Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Arkhe - Unmanned Detection Robot, Hannah Klooster Jan 2021

Arkhe - Unmanned Detection Robot, Hannah Klooster

Senior Honors Theses and Projects

Our project is an Unmanned Thermal Detection Robot. Our robot contains a visual camera, a sonar sensor, and a thermal sensor. This project involves hardware building and coding of the sensors and robot itself. The purpose of this project is to create an accessible and affordable unmanned robot with sensors capable of being able to detect human life forms in disaster areas, or areas inaccessible to humans, and to protect the lives of rescuers, find people in disaster areas quicker, and to help save lives. Our project has successfully created an affordable robot that uses sensors to detect and avoid …


The Influence Of Employee's Perceptions Of Top Management Support, Information Technology Competence, Technology Strategy, Organizational Climate, And Organization's Nationality On Information Systems Security, And Quality Success, Saud Fawwaz Alsahli Jan 2018

The Influence Of Employee's Perceptions Of Top Management Support, Information Technology Competence, Technology Strategy, Organizational Climate, And Organization's Nationality On Information Systems Security, And Quality Success, Saud Fawwaz Alsahli

Master's Theses and Doctoral Dissertations

This research investigated the relationship between levels of top management, information technology, competence, technology strategy, and organizational climate within an organization and organization’s success of information systems. The study conducted a quantitative study of 120 employees working for two organizations within the Ministry of Interior in Saudi Arabia and determine whether organizational attributes affect changes in information systems success. In addition, an American organization (40 employees) was used as a comparison. The analysis of the study found that top management support, information technology competence, technology strategy, and organizational climate were strongly correlated with information systems success in Saudi organizations. In …


Developing A Website For The Sword Of The Spirit Using An Agile Development Approach, James Smith Jan 2017

Developing A Website For The Sword Of The Spirit Using An Agile Development Approach, James Smith

Senior Honors Theses and Projects

This creative project was created using an agile development process. Working in coordination with an organization called the Sword of the Spirit, a website was developed for their use. Using the agile approach, multiple iterations of the project were created and brought back to the organization for testing and feedback. The website was developed and is currently working here: https://sites.google.com/view/sosovemight/home.

For this project, a website, administrative email, and data collection and storage process were created. Security was added to ensure only registered profile holders would be able to view the information on the website. This was developed solely for the …


Detection Of Malicious Content In Json Structured Data Using Multiple Concurrent Anomaly Detection Methods, Brett N. Miller Feb 2016

Detection Of Malicious Content In Json Structured Data Using Multiple Concurrent Anomaly Detection Methods, Brett N. Miller

Master's Theses and Doctoral Dissertations

Web applications and Web services often use a data format known as JavaScript Object Notation (JSON) to exchange information. An attacker can tamper with these exchanges to cause the Web service or application to malfunction in a way that is detrimental to the interests of the owners of the Web application or service. Many such applications or services are involved in processes critical to safety or are vital to business interests. Unfortunately, such critical applications cannot always be relied upon to validate the data sent to them. This creates a need for protection external to the applications themselves. This need …


Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco Feb 2016

Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco

Master's Theses and Doctoral Dissertations

This research effort conceptualized, developed, implemented, and examined the psychometric properties of an Information & Communication Technology (ICT) literacy assessment instrument designed for students entering college. This process began with the development of a working definition of the ICT literacy based on the literature and the input of a panel of experts regarding the proposed literacy sub-constructs and the individual test items. A pilot test was conducted to identify areas for improvement. Once these improvements were incorporated, the final assessment instrument was administered to the freshmen class at a private Midwestern comprehensive university with religious affiliation.

The psychometric aspects of …


Mobile Device Vulnerabilities & Securities, Luke Rondeau Jan 2014

Mobile Device Vulnerabilities & Securities, Luke Rondeau

Senior Honors Theses and Projects

An investigation on current mobile vulnerabilities and research into security. Also, a proof of concept to show the ease of injecting an Android phone with a virus.


Eastern Michigan University Honors College Application Online System, Andrew Greiner Jan 2014

Eastern Michigan University Honors College Application Online System, Andrew Greiner

Senior Honors Theses and Projects

No abstract provided.


A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi Nov 2013

A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi

Master's Theses and Doctoral Dissertations

Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …


A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy Nov 2009

A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy

Master's Theses and Doctoral Dissertations

The Internet‟s router infrastructure, a scale-free computer network, is vulnerable to targeted denial-of-service (DoS) attacks. Protecting this infrastructure‟s stability is a vital national interest because of the dependence of economic and national security transactions on the Internet. Current defensive countermeasures that rely on monitoring specific router traffic have been shown to be costly, inefficient, impractical, and reactive rather than anticipatory.

To address these issues, this research investigation considers a new paradigm that relies on the systemic changes that occur during a cyber attack, rather than individual router traffic anomalies. It has been hypothesized in the literature that systemic knowledge of …