Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Computer

Institution
Publication Year
Publication
Publication Type

Articles 1 - 23 of 23

Full-Text Articles in Engineering

Unity Two Dimensional C# Game, Nick Zajac Jan 2024

Unity Two Dimensional C# Game, Nick Zajac

Williams Honors College, Honors Research Projects

My project is a 2-dimensional game that is being developed in the unity engine. This project includes animating objects, having them interact with each other, and having a goal the player will want to complete in the game. It will be a game that involves the player character moving around, attacking enemies, and dodging enemies. There will also be some challenges that involve maneuvering between platforms and enemies to progress in the game. At the end of the level, the player will encounter a stronger boss character. This character will have movement and attack patterns similar to the other minor …


Improved Portable Back Pain Relief Device With User Interface, Zachary Bobango, Samuel J. Dauterman, Benjamin Bowman Jan 2024

Improved Portable Back Pain Relief Device With User Interface, Zachary Bobango, Samuel J. Dauterman, Benjamin Bowman

Williams Honors College, Honors Research Projects

The objective of this project is to design and create a massage system that is user interactive, portable, safe, efficient, and comfortable. The system should allow for user feedback from an outside peripheral such as a phone to be able to modify the system. Some challenges facing the implementation of such a system include: ensuring the product can withstand substantial force without breaking or malfunctioning while simultaneously being light enough for a consumer to carry without difficulty, engineering the massage heads to be able to move in multiple different motion types, creating the software that can control the device, and …


An Animated Introduction To Digital Logic Design, John D. Carpinelli Aug 2023

An Animated Introduction To Digital Logic Design, John D. Carpinelli

Open and Affordable Textbooks

This book is designed for use in an introductory course on digital logic design, typically offered in computer engineering, electrical engineering, computer science, and other related programs. Such a course is usually offered at the sophomore level. This book makes extensive use of animation to illustrate the flow of data within a digital system and to step through some of the procedures used to design and optimize digital circuits.

All of the animations for this book can be found here: https://digitalcommons.njit.edu/dld-animations/


Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France May 2023

Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France

Computer Science and Computer Engineering Undergraduate Honors Theses

The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang Jun 2020

Simulation Of Influence Of Lightning On Internal Electromagnetic Environment Of Computer, Gaihong Du, Yangmeng Tian, Caixia Wang, Hongwei Wang

Journal of System Simulation

Abstract: Through XFDTD software simulating strong lightning electromagnetic pulse of 50KV lightning electric field strength, rising edge about 50ns, and pulse width about 2000ns coupled with a desktop computer, the curves of the coupled electric field with time and the curves of the energy density with time at several typical locations in the chassis are obtained; the shielding effectiveness of different locations inside the computer is analyzed. Simulation results suggest that the electromagnetic field strength produced in the chassis has no damage to the computer node while coupling energy generated in the hole is large in comparison with the threshold …


Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif Apr 2020

Emotional Awareness During Bug Fixes – A Pilot Study, Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, Bonita Sharif

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

This study examines the effects of a programmer's emotional awareness on progress while fixing bugs. The goal of the study is to capitalize on emotional awareness to ultimately increase progress made during software development. This process could result in improved software maintenance.


College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University Jan 2020

College Of Computing And Engineering Graduate Catalog 2020-2021, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha Jan 2020

V-Slam And Sensor Fusion For Ground Robots, Ejup Hoxha

Dissertations and Theses

In underground, underwater and indoor environments, a robot has to rely solely on its on-board sensors to sense and understand its surroundings. This is the main reason why SLAM gained the popularity it has today. In recent years, we have seen excellent improvement on accuracy of localization using cameras and combinations of different sensors, especially camera-IMU (VIO) fusion. Incorporating more sensors leads to improvement of accuracy,but also robustness of SLAM. However, while testing SLAM in our ground robots, we have seen a decrease in performance quality when using the same algorithms on flying vehicles.We have an additional sensor for ground …


A Compiler Target Model For Line Associative Registers, Paul S. Eberhart Jan 2019

A Compiler Target Model For Line Associative Registers, Paul S. Eberhart

Theses and Dissertations--Electrical and Computer Engineering

LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.


