Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Advanced applications (1)
- Automation technologies (1)
- Automation-related pedagogy (1)
- Automotive industry (1)
- Calibration inconsistencies (1)
-
- Classroom use (1)
- Collaborative robotics (1)
- Containment (1)
- Detection and Analysis (1)
- Electronics industry (1)
- Environmental constraints (1)
- Eradication and Recovery (1)
- Feasibility (1)
- Food and beverage industry (1)
- Grasp planning (1)
- Healthcare industry. (1)
- Identification (1)
- Incident response plan (1)
- Industrial automation (1)
- Industrial operations (1)
- Industrial robots (1)
- Industrial sectors (1)
- Knowledgeable robot programmers (1)
- Mechanical engineering (1)
- Model correctness (1)
- Model representation (1)
- Offline robotic programming (1)
- Ongoing study and development (1)
- Pedagogical impact (1)
- Pharmaceutical industry (1)
- File Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Data Science And The Ethics Of Private Information, Faria R. Promi
Data Science And The Ethics Of Private Information, Faria R. Promi
Publications and Research
This research focuses on the moral questions linked to modern data technologies like Big Data and the Internet of Things. These technologies can be, but they are also about privacy and keeping data secure. We've looked at what experts say about these concerns and discovered that most agree we need to safeguard people's privacy and data. Our research encourages everyone to use these technologies, finding a balance between technological progress and responsible, ethical behavior. This way, we can enjoy the benefits of these technologies while also respecting individuals' privacy and data rights. The study reviews what experts have said about …
The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown
The Potential Of The Implementation Of Offline Robotic Programming Into Automation-Related Pedagogy, Max Rios Carballo, Xavier Brown
Publications and Research
In this study, the offline programming tool RoboDK is used to program industrial robots for the automation sector. The study explores the feasibility of using this non-disruptive robot programming software for classroom use; assesses how well RoboDK can be used to program various robots used in the industry; creates and tests various applications; and pinpoints technical obstacles that prevent a smooth link between offline programming and actual robots. Initial results indicate that RoboDK is an effective tool for deploying its offline programming code to a Universal Robot, UR3e. There are many potential for advanced applications. The goal of the project …
Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li
Development Of A Raspberry Pi-Controlled Vex Robot For A Robotics Technology Course, Lili Ma, Justin Bartholomew, Yu Wang, Xiaohai Li
Publications and Research
This paper describes the development of a Raspberry PI-controlled VEX robot for an undergraduate robotic course. The Raspberry PI controls the mobile base built using the VEX robotics kit without using the Cortex micro-controller that comes with the kit. The aim is to create a physical robot that is manageable, easily replicable, and capable of performing advanced robotic control tasks such as vision-based control.
The constructed robot adopts the great features of the PI and the VEX hardware. Firstly, the VEX hardware consists of various sensors and actuators for students to practice the construction and assembly of an autonomous robot. …
Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li
Introducing Ros-Projects To Undergraduate Robotic Curriculum, Lili Ma, Yu Wang, Chen Xu, Xiaohai Li
Publications and Research
This paper describes three MATLAB-ROS-based simulation projects developed for an undergraduate robotics course. The Robot Operating System (ROS) is an open-source framework that helps researchers and developers build and reuse code between robotics applications. Adoption of ROS in the undergraduate curricula is still rare due to its demanding requirements of C++/Python/Java programming skills and familiarity with Linux. Recently, MathWorks released its ROS Toolbox, making it easier to interact with simulators like the Gazebo and ROS-supported physical robots. The MATLAB-ROS-Gazebo simulation platform allows students to utilize other MATLAB Toolboxes, such as Image Processing, Computer Vision, Visualization, and Navigation Toolboxes, for fast …
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe
Using Nyc Open Data To Improve Accessibility For People With Mobility Impairments In New York City., Said Naqwe
Publications and Research
Approximately one-fifth to one-quarter of American families have a family member with a mobility impairment, which poses challenges for many local communities, particularly in New York City Boroughs. To address this issue, Doorfront.org aims to make sidewalks and facilities, such as residential buildings and restaurants, more accessible to disabled residents of New York City. As a research assistant for Doorfront.org, I used NYC Open Data to accumulate data on inaccessible facilities, such as the NYC sidewalk polygons, building footprints, city hydrants, bus shelters, parking meters, street trees, pedestrian ramps, litter baskets, city benches, and newsstands.
I downloaded a non-geospatial CSV …
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu
Publications and Research
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, …