Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Data Science And The Ethics Of Private Information, Faria R. Promi Dec 2023

Data Science And The Ethics Of Private Information, Faria R. Promi

Publications and Research

This research focuses on the moral questions linked to modern data technologies like Big Data and the Internet of Things. These technologies can be, but they are also about privacy and keeping data secure. We've looked at what experts say about these concerns and discovered that most agree we need to safeguard people's privacy and data. Our research encourages everyone to use these technologies, finding a balance between technological progress and responsible, ethical behavior. This way, we can enjoy the benefits of these technologies while also respecting individuals' privacy and data rights. The study reviews what experts have said about …


The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown Jun 2023

The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown

Publications and Research

In this study, the offline programming tool RoboDK is used to program industrial robots for the automation sector. The study explores the feasibility of using this non-disruptive robot programming software for classroom use; assesses how well RoboDK can be used to program various robots used in the industry; creates and tests various applications; and pinpoints technical obstacles that prevent a smooth link between offline programming and actual robots. Initial results indicate that RoboDK is an effective tool for deploying its offline programming code to a Universal Robot, UR3e. There are many potential for advanced applications. The goal of the project …


Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li Jun 2023

Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li

Publications and Research

This paper describes the development of a Raspberry PI-controlled VEX robot for an undergraduate robotic course. The Raspberry PI controls the mobile base built using the VEX robotics kit without using the Cortex micro-controller that comes with the kit. The aim is to create a physical robot that is manageable, easily replicable, and capable of performing advanced robotic control tasks such as vision-based control.

The constructed robot adopts the great features of the PI and the VEX hardware. Firstly, the VEX hardware consists of various sensors and actuators for students to practice the construction and assembly of an autonomous robot. …


Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li Jun 2023

Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li

Publications and Research

This paper describes three MATLAB-ROS-based simulation projects developed for an undergraduate robotics course. The Robot Operating System (ROS) is an open-source framework that helps researchers and developers build and reuse code between robotics applications. Adoption of ROS in the undergraduate curricula is still rare due to its demanding requirements of C++/Python/Java programming skills and familiarity with Linux. Recently, MathWorks released its ROS Toolbox, making it easier to interact with simulators like the Gazebo and ROS-supported physical robots. The MATLAB-ROS-Gazebo simulation platform allows students to utilize other MATLAB Toolboxes, such as Image Processing, Computer Vision, Visualization, and Navigation Toolboxes, for fast …


Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …


Stand-Up Comedy Visualized, Berna Yenidogan Feb 2023

Stand-Up Comedy Visualized, Berna Yenidogan

Dissertations, Theses, and Capstone Projects

Stand-up comedy has become an increasingly popular form of comedy in the recent years and comedians reach audiences beyond the halls they are performing through streaming services, podcasts and social media. While comedic performances are typically judged by how 'funny' they are, which could be proxied by the frequency and intensity of laughs through the performance, comedians also explore untapped social issues and provoke conversation, especially in this age where interaction with artists goes beyond their act. It is easy to see commonalities in the topics addressed in comedians’ work such as relationships, race and politics.This project provides an interactive …


Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang Feb 2023

Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang

Dissertations, Theses, and Capstone Projects

With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …