for readers to explore what it means to be human in a technologically dominated world. Dick’s emphasis on the usage of androids and artificial intelligence as literary monsters allows for a posthuman reading of the traditional literary monster, notably in how their uncanny nature and behavior helps reveal the synthetic tendencies of humanity. In Do Androids Dream of Electric Sheep?, “Imposter,” and “I Hope I Shall Arrive Soon,” each narrative incorporates artificial intelligence and androids acting as others to reveal the machine-like qualities of Dick’s human characters. This …
Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala
Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala
Master's Projects
Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …
Healthy Eating Index And Body Fat Distribution, Masar Ozrail
Healthy Eating Index And Body Fat Distribution, Masar Ozrail
Theses and Dissertations
Body fat distribution has been identified as a more significant risk factor for metabolic-related diseases. This study investigated whether body fat distribution affects dietary outcomes (quality and intake), anthropometric measures, body composition, and skin carotenoid levels. A cross-sectional study with 91 female students was conducted. Thirty-one percent of participants (n=28) had an android body fat distribution. Body fat distribution was associated with WC and WHtR (p
Android Malware Detection Using Machine Learning Techniques, Mohamed Salem Alhebsi
Android Malware Detection Using Machine Learning Techniques, Mohamed Salem Alhebsi
Theses
Android is the world's most popular and widely used operating system for mobile smartphones today. One of the reasons for this popularity is the free third-party applications that are downloaded and installed and provide various types of benefits to the user. Unfortunately, this flexibility of installing any application created by third parties has also led to an endless stream of constantly evolving malware applications that are intended to cause harm to the user in many ways. In this project, different approaches for tackling the problem of Android malware detection are presented and demonstrated. The data analytics of a real-time detection …
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Student Capstones
The purpose of this mobile app is to provide the Sheridan students, the tools and the personal space to design and map their own development process. This process is essential as it is used to set goals and improve efficiency and productivity to make students more agile and resilient and enable them to reevaluate their goals based on the data collected. The ideal solution is to create that virtual space to allow them to self-asses with daily/weekly reflections, then set goals accordingly to find relevant opportunities and resources. By providing this platform, students would generate their own data to monitor …
Walk Experience, Samina Khaliq, Bilha Ghedeon, Nevada Graci
Walk Experience, Samina Khaliq, Bilha Ghedeon, Nevada Graci
Student Capstones
The Mississauga Music Walk of Fame (MMWF) acknowledges the work of musicians and music industry members who have spent a considerable amount of time in Mississauga. Founded in 2012 and located in Port Credit Memorial Park, The Walk is home to the City’s most accomplished music industry talents. Noticing the lack of engagement at The Walk, the team aims to bring its stars into the 21st century through the introduction of digital innovations. The Walk Experience Project captures the imagination of its visitors and invites them to learn more about the City’s artists and their outstanding work allowing the …
Ahmedabad City App, Rushabh Picha
Ahmedabad City App, Rushabh Picha
Electronic Theses, Projects, and Dissertations
The Ahmedabad City App is a city guide app that provides information on the city's accessible resources. The project's goal is to provide a concrete, one-stop platform for finding information on all of Ahmedabad's accessible resources. The main goal is to simplify the railway's schedule and make it easier for customers to get from one point to another swiftly and safely. Emergency connections such as the blood bank, fire department, police station, and hospitals will be included in the app. Restaurants and picnic areas are also included in the rejuvenation process.
The proposed system uses SQLite as the database and …
Attendio: Attendance Tracking Made Simple, Benjamin L. Greenberg, Spencer L. Howell, Tucker R. Miles, Vicki Tang, Daniel N. Troutman
Attendio: Attendance Tracking Made Simple, Benjamin L. Greenberg, Spencer L. Howell, Tucker R. Miles, Vicki Tang, Daniel N. Troutman
Chancellor’s Honors Program Projects
No abstract provided.
Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton
Feature Selection On Permissions, Intents And Apis For Android Malware Detection, Fred Guyton
CCE Theses and Dissertations
Malicious applications pose an enormous security threat to mobile computing devices. Currently 85% of all smartphones run Android, Google’s open-source operating system, making that platform the primary threat vector for malware attacks. Android is a platform that hosts roughly 99% of known malware to date, and is the focus of most research efforts in mobile malware detection due to its open source nature. One of the main tools used in this effort is supervised machine learning. While a decade of work has made a lot of progress in detection accuracy, there is an obstacle that each stream of research is …
Pollen: A Secure, Decentralized Wireless Communication Platform, Max Perrello
Pollen: A Secure, Decentralized Wireless Communication Platform, Max Perrello
Honors Theses
In this article, we detail an encrypted, internet-independent messaging platform, of which we built a prototype. This thesis also describes the challenges faced in the process, as well as potential future enhancements.
