Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi Jan 2023

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi

Williams Honors College, Honors Research Projects

Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …


Small Voip-Supported Network, Drina Hobson Jan 2023

Small Voip-Supported Network, Drina Hobson

Williams Honors College, Honors Research Projects

Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku Jan 2022

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku

Williams Honors College, Honors Research Projects

Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …


Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn Jan 2022

Magic: The Gathering Card Virtualizer, Vincent Garbonick, Jacen C. Conlan, Jaret A. Varn

Williams Honors College, Honors Research Projects

Any well-versed Magic: The Gathering (MTG) player or collector knows how difficult it can be to keep track of all cards in their collection. Some spend hours searching for that one specific card, and others are constantly scouring the internet for how much their collection costs. However, this issue does not only affect casual fans. Resale companies spend hours a day determining the costs of cards, and tournament judges painstakingly check players’ decks to ensure they are not cheating. To assist with these struggles, the design team proposed to create the MTG Card Virtualizer. This device scans MTG playing cards …


Schaeffler F-250 Bev Conversion: Power Electronics, Leslie Sawyer Jan 2022

Schaeffler F-250 Bev Conversion: Power Electronics, Leslie Sawyer

Williams Honors College, Honors Research Projects

This report shows the work that was done on the power electronics system in the industry sponsored Schaeffler demonstration truck project. The goal of the project was to convert a combustion Ford F250 into a battery electric vehicle, while using as much Schaeffler technology as possible. After the vehicle is converted it will be used as a demonstration vehicle to show potential investors. While this project is still in progress, the work that was done during this time was substantial to the development of this project. Progress that has been made on the power electronics system includes developments in selecting …


Vehicle Maintenance Tracking Program, Jared Tomlinson Jan 2022

Vehicle Maintenance Tracking Program, Jared Tomlinson

Williams Honors College, Honors Research Projects

In order to help consumers and businesses keep track of vehicle maintenance, I will create a program paired with a database that can track vehicle maintenance needs and when they should be performed. The program will be capable of tracking entire fleets of vehicles and based on the vehicle’s mileage, will notify users of what maintenance should be performed. Users will be able to add, remove, and edit vehicles in the system as needed and each vehicle will be paired with a maintenance schedule based on its needs. As maintenance is performed, it can be tracked on the schedule, which …


Penetration Testing In A Small Business Network, Lee Kandle Jan 2022

Penetration Testing In A Small Business Network, Lee Kandle

Williams Honors College, Honors Research Projects

Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …


Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock Jan 2021

Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock

Williams Honors College, Honors Research Projects

The objective of the locomotion system was to design and implement the mechanical, electrical, and software related functions to ensure the LLAGV had the capability of maneuvering its surroundings. The LLAGV’s motors were represented in an open loop transfer function to utilize RPM feedback and a compensator when needed. The modeled compensator helped control the LLAGV’s speed and acceleration, enabling further control of the LLAGV. The internal circuitry has the means to properly distributed power to all components and allowed the user to control the LLAGV to their desire. The application software within the LLAGV locomotion system (LLAGV-LS) had consideration …


Analyzing And Improving Calculation And Tuning Process For A Uav, Laurel Wardell Jan 2021

Analyzing And Improving Calculation And Tuning Process For A Uav, Laurel Wardell

Williams Honors College, Honors Research Projects

The nature of this project is confidential and cannot be disclosed in detail. Generally, this project deals with the analysis of a control system of a UAV with several electric motors and gimbals. The goal of this analysis is to improve control calculations for increased stability. In addition, development has been started on an application to streamline the tuning of gains for this particular controller, allowing for more efficient use of precious flight time.


The Youplanner, Taylor Burgess Jan 2021

The Youplanner, Taylor Burgess

Williams Honors College, Honors Research Projects

Staying organized can be difficult. A four tier web application was created to help in the endeavor. Utilizing software engineering practices, an online notepad was created where users can add, update, and delete notes. The application was a full stack application. For the backend, MySQL was the language and phpMyAdmin was the server. For the front end, PHP and Bootstrap 5.1 was used.


Creature Care, Alexander Weber Jan 2020

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …


Terraria Server On A Raspberry Pi, Bradley Stoldt Jan 2020

Terraria Server On A Raspberry Pi, Bradley Stoldt

Williams Honors College, Honors Research Projects

My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.


Implementing Software Lab At Hackathons, Istvan Gates Jan 2017

Implementing Software Lab At Hackathons, Istvan Gates

Williams Honors College, Honors Research Projects

Hackathons are events where groups of college students have 24 hours to build up a any project, using Computer Science and Electrical Engineering skillsets. These events are typically hosted on college campuses, and attract over 200 students per event. Each student brings 2 devices - their phone, and their laptop. That means that 400 devices are connected to a University venue's Internet network, commonly overloading it. Software Lab alleviates this overloading by providing an abstracted NAS node network for events. Software Lab guarantees speeds of at least 100 mbits/s, and provides a 8-10x improvement on download speeds over the common …