Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ARCE (1)
- Application iOS Swift Python Networking (1)
- ArcGIS (1)
- Bitcraze (1)
- Camera (1)
-
- Civil Infrastructure (1)
- Crazyflie (1)
- DSRC. WiFi (1)
- Earthquake Recon (1)
- IOS (1)
- Location Privacy (1)
- MacOS (1)
- Management System (1)
- Nano quadcopter (1)
- Network Security (1)
- Neural Network (1)
- Pseudonym (1)
- Quadcopter (1)
- Recommendation Application (1)
- Swift (1)
- Task Manager (1)
- VANET (1)
- Vehicular Ad-Hoc Network (1)
- Virtual Networks (1)
- Wireless video streaming (1)
Articles 1 - 6 of 6
Full-Text Articles in Other Computer Engineering
A Survey Of Virtual Network Architectures, Lenoy Avidan
A Survey Of Virtual Network Architectures, Lenoy Avidan
Computer Science and Software Engineering
With the storage needs of the world increasing, especially with the growth of cloud computing, data centers are being utilized more than ever. The increasing need of storage has led to more use of virtualization to help intra and inter data center communications. The virtualization of physical networks is used to help achieve this goal, but with the creation of Virtual Networks, systems must be designed to create, manage, and secure them. A Virtual Network Architecture is the system design for creating and maintaining virtual network components and the resulting networks they create. Different companies design different Virtual Network Architectures, …
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Automation Of Post-Earthquake Civil Infrastructure Reconnaissance, Jack Bergquist
Architectural Engineering
Traditionally post-earthquake structural engineering reconnaissance consists of a team of experts who are deployed to the field to record and capture earthquake damage data, which is later uploaded into online repositories. Despite many advances to these data archives in recent years, the entries in online repositories often have limited metadata which make it difficult and time consuming to extract specific damage evidence that can be used for meaningful analysis. This report outlines the author’s contributions to overcoming these challenges via the development of a neural network that automatically filters and classifies post-earthquake civil infrastructure damage data after a seismic event. …
Delegation Application, Erik Matthew Phillips
Delegation Application, Erik Matthew Phillips
Computer Science and Software Engineering
Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.
Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball
Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball
Computer Engineering
The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work that …
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Master's Theses
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …
Skylux Smartphone Controlled Skylight, James A. Green Vi
Skylux Smartphone Controlled Skylight, James A. Green Vi
Computer Engineering
There are numerous electric skylight openers available for purchase for home-use, but the majority of them are remote based, or operated by a wall-unit. Furthermore, these devices are in hard to reach places, so if one were to lose the remote on a remote operated system, the only option is to contact the manufacturer for a new device. As such, my senior project, in collaboration with Colton Sundstrom’s senior project, build upon our existing capstone project in order to allow operation of the Internet of Things (IoT) device over the internet. Our client, Richard Murray, was unsatisfied with the current …