Automatic Power Management For Instructional Computers At Humboldt State University: A Calculation Of Potential Energy Savings And Greenhouse Gas Emissions Reductions, Nicholas F. Flenghi Jan 2017

Automatic Power Management For Instructional Computers At Humboldt State University: A Calculation Of Potential Energy Savings And Greenhouse Gas Emissions Reductions, Nicholas F. Flenghi

Projects

Computers consume an estimated 5,610 GWh per year in California alone. Much of that energy is consumed by computers that are not being used. In this project, detailed user login data are used to estimate the energy consumption of instructional computers at Humboldt State University (HSU) over the course of one semester. The data are also used to estimate the potential energy savings from automating the shutdown process. Potential cost savings and greenhouse gas (GHG) emissions reductions resulting from implementing an automatic-shutdown power management plan are also calculated.

There are approximately 1,000 computers used for teaching and learning purposes at …


Adopting Problem Based Learning In Third Level Computer Science, Martin Mchugh Jan 2015

Adopting Problem Based Learning In Third Level Computer Science, Martin Mchugh

Reports

It has been recognised that the traditional teaching approach of the teacher being solely a transmitter and the student being a receiver is not sufficient. This is evident when a traditional style of teaching is compared to a more hands-on approach to learning. When discussing the traditional style of teaching, Earl and Ellington (1999, p.83) describe how in this approach to learning; (current) teaching methods are almost invariably of the ‘face-to-face’ type. The whole system is generally geared towards the smooth operation of the teaching institution, with little or no attempt being made to cater for the different learning styles …


Forensic Examination And Analysis Of The Prefetch Files On The Banking Trojan Malware Incidents, Andri P. Heriyanto Jan 2014

Forensic Examination And Analysis Of The Prefetch Files On The Banking Trojan Malware Incidents, Andri P. Heriyanto

Australian Digital Forensics Conference

Whenever a program runs within the operating system, there will be data or artefacts created on the system. This condition applies to the malicious software (malware). Although they intend to obscure their presence on the system with anti-forensic techniques, still they have to run on the victim’s system to acquire their objective. Modern malware creates a significant challenge to the digital forensic community since they are being designed to leave limited traces and misdirect the examiner. Therefore, every examiner should consider performing all the forensics approaches such as memory forensic, live-response and Windows file analysis in the related malware incidents …


A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb Dec 2013

A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb

Masters Theses & Specialist Projects

Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …


Robotic Kinect Bear, Spencer Lines, Dennis Waldron, Sagiv Sheelo May 2013

Robotic Kinect Bear, Spencer Lines, Dennis Waldron, Sagiv Sheelo

Computer Engineering

The goal of this project was to create an interactive 53”-tall robotic teddy bear to showcase various aspects of Cal Poly’s computer engineering degree. The interactive element took the form of a Microsoft Kinect for Windows sensor, which provided body and face position tracking of the user. Using this sensor and various other elements, we successfully made a teddy bear which mirrors a user's face and arm positions in real-time.


A Case Study Towards Verification Of The Utility Of Analytical Models In Selecting Checkpoint Intervals, Michael Joseph Harney Jan 2013

A Case Study Towards Verification Of The Utility Of Analytical Models In Selecting Checkpoint Intervals, Michael Joseph Harney

Open Access Theses & Dissertations

As high performance computing (HPC) systems grow larger, with increasing numbers of components, failures become more common. Codes that utilize large numbers of nodes and run for long periods of time must take such failures into account and adopt fault tolerance mechanisms to avoid loss of computation and, thus, system utilization. One of those mechanisms is checkpoint/restart. Although analytical models exist to guide users in the selection of an appropriate checkpoint interval, these models are based on assumptions that may not always be true. This thesis examines some of these assumptions, in particular, the consistency of parameters like Mean Time …


Real World Computer Forensics, Jessica Riccio Jun 2012

Real World Computer Forensics, Jessica Riccio

Liberal Arts and Engineering Studies

No abstract provided.