Securing User Interaction Channels On Mobile Platform Using Arm Trustzone, Amit Ahlawat
Securing User Interaction Channels On Mobile Platform Using Arm Trustzone, Amit Ahlawat
Dissertations - ALL
Smartphones have become an essential part of our lives, and are used daily forimportant tasks like banking, shopping, and making phone calls. Smartphones provide several interaction channels which can be affected by a compromised mobile OS. This dissertation focuses on the user interaction channels of UI input and audio I/O. The security of the software running on smartphones has become more critical because of widespread smartphone usage. A technology called TEE (Trusted Execution Environment) has been introduced to help protect users in the event of OS compromise, with the most commonly deployed TEE on mobile devices being ARM TrustZone.
This …
Azul - Using Multimodal Sensors From Mobile And Wearable Devices For Assessment And Monitoring Of Depression Symptoms, Manu Srivastava
Azul - Using Multimodal Sensors From Mobile And Wearable Devices For Assessment And Monitoring Of Depression Symptoms, Manu Srivastava
Computer Science and Engineering Theses
With the ubiquitous presence of mobile phones, there is too much data that can be collected for different purposes which can be correlated to monitor multiple more user information. If used responsibly, this data can be used to assess and monitor various mental health conditions. For example, fitness sensors in wearable devices collect step counts, sleep-related data and heart rate; GPS sensors in smartphones continually collect device location, and Android on-device services collect smartphone usage habits of the user. All the data from the previous example relate to exhibited depression symptoms in users. This data, when used in conjugation, has …
Minet Magnetic Indoor Localization, Michael Drake
Minet Magnetic Indoor Localization, Michael Drake
Honors Theses
Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of …
Aplicación Android Para La Vivienda Prototipo De La Salle Solar Decathlon 2019, Jose Esteban García Marín
Aplicación Android Para La Vivienda Prototipo De La Salle Solar Decathlon 2019, Jose Esteban García Marín
Ingeniería en Automatización
El “Solar Decathlon América Latina & el Caribe 2019” se realizó en Cali, Colombia, donde se solicitó a los equipos participantes que se centraran en soluciones de vivienda específicamente para la región de América Latina que sean asequibles, que satisfagan necesidades de ocupantes con movilidad reducida y hacer un uso eficiente de los recursos naturales. La Universidad de la Salle en pro de innovar y ayudar a la sociedad colombiana, reunió a varios profesionales de distintas áreas para conformar un equipo que concurso en este ambicioso reto. El equipo fue liderado por la facultad de Ciencias del Hábitat, quienes se …
Android Game, Ryan Weston
Android Game, Ryan Weston
Williams Honors College, Honors Research Projects
The purpose of this project was to create an endless runner game for Android coded in Java and XML and developed in Android Studio. In the game, the player controls a frog that jumps from lily pad to lily pad to avoid logs moving toward the player. The player must also maneuver the lily pads as they can randomly disappear. There are three difficulties in the game that vary the disappearance rate of lily pads as well as the frequency and acceleration rate of the log obstacles. The game also has a scoring system and saves the high score locally …
Automated Exercise Generation In Mobile Language Learning, Rayo Verweij
Automated Exercise Generation In Mobile Language Learning, Rayo Verweij
Senior Projects Spring 2020
The Language Lion is an Android application that teaches basic Dutch to English speakers. While mobile language learning has increased exponentially in popularity, course creation is still labor-intensive. By contrast, the Language Lion uses a map of Dutch to English lexemes, a context-free grammar, and a modified version of the SimpleNLG sentence realizer to automatically generate semi-random translation exercises for the student. Each component is evaluated individually to find and analyze the particular roadblocks in automated exercise generation for mobile language learning.
Android And Web Application For Tracking Employees, Kaival Dholakia
Android And Web Application For Tracking Employees, Kaival Dholakia
Electronic Theses, Projects, and Dissertations
The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner. …
Comparison Of Forensic Acquisition And Analysis On An Iphone Over An Android Mobile Through Multiple Forensic Methods, Vikas Avancha
Comparison Of Forensic Acquisition And Analysis On An Iphone Over An Android Mobile Through Multiple Forensic Methods, Vikas Avancha
Culminating Projects in Information Assurance
Mobile phones are most widely used as mini laptops as well as personal digital devices one could have. The dependency on mobiles for every single person on every single aspect has increased day by day. Depending on the operating systems, storage capacity, user interface developed by various manufacturers, there are numerous mobile phones designed with diverse computing capabilities. Among all the distinct kinds of smart mobile devices that are available in the mobile market, iPhone became one of the most popularly used smart mobiles across the world due to its complex logical computing capabilities, striking touch interface, optimum screen resolutions. …
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Dissertations and Theses Collection (Open Access)
Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …
Integrating Trustzone Protection With Communication Paths For Mobile Operating System, Kailiang Ying
Integrating Trustzone Protection With Communication Paths For Mobile Operating System, Kailiang Ying
Dissertations - ALL
Nowadays, users perform various essential activities through their smartphones, including mobile payment and financial transaction. Therefore, users’ sensitive data processed by smartphones will be at risk if underlying mobile OSes are compromised. A technology called Trusted Execution Environment (TEE) has been introduced to protect sensitive data in the event of compromised OS and hypervisor.
