Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Liberty University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 14 of 14

Full-Text Articles in Computer Engineering

Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace May 2024

Simulating And Training Autonomous Rover Navigation In Unity Engine Using Local Sensor Data, Christopher Pace

Senior Honors Theses

Autonomous navigation is essential to remotely operating mobile vehicles on Mars, as communication takes up to 20 minutes to travel between the Earth and Mars. Several autonomous navigation methods have been implemented in Mars rovers and other mobile robots, such as odometry or simultaneous localization and mapping (SLAM) until the past few years when deep reinforcement learning (DRL) emerged as a viable alternative. In this thesis, a simulation model for end-to-end DRL Mars rover autonomous navigation training was created using Unity Engine, using local inputs such as GNSS, LiDAR, and gyro. This model was then trained in navigation in a …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob May 2023

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


The Music Bluetooth Controller: An Intersection Between Technology And Music, Lydia Wu Apr 2022

The Music Bluetooth Controller: An Intersection Between Technology And Music, Lydia Wu

Senior Honors Theses

The modern musician faces a new challenge: how can technology be used to enhance a performance? This thesis documents the development of a Bluetooth remote controller that will aid today’s performing musicians by interacting with a digital display (e.g., an iPad) to flip musical score pages remotely. At its core, while mimicking a Bluetooth pedal (the current industry standard), this device attaches to the musician’s hand. In its pilot stages, the device has been referred to “MBC” (Music Bluetooth Controller).


Artificial Intelligence And The Ethics Behind It, Isaac Johnston May 2021

Artificial Intelligence And The Ethics Behind It, Isaac Johnston

Senior Honors Theses

Artificial intelligence (AI) has been a widely used buzzword for the past couple of years. If there is a technology that works without human interaction, it is labeled as AI. But what is AI, and should individuals be concerned? The following research aims to define what artificial intelligence is, specifically machine learning (ML) and neural networks. It is important to understand how AI is used today in cars, image recognition, ad marketing, and other areas. Although AI has many benefits, there are areas of ethical concerns such as autonomous cars, military applications, social media marketing, and others. This paper helps …


Hardware Security Of The Controller Area Network (Can Bus), David Satagaj Apr 2020

Hardware Security Of The Controller Area Network (Can Bus), David Satagaj

Senior Honors Theses

The CAN bus is a multi-master network messaging protocol that is a standard across the vehicular industry to provide intra-vehicular communications. Electronics Control Units within vehicles use this network to exchange critical information to operate the car. With the advent of the internet nearly three decades ago, and an increasingly inter-connected world, it is vital that the security of the CAN bus be addressed and built up to withstand physical and non-physical intrusions with malicious intent. Specifically, this paper looks at the concept of node identifiers and how they allow the strengths of the CAN bus to shine while also …


A Test Bed For Evaluating The Performance Of Iot Networks, Hope Harvey Apr 2020

A Test Bed For Evaluating The Performance Of Iot Networks, Hope Harvey

Senior Honors Theses

The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used. While RPL provides a low-cost solution for connection, it lacks load balancing mechanisms. Improvements in OF load balancing can be implemented to strengthen network stability. This paper proposes a test bed configuration to show the toll of frequent parent switching on 6LoWPAN. Contiki’s RPL 6LoWPAN software runs on STM32 Nucleo microcontrollers with expansion boards for this test bed. The …


Parameter Analysis Of An Adaptive, Fault-Tolerant Attitude Control System Using Lazy Learning, Matthew Russell Apr 2018

Parameter Analysis Of An Adaptive, Fault-Tolerant Attitude Control System Using Lazy Learning, Matthew Russell

Senior Honors Theses

Several key requirements would be met in an ideal fault-tolerant, adaptive spacecraft attitude controller, all centered around increasing tolerance to actuator non-idealities and other unknown quantities. This study seeks to better understand the application of lazy local learning to attitude control by characterizing the effect of bandwidth and the number of training points on the system’s performance. Using NASA’s 42 simulation framework, the experiment determined that in nominal operating scenarios, the actuator input/output relationship is linear. Once enough information is available to capture this linearity, additional training data and differing bandwidths did not significantly affect the system’s performance.


The Design And Implementation Of A Pcie-Based Less Label Switch, Amy C. Williams Apr 2017

The Design And Implementation Of A Pcie-Based Less Label Switch, Amy C. Williams

Senior Honors Theses

With the explosion of the Internet of Things, the number of smart, embedded devices has grown exponentially in the last decade, with growth projected at a commiserate rate. These devices create strain on the existing infrastructure of the Internet, creating challenges with scalability of routing tables and reliability of packet delivery. Various schemes based on Location-Based Forwarding and ID-based routing have been proposed to solve the aforementioned problems, but thus far, no solution has completely been achieved. This thesis seeks to improve current proposed LORIF routers by designing, implementing, and testing and a PCIe-based LESS switch to process unrouteable packets …


A Cyber-Physical System, Andrew Davis, Dustin Bowe, Josiah Nagel May 2016

A Cyber-Physical System, Andrew Davis, Dustin Bowe, Josiah Nagel

Montview Journal of Research & Scholarship

The team was tasked with the creation of an autonomous cyber-physical system that could be continually developed as a post-capstone class by future STEM students and as a means to teach future engineering students. The strict definition of a cyber-physical system is a computation machine that networks with an embedded computer that performs a physical function. The autonomous aspect was achieved through two sonic sensors to monitor object distances in order to avoid walls and obstacles. The integrated system was based on the Intel Edison computation module. A primary goal for future addition is automation capabilities and machine learning applications.


“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams Apr 2016

“My Logic Is Undeniable”: Replicating The Brain For Ideal Artificial Intelligence, Samuel C. Adams

Senior Honors Theses

Alan Turing asked if machines can think, but intelligence is more than logic and reason. I ask if a machine can feel pain or joy, have visions and dreams, or paint a masterpiece. The human brain sets the bar high, and despite our progress, artificial intelligence has a long way to go. Studying neurology from a software engineer’s perspective reveals numerous uncanny similarities between the functionality of the brain and that of a computer. If the brain is a biological computer, then it is the embodiment of artificial intelligence beyond anything we have yet achieved, and its architecture is advanced …


Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams Apr 2015

Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams

Senior Honors Theses

Companies of all sizes operating in all markets are moving toward cloud computing for greater flexibility, efficiency, and cost savings. The decision of how to adopt the cloud is a question of major security concern due to the fact that control is relinquished over certain portions of the IT ecosystem. This thesis presents the position that the main security decision in moving to cloud computing is choosing which type of cloud to employ for each portion of the network – the hybrid cloud approach. Vulnerabilities that exist on a public cloud will be explored, and recommendations on decision factors will …


Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson Nov 2013

Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson

Senior Honors Theses

Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.

Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …


Reconfigurable Systems: A Potential Solution To The Von Neumann Bottleneck, Damian L. Miller Apr 2011

Reconfigurable Systems: A Potential Solution To The Von Neumann Bottleneck, Damian L. Miller

Senior Honors Theses

The difficulty of overcoming the disparity between processor speeds and data access speeds, a condition known as the von Neumann bottleneck, has been a source of consternation for computer hardware developers for many years. Although a number of temporary solutions have been proposed and implemented in modern machines, these solutions have only managed to treat the major symptoms, rather than solve the root problem. As the number of transistors on a chip roughly doubles every two years, the von Neumann bottleneck has continued to tighten in spite of these solutions, prompting some computer hardware professionals to advocate a paradigm shift …