Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan May 2017

Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan

Computer Engineering

A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy …


Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor Dec 2016

Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor

Computer Engineering

No abstract provided.


Slaps Music Sharing App, Maximillian L. Parelius Jun 2015

Slaps Music Sharing App, Maximillian L. Parelius

Computer Engineering

Slaps is a fun way to share new songs with friends. Users can simply select songs from their personal library of music, select a short sample of the song to share, and then select which friends to share it with. If a user loves a song that he/she receives, they can link directly to iTunes through the app to download the full song.


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …


Growing Grounds Inventory Senior Project Application, Javier Balandran Jun 2014

Growing Grounds Inventory Senior Project Application, Javier Balandran

Computer Engineering

No abstract provided.