Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber Dec 2014

Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber

Mechanical Engineering

Raytheon is a defense contracting company with an electronic warfare division that is developing a radio frequency signal triangulation system. Part of the focus in improving this technology is the need for accurate and real time locational knowledge of the signal receivers, which are located at the tips of aircraft wings. Due to turbulence during flight, the fluttering motion of the wings alter the distance and angle relationships of the two receivers and add noise to the received signal data, which negatively affect the triangulation estimates. To mitigate this error caused by the wing flutter, Raytheon is developing a software …


Detection Of Breathing And Infant Sleep Apnea, Brian Berg Jun 2011

Detection Of Breathing And Infant Sleep Apnea, Brian Berg

Computer Engineering

Sleep apnea is a condition where people pause while breathing in their sleep; this can be of great concern for infants and premature babies. Current monitoring systems either require physical attachment to a user or may be unreliable. This project is meant to develop a device that can accurately detect breathing through sound and issue appropriate warnings upon its cessation. The device produced is meant to be a standalone device and thus was developed as an embedded systems project on a Xilinx Spartan 6 FPGA.


Uav Pirates And Silentrack Integration, Travis Dean, Hushnak Singh, Ashley Wager, Matthew (Matt) Woolridge Jun 2010

Uav Pirates And Silentrack Integration, Travis Dean, Hushnak Singh, Ashley Wager, Matthew (Matt) Woolridge

Electrical Engineering

The integration of the UAV pirating system with the SilenTrack video tracking system will allow the combined system to automatically identify and track a suspicious air vehicle visually as well as identify and decode the RF control signal. Once a threat has been identified, the system will execute an algorithm to associate each control channel with the corresponding flight control surface. Once the control channels have been decoded the user can use a hand held radio controller to maneuver the drone which is now under their command.