Data Recovery 101, Neeraj Mukhi Jun 2010

Data Recovery 101, Neeraj Mukhi

Neeraj Mukhi

At some point in time, everyone who owns a computer will experience the trials and tribulations of hard drive failure. The reasons behind it vary, and could include everything from a human error to damages resulting from flood or water. Viruses can play a role as well, along with many other factors. For many years, the need to recover data that has been lost or destroyed has made data recovery such a very valuable asset.


A Computer Vision Application To Accurately Estimate Object Distance, Kayton B. Parekh Apr 2010

A Computer Vision Application To Accurately Estimate Object Distance, Kayton B. Parekh

Mathematics, Statistics, and Computer Science Honors Projects

Scientists have been working to create robots that perform manual work for years. However, creating machines that can navigate themselves and respond to their environment has proven to be difficult. One integral task to such research is to estimate the position of objects in the robot's visual field.

In this project we examine an implementation of computer vision depth perception. Our application uses color-based object tracking combined with model-based pose estimation to estimate the depth of specific objects in the view of our Pioneer 2 and Power Wheels robots. We use the Camshift algorithm for color-based object tracking, which uses …


A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris Jan 2010

A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris

Browse all Theses and Dissertations

Wireless Capsule Endoscopy (WCE) is a new technology that allows medical personnel to view the gastrointestinal (GI) mucosa. It is a swallowable miniature capsule device the size of a pill that transmits thousands of screenshots of the digestive tract to a wearable receiver. When the procedure finishes the video is uploaded to a workstation for viewing. Capsule Endoscopy has been established as a tool to identify various gastrointestinal (GI) conditions, such as blood-based abnormalities, polyps, ulcers, Crohn's disease in the small intestine, where the classical endoscopy is not regularly used.

As of 2009 the market is dominated by Given Imaging …


Communication Of Medical Information Using Agents, John Mcgrory, Jane Grimson, Frank Clarke, Peter Gaffney Jan 2008

Communication Of Medical Information Using Agents, John Mcgrory, Jane Grimson, Frank Clarke, Peter Gaffney

Conference Papers

Agents are self-contained software entities which act faithfully and autonomously on behalf of a body of knowledge. They can operate in a standalone capacity, or as part of a social group collaborating and

coordinating activities with other software agents. To access their knowledge, agents are interfaced with

using message passing communication. The principle behind medical communications is to provide a means

for exchanging information and knowledge from one computerised location to another, whilst preserving its

true meaning and understanding between the listener and sender. Agent communication is similar to medical

communications, but must provide an additional framework element to allow …


Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine Jan 1998

Proposed Model Rules Governing The Admissibility Of Computer-Generated Evidence, Lynn Mclain, James E. Carbine

All Faculty Scholarship

Pursuant to a grant from the State Justice Institute, the Court of Appeals of Maryland Standing Committee on Rules of Practice and Procedure drafted, and the Court of Appeals adopted, model rules regarding computer-generated animations and simulations. The rules address discovery, pretrial rulings, and preservation of the record for appeal.


Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad Jan 1998

Study Of Electronic Cash: Its Impact On The Economy And Society, And Its Future, Sanjana Prasad

LLM Theses and Essays

Technological advancement has introduced an electronic method for the payment for goods and services. With these advancements and the growth of the internet, the market-place of the world has become one universe without borders. This paper examines the various methods of electronic payment for goods and services and the domestic and international laws that govern their operations. The paper explores concerns about money laundering, counterfeiting, internet security, cyber scams in electronic cash as well as proffered security solutions to these problems. The paper concludes with the proposition that electronic cash in the form of cards (ATM) are more accessible to …