Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 67 of 67

Full-Text Articles in Engineering

I Am The Robot. Are You?, Rachel Michelle Feldman Jun 2012

I Am The Robot. Are You?, Rachel Michelle Feldman

Honors Theses

I was originally inspired by a previous project in a 3D modeling class. For my final project, I designed two robots; male and female; who’s naked bodied reflected the presence of technological communications in society and lack of face-to-face interactions. I displayed the robots in a variety of sexual positions, which appear cute or sweet to the viewer because of the toon-shader effect. The toon-shader effect makes the 3D models look like cartoons. I loved combining the idea of technology, robotics, and sex into one. To this day, the poster of the robots in my room always gets a response. …


Mobile Application Development: The Mobile Intoxication Assessment Tool, Adam Burns Jun 2012

Mobile Application Development: The Mobile Intoxication Assessment Tool, Adam Burns

Honors Theses

This research and development undertaking during the senior year is a culmination of undergraduate study at Union College and is an opportunity to put knowledge gained to use. The purpose of this specific capstone project is to bring together not just the research and implementation techniques learned as a Computer Engineer but to also meld this discipline with another; Neuroscience. The objective of the project was to develop a full function software prototype in the form of a mobile phone application. The mobile application (Mobile Intoxication Assessment Tool) constitutes a grouping of simple subtasks that can be completed on the …


Wmu Mobile 2.0 For Iphone, Nathan R. Shiff Apr 2012

Wmu Mobile 2.0 For Iphone, Nathan R. Shiff

Honors Theses

As part of Western Michigan University's College of Engineering and Applied Sciences, the department of Computer Science requires that each undergraduate completes a senior design capstone project. The Lee Honors College allows the senior design project to fulfill the senior honors thesis requirement. In Computer Science, a senior design project can be a website, a desktop program, or in the case of WMU Mobile 2.0, a mobile application. Building on the work of the previous year's team, the app extends the functionality of WMU Mobile for iPhone. WMU Mobile 2.0 provides smooth support for the iPad, a redesigned visual interface, …


A Gps Enabled Ipod Touch For Skiers, Camila Dorin Jun 2011

A Gps Enabled Ipod Touch For Skiers, Camila Dorin

Honors Theses

The purpose of my senior project was to design and build a system that provides GPS capabilities to the iPod touch. The system is used in conjunction with an iPod application, giving skiers the possibility to have access to the following outputs: graph of speed during run, distance skied, calories burned, and map of the slopes followed. The system consists of a GPS receiver, an Arduino microcontroller, a Wifi Shield, and iPod touch, and an iPod application. A central point during the development of the system was the transmission of data from one piece of hardware to the other and …


Scalable Co-Evolution Of Soft Robot Properties And Gaits, Davis K. Knox Jun 2011

Scalable Co-Evolution Of Soft Robot Properties And Gaits, Davis K. Knox

Honors Theses

The field of soft robotics is very promising; applications in-clude urban search and rescue and covert surveillance, but these projects are not yet realized, partly because of the difficulties in soft robot shape and locomotion design. Be-cause of this, traditional design methods do not prove to be effective. This project attempts to come up with solu-tions to this soft robot design problem; utilizing a genetic algorithm, a computer simulation of Darwin’s “Survival of the Fittest,” this project attempts to make soft bodies move. This genetic algorithm evaluates each solution in simulation, and assigns each one a fitness based on distance …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Creating A Video Device Application, Kevin Septor Jan 2004

Creating A Video Device Application, Kevin Septor

Honors Theses

A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …