Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov Jan 2022

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov

Williams Honors College, Honors Research Projects

With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous, …


Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh Dec 2021

Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh

Elinvo (Electronics, Informatics, and Vocational Education)

The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …


Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg Nov 2019

Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg

Publications

Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad Jan 2015

Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad

Computer Science Theses & Dissertations

Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes …


Wireless Network Intrusion Detection System, Calvin Jia Liang May 2014

Wireless Network Intrusion Detection System, Calvin Jia Liang

Computer Engineering

The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.