Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov Jan 2022

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov

Williams Honors College, Honors Research Projects

With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous, …


Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan May 2017

Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan

Computer Engineering

A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy …


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad Jan 2015

Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad

Computer Science Theses & Dissertations

Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes …


Wireless Network Intrusion Detection System, Calvin Jia Liang May 2014

Wireless Network Intrusion Detection System, Calvin Jia Liang

Computer Engineering

The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.