This dissertation points out the limitations of the current design model of mobile TEE, which has a low adoption rate among application developers and has a large size of Trusted Computing Base (TCB). It proposes a new design model for mobile TEE to increase the TEE …
Attacks On The Android Platform, Ranajit Singh Mehroke
Attacks On The Android Platform, Ranajit Singh Mehroke
Culminating Projects in Information Assurance
The focus of this research revolves around Android platform security, specifically Android malware attacks and defensive techniques. Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. With the rise of device mobility in our data-driven world, Android constitutes most of the operating systems on these mobile devices playing a dominant role in today’s world. Hence, this paper analyzes attacks and the various defensive mechanisms that have been proposed to prevent those attacks.
Android Aplikacion: Shfrytëzimi I Baterisë Nga Aplikacionet Tjera, Shqipe Sejdiu
Android Aplikacion: Shfrytëzimi I Baterisë Nga Aplikacionet Tjera, Shqipe Sejdiu
Theses and Dissertations
Ky punim bazohet në njohjen e zhvillimit të sistemit operativ Android dhe në zhvillimin e një aplikacioni specifik. Tregohet se si gjatë kohës është zhvilluar sistemi operativ dhe poashtu si ka arritur t'i publikoj karakteristikat të cilat rezultuan të nevojshme për një shfrytëzues të këtij sistemi operativ, si ka arritur të jetë një ndër të parët në treg dhe se si është bërë kaq fleksibil dhe lehtë i përdorshëm. Në këtë punim tregohet se cilat ishin qëllimet e para të krijimit të Android Inc., tregohet se cili ishte misioni i tyre. Po ashtu tregohen se cilat ishin marrëveshjet më të …
An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain
An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain
Wayne State University Theses
Security threats using intent based inter component communication (ICC) channels in Android are under constant scrutiny of software engineering researchers. Though prior research provides empirical evidence on the existence of collusive communication channels in popular android apps, little is known about developers’willful involvement and motivation to exploit these channels.To shed light on this matter, in this paper we devised a novel methodology to deterministically identify developers’ involvement in establishing collusive inter app communication channels. We incorporate static analysis and relational database technology to discover sensitive collusive channels and domain knowledge of the Android SDK to build a model to identify …
Design And Implementation Of Applications Over Delay Tolerant Networks For Disaster And Battlefield Environment, Karthikeyan Sachidanandam
Design And Implementation Of Applications Over Delay Tolerant Networks For Disaster And Battlefield Environment, Karthikeyan Sachidanandam
Masters Theses
"In disaster/battlefield applications, there may not be any centralized network that provides a mechanism for different nodes to connect with each other to share important data. In such cases, we can take advantage of an opportunistic network involving a substantial number of mobile devices that can communicate with each other using Bluetooth and Google Nearby Connections API(it uses Bluetooth, Bluetooth Low Energy (BLE), and Wi-Fi hotspots) when they are close to each other. These devices referred to as nodes form a Delay Tolerant Network (DTN), also known as an opportunistic network. As suggested by its name, DTN can tolerate delays …
Building Recommendation Systems, Orion Davis
Building Recommendation Systems, Orion Davis
Williams Honors College, Honors Research Projects
Recommendation systems are pieces of software that suggest new items to a user. There are many moving parts to these systems including data, the actual recommendation model, processing data and finally displaying data. This project explores the role each part plays in the overall system and how to develop a recommendation system for beer from scratch. This project highlights the algorithm behind the recommendations and a user facing Android application.
Queue: A Mobile Application For Collaborative Music Playlists, Vlad Mirea
Queue: A Mobile Application For Collaborative Music Playlists, Vlad Mirea
Williams Honors College, Honors Research Projects
This paper focuses on the design and development of the mobile application “Queue”. Queue is an app for creating music playlists that anyone can add songs to while a host controls playback. The app connects to music streaming services such as Spotify to allow users access to their favorite songs while providing functionality not found in those services.
Eye Pressure Monitior, Andrea Nella Levy
Eye Pressure Monitior, Andrea Nella Levy
Computer Engineering
The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …